Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
In 2016, the SonicWall Capture Threat Network observed 60 million unique malware samples, 7.9 billion malware attack attempts, 638 million ransomware attacks and showed that 62% of SonicWall customer internet sessions were encrypted using SSL/TLS.
The SonicWall Capture Labs Threat Research Team:
•Gathers, analyzes, and vets cross-vector threat information from more than one million sensors around the world,
• Performs rigorous testing and evaluation,
• Establishes reputation scores for email senders and content
• Identifies new threats in real-time.
Get the most up-to-date protection against new attacks with real-time information from SonicWall Capture Labs.
Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.
This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.
Join us to hear more about:
•The Mandatory Data Breaches scheme
•Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
•The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
In our future 5G world, your users will not only need to be connected all the time, they will also require access to fast, agile services. The question is: Will your network be ready to support multiple best-in-class wired and wireless access technologies?
“Technology Convergence: Support Multiple Wired and Wireless Access Technologies” explores how virtualization allows for a converged access platform that simplifies management of your access network and lowers your overall system total cost of ownership. The webinar walks you through a working proof of concept developed by Intel, Casa Systems, and Kyrio that brings together vCCAP, vWAG, vEPC, and other VNFs running within an open-source NFVI. Addressed as well is how this solution can be expanded for other operator needs through flexible and generalized SDN/NFV principles.
Listen to Kevin Curtis, Distinguished IOT Architect – Connected Cities, Verizon Enterprise Solutions (VES) talk about how digital transformation occurs when information technology (IT) and operational technology (OT) data assets are effectively integrated, to realize new business outcomes and to create transformative value, not previously possible.
Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.
Steve Reynolds, CTO, Imagine Communications
Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.
Host: Limor Schafman, Content Development Director, TIA
As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
Whether you keep your enterprise data in the cloud, on-prem or in a hybrid environment, chances are, you’re making more copies than you’d like to.
Of course, you must meet data protection requirements. Unfortunately, what sounds like a two-step process – store the data and back it up – often multiplies into many more steps with many more copies. And every time you duplicate your data, you increase your costs.
In this webcast, we’ll look at why this is and what your options are to stop copying data and start accessing it.
The shift to the cloud is modernizing government IT, but are agencies' storage models keeping up with that transition? When it comes to big data, the proper system is necessary to avoid major data bottlenecks and accessibility challenges, allowing agencies to get the right information to the right people at the right time. Flash storage is the latest technology that improves scale, speed, and efficiency of data storage. Join us for a panel discussion on the challenge of scale, increased demand for user-focused data management tools, and security and risk reduction with sensitive data.
- Paul Krein, Chief Technology Officer, Red River
- Joe Paiva, Chief Information Officer, International Trade Administration, U.S. Department of Commerce
- Linda Powell, Chief Data Officer, Consumer Financial Protection Bureau
- Ashok Sankar, Director, Solutions Strategy, Public Sector and Education, Splunk
- Nick Psaki, Principal, Office of the CTO, Pure Storage
This webinar will provide attendees an overview of capabilities of VirNOS virtual network function (VNF) and the use cases. We will cover virtualizing services at the customer edge and how service providers can enable services such as VPN and IPSec to their end customers at lower OPEX. The presenter will also discuss vPE/vRouter running at the data center or cloud providing MPLS WAN services.
Intro webinar and demo featuring Hedvig CEO and co-founder Avinash Lakshman. Learn how software-defined storage transforms your data center and delivers more agile and lower cost data management for VMware and Docker, spanning on premises and public cloud.
Microsoft System Center Operations Manager (SCOM) allows system and application administrators to monitor operations, services, devices and applications within an enterprise through a single console. This single pane of glass can simplify operations, but monitoring the performance of end-to-end digital business services requires more than aggregating measurement data using multiple management packs.
From a performance management perspective, unified monitoring is most effective when there’s a single source of actionable truth; it moves us away from diagnosis-related activities and toward collaborating on how to establish self-healing properties when that diagnosis is identified. Not only is this more cost-effective, it’s a more “unifying” activity than troubleshooting.
A single pane of glass without an understanding of end-to-end IT service dependencies may just lead to more alert fatigue-- little actionable information due to lack of effective correlation and root cause diagnosis. The results are long problem isolation and diagnosis cycles, resulting in poor user experience and increased IT operation costs.
