Hi [[ session.user.profile.firstName ]]

Virtualization

  • Simplifying Data Integration for the Cloud
    Simplifying Data Integration for the Cloud Jill Reber, CEO, JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic Recorded: Oct 19 2017 54 mins
    The rapid adoption of enterprise cloud-based solutions brings data integration as one of the greatest challenges. The challenge grows on increasingly numerous SaaS applications with lack of suitable connectors that fit your business needs. Join this webinar led by Primitive Logic team to see how data integration can be simplified for your cloud. This talk introduces the generic declarative zero-coding approach using Informatica Cloud Rest Connector as an example and illustrates its practical features, as well as best practices and hidden gems.

    Moderator: Jill Reber, CEO, Primitive Logic
    Panelists: JayJay Zheng, Technical Director & Eric Greenfeder, Chief Architect, Primitive Logic
  • Expanding on DataCore’s Vision - Learn What's New at DataCore
    Expanding on DataCore’s Vision - Learn What's New at DataCore Paul Nashawaty, Director of Technical Marketing, DataCore Software Recorded: Oct 19 2017 46 mins
    George Teixeira, our CEO, President and Co-Founder once said:

    “DataCore is committed to creating an enduring and dynamic software-driven architecture liberating data and its productivity from static hardware based limitations.”

    We are expanding on our vision with the new capabilities in the next release of DataCore SANsymphony and Hyperconverged Virtual SAN.

    Join us for this webinar and learn about:

    •DataCore Cloud Replication
    •Container Management
    •Data Resiliency
    •Automation & Enhanced API Integration
  • Remote Endpoint Management and PCoIP Management Console
    Remote Endpoint Management and PCoIP Management Console Paul Barrett, Systems Specialist, Teradici Recorded: Oct 19 2017 32 mins
    Are your users tired of having to login to the corporate network via VPN? Do you wish you could manage at-home devices remotely? In our latest release of PCoIP Management Console, we’ve added the ability to manage both office-based and at-home PCoIP Zero Clients.

    During this 30-minute webinar you’ll learn the best ways how to set up PCoIP Zero Clients so your employees or external consultants can be productive from wherever they happen to be.

    The demonstration will cover how to:
    •Configure PCoIP Zero Clients for off-site employees or contractors
    •Determine the best WAN settings to recognize out-of-office devices
  • VMware vSphere 6.5 Series: Top 10 Secrets to a Successful Upgrade
    VMware vSphere 6.5 Series: Top 10 Secrets to a Successful Upgrade Dan Richardson, Systems Engineer, and Bo Busillo, Senior Technical Account Manager Recorded: Oct 19 2017 43 mins
    Upgrading your IT operations -- even with the industry's leading virtualization platform -- is an unpredictable process. During this webcast, our technical experts will share common do's and don'ts for an easier virtualization upgrade execution for your DevOps and IT teams.
  • 451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security
    451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security Eric Hanselman, Chief Analyst at 451 Research and Michael Gardiner, Security Lead for CTO office, Gemalto Recorded: Oct 19 2017 57 mins
    The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.

    In this joint webinar with 451 Research, we will cover topics including:

    -Building a multi-cloud security strategy for encryption and key management
    -Best practices, benefits and pitfalls of managing your own security
    -Impact of regulations on data protection in the next few years
    -Understanding the different CSP requirements for key management:
    oCustomer-Supplied Encryption Key (CSEK)
    oBring Your Own Key (BYOK)
    oHold Your own Key (HYOK)
    oGeneral cloud service provider key management services overview
  • PCI DSS 3.2 - Are You Ready?
    PCI DSS 3.2 - Are You Ready? Adrian Davis, Managing Director, (ISC)² EMEA, Mor Ahuvia, IAM Product Marketing Manager, Gemalto Recorded: Oct 19 2017 59 mins
    The February 2018 deadline for complying with PCI DSS 3.2 is fast looming. Most of the new requirements in the latest PCI DSS guidelines are focused on the need to extend multi-factor authentication (MFA) to additional use cases and user groups within organisations who handle Credit Card Data. From February 2018 onwards, all individuals who access systems such as databases, network modules and email servers which hold credit card data will be required to authenticate themselves with MFA.
    Join (ISC)² EMEA and Gemalto to learn:
    - What’s new in PCI DSS 3.2
    - How to effectively map PCI DSS MFA requirements to business use cases and user groups in your organisations
    - Best practices for organisations that need to extend their MFA footprints to additional use cases, and for those that are starting to think about how to comply with PCI DSS’s authentication requirements.
  • Is contracting right for you?
    Is contracting right for you? Travis O'Rourke, Country Manager, Hays Recorded: Oct 19 2017 14 mins
    Contracting is becoming more and more popular among professionals. In this episode Travis O’Rourke, Head of Hays Talent Solutions in Canada, discusses how you can determine if contracting is the right career path for you.

    For more contracting tips and careers advice, visit our blog Viewpoint: www.haysplc.com/viewpoint
  • Span Private and Public Clouds: Developing a Multi-Cloud Strategy with SDS
    Span Private and Public Clouds: Developing a Multi-Cloud Strategy with SDS Eric Carter, Sr. Director Product Management at Hedvig Recorded: Oct 18 2017 47 mins
    How can enterprise IT operate more like AWS? That is the defining technology question of the decade. Hyperscale computing models pioneered by AWS catapulted “cloud” to the top of the IT agenda. This model fuels digital business, creates tectonic shifts in IT spending, and upends legacy IT infrastructure vendors. But should today’s CIOs build or buy their own cloud? The simple answer: both. We live in a multi-cloud world. A hyperscale strategy balances digital services across private and public clouds.

    In this session we'll provide:
    -Lessons learned from building two of the world’s largest distributed systems: Amazon Dynamo and Facebook's Cassandra.
    -How to develop a multi-cloud strategy for modern data centers that accommodates both virtualized and containerized applications.
    -Where software-defined storage fits into this strategy to help data span cloud boundaries and avoid cloud lock-in.
  • Using Containers for Hybrid Cloud & Cloud Migration
    Using Containers for Hybrid Cloud & Cloud Migration Amir Jerbi, CTO and co-founder at Aqua Security Recorded: Oct 18 2017 40 mins
    The main benefits of containers vary from speed of development and deployment to scalability, flexibility, and cost-effectiveness – which is what made containers so popular today. But the ability to move containerized applications among different environments, from a public to private cloud for example, is one of the most important benefits of containers, making them enterprise favorites for cloud migration and hybrid cloud architectures.
    In this webinar, we will talk about how to use containers in a hybrid cloud, specifically:
    1.How containers make it easy to migrate and move applications between clouds
    2.What architectural considerations and tooling you need to achieve portability
    3.How to ensure consistency of control, security, and compliance across container cloud deployments
  • Visibility & Actionable Intelligence for a Migration to GCP
    Visibility & Actionable Intelligence for a Migration to GCP Chris Grossmeier, Director of Product Management Recorded: Oct 18 2017 43 mins
    Learn how to determine your anticipated costs and benefits to make an informed decision on how to securely and cost-effectively migrate your workloads to the Google Cloud Platform without disrupting your operations.
  • Technical Webinar: Transform your data center with Open Software Defined Storage
    Technical Webinar: Transform your data center with Open Software Defined Storage Darren Soothill, Storage Technical Director, SUSE Recorded: Oct 18 2017 23 mins
    Get some excellent technical details about "Cost effectively transform your data center with Open Software Defined Storage" in only 30 minutes!
  • The Emerging Impact of NVMe-oF and Storage Class Memory
    The Emerging Impact of NVMe-oF and Storage Class Memory Jeff Kato, Senior Analyst & Consultant, Taneja Group Recorded: Oct 17 2017 61 mins
    Join us for a fast-paced and informative 60-minute roundtable as we discuss the latest—and potentially most game-changing—technology disruptors to traditional storage architectures since flash: NVMe over fabric and Storage Class Memory.

