Hi [[ session.user.profile.firstName ]]

Virtualization

  • Getting started with GDPR, Privacy and Applying Appropriate Security Controls Getting started with GDPR, Privacy and Applying Appropriate Security Controls Jason Hart, Gemalto, Christine Andrews, DQM GRC, Adrian Davis, (ISC)² EMEA Live 60 mins
    In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:

    a. The background to the new General Data Protection Regulation
    b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
    c. A focus on the information security implications and considerations for meeting compliance
    d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
  • Detect and Block Apache Struts Bug Across Your Enterprise Detect and Block Apache Struts Bug Across Your Enterprise Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning Recorded: Mar 22 2017 62 mins
    A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.

    During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

    With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.

    This webcast will include a live demo and Q&A session.
  • OPNFV Overview: Navigating Its Many Projects OPNFV Overview: Navigating Its Many Projects Amar Kapadia, NFV Specialist, John Jainschigg, Technical Solutions Marketing at Mirantis Recorded: Mar 22 2017 59 mins
    NFV continues to gain prominence in both the telecom industry and enterprises. OPNFV is an open source systems integration project to create and test open source to help create a complete NFV stack as defined by the ETSI reference architecture. However, the unique nature of the project makes it difficult to understand than "traditional" open source software development projects. In this webinar, we will look at the OPNFV project as a whole and through a high-level review of its roughly 60 projects. Suitable for both practitioners and decision makers, you will learn:
    * An overview of the OPNFV project
    * An introduction to create-integrate-test categories
    * Upstream and OPNFV projects that belong to the above categories
    Join us on March 22 as Amar Kapadia and Nick Chase help you navigate through the various OPNFV projects.
  • Change is Everywhere! How Can SUSE OpenStack Cloud Help You Deal With It? Change is Everywhere! How Can SUSE OpenStack Cloud Help You Deal With It? Mark Smith Recorded: Mar 22 2017 52 mins
    The adoption of cloud computing continues to accelerate, driven by customer demand for new services and fast-changing technology trends including DevOps, containers and cloud-native apps.
    The impact of rapid change on business is profound. As always, there will be winners and losers.
    Join us to learn how SUSE OpenStack Cloud 7 can help you adapt and innovate to meet the challenges ahead.
  • Migrating Existing Applications with Containers Migrating Existing Applications with Containers Scott McCarty Recorded: Mar 21 2017 26 mins
    Many organizations have dabbled with Linux® containers. After a small, successful project, an epiphany happens and you ask: What else can we containerize? Can we put everything in containers? How do we get traditional applications into containers? Learn about technical and architectural considerations when moving existing applications to containers. From systemd, to storage to backups, to debugging applications in production, there are a lot of things to think about when migrating existing applications to containers and running them in production.

    Join this session to:
    Gain operational confidence if you’re on the fence about, or just dabbling in, containers.
    Have a shared experience with a bigger community this is running containers with actual workloads in their organizations.
    Learn how to optimally containerize new applications and migrate existing ones.
    Start collecting and discussing best practices to widen container adoption.
  • The 5 Disaster Recovery Questions You’re Not Asking The 5 Disaster Recovery Questions You’re Not Asking Curtis Preston, Storage Switzerland Recorded: Mar 21 2017 62 mins
    Disaster Recovery as a Service (DRaaS) is changing the way data center administrators think about disaster recovery. A DR site and equipment no longer need to be bought in advance. DRaaS instead enables DR to be on-demand. The concept is so appealing that vendors are racing into the market claiming to offer DRaaS capabilities. But DRaaS is more than a simple check mark for a DR requirement. Organizations need to realize that how well the service performs is critical to successfully surviving a disaster.
  • Securing Cisco with Splunk - Lessons from One of the World’s Most Mature CSIRTs Securing Cisco with Splunk - Lessons from One of the World’s Most Mature CSIRTs Imran Islam, CISCO, Matthias Maier, Splunk, Adrian Davis, (ISC)² EMEA Recorded: Mar 20 2017 59 mins
    The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.
    Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.
    Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:
    - CSIRT playbooks and automation methods
    - The importance of timely CSIRT data access, correlation & visualisation
    - CSIRT staffing approaches
    - CSIRT threat intelligence management
    - Driving CSIRT operational efficiency
    - The importance of CSIRT collaboration across the business during investigations
    - How CSIRT functions can increase business relevance
    - Learn about the importance of understanding your environment
    - Learn about the importance of having the right data
    - Learn the critical success factors for building a CSIRT Team and capabilities
    - Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues
    - Learn how to justify adding more resources to an incident response team
    - Learn how to introduce consistency into your security team for approaching and solving security problems.
  • Why Facebook and the NSA love the graph database Why Facebook and the NSA love the graph database Senior Analyst & Consultant Mike Matchett Recorded: Mar 17 2017 6 mins
    Senior Analyst & Consultant Mike Matchett dives into graph databases, and Why Facebook and the NSA love them.
  • Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Say good-bye to choppy videos & slow PDF scrolling: Hardware Accelerator Tim Konopelky, Systems Analyst & Patrick Mauro,Senior Product Manager Recorded: Mar 16 2017 29 mins
    Watch a short demonstration on how Teradici PCoIP® Hardware Accelerator smooths CPU peaks to deliver a consistent user experience. Say good-bye to choppy videos or lags using everyday applications thanks to the card’s powerful dynamic workload allocation capabilities.

