Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.
It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?
Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellanox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
CFOs rejoice! CEOs take to the streets in celebration! Ok, maybe it’s not quite that exciting, but did you know that you can get the best of both worlds in storage? One of the biggest challenges in storage has been paying for it. Thanks to trying to plan for exactly how much storage you need right now versus how much you need in the future, people often just overbuy with the expensive hopes that they’ll grow into it.
You actually have a whole lot of financing options at your disposal to pay for storage, from buying to leasing to simply paying for what you use, just like the cloud. Why pay for storage that you’re never going to actually use?
And, what happens when your storage gets too old? You buy new. What if you didn’t have to? What if you could pay a bit more in maintenance on your current system in exchange for an upgrade when the time comes?
Join Rob Commins, Sr. Director of Product Marketing for Tegile Systems, as he takes a deep dive into:
- Best practices for storing your data in the cloud
- How to keep cloud storage costs to a minimum
- How to scale data growth and storage capacity
Rob Commins has been instrumental in the success of some of the storage industry's most interesting companies over the past twenty years including HP/3PAR, Pillar Data Systems, and StorageWay. At Western Digital, he leads the Data Center System's business unit's product marketing team.
Ten years ago, the SNIA 100-Year Archive Task Force developed a survey with the goal to determine the requirements for long-term digital information retention in the data center - requirements needed to frame the definition of best practices and solutions to the retention and preservation problems unique to large,scalable data centers.
Now in 2017, SNIA presents a new survey developed to assess the following details:
1. Who needs to retain long term information
2. What information needs to be retained and for how long
3. If organizations are able to meet their retention needs
4. How long term information is stored, secured and preserved
Join us as we see where we were and where we need to be in the preservation and retention of data.
SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.
AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:
Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
As much as the term Cloud Computing gets tossed around these days you would think everyone’s using it. But do cloud predictions really match real world use? If you aren’t “in the cloud” are you already behind the competition?
During this presentation, we will discuss the pros and cons of moving applications to the cloud, with a particular focus on business critical applications. We will share our experiences working with clients to determine if their applications are “cloud ready” through a review of availability, costs, and operational impacts. Examples of successful use cases in the public cloud will be explored including emerging technologies, DRaaS, new applications, older applications running on older hardware, and startups.
You’ll leave with a better understanding of the types of applications that are best suited for the cloud, a list of questions you should be asking when considering moving to the cloud, and a checklist you can use to evaluate your application’s cloud readiness.
By 2020, five billion people will be online, with 25 billion devices and machines using the Internet. Many devices will share data and services, and the way we engage with them will fundamentally change. In a connected world, consumer expectations of executing transactions on a phone, tablet, VR device – or even a refrigerator – will be higher than ever.
As time goes on, devices will become smarter and make more and more decisions for us. We’ll be able to create rules as users to tell our devices what we’re comfortable with them paying for automatically. The use cases for rule-based payment are endless!
As such, the onus of creating frictionless download and shopping experiences while overcoming barriers between devices lies with each business. When it comes to recurring and subscription payments, the technology underpinning these user experiences across devices is critical. Seamless, simple, and secure are the watchwords of an IoT world.
Don’t wait until 2020 to address consumer pain points and overcome technological barriers to IoT adoption. Tune in to the latest VB Live event and hone in on the fastest, best ways to prepare for the IoT world. After all, it’s already here. Attend this webinar and find out:
•How companies are already dealing with device connectivity
•How the challenges posed by IoT are being solved for today
•Global consumer attitudes around payments made by devices
•How payments will become ‘invisible’ or ‘translucent’ for users
•Payment technology that will enable devices to make decisions
* Kevin Gordon, Lead Innovation Architect, Worldpay
* Stewart Rogers, Analyst-at-Large, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
The shift to cloud is on. The challenge is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale ... and that has inspired a few myths (that we'll de-bunk). Can private cloud and the IT department keep pace? We'll make the case for a building block architecture - introducing public cloud-like web services in your data center. We will share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
Greater visibility and control for individual VMs, along with enhanced storage efficiency and QoS controls, allow customers to streamline management and ensure optimal performance for their virtualized infrastructure. This session will review the NetApp virtualization solutions portfolio before focusing on current ONTAP and NetApp tool capabilities for vSphere.
This presentation details how and where you should deploy an open hardware agnostic Software Defined Storage as part your move to a more agile software defined data center. And Open Software Defined storage solution is the perfect bridge for the traditional data center to move to a DevOps centric data center.