Join us for this webinar as John Worthington, Director of Product Marketing at eG Innovations, demonstrates how you can achieve end-to-end performance monitoring of Microsoft IT services such as SharePoint, Exchange or custom .Net applications--even if those IT services incorporate non-Microsoft components or cloud services—and unify Microsoft SCOM at the same time.
The promise of workflow modernization through automation is great — speed, efficiency, and productivity are the hallmarks. But, the process to get there can be complex: How do you prioritize and modernize those designated workflows as you move to new platforms or implement new processes and ways of working? With workflow modernization, your organization can become fully cross functional, enabling all teams to collaborate to create automation content.
In this webinar, we’ll show you the strategic approach to workflow automation and provide actionable guidance on to make operations more repeatable, predictable, and automated. You’ll learn how to:
- Bring a DevOps mindset and approach to the network
- Create fully automated workflows that are interchangeable between projects
- Extend the power of Ansible automation across the enterprise
As the result of extensive primary end-user and multi-vendor research, including responses from 700+ IT decision makers, Taneja Group has learned that an increasing number of organizations are more motivated than ever before to move their applications in the cloud. However, they prefer to easily move those applications between on-premises and multiple clouds without having to modify the underlying storage infrastructure.
Join us as we unpack this emerging market category along with SoftNAS, one of the vendors at the forefront of this trend.
In this webinar we’ll cover:
• How multi-cloud primary storage can span multiple cloud environments and mitigate the risk of moving to the public cloud
• Lifting and shifting applications to a single public cloud or multiple public clouds without re-engineering the applications
• Why the SoftNAS Cloud Data Platform enables enterprise on-premises file services to be collocated in public clouds
About your hosts:
Taneja Group’s Senior Analysts Jeff Kato and Jeff Byrne will discuss the research behind the Taneja Group’s Multi-Cloud Primary Storage market category. They will be joined by Rick Braddy, Founder, CEO and CTO at SoftNAS, who will describe how the SoftNAS Cloud Data Platform provides the best pathway to shift applications among on-premises, AWS, and Azure clouds.
The sixth year of Amazon RE:Invent is almost upon us (November 27 to December 1 in Las Vegas). In this webinar join Storage Switzerland, Avere Systems and SwiftStack for a storage professional’s guide to the event.
- The different tiers of the Amazon storage offering
- How to create hybrid cloud storage combining private and public offerings
- Learn how to interconnect multiple cloud providers
Ad fraud isn’t becoming more prevalent -- the fraudsters are just getting slicker. From bot nets to device ID spoofing, the tricks are getting more sophisticated, and raking in more and more cash for the swindlers.
Staying ahead of the fraudster’s learning curve is the key — and collaboration is the crucial element. While vendors and advertisers are directly impacted by fraud, tracking partners provide the technology to help fight fraud – all three players have to work together to circle the wagons.
Making a game plan can be complex, when there are no clear benchmarks for defining or measuring fraud, as each player defines it differently and different benchmarks are needed for each app type, geo, traffic source, and so on.
Join this VB Live event to learn how to tackle that complexity, how to define benchmarks, detect and manage fraud, and work with your partners to circle the wagons against the fraudsters.
Register for free!
* Who the stakeholders are, plus why and how is each is affected
* The MMPs’ role in this ecosystem
* What fraud is and what benchmarks should be used for defining it
* How to collaborate to detect and manage fraud on an ongoing basis
* What tools are out there to fight fraud
* Emily Storino, Network Strategy Lead, Electronic Arts (EA)
* Grant Simmons, Head of Client Analytics, Kochava
* Tal Nissenson VP Client Success US, Taptica
* Stewart Rogers, Analyst-at-Large, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
Blending public and private clouds is a strategic goal for many organizations. Join us in this unique session describing how Google and Nutanix join forces to bring this objective to fruition. We will preview how Nutanix customers can natively and instantly extend their environment to cloud services delivered from Google datacenters. We will also discuss how customers can benefit from bleeding-edge technologies like Kubernetes in their on-prem infrastructure
Digital transformation, acceleration, innovation. Buzzwords or not, these words reflect the reality of every existing business fighting for new revenue streams, better customer experience, and faster delivery of new services.
To support these business objectives, IT organizations need to focus on increasing performance and workforce productivity without driving additional costs. At the same time, it is imperative that tools need to adapt to the way people work today.
