Hi [[ session.user.profile.firstName ]]

Virtualization

  • OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management
    OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management Brett Kugler, Senior Red Hat Consultant - Crossvale, Inc. Recorded: Sep 25 2018 22 mins
    Although the cloud is a solution for many of your problems, it may result in unexpected expenses when demand grows. Lowering costs by using AWS Spot Instances can bring substantial cost savings over on-demand pricing, but how is scaling being handled for peak loads and are you concerned about reliability in a scaling solution?

    Crossvale OpenShift CloudBalancer provides the means to leverage AWS Spot Instances for Red Hat OpenShift Clusters ensuring capacity by provisioning new workload capacity automatically when needed and keeping it running for as long as it is required.

    In this webinar we will cover the following:

    - Intro to Crossvale, Inc.
    - Intro to OpenShift CloudBalancer
    - Cost Savings
    - Technology behind CloudBalancer
    - Live Demo
    - 2 Use Cases
    - Roadmap
    - Q&A

    AMAZON EC2 SPOT INSTANCES AND SPOT FLEET HELP CUSTOMERS MANAGE CAPACITY AND COSTS.
    “With Amazon EC2 Spot instances, we easily save 85–90% in costs. That, in turn, allows us to experiment with less risk and ultimately develop higher-quality products for our customers.”
    JOE GARDNER, PRINCIPAL CLOUD ARCHITECT, NATIONAL INSTRUMENTS

    “We see companies today using this facility of unused instances for development and operations closed environments for testing. However, more importantly, we now see it used in production for enterprise-ready, business-critical applications.”
    CONOR BRANKIN
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Sep 25 2018 40 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management
    OCB - How to Minimize Costs Using Adaptive and Scalable Cluster Management Brett Kugler, Senior Red Hat Consultant - Crossvale, Inc. Recorded: Sep 25 2018 24 mins
    Although the cloud is a solution for many of your problems, it may result in unexpected expenses when demand grows. Lowering costs by using AWS Spot Instances can bring substantial cost savings over on-demand pricing, but how is scaling being handled for peak loads and are you concerned about reliability in a scaling solution?

    Crossvale OpenShift CloudBalancer provides the means to leverage AWS Spot Instances for Red Hat OpenShift Clusters ensuring capacity by provisioning new workload capacity automatically when needed and keeping it running for as long as it is required.

    In this webinar we will cover the following:

    - Intro to Crossvale, Inc.
    - Intro to OpenShift CloudBalancer
    - Cost Savings
    - Technology behind CloudBalancer
    - Live Demo
    - 2 Use Cases
    - Roadmap
    - Q&A

    AMAZON EC2 SPOT INSTANCES AND SPOT FLEET HELP CUSTOMERS MANAGE CAPACITY AND COSTS.
    “With Amazon EC2 Spot instances, we easily save 85–90% in costs. That, in turn, allows us to experiment with less risk and ultimately develop higher-quality products for our customers.”
    JOE GARDNER, PRINCIPAL CLOUD ARCHITECT, NATIONAL INSTRUMENTS

    “We see companies today using this facility of unused instances for development and operations closed environments for testing. However, more importantly, we now see it used in production for enterprise-ready, business-critical applications.”
    CONOR BRANKIN
  • How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery
    How to Avoid Disasters via Software-Defined Storage Replication & Site Recovery Augie Gonzalez, Director of Product Marketing, DataCore Software Recorded: Sep 25 2018 41 mins
    Shifting weather patterns across the globe force us to re-evaluate data protection practices in locations we once thought immune from hurricanes, flooding and other natural disasters.

    Offsite data replication combined with advanced site recovery methods should top your list.

    In this webcast and live demo, you’ll learn about:
    • Software-defined storage services that continuously replicate data, containers and virtual machine images over long distances
    • Differences between secondary sites you own or rent vs. virtual destinations in public Clouds
    • Techniques that help you test and fine tune recovery measures without disrupting production workloads
    • Transferring responsibilities to the remote site
    • Rapid restoration of normal operations at the primary facilities when conditions permit

    Attend live for a chance to win a $200 Amazon gift card!*

    *Gift card will be sent within 10 days of the webinar date. Void where prohibited.
  • NVMe™ over Fabrics: Updates for 2018
    NVMe™ over Fabrics: Updates for 2018 Brandon Hoff, Distinguished Software Architect at Broadcom, NVM Express,Inc. Marketing Workgroup Member Recorded: Sep 25 2018 60 mins
    NVMe™ over Fabrics (NVMe-oF™) is the defacto standard for extending the NVMe™ architecture in a scalable manner over mainstream interconnects. In this NVM Express, Inc. hosted webinar, Brandon Hoff, Distinguished Software Architect at Broadcom and NVMe Marketing Group Member, will provide an update on how NVMe-oF technology has evolved in 2018 and what the future holds in 2019 and beyond. The webcast will cover the transports for NVMe-oF, NVMe-of Enterprise Arrays, NVMe-oF Appliances, and NVMe-oF JBOFs as well as interoperability testing. Viewers will also learn about different NVMe-oF solutions and how NVMe-oF is disrupting the storage landscape and improving the performance of external storage solutions.

