Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Patty Driever, IBM; Howard Johnson, Broadcom; Joe Kimpler, ATTO TechnologiesRecorded: Feb 20 201954 mins
FICON (Fibre Channel Connection) is an upper-level protocol supported by mainframe servers and attached enterprise-class storage controllers that utilizes Fibre Channel as the underlying transport.
The FCIA FICON 101 webcast (on-demand at http://bit.ly/FICON101) described some of the key characteristics of the mainframe and how FICON satisfies the demands placed on mainframes for reliable and efficient access to data. FCIA experts gave a brief introduction into the layers of architecture (system/device and link) that the FICON protocol bridges. Using the FICON 101 session as a springboard, our experts return for FICON 201 where they will delve deeper into the architectural flow of FICON and how it leverages Fibre Channel to be an optimal mainframe transport.
Join this live FCIA webcast where you’ll learn:
- How FICON (FC-SB-x) maps onto the Fibre Channel FC-2 layer
- The evolution of the FICON protocol optimizations
- How FICON adapts to new technologies
Paul Stevens / Advantech, Eric vanVliet / Advantech, Purvi Thakkar / IntelRecorded: Feb 19 201955 mins
Workloads are shifting across platforms that span from entry-level to extreme performance.
Finding the right balance of compute, acceleration, networking and storage to cost effectively run an application at any location in the network can be challenging.
More agile solutions are required that meet the challenges of next generation networks with greater elasticity across a scalable range of white box servers.
This webinar will provide you with deeper insights into Intel® Select Solutions for NFVI and uCPE and how they help:
•Simplify Network Evolution using platforms verified as Intel® Select Solutions
•Get on faster, more efficient deployments using tested white box servers
•Build Reliable Infrastructure with verified configurations that take full advantage of virtual network enhancements
Sarah Beaudoin, Product Marketing Manager, DruvaRecorded: Feb 19 201944 mins
As organizations continue to migrate to Office 365 for their email, productivity and collaboration tools, they’re quickly realizing that Office 365’s native capabilities do not provide the essential data protection capabilities they need.
Join us for a technical webinar on Tuesday, August 21st at 3PM SGT/ 5PM AEST and learn best practices for safeguarding your Office 365 data, including:
- Gaps within OneDrive, Exchange Online and SharePoint Online that lead to increased risk of data loss
- How a third party backup solution can automate data protection and ensure data recoverability from user error, malicious behavior or malware
- How to build a data management strategy for the future that leverages the cloud and improves alignment with organizational policies and SLAs
Brandon Dunlap, Moderator, (ISC)², David Mount, Cofense, Mollie MacDougall, CofenseRecorded: Feb 19 201962 mins
New year. New resolutions. Every year we make the pledge to eat healthier and exercise more. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session you’ll hear about 10 resolutions for your phishing defense programs that will make your organisation more secure.
Some of the topics covered include:
- How to empower humans to be part of the solution
- Best practices to balance automation with human intuition
- How the latest features and technologies can make your life easier
Storage Switzerland, KeepItSafe, VeeamRecorded: Feb 15 201917 mins
Most data centers still use a legacy DR strategy of replicating or even physically transporting backups to a dedicated disaster recovery (DR) site, or a secondary site owned by the organization. Disaster Recovery as a Service (DRaaS) delivers a compelling alternative to traditional DR, return on investment (ROI). It eliminates the costs associated with a dedicated disaster recovery site like paying for and equipping the site. Organizations though are hesitant to transition to DRaaS following the “if it ain’t broke, don't fix it” philosophy.
In this live 15 minute webinar join Storage Switzerland, Veeam and KeepItSafe to learn how to transition from a legacy DR strategy to DRaaS without risking data protection downtime.
In 15 minutes, we cover the areas critical to success:
1. DRaaS Software selection
2. Cloud Provider selection
3. Creating and executing a transition plan
Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at DateraRecorded: Feb 14 201956 mins
Discover the architecture behind high-performance storage with Datera data automation on Fujitsu PRIMERGY servers.