In this session we will present the new, re-architected Micro Focus ITSM Automation solution (formerly known as HPE ITSM Automation). Micro Focus ITSM Automation software can be installed on Amazon Web Services, brings a new user experience, greater collaboration, and many other new capabilities. It is based on machine learning and analytics, to adapt the tools to the needs of business users and IT.
Join our live webinar and learn:
•Why choice, flexibility and speed in ITSM deployment is important
•What data is needed so that service desk agents can become more productive and proactive
•How to solve issues faster with increased collaboration among both end users and ITSM staff
Greenlight Group, a managed service provider, will discuss what helps them meet the most stringent SLAs while constantly providing new service offerings to their customers.
During the webinar, you will also see the new ITSM Automation release live in action.
The Telecommunications Industry Association (TIA) TR-42 Telecommunications Cabling Systems Engineering Committee is issuing a Category 8 cabling systems update. Join this webcast to learn the details.
>> Mark Mullins - Global Communications Manager, Fluke Networks
Mark is one of the founding members of Fluke Networks, starting in 1993. He has been involved in all of the key areas of the business, including cable testing, network troubleshooting and analysis. He holds a B.S. in Computer Science and an MBA from the University of Washington.
>> Frank Straka - Product Line Manager, Panduit
Frank Straka manages Panduit’s copper and fiber cable product lines. Frank holds multiple degrees in both engineering and business, including a BSEE, MSEE, and MBA. He holds 26 patents in copper connectivity and cable design. Frank is active in the TIA TR42.7 standards group, which developing new standards to support new applications like 25 and 40GBASE-T, 100W PoE++ and NBASE-T. He has spoken at multiple conferences such as BICSI, IWCS, and the Ethernet Summit on new copper developments.
The shift to cloud is on. The challenge is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale ... and that has inspired a few myths (that we'll de-bunk). Can private cloud and the IT department keep pace? We'll make the case for a building block architecture -- introducing public cloud-like web services in your data center. We will share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
While 2017 was turning out to be a year of ransomware attacks, the mother of all data breaches was carried out on Equifax where the personal information of 146 million people was stolen. Even though these companies had invested in preventive security technologies, it did not stop cyber criminals from stealing sensitive information or bringing their businesses to a grinding halt.
In this webinar, we will examine the top 3 cyber-attacks and data breaches of 2017, and discuss the following:
- How were these cyber-attacks carried out?
- Why preventive technologies were not enough to stop these attacks?
- What type of detection and response capabilities and security expertise could have made a big difference?
About our speakers:
Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.
Anybody can deliver technology, but these days Managed Service Providers (MSPs) also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.
In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
- Current threats and how they are evolving
- Comprehensive threat protection for the cloud
- Unified security for detecting threats and responding to incidents
VMware’s vSphere 6.5, the latest version of the industry leading virtualization platform, solves for the top challenges for digital transformation including: increasingly complex IT environments, new cybersecurity threats, the need to support both existing and new apps and services, and the need for continuous operations and responsiveness.
In this webcast, VMware subject matter experts will explore the key components available in vSphere 6.5 including: simplified experience, comprehensive built-in security, universal app platform, and proactive data center management. Plus, get insight into how vSphere can continue to support your business needs into the future with the Update 1 release. We’ll discuss:
-What’s new in vSphere 6.5 and Update 1
-Foundational vSphere 6.5 Knowledge
-Best practices for upgrading to vSphere 6.5
-How upgrading is the gateway to modern infrastructure.
Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
Feeling bludgeoned by bullhorn messaging suggesting your monolithic behemoth should be put down (or sliced up) to make way for microservices? Without question, 'unicorn-style' microservices are the super-nova-hot flavor of the day, but what if teaching your tried and true monolith to be a nimble, fast-dancing elephant meant you could deploy every week versus every 6 to 9 months?
For most enterprises, weekly deployments (or something close) would fundamentally transform not only operations and business results, but also the inherent value of developers willing to step up to lead the dance lessons.
See beyond the hype to understand the deployment model your business case actually demands, and if weekly deployments courtesy of a dancing (or flying!) elephant fit the bill, love the one you're with as you lead the organization's journey to digital transformation!
5G will bring several groundbreaking new technologies into play with its new air interface and Radio Access Network (RAN) architecture extensions. It will also need an emerging software defined infrastructure, one that provides greater topology flexibility, essential to deliver on the promises of high availability, high coverage, low latency and high bandwidth connections that will open up new parallel industry opportunities.