    Brandon Hoff is Distinguished Software Architect at Broadcom, where he focuses on new product strategy, including product development interlock, business planning, and sales strategy development for growth initiatives. He has also worked on innovation initiatives, end user strategies, technology and solutions for WNVeb giants, and product portfolio leadership. He has been an active participant in NVM Express, is a board member of Understanding Disruption, Inc. and has been IBTA Marketing Work Group Co-Chair. He is a frequent participant at industry events, including NVM Express meetings, SNIA conferences, and Ethernet Alliance events. He has over 25 years of industry experience, including a stint as Chief Strategy Officer/Chief Marketing Officer at CipherOptics. He holds an MBA from the University of Colorado (Boulder) and a BSEE from Colorado State University. Brandon holds patents in networking and security as well as contributing to books that address technology innovation: “Driverless Car Revolution: Buy Mobility, not Metal” and “Our Driverless Future: Heaven or Hell?”
  • Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung
    Neuer OneXafe: nächste Generation für konvergierten Speicher und Datensicherung Ivonne Ehle, DACH Sales Engineer - SCME, Certified Trainer Recorded: Sep 25 2018 28 mins
    Das Wachstum virtualisierter Anwendungen, immer kleinere Backup-Fenster und ein explosionsartiges Datenwachstum haben die Anforderungen an die Datensicherheit und die Speicherinfrastruktur enorm belastet. Backup- und sekundäre Speicherinfrastrukturen kommen oft von mehreren Anbietern, was die Kosten erheblich steigert, betriebliche Ineffizienzen erhöht und zu Datensilos führt, wodurch die zentrale Verwaltung immer komplexer wird.

    Registrieren Sie sich für unseren Webcast und erfahren Sie, wie Sie mit der neuen konvergenten Datenplattform StorageCraft OneXafe Ihre Daten in heterogenen Umgebungen besser schützen und verwalten
  • The Cyberattack Horizon
    The Cyberattack Horizon Kelvin Murray, Sr. Threat Research Analyst, Webroot Recorded: Sep 25 2018 32 mins
    Get an in-depth look at the newest threats.

    More and more, cybercriminals are targeting small- and medium-sized businesses with increasingly sophisticated attacks. And with more regulations and costly fines for non-compliance, a single data breach could spell the end for an SMB.

    To stay safe, businesses and MSPs who serve them need to know the lay of the land. Join our 30 minute informative webinar to get details about the latest trends in cyber threats.


    Topics in this webinar include:

    • Current threat trends hitting SMBs
    • Ransomware, phishing, Trojans, cryptomining , cryptojacking
    • How to stay ahead of the latest cyberattacks
  • Next-Gen File Security Meets Next-Gen Cloud File Services
    Next-Gen File Security Meets Next-Gen Cloud File Services Christoph Spitzer, CSM @ Varonis, Markus Warg, SE @ Nasuni, & Anne Blanchard, Product Marketing @ Nasuni Recorded: Sep 24 2018 49 mins
    Join this webinar to learn how you can take the world’s leading security solution to the cloud and how to protect your unstructured data, which can add up to 80% of all your data. You will learn about the integrated Varonis and Nasuni solution that offers unlimited NAS capacity paired with world-class threat detection and prevention as well.

    This webinar will also teach you how to:

    - Reduce your threat surface area by pruning unnecessary access
    - Prepare for and recover faster from attacks with continuous file protection
    - Identify and stop 0-day attacks by analyzing user behavior
    - Store, protect and manage unlimited capacity in the cloud
    - Establish greater data resilience across multiple sites and locations
  • Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture
    Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture Primitive Logic President Kevin Moos, Chief Architect Eric Greenfeder, Technical Director Steve Ernst Recorded: Sep 20 2018 40 mins
    In the race towards digital transformation, fueled by growing competitive pressures, enterprises need an architecture that responds quickly to escalating customer expectations — while also maintaining security and reliability.

    Join Primitive Logic to discover why your EA roadmap must begin with your business priorities … and how microservice architectures and master data management (MDM) strategies can help you achieve your objectives.

    You’ll learn:
    - How to build a secure EA roadmap grounded in your business priorities
    - How microservices let you move quickly in keeping up with customer expectations
    - How MDM helps you deliver the insights businesses need to make data-driven decisions
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 20 2018 38 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint
    IT Ops SIG Talk Ep. 10: Building a Hybrid IT Blueprint Bobby Allen Recorded: Sep 20 2018 29 mins
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio

    Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • Enterprise-Wide Kubernetes - Episode 1
    Enterprise-Wide Kubernetes - Episode 1 Paulo Renato, Principal Cloud Architect at Microsoft and Jim Bugwadia , CEO at Nirmata Recorded: Sep 20 2018 49 mins
    In this our first episode of the Enterprise-wide Kubernetes series, we will introduce what an enterprise-wide Kubernetes stack consists of, and will look at the compute, networking, and storage infrastructure requirements. Our featured guest will be Paulo Renato, a Principal Cloud Architect with the Microsoft Azure team. Some of the questions we will cover are:

    1. What are the enterprise options for selecting Kubernetes distributions?
    2. When should an enterprise choose a managed Kubernetes service?
    3. How should enterprises evaluate managed Kubernetes services from the top cloud providers?
    4. What else matters for Kubernetes infrastructure?
  • OpenDemo: Network Automation with Ansible
    OpenDemo: Network Automation with Ansible Eric McLeroy, Senior Solution Architect, Red Hat Recorded: Sep 20 2018 56 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    The original airdate of this demo was Sept. 18.
  • IT Ops SIG Talk Ep. 9:  Work with OpsBridge API’s
    IT Ops SIG Talk Ep. 9: Work with OpsBridge API’s Amr Fahmy Recorded: Sep 20 2018 29 mins
    Work with OpsBridge API’s

    In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use
  • The Next Question: How to Backup Office 365
    The Next Question: How to Backup Office 365 Storage Switzerland, KeepItSafe, Veeam Recorded: Sep 20 2018 63 mins
    The first Office 365 question is, do organizations need to protect their data stored there? The answer is yes, Office 365 data needs protection. Almost every industry expert recommends that organizations take Office 365 protection into their own hands and even Microsoft makes it clear that data is the organization’s responsibility. The problem is those industry experts and Microsoft don’t answer the next question of HOW to backup Office 365 data.