Datera is the only true, software-driven data services platform that:
•Powers modern application environments at global scale
•Provides game-changing data orchestration and automation with enterprise-class performance
•Joint solution takes full advantage of the performance, security and reliability of Fujitsu PRIMERGY servers
•Delivers up to 70% lower total cost of ownership and operation compared to traditional solutions
Richard McCormack, Head of Product Solutions at Fujitsu, joins Bill Borsari, Systems Architect Director at Datera, to share how Datera and Fujitsu PRIMERGY systems are leading the software-defined revolution by providing the most powerful and flexible data center innovations across a vast ecosystem of solutions to turn your IT into a business advantage.
Danielle Russell, Group Product Marketing Manager; Aaron Genereaux, Sr. Sales EngineerRecorded: Feb 14 201956 mins
Attackers have figured out how to bypass traditional antivirus software with fileless attacks designed to hide within sanctioned applications and even within the OS itself. Host-based intrusion detection systems (HIDS), which work by monitoring activity that is occurring internally on a host, are an effective way to detect these advanced attacks before they spread.
Join this webcast to learn:
- How fileless attacks work and how they evade detection by most traditional antivirus software
- The types of endpoint activity that can be detected and logged by HIDS to catch threats like fileless attacks
- Why HIDS is an essential security control for threat detection and compliance
- How correlation of HIDS data with IP reputation data, vulnerability scans, and more can boost threat detection and response
Group Product Marketing Manager
Sr. Sales Engineer
George Crump, Storage Switzerland and W. Curtis Preston, DruvaRecorded: Feb 13 201960 mins
Managing and protecting critical data across servers and applications in multiple locations around the globe is challenging. And the more decentralized and complex your infrastructure, the more difficult it is to manage your data. The potential bad news? Data loss, site outages, revenue loss, and potential non-compliance with regulations.
But here’s the good news: centralizing data protection in the cloud can make all the difference. That’s why you should join our webinar and hear from storage expert, George Crump, from Storage Switzerland and Druva’s W. Curtis Preston, Chief Technologist, as they discuss:
• Why protecting a distributed data center is challenging with traditional methods
• How a cloud-centralized backup strategy can be a game changer for your organization
• How Druva can help you drastically improve data protection quality, reduce costs, and simplify global management and configuration?
Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf NetworksRecorded: Feb 13 201937 mins
Attack surfaces are rapidly changing by the minute, as IT organizations are provisioning new types of endpoints, IoT devices, servers, web-applications and cloud-based services to increase business efficiencies. Due to this dynamically changing asset landscape, it has become increasingly difficult for IT security teams to maintain visibility to which ones need to be patched to reduce the risk from being exploited by hackers.
Narayan Makaram, Sr. Director of Product Marketing, Arctic Wolf Networks, will explore the following, to emphasize the need for regularly running external vulnerability scans to boost your visibility and reduce business risks.
- Trends affecting your attack surface
- Need for vulnerability management program
- What should you look for in an external vulnerability scan report
Daniel Gilfix, Marketing Manager, Storage and Hyperconverged Infrastructure, Red Hat and Sean Murphy, Product Manager, Red HaRecorded: Feb 13 201944 mins
In the public sector and industries like energy, retail, banking, and telecommunications, organizations increasingly rely on business-critical applications that must be deployed with limited space, budgetary constraints, and scarcity of skilled IT staff. They must extend the reach of these applications from datacenter core to edge of the network with reduced complexity on the infrastructure that best meets their IT requirements.
Red Hat’s innovative approach to addressing these issues includes Red Hat® Hyperconverged Infrastructure for Virtualization, which provides flexibility and choice for customers seeking low-density, infrastructure consolidation based on our leading virtualization platform. Red Hat Hyperconverged Infrastructure for Virtualization is streamlined with Red Hat Ansible® Automation and is based entirely on code from the open source community.
During the webinar, we’ll discuss:
> Market dynamics and challenges customers are facing with too much required by too few resources in too short a period.
> The emergence of hyperconverged infrastructure as an alternative to inefficient segregated infrastructure.
> Why hyperconverged infrastructure operational processes are more effective.
> How an open source subscription model can facilitate maximum benefits of infrastructure consolidation.
Edna Menon – Sr Product Mgr. & Paul Barrett – Systems Specialist - TeradiciRecorded: Feb 13 201935 mins
PCoIP Management Console Release 3.2.1 delivers powerful endpoint management capabilities with support for Active Directory and User Roles.