    It was just five years ago that Flash technology transformed the traditional storage market forever. Modern flash-first arrays are now the new normal for traditional storage. Will a new shared storage access protocol called NVM express over Fabric (NVMe-oF) combined with the advent of storage class memory (SCM) be equally disruptive to traditional storage over the next five years as NAND flash technology was in the past?

    Vendors are now announcing new products and future architectures to enable them to support these new technologies. With the help of a lively panel of experts from HPE, Pivot3, and Mellanox, we will unpack this topic and explore how their innovative approaches to leveraging Storage Class Memory and NVMe-oF can radically improve storage products and solutions.
  • Cloudify Your On Premises Data Storage
    Cloudify Your On Premises Data Storage Rob Commins, Sr. Director, Product Marketing at Tegile Systems, a Western Digital Company Recorded: Oct 17 2017 21 mins
    CFOs rejoice! CEOs take to the streets in celebration! Ok, maybe it’s not quite that exciting, but did you know that you can get the best of both worlds in storage? One of the biggest challenges in storage has been paying for it. Thanks to trying to plan for exactly how much storage you need right now versus how much you need in the future, people often just overbuy with the expensive hopes that they’ll grow into it.

    You actually have a whole lot of financing options at your disposal to pay for storage, from buying to leasing to simply paying for what you use, just like the cloud. Why pay for storage that you’re never going to actually use?

    And, what happens when your storage gets too old? You buy new. What if you didn’t have to? What if you could pay a bit more in maintenance on your current system in exchange for an upgrade when the time comes?

    Join Rob Commins, Sr. Director of Product Marketing for Tegile Systems, as he takes a deep dive into:

    - Best practices for storing your data in the cloud
    - How to keep cloud storage costs to a minimum
    - How to scale data growth and storage capacity

    Speaker Bio:

    Rob Commins has been instrumental in the success of some of the storage industry's most interesting companies over the past twenty years including HP/3PAR, Pillar Data Systems, and StorageWay. At Western Digital, he leads the Data Center System's business unit's product marketing team.
  • Straight Talk on Business Critical Applications in the Cloud
    Straight Talk on Business Critical Applications in the Cloud Jim Hannan, Principal Architect; House of Brick Technologies Recorded: Oct 17 2017 33 mins
    As much as the term Cloud Computing gets tossed around these days you would think everyone’s using it. But do cloud predictions really match real world use? If you aren’t “in the cloud” are you already behind the competition?

    During this presentation, we will discuss the pros and cons of moving applications to the cloud, with a particular focus on business critical applications. We will share our experiences working with clients to determine if their applications are “cloud ready” through a review of availability, costs, and operational impacts. Examples of successful use cases in the public cloud will be explored including emerging technologies, DRaaS, new applications, older applications running on older hardware, and startups.

    You’ll leave with a better understanding of the types of applications that are best suited for the cloud, a list of questions you should be asking when considering moving to the cloud, and a checklist you can use to evaluate your application’s cloud readiness.
  • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
    SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Oct 17 2017 61 mins
    SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

    AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:

    Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
    Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
    Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
    The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
  • SNIA's New 100-Year Archive Survey: Ten Years Later
    SNIA's New 100-Year Archive Survey: Ten Years Later Thomas Rivera, SNIA-DPCO Co-Chair; Sam Fineberg, SNIA LTR TWG Co-chair; Bob Rogers, CTO, Application Matrix Recorded: Oct 17 2017 60 mins
    Ten years ago, the SNIA 100-Year Archive Task Force developed a survey with the goal to determine the requirements for long-term digital information retention in the data center - requirements needed to frame the definition of best practices and solutions to the retention and preservation problems unique to large,scalable data centers.