    Register now and learn not only why organizations should back it up but also how they should do it.

    In response to the need for Office 365 protection, vendors have flooded the market with solutions but protecting Office 365 is more than just a “checkbox”. Data in Office 365 has value to the organization, is subject to a variety of compliance regulations, and is the target of cyber-attacks.

    In our webinar Storage Switzerland, Veeam and KeepItSafe compare the various methods for protecting Office 365.
  • How to Build an EA Roadmap for the Future
    How to Build an EA Roadmap for the Future Jeanne Morain, iSpeak Cloud, Bala Kalavala, Wyndham Hotels & Resorts, Anthony Nguyen, HP Recorded: Sep 20 2018 62 mins
    Tune into this live panel discussion and start building your enterprise architecture roadmap for 2020 and beyond.

    Topics in this panel discussion will include:

    - How to drive business value through technology
    - Enterprise architecture from a UX perspective
    - Cloud transformation and automation, including Robotic Process Automation
    - Services and API strategy
    - How technologies like Blockchain are changing the enterprise

    And much more!

    Moderator: Jeanne Morain, Digital Strategist, Author & Speaker, iSpeak Cloud
    Panelists: Bala Kalavala, Director of Enterprise Architecture, Wyndham Hotels & Resorts and Anthony Nguyen, UX/Enterprise Architect at HP
  • IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio
    IT Ops SIG Talk Series - OpsBridge API’s & Hybrid IT Blueprint for App Portfolio Amr Fahmy, Bobby Allen Recorded: Sep 20 2018 55 mins
    SIG Talk: IT Operations - Operations Bridge API’s and Hybrid IT Blueprint for Application Portfolio (Complete Edition)

    Join us for the next IT Operations SIG Talk to hear from Vivit member experts about working with OpsBridge API's and building a Hybrid IT Blueprint for your application portfolio. These two presentations will give in depth insight and takeaways.

    Speaker: Amr Fahmy
    Work with OpsBridge API’s: In this session, Amr will give a small introduction of OpsBridge and then will start with a basic introduction about OpsBridge API. Next, he will give a simple example on how we can call the OpsBridge API’s and start creating custom Attributes in the events. Finally, Amr will do some modifications on Events Custom Scripts.

    What you can expect to take away from this session:

    •Basic information on how API’s works and the difference between them
    •How to integrate third party applications with OpsBridge using API
    •Basic Bash Scripts or Python Script depending on the Operation system we will use

    Speaker: Bobby Allen
    Building a Hybrid IT Blueprint – Discover the right mix of public vs. private providers and services for your application portfolio: Many decision makers will say they need more information. The reality is that most leaders are actually drowning in information. What they really need is to move from information to clarity to insight. Attend our talk on building a hybrid it blueprint to see how CloudGenera can quickly take large amounts of data about your applications and provide data-driven analysis on best execution venue. We believe these sorts of insights should happen in minutes not months.

    Attendees will learn the following:

    •Elements that must be part of Total cost of ownership (TCO) analysis
    •How to analyze public vs. private execution venues
    •How to quickly revisit decisions when inputs or market factors change
  • The great escape: Migrating to a modern virtualized environment
    The great escape: Migrating to a modern virtualized environment Bill Helgeson, senior principal domain architect, Red Hat; Matt Nolan, senior cloud architect, Red Hat Recorded: Sep 20 2018 39 mins
    As organizations face pressure to reduce operational costs and become more agile, it's critical that IT support a diverse environment, where traditional applications can coexist with dynamic and cloud-native applications. However, transitioning from legacy, proprietary infrastructure to a managed cloud infrastructure that consists of both traditional and modern components can be daunting.
    In this webinar, we'll discuss an approach to radically simplify the process of migrating workloads from legacy platforms. Specifically, we’ll cover:
    > Methods for building a robust, flexible computing infrastructure to lower total cost of ownership (TCO), improve provisioning time, deliver services faster, and streamline processes.
    > Best practices for organizing workloads into manageable groups and automating migration in a policy-driven manner using Red Hat® Virtualization, Red Hat CloudForms® , and Red Hat Ansible® Automation.
    > How several customers have successfully solved this problem, reduced transition costs, and increased control of their environment.
  • Securing Your Digital Transformation: Considerations for Enterprise Architecture
    Securing Your Digital Transformation: Considerations for Enterprise Architecture Todd Jobson, Co-founder & CTO, TechThought.org Recorded: Sep 20 2018 63 mins
    This webinar will outline how successful Digital Transformation requires an evolution of traditional Enterprise Architecture and Security practices.

    This will include a brief history of today's rapid paradigm shifts, drivers, benefits and challenges.

    Key considerations among several related areas:
    - FOSS, mobile
    - Cloud architecture & deployment models
    - Agile DevOps vs. traditional governance
    - Traditional app architecture vs. CloudNative Microservices & FaaS/Serverless
    - The rapidly changing data landscape (OLTP/OLAP -- BigData & Streaming Analytics)

    Todd Jobson will explore the impact in several of these areas related to successful Digital Transformation, Enterprise Cloud Architecture, as well as considerations related to security. While not intended to be a comprehensive nor prescriptive webinar, it will include several strategic recommendations along with inter-related tactical considerations that most enterprises will encounter along the complex path of Digital Transformation.