Learn more about these much requested capabilities, and participate in our live Q&A with Teradici experts Paul Barrett, Systems Specialist, Global Support Services and Edna Menon, Senior Product Manager. This brief webinar will cover everything you need to learn about this important release through a live demonstration, including:
•Support for Active Directory, including support for sub-domains
•User Roles: System Administrator and Administrator roles
•Web Interface performance improvements
Adam Sharp, CIO, International, TBWA | Andy Hardy, VP, EMEA, NasuniRecorded: Feb 13 201936 mins
Learn from the International CIO of one of the top 10 ad agencies in the world how consolidating infrastructure has become key to streamlining costs, enhancing productivity, and increasing cash flow.
With operations spanning 295 offices and 11,000 employees, TBWA’s IT staff faced increasing demands to bring storage and data protection costs under control without reducing flexibility or security. Join Adam Sharp, CIO International for TBWA, The Disruption® Company, and Adweek’s 2018 Global Agency of the Year, as he discusses why his team opted for a “disruptive” cloud strategy of its own and what the results to date have been:
- How the business strategy drove TBWA to the cloud
- What key decisions enabled them to reduce costs and meet capacity requirements at the same time
- How they went about a worldwide roll-out of their cloud storage strategy
- Why multi-cloud capability is important
Hosted by ActualTech Media & Presented by Augie Gonzalez, Director of Product Marketing - DataCoreRecorded: Feb 13 201926 mins
The “new normal” is an expectation of 100% uptime of applications and long-term retention of data. Coupled with massively growing data sets, IT organizations are struggling to meet these expectations.
As an IT professional, you are looking for innovative data protection and disaster recovery solutions to overcome these hurdles, but where do you start? You simply don’t have time to research and compare the latest software and hardware solutions available for enterprise data protection.
Leave the hard work to us and join us on the Data Protection, Disaster Recovery, and DRaaS Megacast! This single event will help you learn about the latest and most innovative data protection and disaster recovery solutions. In this educational event, you’ll learn what makes each solution unique as well as how they improve your company’s reliability, availability, and efficiency. You’ll learn how each vendor makes data protection easy and how they make disaster recovery fast, reliable, and efficient.
Register now to join us for this fast-paced, fun, and prize-filled event!
Jennifer Kotzen, Product Marketing Lead, SUSE Application Delivery SolutionsRecorded: Feb 13 201950 mins
To thrive today, businesses must act on opportunities, solve problems, and respond to the needs of customers, partners, and employees more quickly than ever before. Increasingly, applications are the vehicles through which these critical needs are addressed, and in this digital economy the key to increasing business agility is no secret: enterprises must deliver applications faster. But how is it done?
Join us in this webinar for an executive level overview of the path your business can take to reduce application delivery cycle times and increase business agility. We’ll discuss emerging container technologies, cloud-native application architectures, DevOps processes, and ways you can use them together to effect the change you need. Application delivery transformation is as exciting as it is important – start your journey with us now!
Aslam Ramos, SUSE Sales EngineerRecorded: Feb 13 201955 mins
Segurança na gestão de sistemas com Live patching e SUSE Manager
Participe deste webinar e descubra como é possível aumentar a segurança do seu ambiente Linux e SUSE Linux com as ferramentas da SUSE, sistema operacional Linux líder para aplicações SAP e SAP HANA. Como estas ferramentas podem ajudar você na continuidade dos negócios e na redução de custos, diminuindo o tempo de espera, aumentando a disponibilidade dos serviços, aprimorando a segurança e a conformidade, utilizando os recursos de gestão de outros sabores de Linux e o SUSE, utilizando o SUSE Manager e do módulo SUSE Live Patching para correção do Kernel, sem necessidade de reboot.
Johna Till Johnson, CEO & Founder, Nemertes ResearchRecorded: Feb 12 201949 mins
Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT.
• Who are the right providers?
• What are the critical factors to consider in selecting one?
This webinar reviews the provider landscape and highlights critical selection factors for companies of all sizes and industries.