    Enjoy full screen HD video playback and immediate performance improvements that can be achieved with PCoIP Hardware Accelerator.

    Get a glimpse of how you can enhance your VMware® Horizon View environment with the card including reduced CPU overhead. Plus, we’ll share five VDI lessons from our customers.

    Those who attend and view the webinar will receive a copy of the slide deck and FAQs.
    Q&A will follow at the end of the session.
  • CTO PoV: Enterprise Networks (Part 2) CTO PoV: Enterprise Networks (Part 2) Khalid Raza, CTO & Co-Founder, Viptela & Danny Johnson, Director, Product Marketing: Network Services, Verizon Recorded: Mar 16 2017 45 mins
    In Part 2, the CTO PoV will focus on Security for IoT and Cloud in Enterprise Networks.

    IoT, Cloud and Mobile devices are stretching the traditional limits of IT security. As enterprise applications change and technology advances, the fundamental network infrastructure needs to support a robust security framework.

    Khalid Raza (CTO, Viptela) & Danny Johnson (Director, Verizon) share their Point of View on why current WAN infrastructures are not designed to support new enterprise traffic patterns, and how emerging security approaches designed around segmentation and policy can help organizations adapt to these changes. Enterprises can protect their Cloud and enterprise against attacks and data leaks while migrating to a cost-effective Hybrid architecture.

    In this webinar, we will cover:

    - The security threats around Cloud and IoT
    - Applications that are stressing enterprise network security requirements

    View Part 1 On-Demand: https://www.brighttalk.com/webcast/14779/247749
  • Collective Security – Prairie Dogs vs Humans Collective Security – Prairie Dogs vs Humans Jim Hansen, Chief Operating Officer, PhishMe, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Mar 16 2017 61 mins
    As the security industry has continued to under invest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.

    In this presentation, Jim Hansen will discuss:
    •Why the cyber security industry is broken
    •How to reduce susceptibility to human-targeted attacks
    •How to empower users to become human sensors to recognize and report suspected attacks
  • All Things Containers: Innovation, Adoption and Security All Things Containers: Innovation, Adoption and Security Peter Christy, Research Director of 451 Research; Marc Woolward, CTO at vARMOUR Recorded: Mar 15 2017 61 mins
    Enterprise IT is transforming rapidly and the evolution to container-structured applications is an important element of this transformation. From the container’s humble origins as a method to virtualize UNIX operating systems to provide process separation with high levels of efficiency, it has become the preferred method for building and deploying modern software into cloud environments.

    Containers are foundational to propelling agility in the enterprise - they are dynamic in nature, support increasing computing densities, have data residency and data provenance for governance and present challenges and opportunities for security in this new world with DevSecOps.

    Please join Peter Christy, Research Director of 451 Research and Marc Woolward, CTO at vArmour as they discuss all things containers along with a look at vArmour’s container strategy, solution and latest patent on container security.
  • Outsmarting Ransomware with Arcserve Outsmarting Ransomware with Arcserve Kervin Myrtil and Gary Sussman Recorded: Mar 15 2017 47 mins
    Ransomware is a growing threat to your business, and the consequences of an attack could be devastating — from critical data loss and business downtime to lost revenue and damage to your reputation.

    Relentlessly protect your data from ransomware!
  • Eliminating Storage Bottlenecks for Advanced Apps & High Performance Computing Eliminating Storage Bottlenecks for Advanced Apps & High Performance Computing Brian Schwarz, Director, Product Management, Pure Storage Recorded: Mar 15 2017 30 mins
    In the age of applications where design, simulation, visualization and interpretation can all be performed digitally on high-powered servers and networks, eliminating the big data storage bottleneck has become imperative for high performance computing users.

    What’s needed is a new, innovative storage architecture to support advanced applications while providing best-of-breed performance in all dimensions of concurrency – including IOPS, throughput, latency, and capacity – while offering breakthrough levels of density. A flash storage solution with an elastic scale-out system can deliver all-flash performance to petabyte-scale data sets, ideal for big data analytics.

    Join this webcast for a technical deep-dive into why storage is becoming increasingly important in the age of applications, big data, and HPC.
  • SPAR V8 New Bumpers SPAR V8 New Bumpers Andreas Kranabitl – CIO, SPAR-AG Recorded: Mar 14 2017 5 mins
    SPAR, one of Austria’s major grocery retailers, runs their own IT operations, SPAR ICS. This allows SPAR to forecast future prospects of trade with data processed in real time and failure of systems would create gridlock for the company. With Hitachi Converged Solutions, powered by Intel, SPAR is able to manage their real time data analytics in massive volume.

