Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Storage Switzerland and AparaviRecorded: Dec 7 201816 mins
Join Storage Switzerland and Aparavi for our live PodCast dealing with data privacy regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA). The regulations potentially force organizations of all sizes to rethink how they protect, retain and remove data.
During the PodCast we cover:
- The aspects of the GDPR and CCPA regulations that should concern IT
- The challenges the regulations create for current data protection retention applications
- How organizations need to change policies and products to address the regulations
- Answers to live audience questions about data privacy, GDPR, and CCPA
All attendees to the live event receive a free copy of Storage Switzerland’s latest eBook “GDPR IS FOR EVERYONE - Designing a Data Privacy Infrastructure”.
Markus Grau, Principal Systems Engineer und Gabor Horvath, Implementation Engineer bei Pure StorageRecorded: Dec 7 201830 mins
Immer häufiger werden Arbeiten an Storage Arrays nicht mehr über ein GUI oder CLI erledigt, sondern werden von Workflows oder Runbooks angestoßen. Ebenso werden Arrays in immer mehr 3rd Party Tools für z.B. Monitoring oder Backup integriert. Durch die offene HTTP REST API können diese Arbeiten sehr einfach und schnell erledigt werden. In diesem Webinar zeigen wir am lebenden Beispiel wie man Pure Arrays mittels APIs verwaltet und welche Integrationen von Partner (z.B. VMware, Veeam, Docker, Microsoft, etc.) diese bereits nutzen. Heute sind python, PowerShell, Ansible, Puppet, OpenStack, etc. keine Exoten mehr sondern ein Bestandteil der modernen IT, um Infrastructure As Code umzusetzen.
Eric Slack, Sr. Analyst, Evaluator GroupRecorded: Dec 6 201837 mins
Digital transformation is happening! It’s driving companies to adopt new ways to capture and analyze data (the new oil), to discover new insights and optimize the way they run their businesses.
IT is evolving to meet these new requirements, becoming more agile to keep up with dynamic markets - and the competition. The Cloud is a key, but on-prem infrastructures are, and will be, a part of most enterprise’s future.
Join Eric Slack, Sr Analyst with the Evaluator Group and see how CI, HCI and Composable can address this need for agile, comprehensive infrastructures that reduce time for design, configuration, deployment and operations.
Dr. Jim Metzler and Joel ChristnerRecorded: Dec 6 201843 mins
The WAN has been fundamentally upended by SD-WAN and IT decision makers now have to reconsider what the branch of today and tomorrow looks like. Do you choose a best-of-breed solution or do you settle on a solution that includes SD-WAN and other capabilities?
Join our webinar to learn the pros and cons of each and which dimensions should power your decision.
In this webinar, you will learn:
* The similarities and differences between best-of-breed SD-WAN and all-in-one systems
* Which challenges and complexities are either presented or remedied by each model
* How best-of-breed SD-WAN and all-in-one systems affect long-term remote office architecture
* And most importantly, which provides the most value in different circumstances
Dr. Jim Metzler is the Founder and Vice President at Ashton, Metzler & Associates. Dr. Metzler has worked in many positions in the networking industry. His current interests include Application Delivery, Software Defined Networking and Network Functions Virtualization.
Joel Christner is the VP of Marketing at CloudGenix and has two decades of experience in building distributed systems, infrastructure, and application delivery.
Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf NetworksRecorded: Dec 6 201852 mins
Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.
Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?
In this webinar, we talk about:
- Why investing heavily in endpoint and perimeter security products may not be enough
- The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
- How you can transform your cyber security strategy today with advanced threat detection and response
To discover why 24x7 monitoring is critical, register now.
Mike McGhee - Technical Marketing Engineer at Nutanix | Shaun Donaldson - Director of Strategic Alliances at BitdefenderRecorded: Dec 6 201858 mins
Since Nutanix pioneered hyperconverged infrastructure (HCI) in 2011, HCI has become an optimal way to run enterprise cloud. Meanwhile, the cyber threat landscape has worsened, demanding new approaches to protecting from advanced attacks.
Join this webinar to see how Nutanix and Bitdefender work together to provide you the following:
-An easy way to build a cutting-edge enterprise cloud for your environment
-A bullet-proof combination of a hardened cloud and next-generation security for its files and workloads
-An integrated solution to help you save time on infrastructure and security management and compliance
Storage Switzerland, Western DigitalRecorded: Dec 6 201847 mins
The flash optimized NVMe protocol has been on the market for over a year and the technology is available in several forms. NVMe, both storage and networking (NVMe over Fabrics) is more expensive than the typical SAS based solution and not all applications or environments can take advantage of the performance NVMe promises. At the same time there are workloads like artificial intelligence, machine learning and high velocity analytics that need all the performance that NVMe can offer and some organizations are buying NVMe solutions just for those workloads.