    About the Speaker:
    Todd Jobson is the CTO & Co-Founder of TechThought.org and has 25 years of experience as both a strategic & tactical thought leader across some of the most demanding business & technically complex mission critical environments. His background has included SW Engineer/Manager developing Nuclear Reactor Control & RealTime access control systems for NYPA, directing application architecture & global Integration (as far as Moscow, Russia) as Chief Technologist for SAI, leading a decade of Enterprise (Fortune 50) client architecture & delivery engagements for Sun Microsystems Professional Services, to conducting Enterprise-wide Digital Transformation Workshops/ Assessments & Future State Cloud Architecture enablement for dozens of Oracle's largest customers.
  • TLS Decryption: Critical to Detecting Threats
    TLS Decryption: Critical to Detecting Threats Lindsay Drabwell, Head of Membership, (ISC)² EMEA, Ollie Sheridan, Principal Engineer, Gigamon Recorded: Sep 20 2018 59 mins
    As the volume of encrypted traffic continues to grow, organisations become even more vulnerable to encrypted attacks, threats and exploits that go undetected. Learn how to create a centralised “decryption zone” to decrypt traffic once and give security tools newfound visibility into encrypted traffic.
    Join Ollie Sheridan (CISSP), Principal Engineer at Gigamon to learn:
    •How the TLS 1.3 draft 28 proposal removes visibility which was widely deployed for threat identification in TLS 1.2.
    •How to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns.
    •Why deploying TLS decryption in the core of networks is critical to detecting threats.
    •How to deploy innovative architectures for TLS decryption while maintaining availability and reliability.
    •How to manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.
  • Your Data: Safe, Accessible, and Optimized - All the Time
    Your Data: Safe, Accessible, and Optimized - All the Time Jaap Van Kleef, EMEA Technical Manager Recorded: Sep 20 2018 56 mins
    Growing data volume, rising cost of downtime and data loss, cyber attacks, limited storage capacity, business continuity, and inadequate backup and recovery performance are among the myriad of challenges that IT teams face today.

    Join this webcast with Jaap Van Kleef, EMEA Technical Manager at StorageCraft and learn about best practices for data protection and disaster recovery.
  • (Replay) IT Convergence: A Perspective on CI & HCI
    (Replay) IT Convergence: A Perspective on CI & HCI Howard Marks, Chief Scientist, DeepStorage.Net; Vaughn Stewart, VP of Technology, Pure Storage Recorded: Sep 20 2018 20 mins
    Join us for an informative look at the Converged Infrastructure and Hyper-Converged marketspace. Vaughn Stewart, VP of Technology from Pure Storage, will moderate this session and also share perspective on why you don’t need to compromise.

    Third party analyst and Chief Scientist, Howard Marks of DeepStorage.Net, will also provide his eye-opening findings on the true costs of each of these solution stacks so you can make a more informed decision on what is best for your organization.
  • [Webcam Panel] Perspectives on the Digital Transformation
    [Webcam Panel] Perspectives on the Digital Transformation Patrick Vardeman, CEO; Rick Snyder, Sr. VP; Anoj Willy, CEO; Vid Sista, Director of Technology Solutions Recorded: Sep 19 2018 47 mins
    Join moderator Patrick Vardeman, CEO of Accudata Systems, for a dynamic digital-first webcam panel discussion with Rick Snyder, Senior Vice President of Cisco’s Partner America’s Organization; Anoj Willy, CEO of Xentaurs, a leading Digital Transformation Systems Integrator; and Vid Sista, Director of Technology Solutions at Accudata Systems.

    They’ll cover it all—from what to consider in your DevOps strategy to hybrid cloud solutions and industry-leading technologies to build an effective data intelligence program. The digital business is far more complex than ever imagined, and we’ll do our part to help you understand where your investment can have the greatest payoff.
  • OpenDemo: Ansible Tower
    OpenDemo: Ansible Tower Michael Ford, Senior Specialist Solution Architect, Red Hat Recorded: Sep 19 2018 59 mins
    Ansible Tower by Red Hat helps you scale IT automation, manage complex deployments and speed productivity.
    Centralize and control your IT infrastructure with a visual dashboard, role-based access control, job scheduling, integrated notifications and graphical inventory management. And Tower's REST API and CLI make it easy to embed Tower into existing tools and processes.
  • Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection
    Using the Cloud to Fix Backup's Blind Spot - Endpoint Data Protection Storage Switzerland and Infrascale Sep 26 2018 5:00 pm UTC 60 mins
    Many data centers unwittingly have a blind spot in their backup strategy, endpoints like laptops and other devices are left exposed. Most organizations have no formal endpoint data protection strategy even though studies indicate that over 60% of data on endpoints is unique to that device. In most cases, there is no centralized data protection strategy for endpoints.

    IT is counting on users to protect their data, but the reality is that the organization needs a centralized endpoint data protection strategy that fixes backup's blind spot.

    Join Storage Switzerland and Infrascale for a live webinar to learn how to create an endpoint data protection strategy that leverages the cloud to fix the backup blind spot. The webinar also includes a live demo of the solution, so you can see how efficiently IT can protect endpoints without disrupting end users.
  • Monetizing IoT in Smart Agriculture
    Monetizing IoT in Smart Agriculture Steve Brumer, Partner at 151 Advisors & Mark Young, CTO at Climate Corporation Sep 26 2018 5:30 pm UTC 45 mins
    Join Steve Brumer, Partner at 151 Advisors and Mark Young, CTO at Climate Corporation for a 45-minute informative discussion on monetizing IoT in Smart Agriculture.

    This webinar will focus on the Smart Ag landscape, uses cases, opportunities and how vendors & partners can monetize with IoT. Exploring all the business aspects, connectivity, sensors, big data, platforms, and system integration.