In this webinar we will talk about SUSE’s latest release that’s built on Ceph Luminous and will discuss a number of commonly deployed use cases, such as; disk to disk backup, compliant archives, bulk storage repositories, data lakes, and cloud storage, etc.. We also look at how SUSE can help you maximize the return of your storage investments without comprise or limitations.
A how-to guide to container and DevOps deployment can help you with the necessary architecture to move faster and be more agile. Red Hat and Intel can help you put DevOps, containers, and application platforms to work for your business.
Enjoy this unique conversation with DevOps enthusiast, Gene Kim, author of The Phoenix Project and The DevOps Handbook, and Brian Gracely, Red Hat director of Product Strategy. Learn from Gene Kim's 18+ years of experience studying high-performing IT organizations.
Join us for a discussion on culture, containers, and accelerating DevOps. Topics will include:
- The trends.
- The journey
- The challenges.
- The path to success
DRaaS is entering its second phase. No longer is it good enough to simply be able to recover applications in the cloud. Next generation DRaaS has to be able to backup faster, recover faster, include ransomware protection and be able to offer on-premises DRaaS, all while being very secure.
In this live webinar we will introduce you to “DRaaS - The Next Generation,” and show you the key elements a DRaaS solution must deliver in order to meet this challenge.
In this session we will provide an overview of licensing Oracle programs using Infrastructure as a Service (IaaS) on POWER/AIX VMs in the Skytap Cloud. There is a lot of confusion around Oracle licensing, especially in virtualized or cloud environments. Many of the references to discussion points and legal challenges resulting from running virtualized x86 platforms apply directly to POWER environments as well.
Key takeaways from this webinar include:
- Skytap Cloud is an effective option for IaaS, including for Oracle-based POWER/AIX applications.
- The use of POWER/AIX VMs for Oracle workloads in Skytap Cloud ensures that Oracle workloads stay running only on licensed processors.
- Skytap Cloud provides support for Oracle licensing by allocating dedicated resources to Oracle workloads.
- In an Oracle audit, usage of Skytap Cloud environments will be documented as if the LPARs or servers are part of the customer’s on-premises environment.
Chief Information Security Officer Reveals How With Arbor Spectrum.
Attackers continuously have new tools, tactics and practices in their weapons arsenal. Human defenders must shift their strategies to more proactively uncover meaningful threats, and find ways that dramatically accelerate threat investigation.
Join us to hear:
- NETSCOUT’s Chief Security Officer discuss how the Arbor Spectrum threat analytics platform was used to help her team take detection and investigation to a new level.
- In depth examples of how security teams can begin or enhance their detection and investigation of attack campaigns.
In a fast-moving, 24/7 healthcare environment, doctors and nurses cannot afford any impediments to delivering the best possible patient care. To ensure that the hospitals, physicians, nurses and other care providers it serves receive the best client experience possible, Allscripts offers a proactive application monitoring service that checks for potential problems that could slow down or disrupt the use of its mission-critical healthcare IT systems.
Initially launched in 2006, the proactive support offering monitors clients’ IT infrastructure and use of Allscripts solutions. Since its introduction, Allscripts has been able to improve client experiences in a way that has had a significant impact on business growth and client retention.
Join Storage Switzerland and HubStor for our live webinar, “Cloud Archiving - Amazon Glacier, Microsoft Azure or Something Else?” In this webinar you will learn the requirements of archiving in the cloud, how Amazon and Microsoft meet those requirements and what software needs to be added to complete the picture.
Join us for an informative look at the Converged Infrastructure and Hyper-Converged marketspace.
Vaughn Stewart, VP of Technology from Pure Storage, will moderate this session and also share perspective on why you don’t need to compromise when it comes to your storage solution. Third party analyst and Chief Scientist, Howard Marks of DeepStorage.Net, will also provide his eye-opening findings on the true costs of each of these solution stacks so you can make a more informed decision on what storage and infrastructure models are best for your organization.
As a retailer SPAR has solved their issues with web store rollout. Vodafone reduced events by over 80%. Boeing evolved most of the users from OM to Operations Bridge in less than 3 months. They have all gained visibility, focus on the right IT issues impacting business, and moreover autonomous operations. They profit from the high degree of automation that the Operations Bridge brings as well as the significant way it helps integrate their tools and data into a single service driven prioritized view.
To launch this SIG, we’ll show you some of their work and the benefits gained. We’ll introduce you to the latest version of Operations Bridge, speak about the containerized version and its roadmap within the new Micro Focus branded software company. All this should inspire many questions for a lively SIG session, one of many more to come.