    Now in 2017, SNIA presents a new survey developed to assess the following details:

    1. Who needs to retain long term information
    2. What information needs to be retained and for how long
    3. If organizations are able to meet their retention needs
    4. How long term information is stored, secured and preserved

    Join us as we see where we were and where we need to be in the preservation and retention of data.
  • Connected devices and the rise of invisible payments
    Connected devices and the rise of invisible payments Kevin Gordon, Lead Innovation Architect, Worldpay Recorded: Oct 17 2017 31 mins
    By 2020, five billion people will be online, with 25 billion devices and machines using the Internet. Many devices will share data and services, and the way we engage with them will fundamentally change. In a connected world, consumer expectations of executing transactions on a phone, tablet, VR device – or even a refrigerator – will be higher than ever.

    As time goes on, devices will become smarter and make more and more decisions for us. We’ll be able to create rules as users to tell our devices what we’re comfortable with them paying for automatically. The use cases for rule-based payment are endless!

    As such, the onus of creating frictionless download and shopping experiences while overcoming barriers between devices lies with each business. When it comes to recurring and subscription payments, the technology underpinning these user experiences across devices is critical. Seamless, simple, and secure are the watchwords of an IoT world.

    Don’t wait until 2020 to address consumer pain points and overcome technological barriers to IoT adoption. Tune in to the latest VB Live event and hone in on the fastest, best ways to prepare for the IoT world. After all, it’s already here. Attend this webinar and find out:

    •How companies are already dealing with device connectivity
    •How the challenges posed by IoT are being solved for today
    •Global consumer attitudes around payments made by devices
    •How payments will become ‘invisible’ or ‘translucent’ for users
    •Payment technology that will enable devices to make decisions

    SPEAKERS:
    * Kevin Gordon, Lead Innovation Architect, Worldpay
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Worldpay
  • Three public cloud myths and how to solve them
    Three public cloud myths and how to solve them Ian Campbell, Sr. System Engineer, Tintri Recorded: Oct 17 2017 26 mins
    The shift to cloud is on. The challenge is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale ... and that has inspired a few myths (that we'll de-bunk). Can private cloud and the IT department keep pace? We'll make the case for a building block architecture - introducing public cloud-like web services in your data center. We will share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
  • Using the NetApp Portfolio for Virtualized Environments
    Using the NetApp Portfolio for Virtualized Environments Karl Konnerth, Product and Partner Engineer and Doug Chamberlain, Senior Product Marketing Manager Recorded: Oct 16 2017 52 mins
    Greater visibility and control for individual VMs, along with enhanced storage efficiency and QoS controls, allow customers to streamline management and ensure optimal performance for their virtualized infrastructure. This session will review the NetApp virtualization solutions portfolio before focusing on current ONTAP and NetApp tool capabilities for vSphere.
  • Cost effectively transform your data center with Open Software Defined Storage
    Cost effectively transform your data center with Open Software Defined Storage Larry Morris, Product Marketing, SUSE Sanjeet Singh, Director of Storage Solutions, SUSE Recorded: Oct 16 2017 48 mins
    This presentation details how and where you should deploy an open hardware agnostic Software Defined Storage as part your move to a more agile software defined data center. And Open Software Defined storage solution is the perfect bridge for the traditional data center to move to a DevOps centric data center.

    In this webinar we will talk about SUSE’s latest release that’s built on Ceph Luminous and will discuss a number of commonly deployed use cases, such as; disk to disk backup, compliant archives, bulk storage repositories, data lakes, and cloud storage, etc.. We also look at how SUSE can help you maximize the return of your storage investments without comprise or limitations.
  • Culture, Containers and Accelerating DevOps: A Virtual Discussion
    Culture, Containers and Accelerating DevOps: A Virtual Discussion Gene Kim, DevOps Enthusiast & Brian Gracely, Red Hat Recorded: Oct 12 2017 55 mins
    A how-to guide to container and DevOps deployment can help you with the necessary architecture to move faster and be more agile. Red Hat and Intel can help you put DevOps, containers, and application platforms to work for your business.