    Learn how SPAR, in partnership with Hitachi Data Systems, has transformed their business model to deliver maximum performance, scalability and availability on a new and improved integrated hardware platform utilizing Hitachi UCP for SAPHANA.
  • How to Keep Linux Safe From Dirty COW Vulnerabilities How to Keep Linux Safe From Dirty COW Vulnerabilities Scott McCarty & Hugo Rivero Recorded: Mar 14 2017 28 mins
    Containers help you build and package applications with all of their dependencies, which allows you to deploy at scale very quickly. But, what happens when you deploy at scale and one of the dependencies has an exploit embedded in it? Since exploits can also be deployed at scale, you need to build with trusted images. The Red Hat® Container Catalog provides the perfect place to get these trusted images from Red Hat.

    Join this session to learn:
    -How the new Red Hat Container Catalog can help you build your container images.
    -How architectural and security information provided by Red Hat sets us apart.
    -Why ISVs consider Red Hat a trusted partner in the journey to containerized applications.
    -How to protect your organization from security exploits and deploy safe containers.safely

    Don't let the Dirty COW (copy-on-write) contaminate your milk!
  • Tech Talk: Improving App Performance Across All WAN Transports Tech Talk: Improving App Performance Across All WAN Transports Derek Granath and Chris Rogers Recorded: Mar 14 2017 48 mins
    Increase the performance of your wide area network and worker productivity with key features that allow you to condition your connectivity, bond different links together to improve application performance, and define QoS profiles based on business policies to ensure that receive the priority, performance and availability they require.
  • "The Wire Can’t Lie" - Empowered by Solarflare’s New SolarCapture Product Range "The Wire Can’t Lie" - Empowered by Solarflare’s New SolarCapture Product Range Ramzi Zabaneh Recorded: Mar 14 2017 43 mins
    “The Wire Can’t Lie”: From packet data to network management wisdom, empowered by Solarflare’s new SolarCapture product range

    This webinar will cover:
    - Consolidated network monitoring can be used to rapidly identify, isolate and solve application and business problems in finance, service provider and government networks, with typical use cases

    - Both ROI and flexibility can be optimized through the powerful feature set of the new SolarCapture turnkey solution, with 40 GbE lossless-to-disk packet capture provided in an open platform

    - SolarCapture is special, key products, functionality and options in the SolarCapture family, as well as details on upcoming product features
  • Get Powerful Threat Detection for the Cloud Get Powerful Threat Detection for the Cloud Danielle Russell, Sr. Product Marketing Manager Recorded: Mar 14 2017 48 mins
    Cloud computing promises advantages such as lower IT cost, increased agility and better support of business functions. However, cloud security concerns continue to top the list of barriers to cloud adoption.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. USM Anywhere extends our award-winning approach to threat detection, Unified Security Management (USM), to the cloud. Whether you are looking to secure your AWS & Azure cloud environments, hybrid cloud or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Viewers will learn how easy is to:
    - Discover all assets across your AWS, Azure and on-premises environments
    - Scan for vulnerabilities across cloud-based and physical assets
    - Detect emerging threats with real-time, integrated threat intelligence
    - Monitor asset logs including Azure Insights, AWS CloudTrail, S3 and ELB
    - Respond quickly to incidents & conduct thorough investigations

    About the Presenter:

    Danielle is a Senior Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement. Prior to AlienVault, Danielle held a marketing leadership position with an IT software company in the telecommunications industry. Danielle earned a B.S. Life Sciences Communication from the University of Wisconsin.
  • Choosing the Best Approach for Monitoring Citrix User Experience Choosing the Best Approach for Monitoring Citrix User Experience Innovations Srinivas Ramanathan, CEO of eG Innovations Recorded: Mar 9 2017 64 mins
    Choosing the Best Approach for Monitoring Citrix User Experience: Should You Monitor from the Network, Server or Client?

    A great user experience is key for the success of any Citrix application virtualization or desktop virtualization initiative. To ensure user satisfaction and productivity, Citrix administrators should monitor the user experience proactively, detect times when users are likely to be seeing slowness, pinpoint the cause of such issues and initiate corrective actions to quickly resolve issues, thereby ensuring user satisfaction and productivity.

    A key question is where should the monitoring of the Citrix infrastructure be performed from - the network, the server infrastructure, or from the client?