•Operations Bridge Action – success stories
•What’s new in today’s version 2017.08
•What’s coming up events, sessions, activities and where to get more information
Discover top considerations around architecting the migration to vSphere 6.5 from Joseph Griffiths, Solution Architect, and Logan Smith, Systems Engineer. During this webcast, they will address specific design "How-Tos" and deep dive into architecture best practices.
Threat hunting, one of the hottest topics in cybersecurity, can be an important weapon for any IT security team. It focuses on identifying perpetrators who are already within an organization's systems and networks.
In this webinar, Ross Phillips, a lead Security Engineer, will discuss:
▪ What is the difference between proactive hunting vs reactive hunting
▪ Even with the right forensic investigation tools, why hunting is still critical
▪ Key hunting methods, tools, and techniques
Security threats can remain hidden for months or even years before triggering an alert. If you wait, the consequences can be severe. Register now to learn more about the impact of proactive hunting when it comes to cyberthreats.
About the speaker:
Ross Phillips graduated from RIT in March 2012 with a degree in Information Security & Network Forensics. Since then Ross has worked doing security analysis, application testing and incident handling / response for companies such as Liberty Mutual, Paychex, and Google.
As people learn more about Fibre Channel and are curious about NVMe over Fibre Channel (FC-NVMe), more questions arise that relate to how storage solutions are going to be affected by the new technology. Perhaps the least understood aspect of storage networks involves distance solutions, and so FCIA has decided to tackle this issue next.
In this webinar you will learn:
•How does Fibre Channel work over distances?
•What are some of the limitations of distance?
•What happens when you are using FC-NVMe?
•What special equipment do you need?
Come spend time with FCIA and speaker Mark Allen, Technical Marketing Engineer Manager for Cisco, to learn how to understand and plan for distance solutions using Fibre Channel.
Artificial intelligence was Gartner’s top 2017 strategic technology trend, and the year isn’t over yet. But for too many companies, AI myths are persistent, use cases and strategies are still on the “shiny new thing” level, and expectations continue to hover in the spirit of Skynet/HAL, making it hard to determine whether it’s really right for your company.
As AI technologies multiply, how do you sort fact from fiction? Should you stop daydreaming about replacing your entire staff with chatbots — or can you start augmenting agent abilities? Most importantly, while AI undoubtedly has shown real-live ROI in case study after case study, where is the particular value in chasing the AI buzz for your own company?
Register now for our our latest VB Live event and find out. We’ll be tackling the AI legends and the AI realities, breaking down the potential AI has for your bottom line, and giving you a glimpse of the future of AI for business.
In this webinar, you’ll explore:
* Myths and realities of AI replacing vs. augmenting staff functions
* How to bake AI into your business strategy
* On- and offline use cases for AI
* The future of AI for business
* Avinash Gangadharan, Sr Director of Engineering, Walmart
* Allen Sebrell, Senior Manager E-Commerce Team, Amtrak
* Deep Varma, VP of Engineering, Trulia
* Stewart Rogers, Analyst-at-Large, Venturebeat
* Rachael Brownell, Moderator, VentureBeat
Digital transformation is real, and it’s happening – our data in the retail industry lends more insight to the state of the transition. It is an inescapable truth that every business is becoming a digital business empowered by new software initiatives such as AI, Robotics and IoT. The adoption of these disruptive trends will force a divide between business leaders and laggards. With the upcoming Black Friday and Cyber Monday, how prepared are you to meet rising customer expectations. As the pace of innovation accelerates, retailers need to act now. Our Global retail research illustrates a significant gap between digital leaders and laggards and even a modest investment can improve operational efficiencies and agility.
The retail industry is bursting with digital innovation driving change. This session will review:
•How differentiation demands digital maturity
•Transformational technologies essential to create immersive, connected retail experiences across digital and physical worlds
•The role of cloud services and its impact on customer experience, agility, efficiency and risk
Learn how to determine your anticipated costs and benefits to make an informed decision on how to securely and cost-effectively migrate your workloads to the Google Cloud Platform without disrupting your operations.
The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
1.How containers make it easy to migrate and move applications between clouds
2.What architectural considerations and tooling you need to achieve portability
3.How to ensure consistency of control, security, and compliance across container cloud deployments
How can enterprise IT operate more like AWS? That is the defining technology question of the decade. Hyperscale computing models pioneered by AWS catapulted “cloud” to the top of the IT agenda. This model fuels digital business, creates tectonic shifts in IT spending, and upends legacy IT infrastructure vendors. But should today’s CIOs build or buy their own cloud? The simple answer: both. We live in a multi-cloud world. A hyperscale strategy balances digital services across private and public clouds.