    Key takeaways will focus on where should you focus your time, energy and efforts within this space and drive revenue.

    PRESENTERS:
    -Steve Brumer, Partner at 151 Advisors
    -Mark Young, CTO & Interim Product Lead at Climate Corporation
  • Nutanix and Thales, Hyerconverged & Hypersecure
    Nutanix and Thales, Hyerconverged & Hypersecure Stephen O’Connor, Sr. Sales Engineer & Mike Wronski, Principal Product Marketing Manager, Nutanix Sep 26 2018 6:00 pm UTC 60 mins
    The rapid adoption of hyperconverged infrastructure (HCI) solutions have been due to their proven ability to deliver scalability, agility, reduced costs, storage redundancy, and reliability. While these are great benefits, perhaps one of the elements that is garnering the most attention right now is data security. Nutanix certainly knows this and is working hard with Thales eSecurity to protect the confidentiality and integrity of sensitive data through strong encryption of user and application data. When used with Vormetric Data Security Manager (DSM), the combined solution provides FIPS certified robust key management and role separation to meet the most stringent security requirements.

    In this webinar, we will examine the key elements of the joint solution as well as what may be the best options for your organization.

    • Understand the types of encryption and their characteristics
    • Understand the critical role of best-in-class key management
    • Learn how to go beyond the encryption basics
  • The Future Data Center - Live from Hitachi Next!
    The Future Data Center - Live from Hitachi Next! Storage Switzerland and Hitachi Sep 26 2018 7:00 pm UTC 60 mins
    What comes after Data Center Modernization? The future data center is smart. But what is a smart data center, how do you create a smart data center and why would you want to? We'll answer all of these questions on our live webinar roundtable discussion LIVE from Hitachi NEXT2018. Join us as we talk about solutions that can answer questions like:

    •What are the largest cost drivers in my data center?
    •How can IT accelerate my time to market?
    •How do I optimize costs like power and cooling?
    •How can I proactively identify inherent threats and issues?
  • (Replay) How End-to-End Copy Automation for SAP Systems Can Save Budget
    (Replay) How End-to-End Copy Automation for SAP Systems Can Save Budget Samer Kamal, SAP Solutions Manager, Pure Storage Sep 26 2018 11:00 pm UTC 45 mins
    Companies are facing increasingly complex IT landscapes, and testing needs to occur quickly and with consistency. Resource-intensive tasks, such as SAP system copy, clone, and refresh, can be complex and time-consuming – some customers report spending 3-5 days for one system copy. In this webinar, learn about a copy automation tool for SAP applications that incorporates more than 75% of all pre, copy and post functionality – and automates it. Whether for traditional SAP or SAP HANA, Pure Storage’s Copy Automation Tool (CAT) for SAP applications drives digital transformation with huge gains in productivity and cost savings, and is included with every Pure Storage FlashArray. In this webinar, you will learn:

    - How some companies have saved up to 80 percent of time and budget when performing SAP landscape copy, clone, and refresh tasks, freeing up time to focus on increasing innovation

    - How to simplify SAP copy functionality and gain flexibility through additional integration or customization, to speed SAP migrations, upgrades, and testing

    - How to reduce risks by automating the refresh process, and reduce complexity through the use of this embedded tool
  • Nouveauté OneXafe: nouvelle génération d'appliances de sauvegarde convergées
    Nouveauté OneXafe: nouvelle génération d'appliances de sauvegarde convergées Florian Malecki, International Sr. Product Marketing Director Sep 27 2018 8:00 am UTC 60 mins
    L'explosion des applications virtualisées, la réduction des fenêtres de sauvegarde et la croissance impressionnante du volume de données ont placé un immense fardeau sur les besoins en matière d'infrastructure de stockage et de protection des données. La situation se complique d’autant plus en raison des environnements de protection des données fragmentés actuels et des besoins de sauvegarde de données physiques et virtuelles, sur site et hors site, qui doivent tous satisfaire des niveaux de service différents (SLA). L'infrastructure de sauvegarde et de stockage secondaire est souvent fournie par plusieurs prestataires. Résultat : une augmentation des coûts d'acquisition et des inefficacités opérationnelles. L'agrégation de tous ces produits entraîne de silos de données difficiles à gérer de façon centralisée. Une vue incomplète du flux de protection des données peut conduire à une hausse des coûts d'exploitation, une perte des données et une incapacité à respecter les SLA ainsi que les réglementations et exigences de conformité propres au secteur.


    Rejoignez StorageCraft pour un webcast exclusif afin de découvrir les avantages de la nouvelle plateforme OneXafe converged storage and data.
  • New OneXafe: next generation converged storage and data protection
    New OneXafe: next generation converged storage and data protection Florian Malecki, International Sr. Product Marketing Director Sep 27 2018 9:15 am UTC 60 mins
    The growth of virtualised applications, diminishing backup windows, and explosive data growth have collectively placed an immense burden on data protection and storage infrastructure requirements. This complexity continues to be exacerbated by today’s fragmented data protection environments and the need to backup physical and virtual, on-premises and off-premises data, all with different service level agreements (SLAs). Backup and secondary storage infrastructure often comes from multiple vendors which significantly increase costs, add operational inefficiencies, and create data silos, making it difficult to manage centrally. An incomplete view of data protection workflow can lead to rising operational costs, data loss, and the inability to meet SLAs and specific industry regulations and compliance requirements.