Nathan Rader, Director of NFV Strategy, CanonicalRecorded: Feb 12 201930 mins
The growth path for operators lies beyond legacy VNF models into cloud-native, container-based microservices architectures to meet requirements for 5G and beyond. In this webinar, we will walk you through:
• Infrastructure implications: Understanding VNF, virtual machines, Openstack and containers
• Redevelopment path of VNF for containers
• Laying the groundwork for container technology: proactive planning and prep
• The impact of containers on strategy for 5G, edge computing, AI, and blockchain
• Components for core certifications, portability and kubernetes distributions
• Use cases and deployments
Brandon Dunlop, Moderator, (ISC)², Matthias Maier, EMEA, Director of Product, SplunkRecorded: Feb 12 201962 mins
Every organisation can, and at some point will be breached. Gone are the days where investing only in preventive security technologies such as firewalls, endpoint protection and proxy servers were considered ‘state-of-the-art’. Instead, security best practices have evolved to build capabilities that detect attacks early, and to respond if all detection and prevention measures have failed. Today’s modernised approach is essential in helping the business recover quickly after a major attack - and helping the CISO keep their job.
So, your technologies have evolved, but has your approach to data collection? Do you have the right data for detection and response - or do you need to adapt for the future?
Join this webinar with Splunker, Matthias Maier to walk through 20 security use cases already used by leading organisations. You’ll hear the most relevant questions for each use case, and discover which device or application within your infrastructure can be used to find the answers. Forty minutes later, you’ll be set to take away your learnings, validate them in your own environment, and identify the most relevant gaps that need to be addressed for your business.
Parker Sinclair Sales Engineer, Druva Inc.Recorded: Feb 12 201920 mins
Did you know that you can simplify data protection for enterprise workloads with a single cloud solution for backup, archival, and disaster recovery?
Attend a 30-minute live demo of Druva Phoenix and our product expert will answer all of your questions!
During this demo you'll learn how to:
- Provide global protection for enterprise server and virtual workloads
- Reduce total cost of ownership (TCO) by up to 60%
- Isolate and quickly restore data during infrastructure attacks
- Get started within minutes — Druva Phoenix is offered as-a-service and can be provisioned on-demand
Daniela Fusaro, Senior Solutions ArchitectRecorded: Feb 8 201920 mins
Die meisten Security Unternehmen haben viele Applikationen in ihrem Netzwerk laufen. Viele Firmen wissen jedoch nicht, welche Applikationen die meisten Ressourcen benötigen, da ihnen die volle Visibilität in ihre Netzwerkdaten fehlt.
Security Budgets werden oft gekürzt, so dass viele Unternehmen eine Herausforderung damit haben, den erhöhten Bedarf diesbezüglich zu decken.
Diese Ineffizienz resultiert oft darin, dass der gesamte Netzwerkverkehr von allen Netzwerk- Security-Tools analysiert wird, auch wenn das gar nicht notwendig wäre.
Während viele Firmen den Fokus auf ihre Security Tools legen, wird häufig aus den Augen verloren, ob alle relevanten Daten oder zuviele Daten dort ankommen, die diese Tools vielleicht gar nicht analysieren können oder müssen.
Die Security Operation Center sind jedoch abhängig davon, Netzwerk-Events zu sammeln, zu korrelieren und auswerten zu können, so dass sie potentielle Security Bedrohungen schnell identifizieren und beantworten können.
An die richtigen Daten aus dem gesamten Netzwerk heranzukommen, und gleichzeitig die Systeme nicht zu überlasten, kann eine große Herausforderung sein.
Application Intelligence bietet Ihnen spezifische Informationen über alle Applikationen, die durch Ihr Netzwerk fließen. Im Security Kontext ist dies besonders nützlich, weil die Security Appliances sprichwörtlich nach der Nadel im Heuhaufen suchen, um in den steigenden Datenmassen von Netzwerkflows Bedrohungsmuster zu finden.
Sehen Sie sich unser Webinar an, um zu verstehen, wie Sie Ihre Netzwerk- und Security-Tools effizienter nutzen können, um Ihre Netzwerk Infrastruktur zu schützen.
Chris Tinker, Chief Technologist, HPE and Hal Woods, CTO, DateraFeb 21 20195:00 pmUTC75 mins
Chris Tinker, Chief Technologist at Hewlett Packard Enterprise joins Hal Woods, CTO at Datera to discuss some of the leading technologies in the Software Defined Revolution, and how HPE and Datera help cultivate the vast ecosystem of solutions.