Edge Cloud unlocks many new doors and one of the keys to its enablement lies in the elasticity and flexibility of the underlying infrastructure. This webinar will discuss several use cases for edge computing along the road to 5G including VR/AR, autonomous cars and IoT, and how Multi-Access Edge Computing solutions allows testing and trials of solutions today.
Container technology is impacting how we think about persistent storage for applications and microservices. In turn, software-defined storage will impact how storage is dynamically provisioned and managed for containerized applications.
Red Hat® OpenShift Container Platform is the container application platform that brings Docker and Kubernetes to the enterprise. Closely integrated with Red Hat® Gluster Storage, together they advance seamless, containerized storage that is uniquely differentiating the future of storage in a container-driven datacenter.
Join this webinar to learn how container-native storage built with Red Hat Gluster Storage, and tightly integrated with Red Hat OpenShift Container Platform, can help you:
- Gain autonomy and control over the storage provisioning experience.
- Persist registries, logging, and metrics on a single storage platform.
- Support file, block, and object storage on a single storage platform for your container orchestration platform.
- Hear from a customer who uses Red Hat Gluster Storage as their container storage solution.
Listen to GlobalData's Peter Jarich – VP, Consumer Services and Service Provider Infrastructure talk about who is in the lead for 5G test trials and deployments and what regions of the world we can expect the next generation of network communications?
The clock is ticking and it’s time to act as Europe’s most demanding and far reaching Data Security regulation to date has been published. This webinar from IBM Cloud will examine the key requirements of GDPR, and look at how we can IBM's Cloud and Data security capabilities to simplify your GDPR Readiness journey.
What You Will Learn
The impact of the Regulation and its key principles
What data protection by design and by default means for organisations
The foundational principles of data protection
Practical application of data protection by design and by default in the Cloud - Data security, encryption capabilities, data breach notification, Multi Cloud SaaS offerings, IBM Cloud services and our Technical and Operational Measures.
What does signing of 24 IBM Cloud infrastructure and PaaS services means in terms of data protection adherence under GDPR.
Enterprises generally have a significant portfolio of legacy applications running in production; applications that have been developed 10-15 years ago or more. These applications stand in the critical path of revenue generation. It's not easy to just rip them out and replace them all with applications built on modern architectures, such as microservices and containers. Businesses can't afford downtime and certainly aren't willing to pay for something they can't see. We need the ability to modernize legacy applications while allowing IT to continue to deliver value—innovating from inside out. Verizon evaluated Red Hat's OpenShift Container Platform to modernize their application portfolio.
In this session, we'll present Verizon’s journey to containerize one of their most challenging applications. We'll show the results of a 2-month long proof-of-concept, including successes, misses, and a roadmap for application modernization. You'll learn about the journey, the pitfalls, and the lessons learned of modernizing complete application portfolios.
In this webinar we will show practical tips on how developers can secure their containerised applications across the DevOps pipeline and solve their secrets management challenges without stifling architectural and software design choices .
We will show a demo of Conjur from CyberArk, an open source security service that helps to securely store and safely retrieve secrets in high-velocity and widely-scaled IT environments while integrating with popular CI/CD tools to provide machine identity authorisation and more.
The National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) is widely recognized as an effective roadmap for improving threat detection and compliance. However, many smaller IT security teams with limited resources have trouble implementing and maintaining the recommended security controls and processes. That's where AlienVault can help.
In this webcast, AlienVault CISO John McLeod will provide insights into how AlienVault approached implementation of NIST CSF and accelerated the process using their own Unified Security Management (USM) platform.
Join this webcast for:
- An overview of security controls recommended by NIST CSF
- Best practices for approaching adoption of NIST CSF
- How a unified security toolset can greatly simplify this process
- A demo of the AlienVault Unified Security Management (USM) platform
Over the past thirty years, not much has changed in the architecture of industrial control systems. During this time, however, there have been fundamental transformations in the world of Information Technology (IT). In this webinar, we explain the business benefits that can be derived by implementing software defined industrial control systems that leverage software-based techniques from the IT industry. We describe a straightforward process for transitioning to this new architecture, managing the risks and reaping the benefits.
The idea of the data lake was alluring; the means to having data at your fingertips, filtered, profiled, secure and business-ready for data consumers to rapidly derive higher-levels of business value. However, this widely adopted concept didn’t come with an instruction manual.