Most data centers already have too many storage systems to manage, and adding another silo just for extreme performance workloads may make the problem even worse. IT needs a strategy to not only correctly integrate NVMe into the data center but to do so in a way that doesn’t further fragment the architecture. In fact, with the right strategy, IT can use the NVMe system as a point of storage consolidation.
In this live webinar join experts from Storage Switzerland and Western Digital for an interactive webinar the will help you develop an NVMe strategy that makes the most sense for your organization.
Dave Welch, CTO & Chief Evangelist; House of Brick TechnologiesRecorded: Dec 6 201854 mins
What’s going on with Oracle core technology workloads in the IaaS Cloud market? What customer activity are we seeing in that space? What are the opportunities and challenges? How have those opportunities and challenges shifted?
Join this live webinar with Dave Welch, CTO and Chief Evangelist at House of Brick Technologies to answer these questions and more, and take a technical deep dive into Infrastructure-as-a-Service and the cloud market in 2019.
Jim Sangster, Sr.Director Product Mktg, Supermicro; Brian Watson, DCG Product Mktg, IntelRecorded: Dec 6 201840 mins
Unparalleled performance and enterprise-class capabilities are now available in the industry’s broadest portfolio of entry level UP servers and multi-node blades from Supermicro. Learn how you can now “do more” than ever before in this class of system, at the same entry prices.
Together with latest Intel® Xeon® E-2100 Processor and Supermicro UP systems, the broad portfolio offers the right server optimized for your environment.
Ghassan Abdo, Research VP, IDC and Danny Johnson, Director of Product Marketing, VerizonRecorded: Dec 6 201861 mins
Join Verizon and Ghassan Abdo, Research VP, Worldwide Telecom Cloud, & Virtualization Services, IDC for an engaging discussion about digital transformation and what organizations should consider as they take the next step in their digital journey. Get more insight into the key findings from the recent IDC MarketScape: Worldwide Communication SP SD-WAN
Managed Services 2018 Vendor Assessment as well as the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment. Plus, find out what your organization needs to do to become a digital leader and improve business outcomes. Participants will be able to download a complimentary copy of the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment, and a Verizon authored decision-maker’s guide.
About the speakers:
Ghassan Abdo, Research VP, WW Telecom Cloud, & Virtualization Services, IDC
Mr. Abdo, Research Vice President in the Telecommunications group, covers the evolution of the Telco Cloud Ecosystem as well as the emerging Virtualized Enterprise Networking services. His primary focus areas include Service Provider SD WAN and Managed Services, and emerging NFV-based Virtual Networking Services as well as other Managed WAN Services. In the Hosting & Cloud segment, Ghassan covers Service Provider Managed Hosting services, including Hybrid Managed Private/Public Cloud Services, Colocation Services, Secure Cloud Connect and CDN services.
The session will be moderated by Danny Johnson, 20+ year veteran in the technology industry. He is a seasoned executive possessing experience in software development, engineering, sales, consulting, product development, and marketing. Danny has started and launched innovative products and solutions within multi-billion dollar markets and is currently the head of product marketing for Verizon where he shares responsibility for the profitable growth of Verizon’s Strategic Network Portfolio.
Brandon Dunlap, Moderator, (ISC)², Nick Trigg, BitSight, Bob Lewis, (former) BarclaysRecorded: Dec 6 201859 mins
In the third of the series exploring BitSight Security Ratings, we will be focusing on the challenge of third party supplier risk management:
- How can we manage suppliers using the dimensions of inherent risk impact and residual risk appetite?
- How can we place suppliers cyber risk posture into context of our business?
- How can we continuously monitor and remediate according to sensible risk prioritisation?
Bob Lewis (former head of External Cyber Assurance and Monitoring, Barclays UK) will be discussing real life examples with Nick Trigg from BitSight.
Florian Malecki, International Sr. Product Marketing DirectorRecorded: Dec 6 201844 mins
Midsize businesses are increasingly embracing digital technology to gain a competitive advantage. However, the explosive data growth, coupled with a lean IT staff at most midmarket organizations has placed an immense burden on data protection and storage infrastructure requirements.
In recent years, a disruptive technology has emerged, creating a brand new category of backup & recovery and storage solutions: converged data protection appliances.
The concept is very simple: combine backup and recovery software with a scale out storage appliance that can be used as a backup target as well as accommodating most storage requirements.