Data is at the center of the Software Defined Data Center, where Datera reimagined enterprise storage and partnered with HPE to deliver a complete solution.
What you will learn from this webinar:
• Architecting your data center for high-performance
• Ease of deployment and management
• Advanced automation and future-ready choice to orchestrate data for VMs
Kamesh Pemmaraju, Head of Product Marketing at Platform9Feb 21 20196:00 pmUTC75 mins
Kubernetes has become the de facto standard today for building and running container workloads. Many organizations would like to leverage their existing investments in VMware to take advantage of the Kubernetes revolution.
Unfortunately, VMware was never designed to run containerized workloads. Furthermore, Kubernetes is complex and notoriously difficult to deploy and operate at scale for production workloads. The lack of Kubernetes skills adds to the challenge.
Join us in this Webinar to learn how you can get a production ready, easy to use Kubernetes solution with a 24x7x365 SLA on your very own VMware infrastructure with the following benefits:
1.Get up and running with Kubernetes in an hour
2.Eliminate the management overhead
3.Enable self-service for your developers to deploy Kubernetes applications with a single click
4.Improve collaboration between your developers and VMware admins
5.And much more!
Join us at 1 PM EST/10 AM PST on February 21, 2019 to learn more.
Komal Bhardwaj & Ritesh PatelFeb 21 20196:00 pmUTC60 mins
When applications that are deployed in Kubernetes need to be accessed from outside the cluster, an Ingress needs to be created. In Kubernetes, Services can also be exposed via a Load Balancer. There are several options available to make your application accessible and the right choice may depend on your requirements.
In this webinar, we will discuss how Ingress and Load Balancing works in Kubernetes. We will also show a demo of how Citrix ADC serves as an Ingress device on a Nirmata managed Kubernetes distribution.
Ritesh Patel - VP Products at Nirmata
Komal Bhardwaj - Principal Product Manager at Citrix
Todd Thiemann, Director Product Marketing - Arctic Wolf NetworksFeb 21 20197:00 pmUTC39 mins
The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*
Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?
In this Arctic Wolf webinar, you will:
- Discover why cybersecurity is top of mind in the legal community
- Recognize the IT and Cybersecurity skills shortage and its impact on security
- Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits
John Masci, Principal Technologist - Cloud SolutionsFeb 21 20197:00 pmUTC60 mins
Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.
As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.
In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.
This webinar focuses on the following critical topics:
• How your cost, security & governance challenges will change at different stages of cloud adoption
• Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
• Mitigating security risks using risk-based policies, and automated threat detection
• Maintaining compliance against internal and external standards corporate when operating in the public cloud
• How the HyperCloud™ platform can simplify all the above
Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
George Crump, Storage Switzerland and W. Curtis Preston, DruvaFeb 22 20196:00 pmUTC15 mins
If you think the cloud provides enough protection for your critical data, you’re putting that data at risk. You can’t assume data is protected because it’s “in the cloud” -- you need to ensure all of the data in your critical applications, including Office 365 and Salesforce.com, get the protection they deserve.
Join George Crump, Founder, and Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technologist at Druva, where they will discuss:
- What level of protection do cloud services provide?
- Is the provided level of protection enough for the enterprise?
- What does the enterprise need to add to achieve complete protection?
Register Now and get Storage Switzerland’s latest eBook “Protecting the Organization From Its Endpoints.”
Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product MarketingFeb 22 20197:00 pmUTC60 mins
Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.
Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:
• Steps you need to take to gain full visibility and control to secure your hybrid environment
• How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
• How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
Every industry is being disrupted by digital technologies. From cloud services to data analytics, technology is revolutionizing how we work, opening opportunities to create new business models, spark innovation, and nurture product. Did you know that the app and desktop virtualization solution you already have has perfectly positioned you for this digital transformation journey?
Join this webinar to learn how Citrix is engineering the most comprehensive, integrated digital workspace to help customers transform how they work.