The past few years have been turbulent times for enterprise data and analytics. In this live discussion, the presenters look beyond the lake, discussing the combination of self-service data preparation and data management and governance as one; a truly functional data marketplace or “data bazaar”. In addition, they will touch on other key enablers fueling the adoption of the self-service marketplace, including;
•Data as a service,
•Smart data ingestion – validation/profiling,
•Smart data cataloging/search,
As 2018 approaches, the era of multi-cloud has arrived. With virtually all the tech leaders and innovators offering robust cloud solutions, there have never been more options for organizations looking to move workloads to the cloud. That makes it easier than ever for companies to avoid vendor lock-in and provision the exact services they want, from whomever they want.
In this webcast, we’ll discuss how application concerns, cost savings and security will make 2018 the year of multi-cloud and what it will mean for enterprises.
As companies shift towards the cloud for their application environments, IT organizations are tasked with finding the most effective methods and solutions to quickly and securely connect their corporate networks to external cloud environments while maintaining the integrity of their corporate security models. Digital transformation and software-defined options are driving IT teams to re-think the existing direction of their WAN to cost-effectively connect to multiple and geographically diverse VPCs. In this session, we outline a solution we’ve recently implemented which includes the adoption of an SDN methodology when securely connecting to geographically diverse VPCs with AWS Direct Connect and transit VPCs.
Az előadás során elmondjuk, hogy milyen szolgáltatások támogatására érdemes üzembe helyezni a nyílt, hardverfüggetlen, szoftveralapú tárolási megoldásokat és hogy ezek hogyan segítenek minket egy modern, a legújabb kihívásoknak is megfelelő szoftveralapú adatközpont kialakításában. A szoftveralapú tárolási megoldások tökéletes hidat képeznek a hagyományos adatközpontok és a DevOps-központú infrastruktúrák között.
A webes előadáson a SUSE Storage legújabb, Ceph Luminousra épülő kiadásáról fogunk beszélni, és számos gyakori használati esetet tárgyalunk, mint a lemezek közötti biztonsági mentést, a megfelelőséget garantáló archívumokat, a tömeges adattárakat, vagy a felhőalapú tárolást. Emellett azt is megvizsgáljuk, hogy a SUSE segítségével hogyan lehet elérni a tárolási beruházások maximális megtérülését kompromisszumok és korlátozások nélkül.
Following our hugely popular “6 Steps to GDPR Compliance” webinar, part 2 will offer a recap followed by an interactive Q&A moderated by Adrian Davis, (ISC)² EMEA's Managing Director.
Join Jan Smets, certified DPO at Gemalto who will focus on the steps where our customers are currently actioning.
1) Understand the GDPR legal framework
2) Create a Data Register
3) Classify your data
4) Start with your top priority
5) Assess and document additional risks and processes
6) Revise and repeat
A whole new era of cloud-native applications is here. From blockchain and IoT, to AI and machine learning, AR/VR, containers and microservices, the possibilities for modernizing your IT infrastructure are endless.
With these advanced technologies and the widespread adoption of open source comes greater security risks, the explosion of firewall, and implications on IT teams to adopt, integrate, transition, and digitize at lightning speed.
Join this expert panel with Russ White, Network Architect at LinkedIn, Tarak Modi, President & CTO of TekNirvana, and Bala Kalavala, Founder & CIO of Adiya, Inc. as they discuss and explore in-depth the most important technology trends and how to apply them in 2018.
- Decentralized applications - a closer look at containers and microservices, blockchain, AI, VR and IoT
- Network disaggregation and the changing engineering landscape
- DevOps, agile and software-defined networking
- A technical deep dive into cloud, open source and security in 2018 and beyond
- Challenges in adapting to modernization of enterprise IT - People and Process
One of the main aims of the NFV-concept is to replace dedicated proprietary network hardware with flexible and scalable software-based solutions. However, all but one of today’s VNF solutions demonstrate benefits in terms of flexibility and scalability, but not the levels of performance that the industry demands.
NFWare, an innovative network software vendor, has risen to meet the challenge by developing virtual networking products to provide hardware-like performance alongside all the benefits of a virtual solutions. NFWare’s product line includes three products: vCGNAT (up to 200 Gbps per VM), vADC (up to 40M CPS per VM) and vURL-Filtering (up to 20M CPS and 100M concurrent sessions per VM).