In this session we'll provide:
-Lessons learned from building two of the world’s largest distributed systems: Amazon Dynamo and Facebook's Cassandra.
-How to develop a multi-cloud strategy for modern data centers that accommodates both virtualized and containerized applications.
-Where software-defined storage fits into this strategy to help data span cloud boundaries and avoid cloud lock-in.
Nutanix 101: Find out how Nutanix can help transform your Infrastructure
•Nutanix Overview - Introduction to Nutanix and Hyper-Converged Infrastructure
•Common Challenges - Challenges organizations in your industry face
•Customer success stories - Outlining your peers who are using Nutanix
The February 2018 deadline for complying with PCI DSS 3.2 is fast looming. Most of the new requirements in the latest PCI DSS guidelines are focused on the need to extend multi-factor authentication (MFA) to additional use cases and user groups within organisations who handle Credit Card Data. From February 2018 onwards, all individuals who access systems such as databases, network modules and email servers which hold credit card data will be required to authenticate themselves with MFA.
Join (ISC)² EMEA and Gemalto to learn:
- What’s new in PCI DSS 3.2
- How to effectively map PCI DSS MFA requirements to business use cases and user groups in your organisations
- Best practices for organisations that need to extend their MFA footprints to additional use cases, and for those that are starting to think about how to comply with PCI DSS’s authentication requirements.
Nutanix 101: Find out how Nutanix can help transform your Infrastructure
•Nutanix Overview - Introduction to Nutanix and Hyper-Converged Infrastructure
•Common Challenges - Challenges organizations in your industry face
•Customer success stories - Outlining your peers who are using Nutanix
The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.
In this joint webinar with 451 Research, we will cover topics including:
-Building a multi-cloud security strategy for encryption and key management
-Best practices, benefits and pitfalls of managing your own security
-Impact of regulations on data protection in the next few years
-Understanding the different CSP requirements for key management:
oCustomer-Supplied Encryption Key (CSEK)
oBring Your Own Key (BYOK)
oHold Your own Key (HYOK)
oGeneral cloud service provider key management services overview
Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.
During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.
The demonstration will cover how to:
•Configure PCoIP Zero Clients for off-site employees or contractors
•Determine the best WAN settings to recognize out-of-office devices
The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.
Moderator: Jill Reber, CEO, Primitive Logic
Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
Join leading independent product assessment group, Miercom and technical experts from Silver Peak as they discuss the performance expectations of today’s networks and how the right SD-WAN solution can improve application availability across the WAN using any type of transport. They will disclose how Silver Peak’s SD-WAN solution, Unity EdgeConnect fared in their aggressive stress test environment and provide a live demo on its performance capabilities.
Like everyone else undergoing digital transformation, large, established organizations know cloud and DevOps adoption are critical to delivering the immediate, personalized, data-driven user experience customers demand. But often these companies have existing investments that limit their ability to monitor a DevOps toolset without fracturing their ability to see critical performance and availability metrics across their entire organization.
In addition, containers provide some unique monitoring challenges. Containers come and go so frequently, and change so rapidly, that they can be an order of magnitude more difficult to monitor and understand than physical or virtual hosts.
In this webinar you’ll learn:
•How traditional IT operations teams are adapting to monitor the DevOps toolset
•Ways to fill the container monitoring gap between hosts and applications
This presentation details how to leverage technologies such as Hadoop, MapReduce, Pig and Sqoop to massively scale cloud integrations to services such as Salesforce.com. Attendees will learn how to overcome API limitations, throughput latency and infrastructure scaling challenges to significantly increase integration performance.
Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.
When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.
In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:
- The top cybersecurity risks and best practices for securing cloud deployments
- How AWN security monitoring compliments the native security features in AWS and Office365
- The role of AWN cloud security in integrating observations from cloud and on-premise systems
To see how AWN CyberSOC™ can secure your cloud, register now.
About our speakers:
Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.
Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
Leírás: A konténerek hasznos eszközöknek bizonyulnak az alkalmazásfejlesztő és az üzemeltető csapatok számára egyaránt, és kulcsszerepet játszanak a korszakalkotó átalakulásban: megváltoztatnak mindent, az alkalmazásarchitektúrától és az infrastruktúrától kezdve az üzleti folyamatokig és az üzemeltetési modellekig. Tartson velünk, és fedezzük fel együtt a konténerek népszerű alkalmazási területeit, és vizsgáljuk meg a konténeralapú szolgáltatások létrehozását, szolgáltatását és felügyeletét támogató SUSE CaaS platformot.