    Enjoy this unique conversation with DevOps enthusiast, Gene Kim, author of The Phoenix Project and The DevOps Handbook, and Brian Gracely, Red Hat director of Product Strategy. Learn from Gene Kim's 18+ years of experience studying high-performing IT organizations.

    Join us for a discussion on culture, containers, and accelerating DevOps. Topics will include:
    - The trends.
    - The journey
    - The challenges.
    - The path to success
  • 5 Keys for Next Generation DRaaS
    5 Keys for Next Generation DRaaS Storage Switzerland, Quorum Recorded: Oct 12 2017 60 mins
    DRaaS is entering its second phase. No longer is it good enough to simply be able to recover applications in the cloud. Next generation DRaaS has to be able to backup faster, recover faster, include ransomware protection and be able to offer on-premises DRaaS, all while being very secure.

    In this live webinar we will introduce you to “DRaaS - The Next Generation,” and show you the key elements a DRaaS solution must deliver in order to meet this challenge.
  • Can Your Network Survive the Miercom Torture Test?
    Can Your Network Survive the Miercom Torture Test? Robert Smithers, CEO at Miercom and Derek Granath, VP Product Marketing at Silver Peak Oct 24 2017 5:00 pm UTC 60 mins
    Join leading independent product assessment group, Miercom and technical experts from Silver Peak as they discuss the performance expectations of today’s networks and how the right SD-WAN solution can improve application availability across the WAN using any type of transport. They will disclose how Silver Peak’s SD-WAN solution, Unity EdgeConnect fared in their aggressive stress test environment and provide a live demo on its performance capabilities.
  • Best Monitoring Strategies for Containers
    Best Monitoring Strategies for Containers Nancy Gohring, 451 Research, Senior Analyst | Craig Lee, Blue Medora, Chief Systems Architect Oct 24 2017 7:00 pm UTC 60 mins
    Like everyone else undergoing digital transformation, large, established organizations know cloud and DevOps adoption are critical to delivering the immediate, personalized, data-driven user experience customers demand. But often these companies have existing investments that limit their ability to monitor a DevOps toolset without fracturing their ability to see critical performance and availability metrics across their entire organization.

    In addition, containers provide some unique monitoring challenges. Containers come and go so frequently, and change so rapidly, that they can be an order of magnitude more difficult to monitor and understand than physical or virtual hosts.

    In this webinar you’ll learn:
    •How traditional IT operations teams are adapting to monitor the DevOps toolset
    •Ways to fill the container monitoring gap between hosts and applications
  • Rev Up Your Cloud Integrations with Big Data Technology
    Rev Up Your Cloud Integrations with Big Data Technology Eric Greenfeder, Chief Architect, Primitive Logic Oct 24 2017 9:00 pm UTC 60 mins
    This presentation details how to leverage technologies such as Hadoop, MapReduce, Pig and Sqoop to massively scale cloud integrations to services such as Salesforce.com. Attendees will learn how to overcome API limitations, throughput latency and infrastructure scaling challenges to significantly increase integration performance.
  • Why Native Security Features in AWS and Office365 aren't Enough
    Why Native Security Features in AWS and Office365 aren't Enough Narayan Makaram - Senior Director of Product Marketing & Louis Evans - Product Marketing Manager Oct 24 2017 9:00 pm UTC 60 mins
    Most businesses are rapidly moving to the cloud to be fast and nimble, reduce their cost structure, and reach more customers anywhere, anytime. These new architectures have powerful new capabilities—but also expose businesses to a new universe of risk.

    When dealing with outsourced infrastructure like AWS, or a SaaS solution like Office365, it is easy for IT managers to assume that security is out of their hands, for better or worse. But, this assumption may not always be true. Businesses must develop an active cloud security strategy as they pursue their migrations, and become a proactive security partner with their cloud providers—or they will find themselves vulnerable to attack.