Join this webcast to learn about the benefits of converged data protection platforms and what to look for when making your final decision.
Seyi Verma, Director of Product Marketing, DruvaRecorded: Dec 5 201863 mins
With data growing faster than ever before, managing data center infrastructure can be costly and complex. In addition to adding resources, hardware and tapes, you need to ensure visibility and control over remote and global sites to avoid data silos, and risks and compliance issues. That’s why the cloud became such a game changer for modern IT environments.
Join us for this upcoming webinar, discussing the five questions to ask about cloud data protection for enterprise workloads, and find out how to:
- Centralise and simplify management of corporate data environments
- Reduce costs and demands on local resources, and achieve 60% lower TCO
- Modernise data protection for virtual workloads
- Meet critical application data recovery speeds, and business continuity SLAs
- Harnesses the efficiencies and global reach of the public cloud, while delivering unmatched storage flexibility, data durability, and security
We will conclude with a product Demo, when you can get an in-depth look at product admin consoles and client UIs.
Jim Jeffers, Sr. Director, Principal Engineer, Intel; Bart Willems, Director, Sr. HPC Engineer/Architect, AtipaRecorded: Dec 4 201826 mins
Scientific simulations and modeling continue to produce larger and larger data sets. For our brain to understand and digest these vast amounts of data, visualization becomes an indispensable tool for post-simulation processing. Data produced by simulations is therefore often copied to high-end workstations and servers with special-purpose GPUs. As simulations continue to grow, moving and copying data becomes increasingly inefficient, time consuming, and wasteful of resources. The Atipa Polaris Select HPCV Cluster Family built on Intel Xeon Scalable Processors and Intel Omni-Path Fabric technology is the industry's first unified platform for scientific simulation and visualization. Using Intel Xeon optimized rendering engines, Atipa Polaris Select HPCV clusters offer in-situ visualization of big data on the same HPC system used to generate the data, eliminating the need for wasteful data transfers and special purpose hardware.
Bernie Hannon, Sr. Director, Citrix; Pankesh Mehta, Sr. Product Mgr, LenovoRecorded: Dec 4 201861 mins
For years, we’ve talked about the virtues of virtual desktop infrastructure (VDI). However, at the end of the day customers who invested time, resources and significant budget, often found that the benefits of VDI came with some hefty challenges. Complexity and time-to-value are difficult enough, but striking the balance between security and anytime/anywhere/any device access with has increasingly caused headaches for IT (not to mention the users!). Traditionally, securing apps and data meant keeping everything running in the data center, requiring IT to invest in expert resources to deploy and manage everything. In this session, you will see how these challenges have been addressed and how the barriers to adopting hybrid cloud digital workspaces are a reality with Citrix Cloud services deployed on Lenovo ThinkAgile HX. You’ll learn what VDI hasn’t been able to do, is now being delivered by Citrix and Lenovo. If you’ve already deployed VDI, we’ll show you how to relieve yourself of the burden of managing and maintaining a complex VDI environment, enabling you to put resources to better use. If you haven’t deployed VDI yet, we’ll show you just how simple it is to create secure, easy-to-use, and manage intelligent workspaces you and your users have been looking for. It’s called The Future of Work, and it’s here today.
Bob Ghaffari, Director, Intel & Calvin Chai, Director, VMwareRecorded: Dec 4 201848 mins
In today’s world of applications, dynamic workloads, and software-defined technologies, performance matters more than ever. Metrics like latency, availability, throughput, and processing power are all critical to designing a hyper-converged, software-based data center. Intel and VMware have been actively collaborating on technologies optimized for network workloads, and helping customers build solutions for enterprises of all sizes. In this session, we will explore how VMware, Intel, and customers are building multi-cloud networking solutions that combine all the speed and agility of the software experience with VMware NSX, together with platform benefits such as, Intel ISAs, DPDK, QAT.
Eric Hanselman - Chief Analyst, Robert Mahowald - Senior Vice President, and Simon Robinson - Senior Vice PresidentRecorded: Dec 4 201853 mins
Planning for the future is a complicated business. Organizations have to align business objectives with market forces and the technology that they hope will support them. Early stage technologies can offer tempting options, but it can be hard to quantify the risk in using them.