At the webinar, NFWare will tell more about technologies that allowed to achieve outstanding performance levels, as well as discussing what this new technology means for an industry that is always in search of faster, better ways of working.
Join this live webinar with Monique Morrow, President & Co-Founder of The Humanized Internet, for an in-depth look at the major influencers, game changers, and technologies that are shaping IT in 2018. From fast changing global patterns to the "trust deficit" and community activism, this will be a holistic approach to understanding the technologies of tomorrow. Topics will include:
- Big Data
- AI & Facial recognition
- Critical Infrastructure
- Cyber security
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
IT organizations that rely on legacy platforms and traditional development processes struggle to innovate and keep up with competitive pressures and the high rate of change demanded by customers. Application and infrastructure modernization is needed and while many organizations are interested in making this change, they often find themselves asking, “Where and how do we begin?”
In this webinar we’ll share best practices from successful IT modernization and migration projects to help you get started on your digital transformation journey. Topics include:
- Analyzing large-scale application portfolios for modernization opportunities.
- Modernizing existing applications with containers, CI/CD, and DevOps principles.
- Creating a business case.
- Structuring transformation project teams.
- A proven methodology for migrations.
In this webinar we will explore new privileged account risks that DevOps, the Cloud and digital transformation projects bring. Examples shown will discuss the privilege risks that have already been exploited to compromise businesses. We will share best practices and guidelines on managing highly privileged secrets used to access cloud consoles, access keys and finally how to manage the privileged secrets bestowed to the new robot-guardians of our infrastructure, CI/CD tools.
Change is coming fast and furious. And in the eye of the storm are applications. I’ve seen entire IT departments go into scramble drills to see if they possessed the necessary personnel and talent to bridge the gap as their organizations embraced digital transformation. And by digital transformation, I mean the ubiquitous app or service that can be consumed from anywhere on any device at any given time. For organizations, it’s all about making money all the time from every possible engagement. Remove the barrier to consume and make the organization more money is what digital transformation is all about. So what will happen in 2018?
In this session, I will discuss my top three IT predictions for 2018 and discuss how IT professionals can remain valuable in their IT careers in the face of continuous integration and continuous delivery.
· What are my top three 2018 predictions?
· What skills do I need to remain relevant?
In support of Microsoft Server software-defined storage, Intel has created Select Solutions. They are workload-optimized data center solutions that accelerate customer paths from product evaluation to installation. Intel selected DataON’s new Purley-based TracSystem HCI to be part of the first Intel Select Solution with Windows Server Software-Defined Storage.
In October, Microsoft released their semi-annual channel (SAC) update of Windows Server 2016, also known as build 1709. Included in the release are updates to the Server Core and Nano Server container images, introduction of a new Windows Server management tool known as “Project Honolulu”, and many compute, storage, networking and remote-desktop services updates.
Cherokee County School District (CCSD) is a public school system in the metro Atlanta, GA area. It consolidated their three-tiered SAN storage system into a consolidated Windows Server 2016 software-defined system that could support over 50,000 students and staff.
The webcast will explore the following topics:
•How Intel Select Solutions simplify and accelerate the process of selecting and deploying hardware and software needed for Window Server software-defined solutions.
•What’s new in Windows Server 2016 build 1709 and why the new features are important.
•Why Cherokee County School District chose a Windows Server 2016 solution to simplify their on-premise storage needs and provide enough VMs for their students and staff.
DataON Storage – Howard Lo, VP of Sales and Marketing
Microsoft – Jeff Woolsey, Principle Program Manager, Windows Server
Intel Corporation – Christine McMonigal, Storage Software Ecosystem Manager
Cherokee County School District – Matt Roper, Facilitator of Technology Support Services
As more organizations move to public cloud service providers, they expect the same level of automation and self-service from their data centers. Ranging from network configuration and provisioning virtual network resources to self-healing networks, network automation is fast becoming a top priority for efficiency and productivity for many organizations.
In this webinar, we’ll offer a framework that shows how network automation can change the way you do business. Using TripleO to deploy an OpenStack® lab environment and Ansible to manage the cloud resources, you’ll learn how to:
- Develop an automation strategy that includes network discovery and configuration auditing.
- Adopt a holistic approach to configuration and workload management.
- Automate new network device provisioning.
- Integrate existing orchestration tools and systems with Red Hat® Ansible Tower.
- Provide a better way for teams to deploy and manage their own workloads.