You’ll learn how to:
• Simplify your systems and ongoing management with a cloud-based approach
• Give IT teams the flexibility to adopt new systems, quickly scale and rollout updates as needed
• Manage Windows, Linux, web, SaaS, and mobile apps – all through one unified solution
Brandon Dunlop, Moderator, (ISC)², David Warburton, Senior Threat Research Evangelist, F5 LabsFeb 26 20191:00 pmUTC60 mins
Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.
Join us for this webinar to learn more about:
• Challenges with encrypted traffic and risks to your business
• How to efficiently decrypt and orchestrate traffic to reduce latency
• How to intelligently manage decryption and re-encryption across your entire security inspection solutions (IPS, NGFW, DLP, WAF, Anti-Malware, etc.)
The demand for additional data storage is growing too fast for traditional storage options to continue to be an affordable solution. Continuing down this path means you'll be forced to increase your budget dramatically in order to keep up with your data needs. However, SUSE’s intelligent software-defined storage solution, powered by Ceph technology, enables academic facilities to transform their storage infrastructure and reduce costs while providing unlimited scalability.
Jonathan Culver, Solutions Architect & Andrew Waite Brown, Regional Director - EMEA- TeradiciFeb 26 20192:15 pmUTC30 mins
Join our monthly webinar for a quick review on Cloud Access Software followed by a Question and Answer session with our Cloud Access Software expert and Solutions Architect Jonathan Culver.
1.What graphics adapters does Cloud Access Software support?
2.What Windows versions does Cloud Access Software support?
3.Can USB devices be used with Cloud Access Software?
4.What are the supported hypervisors and cloud platforms for Cloud Access Software?
5.Can I connect to my Cloud Access Software workstation on a tablet device?
Submit a question when registering or during the webinar. Our goal is to ensure your deployment is a success!
Alessandro Barbieri, VP Product Management at Pluribus NetworksFeb 26 20194:00 pmUTC60 mins
In this webinar we will review a novel network fabric architecture that leverages open source software, distributed SDN intelligence and open networking principals and has been designed for multi-site data center deployments as well as emerging distributed cloud and edge compute environments. We will discuss the technical attributes of the architecture and the rationale behind its design and then we will review three separate deployment examples. The first will be how this architecture has been deployed at regional cloud service provider Econocom Italia for their new Naboo Cloud offering. Econocom is the Digital Transformation Designer that designs, integrates and supports innovation, accelerating the digital transformation of companies. We will review the status of the implementation, learnings to date and next steps in the deployment. Second we will review a common scenario whereby the fabric provides a programmable network fabric to support the deployment of network function virtualization infrastructure (NFVi) in the mobile cores of Tier 1 mobile network operators. The third example will review a hypothetical deployment in a distributed cloud environment to paint a picture of how the network fabric might be deployed in emerging edge compute architectures.
Sean Leach, Fastly and Sophia Vargas, ForresterFeb 26 20195:00 pmUTC18 mins
Organizations today are facing 4 main challenges when adopting cloud infrastructure and delivering apps in a multi cloud environment.
Join this webinar with experts from Fastly and Forrester to learn how to:
- Maximize availability by ensuring sufficient redundancy and failover options
- Maintain visibility and control to guarantee app performance
- Optimize performance across a diverse set of resources, locations and workload types
- Address interoperability and leverage hybrid app components as one dynamic system
Tune in with Sophia Vargas from Forrester and Sean Leach from Fastly as they discuss the state of cloud adoption, what to consider when delivering apps in a hybrid/multi cloud and the new approaches to cloud app delivery at the edge.
Nathan Swetye - Sr. Manager of Platform Engineering - Cox AutomotiveFeb 26 20196:00 pmUTC62 mins
Cox Automotive comprises more than 25 companies dealing with different aspects of the car ownership lifecycle, with data as the common language they all share. The challenge for Cox Automotive was to create an efficient engine for the timely and trustworthy ingest of data capability for an unknown but large number of data assets from practically any source. Working with StreamSets, they are populating a data lake to democratize data, allowing analysts easy access to data from other companies and producing new data assets unique to the industry.
In this webinar, Nathan Swetye from Cox Automotive will discuss how they:
-Took on the challenge of ingesting data at enterprise scale and the initial efficiency and data consistency struggles they faced.