451 Research has distilled two years of conversations with their clients, demand-side research and the insight of their analyst team into a planning framework that can help organizations take on the future on their own terms. It’s not a quadrant, a wave or a platform. It doesn’t admonish you with prescriptive technology imperatives. It’s our collective view of the most important factors shaping tomorrow, so we can begin to plan today. It outlines trends that are pushing them and the assesses the maturity of the technologies that are behind them. We have identified four key "forces" that define all the trends we foresee: Universal Risk, Invisible Infrastructure, Pervasive Intelligence, and Contextual Experience. Whether you’re an enterprise, a vendor or a service provider, these forces, together or in part, are rocking your world, and 4SIGHT is an essential tool to plan for better future outcomes. This webinar will look at 4SIGHT capabilities and some of the outcomes that it can achieve, and explore some examples of 4SIGHT dialogs.
Join us and see how you can raise your planning game!
Paul Murray, Senior Systems Engineer, Nutanix & James Hsu, Senior Technology Architect, CitrixRecorded: Dec 4 201860 mins
Nutanix and Citrix have partnered to create a tightly integrated multi- cloud solution that simplifies and accelerates VDI deployments for companies of any size. With Nutanix InstantON for Citrix Cloud, the entire Citrix software stack is delivered as a 1-click service from the Citrix Cloud, attaching with zero effort to the on-prem Nutanix clusters powered by Citrix XenServer or AHV, the Nutanix native hypervisor. This hybrid mode tackles all the drawbacks of an exclusively on-prem or an exclusively cloud-based desktop delivery mechanism.
In this webinar, you will learn how Nutanix and Citrix allow you to:
· Take advantage of enterprise-class VDI benefits without any complexity
· Simplify desktop management and operations while increasing security and compliance
· Bring IT's focus back to the end-user with the help of Citrix XenApp and XenDesktop running on the Nutanix Enterprise Cloud
· Safely transition to hybrid cloud using our tightly integrated VDI solution called Nutanix InstantON for Citrix Cloud
Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Matthias Maier, EMEA Director of Product Marketing, SplunkRecorded: Dec 4 201860 mins
Where has the time gone?
2018 may forever be known as the year of GDPR, but a look back to the last 365 days shows us that those in cybersecurity have been through a year of numerous trends, investments and modernisations of their Security Operations.
This webinar will share trends and lessons learned from Splunk’s own customers throughout 2018, including
-Insights into SOC activities at the Bank of England
-What security life really looks like at Siemens
-Overcoming the Industrial Internet of Things/Industry 4.0 security challenges at Volkswagen AG
-The skillsets Telia needed for their SOC to be successful.
Join us on December 4th, 12pm GMT as Matthias Maier goes through the top tales you need to hear as a security practitioner or manager.
Simon Ratcliffe, CIO Advisor & Mentor, IT Evangelist, Ensono & Cloud Industry ForumRecorded: Dec 4 201856 mins
A 2018 survey of Enterprise organisations by Ensono and the Cloud Industry Forum showed that 89% of the 500 participants surveyed indicated that legacy technology within their businesses were preventing or hampering their ability to execute effective digital transformation.
Perhaps the greatest legacy within many organisations is the mainframe estate that brings the challenges of punitive vendor commercials, risks with maintaining on-going skills, lifecycle planning issues and the sheer volume of residual workload that remains within these estates. With increasing pressure to modernise the applications, methodologies and tooling surrounding these legacy environments, the mainframe is often seen as holding businesses back but does this need to be the case?
This webinar will explore different approaches to enabling these legacy systems to be part of the transformational journey rather than a blocker and examine how organisations can re-define the legacy blockers as positive rather than negative attributes.
Kelvin Murray, Sr. Threat Research Analyst, WebrootRecorded: Dec 4 201836 mins
Small and medium-sized businesses are major targets for cybercriminals. To stay safe, today’s businesses must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.
Register for this 30-minute webinar on the key threats businesses faced this year and what's upcoming in 2019 to get details and tips that will help you keep your business and clients safe. Our Threat expert will be discussing ransomware, banking Trojans, phishing and all the crypto-crime that’s wreaking havoc on IT pros.
Marija Šanina, Systems Engineer bei Pure StorageRecorded: Nov 30 201839 mins
"Die Einführung von Container nimmt rasant zu, aber die fehlende Unterstützung von persistentem Speicher und dessen Skalierbarkeit, um die Anforderungen und Geschwindigkeit von Containern zu erfüllen, scheint den Trend zu verlangsamen.
Mit dem Pure Service Orchestrator können Sie nun Storage- as- a- Service für Container liefern, um on-demand, microservicebasierende scale-out Applikationen aufzubauen und auszurollen, die die Anforderungen dynamischer, containerisierten Umgebungen erfüllen.
Mit Pure Storage können Sie somit in Ihrer eigenen Infrastruktur, on-premise, die Agilität erfahren und ausüben, die man so bisher nur von der Public Cloud kennt."