    In this webinar you will:

    Learn about the different approaches to Citrix user experience monitoring, their benefits and shortcomings
    Hear about a hybrid approach that provides the most cost-effective yet comprehensive monitoring for a Citrix server farm
    See a live demonstration of the hybrid Citrix monitoring approach and its ability to cover all aspects of Citrix user experience
  • A View of the World's Largest & Fastest Growing Data Center Spot A View of the World's Largest & Fastest Growing Data Center Spot Kelly Morgan 451 Research and Mark Kidd Iron Mountain Recorded: Mar 9 2017 33 mins
    A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Tintri VM-Aware Storage Tintri VM-Aware Storage Brett Schechter, Sr. Product Marketing Manager Recorded: Mar 9 2017 60 mins
    Flash storage adoption is growing at an ever-increasing rate. It’s posed to adopt storage that has become overly expensive, doesn’t keep up with new application performance needs, constantly requires capacity expansion, and requires expensive staff to keep it operational. Worse, it probably gets conveniently “end-of-life-d” at exactly the wrong time, forcing you in to costly upgrades.
  • Mobile World Congress 2017: 5 Trends to Watch Mobile World Congress 2017: 5 Trends to Watch TIA, David Heard, John Jacobs, Susan Schramm, Brenda Boehm, Limor Schafman Recorded: Mar 9 2017 57 mins
    Sights and Insights from TIA @ MWC17

    On Thursday, March 9 at 11 am ET, join TIA for a post Mobile World Congress 2017 webcast on sights and insights from the show floor. Hear from TIA executives as they discuss the transformation of connectivity infrastructure, the expansion of IoT applications, and the proliferation of Smart Communities projects.

    Speakers:

    > David Heard, Board Chairman, TIA

    > Brenda Boehm, Chief Strategy Officer and Executive Vice President of Technology and Products

    > Susan Schramm, Chief Marketing Officer & Senior Vice President of Membership and Marketing

    > John Jacobs, Vice President, Market Intelligence and Research
  • Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Applink: Automate the process flow between HPE OpsBridge & 3rd party BSM vendors Stefan Goeritz, Applink and Ian Bromehead, HPE Mar 23 2017 4:15 pm UTC 60 mins
    In this session we will demonstrate AppLink’s CLIP solution to implement a combined workflow of HPE OMi’s event management capabilities integrated into the incident management process of ServiceNow and BMC Remedy. In addition to CLIP’s out-of-the-box workflow, this session shows real life non-intrusive customer customizations of CLIP to address auto-assignment of incidents, context sensitive auto-resolution of incidents based on CLIP variables and direct vs. indirect integration options.
  • Top Reasons Why Your Antivirus Isn’t Working Anymore Top Reasons Why Your Antivirus Isn’t Working Anymore Ed Metcalf, Director of Product Marketing and Brian Robison, Senior Director of Field Technical Marketing at Cylance Mar 23 2017 5:00 pm UTC 75 mins
    Are you weary from fighting malware, ransomware, and other threats that your ineffective and tired antivirus software can’t stop?

    If so, join us for our webinar, “Top Reasons Why Your Antivirus Isn’t Working Anymore” to hear why it’s time to rise up and overthrow traditional, reactive antivirus solutions in favor of proactive endpoint protection powered by artificial intelligence (AI).

    During this webinar, you will see a live demo of AI in action with CylancePROTECT®, and cover the key reasons why your current antivirus solution probably isn’t working anymore:

    - It’s Reactive: Legacy, signature-based antivirus products cannot prevent malware from executing. Cylance AI technology protects before the machine is infected.
    - It’s Ineffective: Legacy security tools perform at a 70 – 90% success rate. Cylance routinely performs with near perfect efficacy, at 99%+.
    - It’s Burdensome: On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. CylancePROTECT is outstandingly lightweight at just 1% – 3% CPU utilization.
    - It’s Costly: Signature-based antivirus solutions impact the bottom line with more layers of unproductive technology. Cylance protects with a single agent and a single cloud-based management tool, and that translates into big cost savings.
  • Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Storage Refresh? 3 Capabilities Primary Storage Must Have (but probably doesn't) Charlie Hodges, Storage Switzerland Mar 23 2017 5:00 pm UTC 60 mins
    If your organization is embarking on a refresh of your primary storage system this year, this is the one webinar that you will want to attend. IT evaluators that haven't looked at storage in a few years, will be impressed the use of flash to improve performance, while many claim to integrate file (NFS, SMB) and block (iSCSI, Fibre) protocols. These features though are now table stakes for the modern storage solution.