    Join our webcast and learn how the new StorageCraft OneXafe converged data platform can help you with better protecting and managing your data in heterogeneous environments.
  • Fighting back with AI: Tapping the power of AI to elevate cybersecurity posture
    Fighting back with AI: Tapping the power of AI to elevate cybersecurity posture Lindsay Drabwell, Head of Membership Services (ISC)² EMEA, Mike Spradbery, Neil Jones, IBM Sep 27 2018 11:00 am UTC 60 mins
    How can AI help overworked, understaffed and overwhelmed security analyst teams? How can the use of an AI platform help reduce the cost of a data breach? Mike Spradbery, IBM's UK&I Security Technical Leader, will explore these and other questions as he talks live to the experts behind a new Ponemon Institute study on the use of Artificial Intelligence in Cyber Security. Mike will also share case studies of AI in action in Cyber Security and explore how AI is helping organisations elevate their cybersecurity posture and reduce response times.
  • What’s New in Data Protector: Introducing Data Protector 10.10
    What’s New in Data Protector: Introducing Data Protector 10.10 Julita Kussmaul, Senior Product Marketing Manager and Uli Wallscheid, Product Manager, Micro Focus Sep 27 2018 3:00 pm UTC 60 mins
    Join us for an exciting and informative look at the latest release of Data Protector.

    Data Protector 10.10 introduces two new editions: Data Protector Express for virtual environments and Data Protector Premium for physical, virtual, and multi-cloud workloads. With these editions we are simplifying pricing and packaging for Data Protector.

    Data Protector now offers integrated reporting capabilities making it a complete solution which includes built-in monitoring and reporting that can be managed within its web-based user interface. We’ll discuss the benefits of migrating your current Data Protector installation to these new editions.

    Data Protector 10.10 also includes installation and upgrade improvements including new prerequisite checks and automation. See a live demo of all the new features.
  • How to Solve your Top IT Security Reporting Challenges
    How to Solve your Top IT Security Reporting Challenges Sacha Dawes Principal Product Marketing Manager, AlienVault Sep 27 2018 4:00 pm UTC 56 mins
    If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework (CSF), as well as demonstrate compliance with PCI DSS, HIPAA and other regulations.

    Join this webcast to see how the USM platform makes it easy to:
    - Automate log collection, analysis and event correlation in a single console
    - Continuously scan for new assets and vulnerabilities
    - Get alerted of suspicious behavior like privilege escalations, account changes, malware and ransomware threats, and more
    - Simplify compliance with pre-built and customizable reports mapped to numerous regulatory requirements
  • Ransomware Attacks: Do You Have a Backup Plan?
    Ransomware Attacks: Do You Have a Backup Plan? Ronn Martin, Solution Architect - Veeam and Terry Grulke, Principal Technical Advisor - Quantum Sep 27 2018 4:00 pm UTC 45 mins
    Ransomware is just one of the many threats that can impact your business data. With the use of cloud storage and virtualization expanding, and with a +500% in attacks and +600% in new variants, NOW is the time to ensure you have a proactive backup plan.

    Join Veeam and Quantum to learn how to set up a solid BCDR (business continuity and disaster recovery) and backup strategy to protect your virtual data against any ransomware and cyber security threat, including some lessons learned by our customers.
  • Overcoming the Storage Roadblock to Data Center Modernization
    Overcoming the Storage Roadblock to Data Center Modernization Storage Switzerland and Datera Sep 27 2018 5:00 pm UTC 60 mins
    Organizations have tried a variety of solutions to regain control of their data storage infrastructure. They’ve invested in monolithic storage systems, software defined storage (SDS) and hyper-converged systems. While each approach may have brought some value, each failed in its primary task: consolidating storage resources. Each of these consolidation efforts is unable to consistently guarantee performance, scale capacity and drive down storage costs.

    As a result, most organizations end up buying workload specific solutions for both legacy and modern applications. Most data centers today have a mixture of multiple all-flash storage systems, hyper-converged environments and high capacity data archives. They also have storage software for each use case. IT ends up dealing with a data management nightmare, which limits organizational efficiency and productivity.

    Don’t give up! Join Storage Switzerland and Datera to learn how monolithic, software defined and hyper-converged architectures have let IT down and why the problem gets worse as data centers modernize. Attendees will learn how storage solutions need to change in order to eliminate primary storage silos while guaranteeing specific application performance, scaling to meet capacity demands and lower storage TCO.
  • Citizen Data Science Webinar Series - How To Do Data Right
    Citizen Data Science Webinar Series - How To Do Data Right Kyle Dempsey, Sr. Professional Services Engineer at Periscope Data Sep 27 2018 5:00 pm UTC 60 mins
    This is the second webinar in our “Citizen Data Science” series. Our first webinar, “Getting Started with Citizen Data Scientists,” covered the importance of citizen data scientists, how to get them enabled and how to empower them.

    To some citizen data scientists, data is a new language that they’re unfamiliar with translating into insights. For others, they’re eager to dive in and curious to explore, but reluctant to communicate their findings because they don’t have experience translating data into tactical operations.

    These new business-focused analysts need to be confident that they’re utilizing data properly. To empower these new data dives, Kyle Dempsey, senior professional services engineer at Periscope Data pulled together a collection of tips to make sure first-time analysts are doing data right.