Steve Hunt, Dir. Product Management - DataCoreRecorded: Nov 29 201846 mins
IT organizations require a data protection solution that can combat against the ever looming threat of malware or ransomware, and data corruption, which can have a significant effect on day to day operations. When that data protection capability is included in their storage solution, it allows IT organizations to reduce their overall costs, while maximizing their ability to protect all data they are responsible for.
This is why DataCore Software created Continuous Data Protection (CDP), or the “undo button” for your data. In this webinar we explain and show how DataCore Software’s CDP feature can deliver one-second restore granularity and provides the best Recovery Point Objective (RPO) of any data protection solution.
Sam McLane, CTSO, Arctic Wolf NetworksRecorded: Nov 29 201837 mins
Cybersecurity is the biggest risk law firms face, and they can expect to face greater scrutiny from clients on how they use, store and protect client data. An effective cyber risk program often requires advanced threat detection and response capabilities that can challenge even a well-resourced internal IT team. While many recreations and online exploits are presented from the attacker's point of view, what do these attacks look like on the defender's side?
In this webinar, top security operations center (SOC) expert, Sam McLane, will share war stories on how attacks appeared in targeted organizations, the steps taken to correlate information about the attacks, and the development of an effective mitigation strategy. You'll also gain insight on how a SOC can identify a sophisticated attack sooner in its evolution, helping minimize the damage it might cause.
After attending, we will help you answer the following key questions:
- How can law firms demonstrate to their clients the effectiveness of their cybersecurity programs?
- What are the key risk factors that law firms face and how can they be mitigated?
- Why are law firms particularly vulnerable to the new cyberattacks that are becoming more prevalent?
- What is the right way to manage a cybersecurity breach?
Register now to hear from this security expert!
About our key speaker:
Sam McLane leads CTSO at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
Brian NeSmith, CEO and Co-founder of Arctic Wolf NetworksDec 10 20189:00 pmUTC45 mins
Cybercriminals continued on their rampage in 2018 stealing millions of records from Department of Homeland Security and successfully hacked into name brand companies like Adidas, Twitter, Cathay Pacific, and Ticketmaster. The pace is not expected to slow in 2019. With porous on-premises infrastructure, new cloud assets, and not enough people with cybersecurity skills to detect and respond to threats, 2019 should be a lively year.
The cybersecurity experts at Arctic Wolf Networks (AWN), a leading Security Operation Center (SOC)-as-a-Service provider have seen all types of attacks that have attempted to sneak through many a company’s perimeter and endpoint defenses.
In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf will walk through the top predictions for 2019, based on what our security services team has seen across more than 500 customers.
Here is a preview of the top 3 predictions that is bound to surprise you.
- The new approach cybercriminals will employ to get into target organizations
- Which industries will be most attractive to 2019’s hackers
- Whether new security technologies can live up to their expectations
- And much more!
To hear from this security expert and to learn what to look for in 2019, register now.
Roberto Isidoro, Sales Engineer en SUSE y Guillermo Torres, AWS Solutions Architect and SAP Expert en LinkeDec 11 20183:00 pmUTC60 mins
Descubre de la mano de Roberto Isidoro, Sales Engineer en SUSE y Guillermo Torres, AWS Solutions Architect and SAP Expert en Linke, AWS Premier Partner con la SAP Completency, cómo y por qué desplegar SAP en la nube de Amazon Web Services utilizando SUSE Linux Enterprise Server for SAP.
Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services LtdDec 11 20183:00 pmUTC60 mins
2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.
We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.
Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:
- What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
- How their priorities have changed over the last 15 years and where they will focus for the next 15 years
- Which cyber security trends have impacted their cyber security strategy
- How to prepare your organisation for these new trends
Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
Jambi Ganbar, Sr. Technical Solutions Manager NFV Ready Program, VMware and Petar Torre, Intel Lead Telco ArchitectDec 11 20184:00 pmUTC60 mins
Intel and VMware will explore the impact of NFV Infrastructure on VNF Data Plane performance. We will explain the correct hardware design and then discuss the optimal use of VMware vCloud NFV to achieve high throughput and low latencies. This will be excellent opportunity to learn about Data Plane HW configurations with Intel® Xeon® Scalable Processors and Intel® Ethernet Adapters 710 Series, as well as VMware’s latest vCloud NFV OpenStack Edition 3.0 and NSX.
