Welcome to the virtualization community on BrightTALK! Whether it affects servers, storage, networks, desktops or other parts of the data center, virtualization provides real benefits by reducing the resources needed for your
infrastructure and creating software-defined data center components. However, it can also complicate your infrastructure. Join this active community to learn best
practices for avoiding virtual machine sprawl and other common virtualization pitfalls as well as how you can make the most of your virtualization environment.
Users expectations of IT's ability to return mission critical applications to production are higher than ever. These expectations are leading IT to abandon many of their backup and recovery solutions to try new, unproven solutions that may or may not solve the problem. In either case, the organization wasted its investment in the first solution for the unknown potential of a new solution. User expectations are certain to get higher, so this cycle will likely repeat itself. IT needs a new strategy, one that will meet the current expectations of users and pave the way for true organizational resilience.
Discover how to create flexible, API-focused scale-out storage that supports today’s demanding enterprise applications. Join the live webinar from Datera and Packet.net for an advanced customer case study and technical deep dive.
Viewers will get insights on how elastic block storage is evolving in on-premises clouds, challenges with current storage solutions scaling beyond a rack, and data center alternatives for service providers and cloud builders. Learn about Datera’s unique solution to scale easily across the data center and hear from Packet.net on how they are operationalizing Datera Elastic Block Storage.
This insightful webinar is designed for service providers and data center professionals chartered with providing a high performance, consistent and profitable elastic block storage.
As the digital experience proliferates in everyday life and we begin to migrate into the new virtual reality medium, how do we create the most human and organic digital experience?
Moving forward, digital devices not only grow smaller and closer to the body, but daily use time explodes. The challenge is using design strategies around user experience to mitigate consumer pain points to allow for seamless immersion in your experience or VR product.
We will talk about how about how design must be incorporated as a process and strategy in VR builds for success.
End-to-end encryption is important and offers a base level of security but if the EFSS vendor owns your keys then you may not have the protection you might think. In this StorageShort, Storage Switzerland and Ctera discuss the importance of key ownership as part of the encryption process.
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
Join us April 27th for a panel discussion on how to put the human first while creating for Virtual Reality. Part of the VR/AR BrightTALK Summit, our panelists will exchange on how to take user and audience in consideration during the Virtual Reality creation process.
As Virtual Reality is getting more and more exposure, it is time to highlight the right practices of designing a Virtual Reality project and see what we can do to put the human first.
- Do Virtual Reality creators consider the audience they address before/while developing their projects? Why is this crucial? How and when to do so?
- Are we more careful today to offer more accessible VR experiences than a year ago?
- How is this evolving? Do studios and creators tend to integrate more the human in the creation process?
The panel will be led by Amandine Flachs, Events and Communication manager at the Realities Centre. She will be joined by a variety of Virtual Reality leaders, including creators, game developers, agency and B/B professionals.
- Amandine Flachs, Events & Comms Manager, Realities Centre
- Tom Evans - CEO and co-founder at Trojan VR
- Komal Sable - COO at Tengio
- Doug North Cook - Creative director and co-founder at Decoder.
-Summarize the Studies on Non-immersive Virtual Reality Therapy
-Summarize the Studies on Immersive Virtual Reality Therapy
-Discuss Current uses of Technology
-Discuss the Future of the Field
-Q & A
Brandon Birckhead is a physician who founded Immergence Technologies, LLC, a company to help dentists use virtual reality in their practice and collaborate with developers to create tailored content. He is also the coordinator of the VRARA Digital Health Committee. Current research focus has been on exploring the immersive effect of different VR applications. He graduated from Mayo Clinic Medical School in 2016.
Many of us responsible for large scale OLTP systems confront two clashing phenomena:
•Data comes at us at increasingly higher rates (from an expanding number of sources)
•The time required to process and analyze those inputs is rapidly shrinking.
Blame it on the Internet of Things (IoT)!
Instinctively, we respond with two approaches. First, we search for hardware and software that speed up the process.
Then, we try breaking up the problem into smaller parallel efforts.
In this webinar you will learn to:
•Look for choke points that get in the way of executing concurrent transactions
(Hint: they hide where you don’t suspect)
•Recognize the consequences those choke points have on competing workloads
•Apply DataCore™ Parallel I/O technology to solve these barriers
4 steps for more affordable, effective disaster recovery. Disaster Recovery is an expensive proposition. But since the consequences of not being prepared for a disaster are so severe, it is an expense that organizations make. But that's not to say organizations are not always looking for way to do DR better, faster and for less money. In this live webinar join Storage Switzerland and ClearSky to learn how organizations can lower the cost of DR preparation and execution.