    While all of these features are important (and not created equal), IT professionals should demand capabilities that solve today's organizational challenges like eliminating shadow IT, improving multi-site productivity and long term data retention as well as meeting increasingly strict compliance standards. IT professionals should look for not only high performance and universal protocol support but also enterprise file sync and share, inter-data center sync and secure archive with compliance.
  • Redefining Virtual Desktops and Apps with Horizon Cloud Redefining Virtual Desktops and Apps with Horizon Cloud Joseph Evans - Senior Product Marketing Manager, VMware and Nina Seth - Senior Product Marketing Manager, VMWare Mar 28 2017 3:00 pm UTC 45 mins
    VDI has seen tremendous growth over the past few years as organizations look to securely and cost-effectively support their ever-increasing mobile workforce. Now VMware is introducing Horizon Cloud, making it easier than ever to deliver on-premises or cloud-hosted virtual desktops and applications from an easy-to-use control plane in the cloud. In this webcast, you’ll learn how your organization can reap the many benefits of virtual desktops and applications with the speed, simplicity, and predictable pricing of a cloud service.
  • Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid Charlie Hodges, Storage Switzerland Mar 28 2017 3:30 pm UTC 60 mins
    For most enterprises, optimizing your Windows fileserver means buying a new, bigger server with more capacity and better network connections. Or it means buying a dedicated Network Attached Storage (NAS) system. Then they feel they need to add new ransomware and data protection software. All of these "solutions" are expensive, involve a costly data migration and don't really increase IT efficiency. In this webinar, experts from Storage Switzerland and Caringo will teach you how data management can eliminate the need for additional Windows file servers, capacity and protection.
  • Got Slow Apps? Challenges, Tips & Best Practices for Troubleshooting & UX Got Slow Apps? Challenges, Tips & Best Practices for Troubleshooting & UX Frank Ohlhorst, Enterprise IT Analyst & Consultant and Srinivas Ramanathan, CEO of eG Innovations Mar 28 2017 5:00 pm UTC 60 mins
    IT performance management isn’t about monitoring CPU, memory or disk space any more. One of the toughest application performance challenges for any IT administrator is when a user says "my application is slow". You have to be able to quickly determine what the real cause of the problem is - is it in the network, the database, the application, storage? The fact that applications are using multi-tier architectures and being deployed in cloud and virtualized infrastructures only adds to the challenge.

    Join us for this webinar where Frank Ohlhorst, Enterprise IT Analyst & Consultant and Srinivas Ramanathan, CEO of eG Innovations, will discuss the best practices for troubleshooting and prevention so even before a user complains their application is slow, you can pinpoint exactly where the cause of a problem lies – ensuring quick resolution and a positive user experience.
  • Using Ansible Container to build your Images Using Ansible Container to build your Images Greg Dekoenigsberg Mar 28 2017 7:00 pm UTC 30 mins
    If you have invested time in building Ansible infrastructure and knowledge, it makes sense to get as much out of that investment as possible. That's why we created the Ansible Container project—to help you move from the world of Ansible to the world of OpenShift.

    Join this session to learn:
    1. The conceptual similarities between Ansible roles and microservices.
    2. The proper construction of an Ansible role to be deployable to VMs or containers.
    3. The usage of Ansible Container to turn Ansible roles into container images.
    4. How to integrate Ansible Container and OpenShift seamlessly.
  • SUSE OpenStack Cloud  - Grow Your Technical Knowledge SUSE OpenStack Cloud - Grow Your Technical Knowledge Simon Briggs, SUSE Mar 29 2017 2:00 pm UTC 30 mins
    Get some excellent technical details about SUSE OpenStack Cloud in only 15 minutes!
  • All-Flash Storage Technology & High Performance Workloads: The Latest Innovation All-Flash Storage Technology & High Performance Workloads: The Latest Innovation Ravi Poddar, Ph.D., Director of HPC and EDA Solutions for FlashBlade, Pure Storage Mar 29 2017 4:00 pm UTC 15 mins
    This webinar discusses how advances in all-flash storage technology can help improve the acceleration of Electronic Design Automation (EDA) and high performance workloads. It highlights current issues with storage bottlenecks in these environments and its impact on productivity. And then it covers a quick overview of FlashBlade, a revolutionary new storage system for high performance and high concurrency workloads that will drive tomorrow's next generation chip designs.
  • Transformez l’expérience client grâce à la vision à 360 degrés Transformez l’expérience client grâce à la vision à 360 degrés Eléonore AIT-LEBON, MDM Sales Specialist - Informatica & David Decloux, MDM Specialist Manager - Informatica Mar 30 2017 9:00 am UTC 45 mins
    Aujourd’hui, une expérience client réussie prévaut sur le prix et l’innovation dans la décision d’achat. Seule une connaissance accrue du client basée sur une donnée de qualité et largement diffusée peut permettre aux directions marketing et relation client d’offrir cette expérience sans couture que les consommateurs exigent.