    Join Kyle on September 27th, 2018 at 10 a.m. PDT as he walks through how to:
    - Define your analysis and outcomes
    - Understand what data is available and know how to ask for more
    - Ask questions in a way that allows data to answer them
    - Use data to inform decisions
    - Enable collaboration between technical and nontechnical teams
  • From Experimentation to Insights: Building an End-to-End Deep Learning System
    From Experimentation to Insights: Building an End-to-End Deep Learning System Tony Paikeday, Dir of Product Marketing, NVIDIA Deep Learning Systems; Roy Kim, Dir of Product Solutions, PureStorage Sep 27 2018 5:00 pm UTC 61 mins
    Every organization wants to infuse the power of AI in its business. From development to production training, you need an end-to-end AI workflow that’s optimized for the rigors of deep learning, that offers predictable performance as your neural network models and datasets grow. Attend this session to get insights into use cases, best practices and architecture examples that can help you and your data science team get started now, accelerating your path from experimentation to business insights.

    About the Speakers:
    Tony Paikeday is the Director of Product Marketing for the NVIDIA Deep Learning Systems, responsible for the world's first portfolio of AI supercomputers for enterprise - NVIDIA DGX Systems. Tony was previously with VMware, managing product marketing for the Horizon 7 portfolio and focused on key enabling technologies, including GPU virtualization and software-defined data center. Prior to joining VMware, Tony was at Cisco, building its data center solutions marketing practice focused on desktop and application virtualization. Prior to Cisco, he held business development roles at Nortel working with enterprise and service provider accounts, after having started his career as a Manufacturing Engineer for Ford Motor Company. Tony holds an engineering degree from the University of Toronto.

    Roy Kim joined Pure in 2017 as Director of Product Marketing for FlashBlade. Previously, Roy led product marketing at NVIDIA for deep learning, HPC, and enterprise analytics industries. Roy has Masters of Computer Science and Electrical Engineering and Bachelors of Science in Electrical Engineering from Massachusetts Institute of Technology.
  • A Hyperconverged Solution for Networking and Security Applications
    A Hyperconverged Solution for Networking and Security Applications Paul Andersen, VP Sales and Marketing, Array Networks Oct 2 2018 3:00 pm UTC 45 mins
    As data center and IT managers have increasingly moved to virtual environments, they’ve quickly come up against a hard reality of virtualization: Networking and security workloads often yield sub-par performance due to resource contention and hypervisor overhead. Join Array and Intel as we present a new alternative: The Network Functions Platform, a hyperconverged solution designed for the specific needs of networking and security, leveraging Intel technologies to deliver guaranteed performance in shared environments.
  • Future Smarter with NETSCOUT – Migrate to the Hybrid Cloud with Confidence.
    Future Smarter with NETSCOUT – Migrate to the Hybrid Cloud with Confidence. Ray Krug, Enterprise Solutions Architect, NETSCOUT Oct 2 2018 5:00 pm UTC 60 mins
    The ever-increasing pace of digital transformation is making businesses ever more reliant on interconnected software applications, substantially increasing complexity for deploying and managing these new services. In addition, increased dependence on hybrid cloud magnifies the risk that these technologies may slow down or end up failing. In this webinar, join Ray Krug, Enterprise Solutions Architect at NETSCOUT to learn about:

    • The challenges facing IT teams and the potential barriers that threaten the operation and migration of applications on-prem, off-prem and in hybrid environments

    • How you can extend the smart data your IT team has relied on in your physical and virtual worlds to maintain continuity, visibility and service throughout the transition to public cloud

    • Real-life examples of how businesses have harnessed this visibility in their Cloud environments.
  • Can your data infrastructure support AI marketing?
    Can your data infrastructure support AI marketing? Rolf Schromgens, CEO, Trivago Oct 3 2018 3:00 pm UTC 62 mins
    Are you AI-ready? You need to be. Artificial intelligence marketing applications are delivering on their promise to source new insights to grow your business fast, AI technology is becoming available to any company looking for a competitive edge, and now’s the time to move, if you want to stay ahead of the curve.

    But the challenge is not just in defining an AI strategy; it requires developing the infrastructure to support it.

    Should you be developing in-house, or look to available technology and collaborate with outside experts? Keep deployment on-premise, or reach for the cloud? Can your current infrastructure, from server performance to processing power, stand up to the demands of increasingly complex AI applications?

    Get ready to level up your marketing strategy with AI, advance your technological capabilities in smart, strategic ways, learn how to make sure your next infrastructure move helps you exploit the AI advantage and more when you join this VB Live event!

    Register for free!

    Attend this webinar and learn:
    * How to tell if your marketing and IT departments are AI-ready
    * The fundamentals of an AI-driven infrastructure
    * The role of clean, definable data goals in successful AI implementation
    * How to scale the AI workload

    Speakers:
    * Andrew Malinow, PhD., Principal Data Scientist, Zylotech
    * Rolf Schromgens, CEO, Trivago
    * Sherif Mityas, Chief Experience Officer, TGI Friday's
    * Michele Goetz, Principal Analyst, Forrester
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Zylotech
  • [Ep.21] Founders Spotlight: Matt Angerer, Founder, VerticalRent
    [Ep.21] Founders Spotlight: Matt Angerer, Founder, VerticalRent Matt Angerer, Founder, VerticalRent Oct 3 2018 4:00 pm UTC 45 mins
    In 2014, the founders of VerticalRent (www.verticalrent.com) were featured by Microsoft BizSpark for their early achievements with launching the industry leading rental property management and tenant screening software platform for property managers and landlords. In that article, Microsoft wrote: Matt Angerer is an IT professional by day and a landlord by night. At all times, he has an entrepreneur’s heart and mindset.

    A lot has changed since 2014. VerticalRent has more than quadrupled in the sheer number of landlords using the platform from every corner of the United States. The one thing that has not changed is that VerticalRent remains a small operation without employees that epitomizes the concept of a Lean Startup. If you're an IT professional by day who has been toiling with the idea of launching your own "side-gig", you'll want to tune into this BrightTalk webinar to learn how Matt Angerer, Founder of VerticalRent, started with a simple idea and scaled it into a platform that services over 25,000 landlords and nearly 50,000 renters across the United States in 5 short-years -- all while keeping his day job, running his rental properties, and financially supporting a family of 4.