Traditionally, hyperconverged infrastructure (HCI) has been deployed only for specific use cases. However, HCI has the potential to do so much more! With greater economics and simplicity than traditional three-tier infrastructure, HCI can support multiple mixed workloads and latency-sensitive applications, plus scale predictably and efficiently.
Join Senior Analyst, Tim Stammers, from 451 Research and Sr. Product Marketing Manager, George Wagner, from Pivot3 as they discuss the evolution of hyperconverged infrastructure, architectural considerations for supporting workload consolidation, and how companies like Pivot3 are enabling organizations to do more with HCI with new architecture and policy-based management capabilities.
Augmented, mixed, and virtual reality compose a spectrum for next-gen computing that is disrupting or accelerating the business objectives of companies across almost every industry. With an ever growing number of pilots and available solutions, it is imperative that businesses develop a strategy of where to play and how to win, while avoiding technology for technology’s sake, in order to create new value.
Jiten Dajee is a subject matter expert on digital reality technology spanning the entire value chain of augmented, mixed, and virtual reality. Jiten has been involved with Digital Reality technology since his first joint-venture in healthcare wearables in 2011. He joined Deloitte Consulting Innovation to lead the rapid commercialization of digital reality across industrial and commercial sectors. He brings an end-to-end understanding of how optics, networks, semiconductors, platforms, products, and will interact in the next-gen computing medium. Jiten specializes in market intelligence, technology adoption, solution integration, and strategic growth planning of digital reality in enterprise.
While many companies and institutions understand the need to investigate AR and VR, the path to success is a long one. Often, there are several teams at a single company looking at ways to leverage this technology, for internal processes as well as customer- and consumer-facing solutions.
This panel will explore ways to effectively bring this vision to fruition:
• Identifying the right use cases
• Getting internal buy-in and budget
• Finding development resources
• Rolling out new AR/VR processes and products
Enterprise is the best starting or entry point for AR and VR because the pain points are high, the dollars are there to make a strong ROI case for use, and the wearable form factor is much less of an issue. AR and VR technologies will be instrumental in closing the skill gap that is responsible for the shortage of skilled manufacturing workers. We are optimistic that industrial productivity will grow and that this will ultimately translate into higher wages because AR and VR will allow more workers to do high-skill jobs, and improve their performance.
Augmented Reality in Business: Assessing the Potential
This live panel will set the scene for augmented reality (AR) in business; what are the use cases? Who's beginning to adopt the technology? Where are we seeing success? The panel of experts will then discuss areas of growth and the challenges that lie ahead.
The panelists will try to break through the surrounding hype and discuss in detail the true potential and challenges for AR when business look towards adoption.
Featuring an industry-leading selection of Augmented reality experts:
- Josh Downs, Community Manager, BrightTALK (Moderator)
- Alice Bonasio, Technology Author and Journalist
- Max Dawes, Partnerships & Marketing Director, Zappar
- Mickael Jordan, Co-Founder & COO, Augment
For more information on Alice Bonasio please visit:
This presentation will look at the new opportunities being opened up for the visualisation of data within both personal and collaborative 3D spaces, delivered to mobile, browser, desktop, virtual reality and social virtual world/social virtual reality environments. The pros and cons of both 3D and VR environments for the creation and sharing of data visualisations will be considered, tools which let you do dataviz in 3D and VR today presented, and future development pathways discussed.
The newest VR Intelligence survey clearly shows that the lack of engaging content is holding the industry back. On the other hand content creators need better distribution of VR/AR headsets. In comparison we can ask ourselves: 'how much would I pay and what kind of mobile phone would I buy if it would not allow me to have video calls or take pictures and share them live on my social networks'?
EF EVE™ is a live holographic streaming engine which is changing the industry by bringing real time 3D VR/AR experiences. Just imagine putting on your VR/AR glasses and in a split second traveling miles to visit your friend in New York or standing next to Ed Sheeran during his performance in Brazil.
Lets have a live demo of EF EVE™, and discuss the future of live 3D events for VR/AR.
Content Creation & Production that drives User Engagement because you Experience the Content.
George Egbuonu is the founder of VR eCards a VR platform and content creation tool that allows you to personalize and share a virtual reality experience instantly in the form of a VR eCard. He is a technology entrepreneur and product centric visionary with both a mechanical engineering and MBA degrees. He is also a bestselling Author and a movie producer.