    Participez à ce webinaire pour découvrir comment :

    - Mettre les données client au cœur de la stratégie de l’entreprise et de l’expérience client grâce à l’exemple de Hyatt Hotels ;
    - Améliorer la fidélisation en offrant des expériences personnalisées et fluides d’un canal à l’autre ;
    - Se doter d’une vision client unique grâce aux technologies de Master Data Management nouvelle génération, à travers une démonstration live.
  • Making the Case for Lithium-Ion Batteries in the Data Center Making the Case for Lithium-Ion Batteries in the Data Center Peter Panfil, VP Global Power, Vertiv; Tony Gaunt, Senior Director, Vertiv Asia; Thomas McKinney, Forsythe Data Centers Mar 30 2017 7:00 pm UTC 60 mins
    This one-hour webinar will examine the advantages of lithium-ion as well as concerns data center managers may have. The presentation will focus on:

    > Footprint
    > Battery life
    > Cooling costs
    > Safety

    Attendees will be provided with key takeaways to help them effectively evaluate real-life applications of lithium-ion batteries within critical spaces.

    Register now.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Adrian Davis, Managing Director, (ISC)² EMEA, Q&A with Membership Services Apr 3 2017 10:00 am UTC 60 mins
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Protecting your all-flash FlashStack Converged Infrastructure platform Protecting your all-flash FlashStack Converged Infrastructure platform Mayur Dewaikar, Product Management: Solutions & Integrations, Pure Storage Sunil Polepalli, Head of Cisco Alliance, Commvault Apr 4 2017 6:00 pm UTC 60 mins
    Are you considering converged infrastructure, but unsure how it can be protected? Look no further. Cisco has just released an end-to- end, Cisco Validated Design (CVD), leveraging Commvault Data Protection. FlashStack now offers industry-leading Commvault data protection running on UCS Servers, for protection of all FlashStack supported applications.

    According to IDC, Commvault Data protection software delivers:

    1. 42–52% reduction in annual spending on data infrastructure, software, services, and compliance

    2. 47–62% reduction in weekly administrative hours across cloud, disaster recovery (DR), backup, snapshots, discovery, reporting, and scripts

    3. 15–30% reduction in data management point solutions

    4. 55% reduction in annual unplanned downtime

    Join us on April 4th for an exclusive webinar hosted jointly by Pure Storage and Commvault where you’ll learn:

    1 How FlashStack compares to other converged infrastructure platforms.

    2 What applications can be deployed and protected on FlashStack, combined with Commvault Data Protection.
  • Rockin’ and Rollin’ with SMB3 Rockin’ and Rollin’ with SMB3 Ned Pyle, SMB Program Manager, Microsoft, John Kim, SNIA-ESF Chair, Mellanox, Alex McDonald, SNIA-ESF Vice Chair, NetApp Apr 5 2017 5:00 pm UTC 75 mins
    Server Message Block (SMB) is the core file-transfer protocol of Windows, MacOS and Samba, and has become widely deployed. It’s ubiquitous - a 30-year-old family of network code.

    However, the latest iteration of SMB3 is almost unrecognizable when compared to versions only a few years old. Extensive reengineering has led to advanced capabilities that include multichannel, transparent failover, scale out, and encryption. SMB Direct makes use of RDMA networking, creates block transport system and provides reliable transport to zetabytes of unstructured data, worldwide.

    SMB3 forms the basis of hyper-converged and scale-out systems for virtualization and SQL Server. It is available for a variety of hardware devices, from printers, network-attached storage appliances, to Storage Area Networks (SANs). It is often the most prevalent protocol on a network, with high-performance data transfers as well as efficient end-user access over wide-area connections.

    In this SNIA-ESF Webcast, Microsoft’s Ned Pyle, program manager of the SMB protocol, will discuss the current state of SMB, including:

    •Brief background on SMB
    •An overview of the SMB 3.x family, first released with Windows 8, Windows Server 2012, MacOS 10.10, Samba 4.1, and Linux CIFS 3.12
    •What changed in SMB 3.1.1
    •Understanding SMB security, scenarios, and workloads
    •The deprecation and removal of the legacy SMB1 protocol
    •How SMB3 supports hyperconverged and scale-out storage
  • Designing & 3D Printing in Education Using the Full Color Stratasys J750 Designing & 3D Printing in Education Using the Full Color Stratasys J750 Darlene Farris-LaBar – Prof. of Art and Design, & Environmental Artist at East Stroudsburg University Apr 5 2017 5:00 pm UTC 45 mins
    In this 30-minute webinar, we'll discuss how an instructor and two students at East Stroudsburg University are using the Stratasys J750 3D Printer in their coursework. Projects include environmental designs, branding championship, medical problem-solving and more. You’ll learn:

    o    How full-color 3D printing can enable learning in art and design
    o    Examples of student projects
    o    Learn about the benefits of having a 3D printing lab on campus
  • Machine Learning: The what, how, and why you need it now Machine Learning: The what, how, and why you need it now Stewart Rogers, Dir. of Marketing Technology, VentureBeat Apr 5 2017 5:00 pm UTC 60 mins
    The short answer is that machine learning is the enemy of a post-truth world: Set loose on large data sets, it’s used to uncover patterns and deliver key insights that help predict how things will unfold in the future. The long answer is that from the transformation of forecasting and predictive analytics to the development of self-driving cars to Microsoft working to prevent blindness in children, machine learning has quickly become the kind of technology that transforms the world, from impactful business use cases to powerful social change.