Michael Ocampo, Product Mgr, Supermicro; Jason Kennedy, Director, Data-Centric Product Mktg, IntelDec 11 20185:00 pmUTC60 mins
The 5th generation of Supermicro’s Twin Architecture has been optimized to support cloud application solutions. In this Webinar, we will learn how companies configure their cloud infrastructure to maximize the BigTwin’s compute, memory and storage resources with virtualization. We will take a deep look into how BigTwin offers cost-effective memory bandwidth, which is critical for cloud applications and NoSQL performance.
Kevin Moos, Kina Ratanjee, and Sarah DavisDec 11 20185:00 pmUTC60 mins
Join Primitive Logic at our next webinar, where we'll bust the most common myths about data privacy as we show you how to adapt to the demands of our current environment and prepare for what lies ahead.
You will learn:
The most common myths around data privacy … and the real truth behind them
How to build a foundation for alignment with present and future data privacy laws
How to address the four key areas of data privacy compliance
The realities of where technology products can help your compliance efforts
Common challenges and pitfalls to avoid
Kevin Moos, President, Primitive Logic
Kina Ratanjee, Delivery Director, Primitive Logic
Sarah Davis, Senior Consultant, Primitive Logic
Dean Wallace, Marvell; Barry Maskas, HPEDec 11 20186:00 pmUTC75 mins
Fibre Channel’s speed roadmap defines a well-understood technological trend: the need to double the bit rate in the channel without doubling the required bandwidth.
In order to do this, PAM4 (pulse-amplitude modulation, with four levels of pulse modulation), enters the Fibre Channel physical layer picture. With the use of four signal levels instead of two, and with each signal level corresponding to a two-bit symbol, the standards define 64GFC operation while maintaining backward compatibility with 32GFC and 16GFC.
This advanced technical session will cover the T11 standards which define 64GFC serial Fibre Channel, backwards speed auto-negotiation compatibility, and compatible form factors:
•New physical layer and specification challenges for PAM4, which includes eye openings, crosstalk sensitivity, and new test methodologies and parameters
•Transceivers, their form factors, and how 64GFC maintains backward compatibility with multi-mode fibre cable deployments in the data center, including distance specifications
•Discussion of protocol changes, and an overview of backward-compatible link speed and forward error correction (FEC) negotiation
•The FCIA’s Fibre Channel speed roadmap and evolution, and new technologies under consideration
Arun Trivedi, Partner, Wipro and Kelly Harris, Senior Content Manager, BrightTALKDec 11 20186:00 pmUTC45 mins
This webinar is part of BrightTALK's Ask the Expert Series.
Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.
This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.
Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
openATTIC is a web-based management and monitoring tool for Ceph storage clusters. This webinar covers the functionality available in the most recent release, including performance graphs, node and disk monitoring, along with storage and gateway service management.
Jacqueline Bloemen, Senior Analyst BI (BARC) and Becky Smith, Sr. Product Marketing (Denodo)Dec 12 201810:00 amUTC60 mins
In a digtial World data is really everywhere. It enables innovative use cases, optimizes internal processes and will significantly affect tomorrow´s businesses.
The growing interconnectedness of people, companies, and devices, however has led us to a vast volume of data from an ever-widening variety of sources. This has resulted in the rising awareness of the necessity to implement a data strategy.
In this webinar Jacqueline Bloemen, Senior Analyst BI at BARC and Becky Smith, Senior Marketing Manger at Denodo, provide an overview of the current state of data strategy and data governance initiatives from companies around the world, based on the findings of a recently conducted study.
Key Questions this webinar will address:
- What are the most striking benefits of data governance?
- Which technological approaches are companies taking to control and provide data?
- What are the critical success factors of effective data governance?
1) Introduction and Challenges (Denodo)
2) Insights into the current state of data strategy and data governance initiatives (BARC)
3) Key Takeaways
Cameron Brett, Toshiba and Jonmichael Hands, IntelDec 12 20185:00 pmUTC60 mins
NVM Express® over PCI Express® SSDs is the mainstream solution in the client space because it is low cost and has a smaller form factor than HDDs, while touting high performance and low power usage. Evolving to meet the needs of consumers, NVMe™ implementations touch various markets like gaming, content creation, workstations, mobile, media creation and more. Join Jonmichael Hands of Intel and Cameron Brett of Toshiba for this NVM Express, Inc. hosted webcast to learn more about real-world examples and how NVMe specifications continue to evolve to support client needs.
In this webcast, attendees will learn more about the benefits of selecting NVMe enabled products like Intel SSDs and Toshiba SSDs. The webcast explores the client benefits that have surfaced with the different iterations of the NVMe specifications from NVMe 1.2 to NVMe 1.3 to the upcoming NVMe 1.4. Attendees will receive an in-depth overview of critical NVMe features including easier management of power/thermals, NVMe’s enablement in small form factors like M.2 and BGA, boot partitions and host controlled thermal management and namespace write protection.