    In this upcoming webinar, hear from security experts at Arctic Wolf Network (AWN), on:

    - The top cybersecurity risks and best practices for securing cloud deployments
    - How AWN security monitoring compliments the native security features in AWS and Office365
    - The role of AWN cloud security in integrating observations from cloud and on-premise systems

    To see how AWN CyberSOC™ can secure your cloud, register now.

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

    Louis Evans is a new member of the Arctic Wolf team. He’s passionate about cybersecurity, defeating the next generation of threats, and Alan Turing.
  • The Dissolving Perimeter-Security Experts Speak
    The Dissolving Perimeter-Security Experts Speak Patrick Heim, CISO; Hal Lonas, CTO; Dr. Doug Jacobson, University Professor; Dr. Ratinder Ahuja, CEO Oct 25 2017 3:30 pm UTC 60 mins
    Expert panel discusses challenges and strategies. Attendees can download ESG report. Co-sponsored by Webroot. For more information, visit https://www.shieldx.com/webcast-dissolving-perimeter
  • A konténerek és a SUSE CaaS platform átalakítják az informatikát
    A konténerek és a SUSE CaaS platform átalakítják az informatikát Hargitai Zsolt Oct 26 2017 8:00 am UTC 60 mins
    Leírás: A konténerek hasznos eszközöknek bizonyulnak az alkalmazásfejlesztő és az üzemeltető csapatok számára egyaránt, és kulcsszerepet játszanak a korszakalkotó átalakulásban: megváltoztatnak mindent, az alkalmazásarchitektúrától és az infrastruktúrától kezdve az üzleti folyamatokig és az üzemeltetési modellekig. Tartson velünk, és fedezzük fel együtt a konténerek népszerű alkalmazási területeit, és vizsgáljuk meg a konténeralapú szolgáltatások létrehozását, szolgáltatását és felügyeletét támogató SUSE CaaS platformot.
  • Network Slicing: Building block of Tomorrow's Network
    Network Slicing: Building block of Tomorrow's Network Anurag Agarwal, Solution Architect, TCS Oct 26 2017 2:00 pm UTC 60 mins
    Next Generation applications like IoT, MBB, AR, VR, V2X, etc. generates wide variety of traffic and with different QoS needs. Today's network is not designed to handled the ever growing varied traffic which chokes the network. Since each of these traffic may have a different QoS needs, one size fit all solution will not work in long run.

    Network slicing is one of the key capabilities than enables flexibility which allows service providers to deploy multiple logical netwok on shared physical infrastructure. It also extensively uses the concept of Network function virtualization (NFV) and Software Defined Network (SDN) to bundle the virtualized network functions into tailored made logical network to handle varied requirement like low latency network, high bandwidth network, reliability, etc. This optimization helps to monetize the investment better and also opens up new revenue streams.

    This session talks about
    - What is network Slicing?
    - How it is related to 5g?
    - What will it do?
    - Who is driving it?
    - TCS Experimentation
  • Chart your course through container management with Kubernetes and Helm
    Chart your course through container management with Kubernetes and Helm Jennifer Kotzen & Simona Arsene, SUSE Oct 26 2017 2:00 pm UTC 60 mins
    Enterprises that use Kubernetes to orchestrate their container-based applications can benefit from a rich ecosystem of complementary technologies. Project Helm is one to watch - it helps you find, share, and use software built for Kubernetes. Join us as we explore the challenges of Kubernetes package management, and see how Helm helps you define, install, and upgrade even the most complex container-based applications.