-Created a self-service data exchange for their companies based on an architecture that decoupled data acquisition from ingestion.
-Reduced data availability from weeks to hours and developer time by 90%.
Paul Moxon, VP Data Architecture and Chief Evangelist, DenodoFeb 27 20191:30 amUTC57 mins
By 2020, a corporate "no-cloud" policy will be as rare as a "no-internet" policy is today, according to Gartner, Inc. While cloud makes enterprises more flexible and agile, various cloud adoption scenarios such as hybrid cloud, infrastructure modernization and cloud based analytics present a few challenges of their own.
Attend this session to learn:
• Challenges involved with various cloud adoption scenarios
• How data virtualization solves cloud adoption challenges while centralizing data governance and security mechanism
• How companies are using data virtualization to tackle complex modern customer segmentation problems such as “customer genomics”
• Challenges of cloud adoption
• Data virtualization to the rescue
• Product demonstration
João Marcelo, AWS Solutions Architect & Aslan Ramos, SUSE Sales EngineerFeb 27 20191:00 pmUTC60 mins
Aproveite os benefícios de utilizar SUSE com AWS
Venha participar do nosso webinar e saiba como a SUSE e a AWS trabalham juntas para atender demandas com soluções inteligentes. O webinar acontece no dia 27 de Fevereiro às 10 horas. Registre-se.
Juntamente com a AWS e o SUSE, você pode desenvolver e implantar aplicativos de próxima geração e de missão crítica na plataforma de nuvem pública líder do mundo.
Acompanhe-nos e aprenda como as soluções SUSE na AWS podem permitir que você:
Transforme seu panorama SAP e mude para o SAP HANA na nuvem da AWS;
Gerenciar, manter, atualizar e corrigir seu TI Híbrido com o SUSE Manager na AWS;
Saiba mais sobre soluções de contêineres para a AWS, incluindo a plataforma de aplicativos SUSE Cloud aproveitando Cloud Foundry e kubernetes.
Storage Switzerland, Virtual Instruments, SANBlazeFeb 27 20196:00 pmUTC60 mins
NVMe storage systems and NVMe networks promise to reduce latency further and increase performance beyond what SAS based flash systems and current networking technology can deliver. To take advantage of that performance gain however, the data center must have workloads that can take advantage of all the latency reduction and performance improvements that NVMe offers. Vendors emphatically state that NVMe is the next must-have technology, yet many still continue to provide SAS based arrays using traditional networks.
How do IT planners know then, that investing in NVMe will truly provide their organizations the benefits of NVMe for their demanding applications and see a measurable return on investment? Just creating a test environment to perform an NVMe evaluation can break the IT budget!
Register now to join Storage Switzerland, Virtual Instruments, and SANBlaze as we look at the state of the data center and provide IT planners with the information they need to decide if NVMe is an investment they should make now or if they should wait a year or more. The key is determining which applications can benefit from NVMe-based approaches.
In this live event, IT professionals will learn
- About NVMe, NVMe Storage Systems and NVMe over Fabric Networking
- The Performance Potential of NVMe Storage and Networks
- What attributes are needed for a workload to take advantage of NVMe
- Why NVMe creates problems for current IT testing strategies
- Why a Workload Simulation approach is the only practical way to test NVMe
- How to build a storage performance validation practice
Sam Kumarsamy, Senior Product Marketing Manager, GigamonFeb 27 20196:00 pmUTC60 mins
How do you reduce complexity of your transforming infrastructure, gain greater IT tool efficiency and maximize visibility into your network? The right solution should empower you to produce better outcomes with less effort at lower cost. That is where a next-generation packet broker comes into play.
Join Gigamon to get the latest best practices to:
• Acquire and aggregate all network traffic for better visibility
• Stop duplicate packets from overloading your tools
• Filter traffic to provide the right data to the right tools
• Optimize compliance and reduce risk across your entire IT environment
If you need to optimize your tools, improve network performance and availability, get better insights into threats and enable your Network Operations and Security Operations teams to collaborate, you won’t want to miss this technical webinar.
Chris Marsh of 451 Research & Matt Crawford of CitrixFeb 28 201912:00 pmUTC54 mins
The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.