The go-to choice for IT pros to secure their data was Windows-based backup. But with all the malware and ransomware designed to attack Windows, many are trusting their backups to a hardened, purpose-built Linux appliance. Are you?
Unitrends increases uptime and confidence in a world in which IT professionals must do more with less. Unitrends leverages high-availability hardware and software engineering, cloud economics, enterprise power with consumer-grade design, and customer-obsessed support to natively provide all-in-one enterprise backup and continuity. The result is a “one throat to choke” set of offerings that allow our customers to focus on their business rather than backup.
Learn more at www.unitrends.com; follow us on Twitter @Unitrends
As new employees join your organization, it is important to get them productive day-one. In this session you will learn how the Workspace ONE suite of mobile productivity apps helps you on-board a new employee with all of their apps and devices in under an hour with 0 tickets and help desk calls.
Communication Service Providers are undertaking a major transformation from networks interconnected with closed, proprietary hardware network elements, to open architectures based on Software Defined Networks (SDN) and Network Functions Virtualization (NFV). Intel® Rack Scale Design (RSD) is a logical architecture for NFV infrastructure (NFVi) requirements that disaggregates compute, storage, and network resources, with the ability to efficiently pool and utilize these resources.
In this webinar, experts from Radisys and Intel will present the latest developments in applying Intel® RSD to SDN and NFV applications. Webinar participants will learn how the Radisys DCEngine™ hyperscale platforms, an implementation of Intel® RSD and inspired by Open Compute Project (OCP), can deliver the open software flexibility, DevOps deployment efficiencies, with carrier scalability for robust NFV deployments in emerging communication data center applications. The Webinar will include customer deployment examples, including Radisys DCEngine for open source software architectures, Central Office Re-architected as a Datacenter (CORD) projects, as well as Intel® RSD initiatives in telecom networking applications.
Your customers look to you to provide routing, security, and SLA backed network connectivity at a competitive price. How you deploy those services (via central office or on premises) depends on the customer’s needs. Now you can provide those services with the carrier grade reliability your customers depend on, and the flexibility and performance you need to drive new revenue streams while keeping your costs down.
Dell EMC, Versa, and Wind River have teamed up to create a highly efficient, dynamic and reliable service rich virtual enterprise CPE (vE-CPE) reference platform which also has the benefit of being very cost effective. Join us in this web seminar to learn about:
- Thick and thin branch deployments, and how to choose which is right for you
- How ease of use, efficiency, and longevity help to make the vE-CPE solution cost effective
- How the Titanium Cloud ecosystem leverages open solutions to ensure interoperability and breaks vendor lock-in
A mixed-reality world driven by intelligent systems would have to be observing behavior and sensing physical phenomena continuously in order to provide individuals with appropriate content. Is that a sensible trade-off or a dance with the devil?
Does the sensing possible with these technologies allow for ways to level the playing field or does it exacerbate existing power inequities? If the AI-enabled world of the future is monetized with personal data, then surveillance might well be baked into the system, but the ethical issues we see today will only be amplified in an immersive environment.
Join this discussion with Monique Morrow, CTO & Chief Technology Strategist, President & Co-Founder of the Humanized Internet, for an in-depth look at what a true MR/AR/VR world means.
Humans have shared gathered around and communicated through stories throughout history. Text, pictures, images and videos have sought to capture our imagination, or portray the non-fictional in a relatable way. Now, as we move beyond the 2D flat screen to new ways of interacting/communicating with the world — virtual and augmented reality, for example — we begin to see the power of immersion in storytelling, and the impact it has, beyond anything we have ever seen, on those in the receiving end. Arguably, the ultimate empathy machine.
As we shape the next 'Information Age', and given the state of the world today, never before have we been in more need of putting ourselves in other people’s shoes, and empowering diverse and inclusive voices worldwide. Never before have we seen more women jump at the opportunity to lead and make content that is all-encompassing, that touches and inspires, and that aims to build bridges not walls. Here is their story.
Learner, maker, systems thinker, innovator and tech evangelist, Luciana splits her time between growing the Realities Centre London — a new innovation space, incubator and academy for B2B/enterprise VR, AR, MR and AI — and Unfold UK, promoting women/diversity in future in the UK. Passionate about VR and tech for good, she carries ongoing research on the possibilities and challenges immersive tech presents as re neuroscience, empathy and female empowerment.