About the Presenters
Cameron Brett is Director of Marketing, SSD and Storage Solutions, Toshiba Memory America, Inc. and a member of the NVMe Marketing Workgroup.
Jonmichael Hands is a Product Marketing Manager at Intel and the NVMe Marketing Workgroup Co-Chair.
Alfons Michels, Sr. Product Marketing Manager & Alex Best, Dir. Technical Business Development - DataCore SoftwareDec 12 20186:00 pmUTC60 mins
Are you forced to replace your hardware? Are you thinking about different deployment models for your IT infrastructure, e.g. hyperconvergence?
Well, any change to your IT infrastructure is a major challenge, and typically requires complex data migrations, resulting in service downtime, overtime and more money to spend - but are the results worth it?
Before you start your next project, think about an alternative approach to rip-and replace, like software-defined storage. You may ask yourself, why should that help me? And there are many good reasons, but an essential one are the unrivaled chained migration options.
If you're wondering what these benefits can mean to you, just join our brief webinar, which also includes a live demo and audience Q&A so you can see how simple it is to bring software-defined storage into your IT environment and leverage chained migration. Among others, you'll be able to discover:
• How to integrate software-defined storage into your environment
• How to migrate data between totally different types of storage
• How to change towards hyperconverged during regular business operations
Carl Sweetland, Account Executive - Microsoft & Mirela Cunjalo, Dir. Product Mgmt. - TeradiciDec 13 20186:00 pmUTC60 mins
Join Teradici and Microsoft for a glimpse into how scalable desktop resources in the cloud can help in education.
In this webinar, you'll learn how education institutions can leverage virtual desktops in the cloud to provide improved computing resources to students, strengthen security, and help make university IT operations more efficient. Teradici Cloud Access Software and Microsoft Azure enable a solution that will solve today’s desktop management challenges and drive improved access for students, personalized learning, and improved student outcomes.
•The unique benefits of hosting desktops and applications on Azure
•A reference architecture for the education use case
•The security and performance benefits PCoIP technology provides
•Endpoint flexibility, from ultra-secure PCoIP Zero Clients to personal devices
Don’t miss this webinar and a chance to learn how you can get started with Teradici and Microsoft.
Q&A will follow.
Don Molaro, CTA at WWT & industry expert, Hal Woods, CTO at Datera, and Bill Borsari, Field Technical Lead at DateraDec 13 20186:00 pmUTC45 mins
If you are like many out there, the DATA is at the center of what your organization does and it’s getting in the way of achieving a Software Defined DATA Center that is simple, automated and fast. Hear about the challenges enterprises like yours are encountering and evaluate the options available to architect a new approach that can:
- Automate data storage end-to-end using new capabilities like machine learning
- Harness the latest tech like NVMe to drive performance @ scale
- Consolidate data storage and operations
- Pave the way to adopt new container orchestration technologies like Kubernetes
Don Molaro, Chief Technical Advisor at World Wide Technology joins Hal Woods, CTO at Datera, and Bill Borsari, Field Technical Lead at Datera, to share their experience and advice. Learn the key requirements and technology options available to architect your future data operations, rightsize your budget and transition to a software-driven world.
Cameron Wyatt and Ian Tewksbury, Red HatDec 13 20187:00 pmUTC52 mins
The usual approach to beginning business transformation lies with the cloud, and the benefits of a hybrid cloud are clear and uncontested. So why is it that so many enterprises struggle to adopt this exceedingly prevalent technology? Historically, the problem has been an exclusive focus on the tools instead of the people using the tools.
In this webinar, we we'll discuss why it's imperative in today’s IT landscape to keep the end user as your primary focus when designing and implementing your hybrid cloud.
- How to build your cloud incrementally to accommodate future fixes and enhancements.
- Why you need to consider your existing policies and procedures when defining your new cloud experience.
- How to iteratively design and implement a successful hybrid cloud experience.
Cameron Wyatt, Consulting Architect, Red Hat Consulting, Red Hat
Ian Tewksbury, Consulting Architect, Red Hat Consulting, Red Hat
Daniela Fusaro, Senior Solutions ArchitectDec 14 20189:00 amUTC30 mins
Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.
Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.