    McKinsey’s 2016 data and analytics study found 120 potential machine learning applications in 12 industries—and the evolution is accelerating. Join our latest VB Live interactive event for a deep dive into how to measure, understand, and mobilize the data that matters the most for your business using machine learning.

    In this webinar you’ll:

    * Learn how cognitive technologies scale across mobile devices (including cars)
    * Evaluate the value of a machine learning product to your organization
    * Tailor your data structure to optimize for future machine learning initiatives


    Speakers:


    * Stewart Rogers, Director of Marketing Technology, VentureBeat
    * Wendy Schuchart, Moderator, VentureBeat
  • CEO PoV: IT Infrastructure for the Cloud Era CEO PoV: IT Infrastructure for the Cloud Era TBD Apr 6 2017 5:00 pm UTC 60 mins
    Enterprises face major hurdles as they transform their IT infrastructure in the era of IoT, Cloud, and mobile. Viptela's CEO defines how simplification and abstraction of sophisticated underlying technology is imperative to reimagining today's connectivity; an architecture that fundamentally changes the way networks are built and consumed. We invite you to join the discussion as we break down the essential areas behind how some Fortune-500 enterprises are taking the lead in jump-starting IT innovation.

    SD-WAN is the first step in transforming enterprise infrastructure. However, depending on the solution, organizations could still be stuck with an operationally complex model. Implementing separate infrastructure solutions for Cloud, IoT, mobile, security, etc. compounds the problem. It is crucial to think of integrated strategies on addressing security vulnerabilities, application performance, and long provisioning times for new services.

    The right SD-WAN solution is just the beginning.
  • Powering the New “Thin Branch Office” with SD-WAN Powering the New “Thin Branch Office” with SD-WAN Damon Ennis, Sr VP Products and Derek Granath, VP Product Marketing Apr 6 2017 6:00 pm UTC 60 mins
    SD-WANs have become a major market disrupter as they enable IT to use low-cost, high-speed broadband to connect their users to applications wherever they reside. Silver Peak’s SD-WAN solution is the most complete, total performance SD-WAN that not only lowers connectivity costs, it improves network and application performance. Now this powerful solution is taking on another challenge – completely simplifying the WAN architecture.

    Join this webinar to learn:
    • How to utilize an SD-WAN to consolidate and simplify the branch
    • What a “Thin Branch” is and how it benefits the entire enterprise
    • New ways to gracefully migrate to SD-WAN at your own pace
    • New features in Silver Peak’s Unity EdgeConnect that take SD-WANs to the next level with increased security, granular internet breakout and automation
  • Powering the New “Thin Branch Office” with SD-WAN Powering the New “Thin Branch Office” with SD-WAN Damon Ennis, Sr VP Products and Derek Granath, VP Product Marketing Apr 11 2017 2:30 am UTC 60 mins
    SD-WANs have become a major market disrupter as they enable IT to use low-cost, high-speed broadband to connect their users to applications wherever they reside. Silver Peak’s SD-WAN solution is the most complete, total performance SD-WAN that not only lowers connectivity costs, it improves network and application performance. Now this powerful solution is taking on another challenge – completely simplifying the WAN architecture.

    Join this webinar to learn:
    • How to utilize an SD-WAN to consolidate and simplify the branch
    • What a “Thin Branch” is and how it benefits the entire enterprise
    • New ways to gracefully migrate to SD-WAN at your own pace
    • New features in Silver Peak’s Unity EdgeConnect that take SD-WANs to the next level with increased security, granular internet breakout and automation
  • Powering the New “Thin Branch Office” with SD-WAN Powering the New “Thin Branch Office” with SD-WAN Damon Ennis, Sr VP Products and Derek Granath, VP Product Marketing Apr 11 2017 9:00 am UTC 60 mins
    SD-WANs have become a major market disrupter as they enable IT to use low-cost, high-speed broadband to connect their users to applications wherever they reside. Silver Peak’s SD-WAN solution is the most complete, total performance SD-WAN that not only lowers connectivity costs, it improves network and application performance. Now this powerful solution is taking on another challenge – completely simplifying the WAN architecture.