She was elected one of Code First Girls ‘25 Ones to Watch’, 'Top 5 Female Role Models in the Tech Industry', and Virtual Perceptions' 'Heroes of VR' in 2016.
As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Lisa Bentall (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.
How does SD-WAN shift the status quo for Operations teams? SD-WAN technology possesses sophisticated, in-built capability for operations and management, and advanced automation to address network problems in real-time. However, network operations teams need to seamlessly integrate this network and health status intelligence from their new SD-WAN infrastructure into their existing monitoring and management infrastructure. Additionally, monitoring solutions must provide visibility across all network architectures including highly dynamic and complex hybrid clouds and other SDN elements and should:
- Eliminate visibility gaps between traditional networks and SD-WAN providing administrators with insights to optimize and transform their large hybrid networks
- Provide relationship mapping of major IT events
- Visualize physical and logical dependencies in applications and service chains
- Extend visibility for operators with network performance monitoring across traditional, SDN, NFV, SDDC, SD-WAN, NFV and cloud networks (including service chains)
- Enable operational insight into how all elements of traditional and overlay networks affect service integrity
Virtualization, hyperconvergence, and the cloud bring a host of benefits to IT landscapes, including management simplicity, enhanced resource utilization, better availability, and increased business agility. So what options are available for bringing these advantages to your business-critical SAP landscapes? And what considerations are involved when migrating your two or three-tier SAP architecture to a virtualized cloud platform built on hyperconverged infrastructure?
In this webinar, we’ll show you how to implement an optimized, protected and high performing cloud platform on HCI across your SAP landscape, including NetWeaver, S/4HANA and RDBMSs. You will hear real-world customer experiences and learn about:
• The technical details involved in a virtualized deployment of SAP Business Suite
• Performance, availability, and scalability best practices for using HCI to build a private cloud solution
• How to simplify and speed system copy and refresh with a web-scale architecture to benefit development, testing, quality assurance, copying, and migration in your SAP landscape
It’s commonly said in packet capture that the one packet you miss is ALWAYS the most important packet. That’s why lossless network packet capture is a vital component in the security and performance of your mission. Today given the huge traffic volumes common in most missions it’s not surprising to learn that many monitoring tools never see a complete picture of what it is they’re really monitoring. It is challenging to launch a forensic investigation into a problem knowing that perhaps some pieces of the puzzle may be missing.
Please join us to learn how lossless network packet capture from Solarflare can provide agencies with an effective means of natively enhancing the security, and performance of their mission systems and applications.
Picking up where our last container-focused webinar, "Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level", left off, Bich seeks to provide more visibility on the path down containerization. In this webinar, he'll go over deploying Kubernetes on-prem vs public infrastructures, walk through cluster creation, and how to dynamically expand the capacity of an on-prem cluster with public cloud resources.
We think differently. We innovate through software and challenge the IT status quo.
We pioneered software-based storage virtualization. Now, we are leading the Software-defined and Parallel Processing revolution. Our Application-adaptive software exploits the full potential of servers and storage to solve data infrastructure challenges and elevate IT to focus on the applications and services that power their business.
DataCore parallel I/O and virtualization technologies deliver the advantages of next generation enterprise data centers – today – by harnessing the untapped power of multicore servers. DataCore software solutions revolutionize performance, cost-savings, and productivity gains businesses can achieve from their servers and data storage.
Join this webinar to meet DataCore, learn about what we do and how we can help your business.
If you're like most organizations we work with, your IT budget is not increasing at the same rate that your data needs are expanding. With the storage industry in considerable turmoil and the rise of the cloud, it's time to consider new technologies. Pure Storage is putting data to work by delivering a data platform powered by cloud-era flash. With explosive growth in data, increasing constituent demands, and the need for real-time analysis, Pure is helping organizations across the country accelerate into the future. Join us and learn:
· How flash is impacting state and local government organizations
· Discovering savings: a look at the total cost of ownership
· A data platform for the cloud era
This webinar will clear up a common misconception that SD-WANs obsolete the need for WAN optimization. All the bandwidth in the world doesn’t diminish physical distance and therefore the latency across long distances. WAN opt is all about improving application performance over distance and transporting large data sets efficiently. No longer is it necessary to have WAN opt deployed across the entire network – just selectively where and when you need it.
We’ve all heard of containers, and as Docker’s tagline suggests, they let you “Build, Ship, Run, Distributed Applications, Anywhere”. In some ways they are a bit like a lightweight Virtual Machine, but what does that really mean? In this presentation we will go through some container basics, and then show what a container really is (and how container engines like Docker work) by writing a container in a few lines of code.