Sie erfahren folgendes:
- Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
- Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
- Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller
Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
A SUSE Fornece uma infraestrutura ágil e simples de gerenciar, com maior velocidade de entrega, durabilidade e confiabilidade. Acelere a inovação e reduza os custos, transformando sua infraestrutura corporativa de armazenamento com uma solução inteligente de armazenamento definido por software, verdadeiramente aberta e unificada.
Storage Switzerland, Veeam, HPEDec 17 20186:00 pmUTC60 mins
Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates both the on-premises data center and the cloud to support a wide variety of workloads including traditional transactional databases, big data analytics, containers and many others.
A key aspect of consumption based IT is how the data created by these workloads will be protected. In fact, the right consumption based IT solution should curate end-to-end backup directly into the solution.
In our live webinar join Storage Switzerland, Veeam, and HPE to learn about consumption based IT, what to look for in a consumption based solution, how data protection can protect the solution and how data protection can be offered as a consumption based solution protecting both legacy and new architectures.
Shay Naeh, Cloudify; Petar Torre, Intel, Telco Lead ArchitectDec 18 20184:00 pmUTC60 mins
Diverse environments between CommSP IT, Core and Edge networks require flexible orchestration to implement multiple design principles from Telco over IT to cloud native. Solving orchestration and platform requirements for edge computing is critical from very small sites to much bigger ones. We will explore much better business and service agility for more performance and cost-optimized Intel(R) Architecture platforms.
Johna Till Johnson, CEO & Founder, Nemertes ResearchDec 18 20184:00 pmUTC60 mins
Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations.
Join Nemertes CEO Johna Till Johnson as she reviews the IoT architecture and framework and shares guidance gleaned from leading-edge clients and research study participants.
Tom Rose, Vice President of Technical Solutions at NasuniDec 18 20186:00 pmUTC60 mins
Two competing trends are helping Hybrid Cloud file storage emerge as a dominant architecture for IT: Globalization and Data Center Consolidation. How does IT manage to power users and applications at the edge in a competitive global environment while consolidating expensive data center resources? Tune in to learn:
- Why hybrid cloud solutions for applications and users are leading the way in file storage
- How to leverage hybrid cloud storage to reduce data center footprint
- How IT leaders are incorporating a cloud first strategy for file storage in 2019
Bhavani Yellapragada, AVP of DevOps, NasdaqDec 19 20186:00 pmUTC60 mins
IT leaders look to technology as a business differentiator and rely on it to foster innovation. Enterprises have discovered that hyper-converged infrastructure (HCI) can be the foundation of a modern, cloud-like datacenter. But don’t stop there — going beyond HCI delivers more savings, increases IT agility, and supports multi-cloud goals when you add virtualization as an integral part of your stack.
How do you harness the power of HCI and virtualization? Sure, there are a wide variety of tools on the market, but choosing the wrong HCI platform could limit your options in how you operate your datacenter or could impede cloud goals — including those associated with virtualization.
To learn more about the power of HCI and virtualization, how virtualization can remove complexity and increase efficiency, and how to choose the right HCI tool, don’t miss this VB live event!
Registration is free.
Attend and learn:
* How virtualization platform options on the market compare
* Why to consider changing virtualization solutions
* How to choose the right virtualization solution
* How to save thousands in virtualization licensing costs
* Bhavani Yellapragada, AVP of DevOps, Nasdaq
* Mike Wronski, Principal Marketing Manager, Nutanix
* Stewart Rogers, Analyst-at-Large, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
In this episode of the Enterprise-Wide Kubernetes series, we will show
how Nirmata makes it easy to integrate your Kubernetes clusters and
workloads with Vault for enterprise grade secrets management.
What to expect:
1. Learn best practices for managing secrets in Kubernetes.
2. Get an overview of HashiCorp Vault and learn how to use the tool for managing secrets i.e. sensitive data like passwords and access keys.
3. Discover Nirmata integrations with Vault.
Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo and Alejandro Ocando, System Analyst , TransAltaDec 19 20187:00 pmUTC51 mins
TransAlta is an electric power generator company headquartered in Calgary, Alberta. TransAlta developed a Energy Trading and Risk Management System (ETRM) for hourly energy pricing, but business users needed the ETRM data to be blended with many other sources of data in near real-time. At the same time TransAlta's IT department wanted to move their entire data layer to the cloud for flexibility, agility and lower TCO. Data virtualization technology played a central role in TransAlta's real-time data integration, while helping them move to the cloud with zero down-time. Attend this webinar to learn:
* Who is TransAlta and why data driven insight is critical for their energy trading system
* Why Data Virtualization played a critical role in TransAlta's cloud modernization effort
* How Data Virtualization offers a faster and better data integration over legacy systems