Next Generation applications like IoT, MBB, AR, VR, V2X, etc. generates wide variety of traffic and with different QoS needs. Today's network is not designed to handled the ever growing varied traffic which chokes the network. Since each of these traffic may have a different QoS needs, one size fit all solution will not work in long run.
Network slicing is one of the key capabilities than enables flexibility which allows service providers to deploy multiple logical netwok on shared physical infrastructure. It also extensively uses the concept of Network function virtualization (NFV) and Software Defined Network (SDN) to bundle the virtualized network functions into tailored made logical network to handle varied requirement like low latency network, high bandwidth network, reliability, etc. This optimization helps to monetize the investment better and also opens up new revenue streams.
This session talks about
- What is network Slicing?
- How it is related to 5g?
- What will it do?
- Who is driving it?
- TCS Experimentation
Enterprises that use Kubernetes to orchestrate their container-based applications can benefit from a rich ecosystem of complementary technologies. Project Helm is one to watch - it helps you find, share, and use software built for Kubernetes. Join us as we explore the challenges of Kubernetes package management, and see how Helm helps you define, install, and upgrade even the most complex container-based applications.
SUSE delivers Kubernetes and Helm together in SUSE CaaS Platform 2, the latest release of SUSE’s enterprise class container management solution. In addition to Helm, the new release also incorporates updated versions of Kubernetes and MircoOS, streamlines public cloud accessibility, and more. If you haven’t taken a look at SUSE CaaS Platform lately, this is the perfect opportunity to get on board!
Whether using an on-premises or cloud based UC solution, reliable and SLA driven connectivity is critical to ensure that your enterprise business productivity and presence is not impacted.
Join Versa Networks and S-NET Communications as we provide insights into how a software-defined WAN (SD-WAN) delivers the improved and reliable secure connectivity for your enterprise voice and video services. S-NET Communications is an industry expert in cloud communications solutions, removing complexity from IT and enabling enterprises and SMBs to collaborate and connect from any location and any device.
Learn from their experience in integrating SD-WAN into their portfolio to deliver more secure and reliable services so their customers can attain faster data transfers and a more positive user experience for their business voice services.
What does modernizing the infrastructure for public cloud really mean? And what does your on-premises infrastructure have to do with an off-premises public cloud? Join us for this webcast and learn why modernizing your infrastructure is part of the journey for successful adoption of cloud computing. We’ll cover how you are well positioned for success with a VMware vSphere® foundation, and can continue the journey to a software-defined approach by virtualizing across the data center from compute to storage to networking, and adding unified management for intelligent operations. Specifically you’ll learn about:
· Components of a modernized infrastructure
· How to evolve to a software-defined environment
· Use cases of modernizing the infrastructure
A year ago, we predicted 2017 would bring difficult, messy hybrid cloud transformation, that “hybrid cloud” would become synonymous with “multi-cloud,” and that IoT and machine data would raise new questions related to security and data access.
Our crystal ball was crystal clear last year, and we’re breaking it out again to look forward to 2018.
In this webcast, we’ll cover the data storage trends most likely to make news in the New Year, including cloud vendors with on-prem-like strategies, security and the ransomware challenge, consolidation of secondary storage players and the comeback of captive cloud.
How to get the most out of vSAN – VMware’s Hyper-Converged Infrastructure (HCI) software. In this webinar you will learn testing and tuning insights and lessons learned from Western Digital’s ongoing vSAN performance test bed. Learn the test bed design and why it’s done the way it is. You’ll find the answers to questions such as: What performance tools are used in the industry and why? How do vSAN features such as Erasure Coding, Deduplication and Compression, and Object Checksum impact performance? What design principles should be used when configuring your vSAN and implementing your VMs? What does “Working Set” mean, and how does it impact performance? What other knobs can be turned (e.g., Disk Stripes per Object, Cache Line Settings, etc.), and what can you expect from them?
When considering a transition to SD-WAN, there are several important capabilities needed to suit an enterprise-grade network infrastructure. This webinar will cover critical SD-WAN features and how they translate to common deployment scenarios in different industries.
These features include:
- Overlay capability over MPLS, Broadband and LTE
- Unified and centralized management of the infrastructure
- Network segmentation with per-segment topologies
- Predictable Application SLA with centralized policies and real-time traffic steering
- Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
- Robust zero-trust WAN security