Join our webinar in order to learn:
•How a container engine uses namespaces and control groups to create containers
•What makes containers so appealing to developers
In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.
The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection.
During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:
1. Complete visibility of your IT environment
2. Deep visibility into assets
3. Continuous and automatic updates
4. Asset criticality ranking
5. Interactive, customizable dashboarding and reporting
6. Integration with your CMDB
Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.
Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.
Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:
•Different ransomware types
•Delivery methods, including drive-by downloads and fileless malware
•Why launching attacks is cheap and easy with ransomware-as-a service
•How Cylance prevents both file-level and disk-level encryption
Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.
But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.
This webinar explains:
•Challenges to greater cloud adoption in the enterprise
•What cloud access management is
•How strong authentication complements access management
•Why cloud access management is critical to an organization’s cloud adoption strategy
As communications service providers are figuring out their way towards wide-scale deployment of network functions virtualization, they need a practical approach to engineer their network and service architecture with the new technologies. In this webinar, RAD’s Dr. Yuri Gittik, Head of Strategic Developments and Innovation, and Ron Insler, AVP R&D, Head of Innovation Labs, will discuss the challenges and deployment scenarios of virtualized business services in 2017, for SD-WAN, security and other value added capabilities. They will explore various vCPE implementation options enabled by x86 to allow network operators to increase service agility and revenues..
As part of the successful “Everything You Wanted To Know About Storage But Were Too Proud To Ask” series, we’ve discussed numerous topics about storage devices, protocols, and networks. As we examine some of these topics further, we begin to tease out some subtle nuances; subtle, yet important nevertheless.
In Part Sepia, we’re going to take a look at some of the terms and concepts that affect Storage Architectures as a whole. In particular, we’ll be looking at those aspects that can help or hinder storage systems inside the network:
•Encapsulation versus Tunneling
•IOPS vs Latency vs Jitter
•Quality of Service (QoS)
Each of these topics has a profound impact on storage designs and performance, but they are often misunderstood. We’re going to help you become clear on all of these very important storage concepts so that you can grok storage just a little bit more.
Malware has been a thorn in the side of IT pros for years, and will continue to be for years to come as new strains and variants evolve. The impact of malware to your business can be huge, as was demonstrated last year by the Mirai botnet, one of the largest and most disruptive distributed denial of service (DDoS) attacks of 2016. Join us for a webcast covering the essentials of malware detection, along with a demo of how to detect malware with AlienVault USM Anywhere.
In the webcast, you'll learn:
Common types of malware and the challenges of detecting them
Why you need both signature and anomaly detection to protect against malware
How USM Anywhere can alert you of malware infections so you can take action quickly
What to do when you detect malware activity on your network
Principal Product Marketing Manager
Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha currently lives in Seattle, though soon moving to Austin, TX where he is based.
From pilot to production, eG Enterprise empowers enterprise organizations to deliver a better user experience and increased ROI by delivering comprehensive, converged performance management of Java application services. With optimized Java platforms delivered through Zing, Azul Systems enables Java-based businesses to focus on functionality and long-term lower operating costs rather than daily firefighting. Together, eG Enterprise and Azul Systems offer a proven Java environment designed to optimize the deployment, management, and scale of Java application services.
Join us for this webinar where Bala Vaidhinathan, CTO of eG Innovations and Simon Ritter, Deputy CTO of Azul Systems to will present how:
- Java Application Service Management can be simplified and made more cost-effective, while delivering a better user experience
- eG Enterprise enhancements provide insights into Java applications running on the Zing runtime
- eG Enterprise and Azul Zing working together in a production Java installation can reduce costs, optimize deployments and deliver optimum user satisfaction
Understanding the customers’ business model and reaching a healthy consensus between the push of technology (e.g., IoT and 5G) is required in data center design and planning to meet the demand for ubiquitous coverage and the demand of data anytime, anywhere. This presentation will provide an overview of data center design, the changes in the upcoming revision of ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers, and review use cases in the implementation of ANSI/TIA-942.
Henry Franc, RCDD OSP CDCDP, Belden Canada
Jonathan Jew, J&M Consultants
Glenn Sexton, President and Principal Consultant, NIS
About TR-42 Telecommunications Cabling Systems Committee:
The TR-42 Telecommunications Cabling Systems Committee develops and maintains voluntary telecommunications standards for telecommunications cabling infrastructure in user-owned buildings, such as commercial buildings, residential buildings, homes, data centers and industrial buildings. The generic cabling topologies, design, distances and outlet configurations as well as specifics for these locations are addressed.
The ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers is developed by the TR-42.1 Generic and Premises Cabling Subcommittee. TR-42.1 develops and maintains cabling standards for generic customer-owned telecommunications networks. These standards are intended to specify open systems designed to support a wide variety of voice, data, video, and other low voltage, power-limited applications. TR-42.1 also develops and maintains telecommunications cabling standards for premises networks such as commercial buildings, data centers, building automation, etc. This Subcommittee specifies cabling system topology, architecture, design, installation, testing and performance requirements. Go to https://www.tiaonline.org/all-standards/committees/tr-42 for further information.
Participate in TR-42: Contact Germaine Palangdao, email@example.com
The architectural pattern of decomposing an application into microservices has proven extremely effective at delivering software faster. However, this type of an architecture comes with its fair share of challenges.
Fortunately, Amazon Web Services (AWS) offers many services that can be leveraged to overcome these challenges and adopt microservice best practices. If you are just starting to consider using AWS for running your microservices or if you have already started on the journey and looking for opportunities to improve, then this webinar will be beneficial for you.
In March of this year, the OPNFV community will make generally available its 4th release, OPNFV Danube. As always, this version includes hundreds of new features and fixes, but what does that really mean to you?
Our fast-paced, in-depth look at what's new in OpenStack Danube focuses on the major highlights of this release, but we'll also give you an idea of what's going on in the rest of the ecosystem -- now roughly 60 different projects -- so you'll know where to turn your attention next.
In this webinar, you will learn:
- How the OPNFV ecosystem has changed in the last year
- What new scenarios are covered by Danube
- What testing improvements will you find in Danube
- What new features has Danube influenced in the constituent upstream projects
- How can you get involved or take advantage of OPNFV Danube
Is your flash system up to the challenge? Attend this webinar and learn how you can optimize your SQL Server performance. Hear how the pros pinpoint performance bottlenecks and leverage the latest advancements in storage technology to decrease access latency and IO wait times. By the end of the webinar you’ll have the tools and information you need to recommend the best approach for your SQL Server environment.
Backup vendors know if ALL your data is not protected, there is a good chance ransomware will hit you and you will most likely lose data. But, what should scare you more is less than half of ransomware victims fully recover their data, even with backup. What can you do to make sure you are not on the wrong side of a statistic?
Join our webinar to learn how to remove fear by assuring recovery. We'll cover:
- The trends in Ransomware
- 5 steps to protecting your data
- How Unitrends ensures instant recovery from an attack
About the presenter:
Mark Jordan is VP of Technology at Unitrends and is responsible for building Unitrends’ advocacy program. Mark joined Unitrends in 2002 and has spent over 25 years in the information technology industry. At Unitrends, Mark has been manager of Unitrends presales, director of support services and was product manager of the first generation Unitrends data protection appliance. Follow Mark on Twitter @MarkCJordan.
Businesses sometime ignore Oracle database performance until poor performance impacts profitability, or the cost of Oracle licensing becomes significant. But this consideration frequently comes a bit late, and can cause tension between the business and technical staff.
Hear how we have helped our clients bridge the gap between business needs and technical resources. Learn how using the right tools, like Statspack and AWR, can help identify performance trends and enable a healthy dialogue between the business, technical, DBA, developer, and infrastructure teams.
Discover the importance of benchmarks in establishing baselines that:
1) Facilitate performance troubleshooting
2) Enable efficient use of existing hardware
3) Inform the hardware and software requisition narrative
Is the problem poorly performing hardware, misconfigured servers and instances, expensive SQL, and/or a lack of data life cycle management? An incorrect answer could place blame with the wrong department, increase frustration levels, and possibly result in higher hardware and software costs. So find the correct answer using the tools discussed in this webinar and facilitate a more cost effective and attainable solution for your business.
The Internet is notoriously insecure – we hear about security breaches nearly every day. Discover the multiple security features of a Silver Peak SD-WAN, architected to ensure that all traffic moving across broadband Internet is highly protected. Got compliance requirements? Learn how micro-segmentation using business intent overlays helps organizations meet compliance mandates.
Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.
Qualys simplifies web app security with an end-to-end solution.
During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:
* Scan your apps using Qualys Web Application Scanning (WAS)
* Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
* Manage it all from a centralized, cloud-based portal