Topics discussed will include:
* Current sources of friction that hamper productivity
* Barriers to collaboration and execution
* The importance of context and automation in enabling workers
* Tips for selecting technologies that map to the new workforce
Edge Computing has been brought in as an approach to solve some of the main challenges of IIoT, but it is capable of much more than handling secure networking. In this webinar, we’ll share new developments in Edge computing and explain how it can be used to perform IIoT-specific, non-networking functions, such as OpenPLC and SCADA firewall.
John Burke, CIO and Principal Research Analyst, Nemertes ResearchFeb 28 20194:00 pmUTC60 mins
You need to rethink your WAN to survive the next 5 years. We can help show you how.
Think about it: half of your IT services come from the cloud, from folks such as Amazon Web Services, Google Cloud, IBM Cloud, Microsoft Azure and Office365, and Oracle Cloud. Mixing cloud and internal sources, you serve an increasingly scattered and mobile staff. IoT is turning the physical environment into both a provider and a consumer of IT services.
Is the WAN you built for Client/Server really going to serve?
No. IT needs to rethink its WAN and re-engineer the economics of wide-area networking.
Join Nemertes as we bring our WAN technology research study and freshly updated, one-of-a-kind cost and performance benchmarks to bear on the challenges of remaking your WAN to drive success in the cloud age. We'll discuss:
• SD-WAN and the real benefits it can deliver for performance and cost
• Other cloud-friendly network technologies such as direct-connect and WAN-Cloud Exchanges
• Up-to-date cost and provider performance data for MPLS and Internet services.
Murali Selvaraj, CIO, Perkins + Will | Henry Axelrod, Solutions Architect, AWSFeb 28 20194:00 pmUTC60 mins
Learn from the CIO and Director of IT Infrastructure from one of the world’s top architecture and design firms as they discuss how they built a high-performance infrastructure to support the firm’s global growth.
Learn from Murali Selvaraj, CIO and Gregory Fait, Director of IT Infrastructure at Perkins + Will, one of the world’s top architecture and design firms, as they discuss how they built a high-performance infrastructure to support the firm’s global growth. Using a solution from AWS and Nasuni, the firm has been able to scale its ability to store and protect unstructured data across 2,500 employees and 28 locations.
Attend this webinar and hear:
- How the firm scaled its storage and protection strategy across multiple locations using Amazon S3 and Nasuni
- How the combined platform increased the firm’s ability to pursue a global growth strategy
- What capabilities enabled them to increase productivity across distributed design teams
Storage Switzerland and StorONEFeb 28 20195:00 pmUTC60 mins
Most storage consolidation strategies fail because they attempt to consolidate to a single piece of storage hardware. To successfully consolidate storage, IT professionals need to look at consolidation strategies that worked. Server consolidation was VMware’s first use case. It was successful because instead of consolidating hardware, VMware consolidated the environment under a single hypervisor (ESXi) and console (vCenter) but still provided organizations with hardware flexibility. A successful storage consolidation strategy needs to follow a similar formula by providing a single software solution that controls a variety of storage hardware, but that software also has to extract maximum performance and value from each hardware platform on which it sits.
Join Storage Switzerland and StorOne in which we discuss how to design a storage consolidation strategy for today, the future and the cloud.
In this webinar learn:
- The problems with a fragmented approach to storage
- Why storage fragmentation promises to get worse because of AI, ML, and the Cloud
- Why consolidating to a single storage system won’t work
- Why hyperconverged architectures fall short
- Why Software Defined Storage falls short
- Why the organization needs a Storage Hypervisor
Zhiqi Tao, Intel; John Kim, MellanoxFeb 28 20196:00 pmUTC75 mins
This webcast will present an overview of scale-out file system architectures. To meet the increasingly higher demand on both capacity and performance in large cluster computing environments, the storage subsystem has evolved toward a modular and scalable design. The scale-out file system is one implementation of the trend, in addition to scale-out object and block storage solutions. This presentation will provide an introduction to scale-out-file systems and cover:
•General principles when architecting a scale-out file system storage solution
•Hardware and software design considerations for different workloads
•Storage challenges when serving a large number of compute nodes, e.g. name space consistency, distributed locking, data replication, etc.
•Use cases for scale-out file systems
•Common benchmark and performance analysis approaches