    Matt will share with you the techniques he learned that allowed him to balance his personal and professional life to create a software as a service business. In this Webinar, he'll cover:
    - The Learn Start Up Mentality - What it Means and How to Live it Day by Day
    - Why a Slow-Growth Approach is Better for Certain Personality Types
    - How Anyone Can Create a SaaS Platform to Create Side Revenue
    - Why SaaS is More Lucrative in the Long-Term than Consulting
    - The Darkside of Entrepreneurship and Why Its Necessary

    Join us on Wednesday, October 3rd at 9am PT / 12pm ET for this live interview!
  • How Companies Can Scale Their File Systems with Microsoft Azure Storage + Nasuni
    How Companies Can Scale Their File Systems with Microsoft Azure Storage + Nasuni Vamshidhar Kommineni, Principal PM Manager @ Microsoft & John Capello, Vice President of Product Strategy @ Nasuni Oct 3 2018 5:00 pm UTC 60 mins
    Attend this webinar to learn about the first Azure-based solution that combines limitless NAS, Archiving, Backup, and Disaster Recovery and that automatically reduces your costs as your files age.

    See how Nasuni Cloud File Services and Azure object storage enable you to:

    - Store active and inactive data in one global file system that has no capacity limits
    - Cache actively used files locally to minimize egress charges and cloud latency
    - Provide access to active files at local LAN speeds from any office location
    - Avoid ever having to migrate or tier file data again
  • Location data: The secret to really knowing your customer
    Location data: The secret to really knowing your customer David Bairstow, SVP Product Management, Skyhook Oct 3 2018 5:00 pm UTC 60 mins
    Where are your target customers going, and how are they spending their time and, more importantly, their dollars? Location data and intelligence – not just on how consumers are interacting with your brand but also with your competitors – is key to crafting a killer consumer experience and reaching them when and where their hearts and minds (and wallets) are ready to be captured.

    From foot traffic patterns and location visits to frequency analysis, custom venue visit analysis offers powerful, actionable insights to companies looking for a competitive edge in a crowded field. Learn how to capture new customer interest, keep older customers coming back, and boost your market share when you join this VB Live event!

    Register for free now!

    During this webinar you’ll learn how to:
    * Boost engagement with location-based consumer insights and competitive intelligence
    * Gain insight into the behavioral patterns of customers and prospects
    * Apply the best use of location data for your business

    Speakers:
    * David Bairstow, SVP Product Management, Skyhook
    * Sheryl Jacobson, Principal Consulting Strategy and Analytics, Deloitte Consulting LLP
    * Stewart Rogers, Analyst at Large, VentureBeat (Moderator)

    Sponsored by Skyhook
  • Marketing Analytics: How a Data Company Manages Marketing Data
    Marketing Analytics: How a Data Company Manages Marketing Data Fraser Harris, Head of Product at Fivetran, Ryan Segar, Head of Sales Engineering & Brenna Robinson, Head of Growth Marketing Oct 3 2018 8:00 pm UTC 30 mins
    Marketing is increasingly becoming a data-driven function — tracking more activity than ever before — but how can you make sense of it all? What tools do you need? What roles do the marketer and the analyst or technical partner play?

    Follow along with Head of Product at Fivetran, and Periscope Data’s Head of Growth Marketing and Head of Sales Engineering to get a full picture of how a data company handles marketing metrics — from the perspective of both the data analyst and the marketing professional.

    This webinar will cover:
    - Setting objectives and goals for marketing analytics
    - Tying together disparate marketing data sources
    - Some best practice dashboards Periscope uses
    - How analytics and marketing should work together — and how analysts can enable marketers to explore their own datasets
  • What’s the latest in CA Service Virtualization v10.3 and why consider upgrading.
    What’s the latest in CA Service Virtualization v10.3 and why consider upgrading. Beverly Mindle and Koustubh Warty, CA Technologies Oct 4 2018 2:00 pm UTC 63 mins
    This session will walk you through the new and exciting features in our latest release- CA Service Virtualization v10.3 and offer some pointers on how to upgrade & stay current.

    Hear from our expert on tips and tricks to best upgrade to the latest version of CA Service Virtualization. Our experts will be at hand to take all of your questions on the new version and the upgrading process.

    Don’t miss the opportunity.
  • How to Design a 92TB, 500K IOPS AFA for less than $95,000!
    How to Design a 92TB, 500K IOPS AFA for less than $95,000! Storage Switzerland and StorONE Oct 4 2018 5:00 pm UTC 60 mins
    All-Flash Arrays are the model of inefficiency and as flash media increases in density and performance, the cost of this inefficiency becomes more obvious. Enterprise solid-state drives (SSD) deliver 70,000 IOPS per drive but most AFAs need 24 drives or more to achieve 70,000 IOPS. Those same systems also need high-end processors to move IO through them at those speeds. The cost of these systems is hundreds of thousands of dollars when in reality they should cost less than $100,000.

    In this webinar we will discuss why their software bottlenecks current all-flash arrays. We will explain how inefficient storage software requires vendors to use more powerful and more expensive CPUs, as well as a greater quantity of flash drives. We'll also explain why technology advancements like NVMe and increasing flash density will only make the situation worse.

    Registrants for the webinar will receive a copy of Storage Switzerland's eBook "Why Does Storage Cost So Much - How to Dramatically Lower the Cost of Storage".