    Join this webinar to learn:
    • How to utilize an SD-WAN to consolidate and simplify the branch
    • What a “Thin Branch” is and how it benefits the entire enterprise
    • New ways to gracefully migrate to SD-WAN at your own pace
    • New features in Silver Peak’s Unity EdgeConnect that take SD-WANs to the next level with increased security, granular internet breakout and automation
  • End User Computing Evolution: Digital Workspace in 2017 End User Computing Evolution: Digital Workspace in 2017 Sumit Dhawan, SVP & GM, End User Computing  Apr 11 2017 3:00 pm UTC 45 mins
    Join Sumit Dhawan, SVP & GM, End User Computing (EUC) VMware, as he delivers the 2017 vision and strategy addressing key market trends of mobility, cloud and the move to Windows 10. Learn about the latest announcements in the Horizon portfolio and how these come together to drive a consumer simple, enterprise secure digital workspace experience that enables organizations to transform the way work gets done. Prakash Kota, VP IT of Autodesk will join Sumit to discuss the organization’s plans to be an early adopter of the digital workspace, and the improvements and enablement they hope to achieve from implementing VMware Workspace ONE™.
  • Addressing Emerging PrivateLTE Opportunities w/ a Flexible Virtualized Solution Addressing Emerging PrivateLTE Opportunities w/ a Flexible Virtualized Solution Jennifer Pigg Clark VP, Network Research, 451 Research, Douglas Ranalli - Founder & Chief Strategy Officer, NetNumber Apr 11 2017 3:00 pm UTC 60 mins
    Private LTE networks are becoming the critical infrastructure for a variety of vertical markets. This webinar will explore the requirements of these markets and the unique capabilities of the NetNumber TITAN centralized signaling and routing control platform to deliver the core signaling and database applications on a single virtual machine that can scale down to run on the often-limited resources available in a Private LTE network instance.

    NetNumber supports a wide range of deployment environments including COTS hardware running on Intel architecture. NetNumber also provides the capability to centrally provision the distributed LTE core instances without the need for any additional management applications, which would otherwise take up additional compute resources.
  • The Internet of Things:  The Brutal Truth The Internet of Things: The Brutal Truth Harry Zimmer, Senior Director, Global Competitive and Market Intelligence, Hitachi Data Systems Apr 12 2017 4:00 pm UTC 60 mins
    How do we make sense of the internet of things (IoT) and the industrial internet of things (IIoT)? What do these concepts mean to my business? Forecasts show the number of things that will be connected to the internet by 2020 range from 26 billion up to 50 billion. From the simplest of technologies, such as light bulbs or switches, to complex systems like smart vehicles and drones, the IoT and IIoT are expanding and doing so at increasing rates. So, how do companies prepare for this shift? Hitachi Data Systems’ Harry Zimmer will help to answer those questions and more.

    Join us for a live webcast on April 12, 2017, as industry expert Harry Zimmer provides his insight into the internet of things and what this could mean for you.

    Don’t miss the opportunity to get answers to these questions:
    •What is the internet of things (IoT)?
    •How will IoT impact my company?
    •Consumer and business use cases, are they both winners?
    •Is there IoT architecture?
  • Combine Application & Infrastructure Monitoring to Accelerate IT Transformation Combine Application & Infrastructure Monitoring to Accelerate IT Transformation John Worthington, Product Director, eG Innovations Apr 12 2017 5:00 pm UTC 60 mins
    What leaves visibility gaps and demands higher levels of time and expertise from IT professionals? Having different consoles for application code visibility vs. IT infrastructure management. The convergence of application and infrastructure monitoring offers significant opportunities to drive IT transformation using IT service management, DevOps and/or a combination of both.

    Join us for this webinar, ‘Closing the Visibility Gap | How to Combine Application & Infrastructure Monitoring to Accelerate IT Transformation ‘, the first of a ‘shift-left’ series that will highlight how you can meet the emerging requirements across both the ITSM and DevOps lifecycles.

    In it, you will discover how to:

    Get a baseline of monitoring in an IT transformational context based on ITSM and DevOps
    Find out how converged application and infrastructure visibility can help accelerate IT transformation efforts with ITSM, DevOps or both
    Understand how monitoring can accelerate cultural change and accelerate IT value delivery to the business without flying blind
  • Cutting Design-to-Market Risks - A New Paradigm for Rapid Prototyping Cutting Design-to-Market Risks - A New Paradigm for Rapid Prototyping Sam Green – Head of Marketing for Rapid Prototyping at Stratasys Apr 12 2017 5:00 pm UTC 30 mins
    Companies are all under pressure to deliver products to market faster.

    Empowering professional designers; shrinking lead times; unleashing creativity. Those are the demands of a professional rapid prototyping 3D printing solution.

    In this seminar, Stratasys’ Sam Green, Head of Marketing for Rapid Prototyping, introduces a new paradigm in rapid prototyping and 3D printing that doesn’t compromise on the needs of designers and engineers: Engineering grade quality – but easy enough for anyone to operate. Professional levels of efficiency and productivity – with availability right from the workgroup office.
    Join this seminar to find out how to:

    o Implement a more efficient and streamlined workflow from design to 3D print.

    o Deliver optimal results at every prototyping stage, from concept verification to design validation to functional performance.

    o Produce more accurate, detailed and repeatable prototypes at lower cost.

    o Maximize your overall solution effectiveness by optimizing available run time, workflow performance and yield.