    SUSE delivers Kubernetes and Helm together in SUSE CaaS Platform 2, the latest release of SUSE’s enterprise class container management solution. In addition to Helm, the new release also incorporates updated versions of Kubernetes and MircoOS, streamlines public cloud accessibility, and more. If you haven’t taken a look at SUSE CaaS Platform lately, this is the perfect opportunity to get on board!
  • How SD-WAN improves Unified Communications
    How SD-WAN improves Unified Communications Alex Falyn Co-founder & CEO S-NET Communications & Robert McBride Director of Enterprise & Telco Solutions at Versa Networks Oct 26 2017 3:00 pm UTC 45 mins
    Whether using an on-premises or cloud based UC solution, reliable and SLA driven connectivity is critical to ensure that your enterprise business productivity and presence is not impacted.

    Join Versa Networks and S-NET Communications as we provide insights into how a software-defined WAN (SD-WAN) delivers the improved and reliable secure connectivity for your enterprise voice and video services. S-NET Communications is an industry expert in cloud communications solutions, removing complexity from IT and enabling enterprises and SMBs to collaborate and connect from any location and any device.

    Learn from their experience in integrating SD-WAN into their portfolio to deliver more secure and reliable services so their customers can attain faster data transfers and a more positive user experience for their business voice services.
  • How to Ready Your Infrastructure for Public Cloud
    How to Ready Your Infrastructure for Public Cloud Taruna Gandhi - Group Manager, Product Marketing, Cloud Management Oct 26 2017 4:00 pm UTC 45 mins
    What does modernizing the infrastructure for public cloud really mean? And what does your on-premises infrastructure have to do with an off-premises public cloud? Join us for this webcast and learn why modernizing your infrastructure is part of the journey for successful adoption of cloud computing. We’ll cover how you are well positioned for success with a VMware vSphere® foundation, and can continue the journey to a software-defined approach by virtualizing across the data center from compute to storage to networking, and adding unified management for intelligent operations. Specifically you’ll learn about:

    · Components of a modernized infrastructure
    · How to evolve to a software-defined environment
    · Use cases of modernizing the infrastructure
  • Amplifying VMware vSAN Performance: Lessons Learned and Tips
    Amplifying VMware vSAN Performance: Lessons Learned and Tips Jonathan Flynn, Virtualization Technologist, Western Digital; John Nicholson, Senior Technical Marketing Architect, VMware Oct 26 2017 5:00 pm UTC 45 mins
    How to get the most out of vSAN – VMware’s Hyper-Converged Infrastructure (HCI) software. In this webinar you will learn testing and tuning insights and lessons learned from Western Digital’s ongoing vSAN performance test bed. Learn the test bed design and why it’s done the way it is. You’ll find the answers to questions such as: What performance tools are used in the industry and why? How do vSAN features such as Erasure Coding, Deduplication and Compression, and Object Checksum impact performance? What design principles should be used when configuring your vSAN and implementing your VMs? What does “Working Set” mean, and how does it impact performance? What other knobs can be turned (e.g., Disk Stripes per Object, Cache Line Settings, etc.), and what can you expect from them?
  • Data storage trends to watch for in 2018.
    Data storage trends to watch for in 2018. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Oct 26 2017 5:00 pm UTC 60 mins
    A year ago, we predicted 2017 would bring difficult, messy hybrid cloud transformation, that “hybrid cloud” would become synonymous with “multi-cloud,” and that IoT and machine data would raise new questions related to security and data access.

    Our crystal ball was crystal clear last year, and we’re breaking it out again to look forward to 2018.

    In this webcast, we’ll cover the data storage trends most likely to make news in the New Year, including cloud vendors with on-prem-like strategies, security and the ransomware challenge, consolidation of secondary storage players and the comeback of captive cloud.
  • What to Consider When Transitioning to SD-WAN
    What to Consider When Transitioning to SD-WAN David Klebanov, Director of Technical Marketing, Viptela Oct 26 2017 5:00 pm UTC 45 mins
    When considering a transition to SD-WAN, there are several important capabilities needed to suit an enterprise-grade network infrastructure. This webinar will cover critical SD-WAN features and how they translate to common deployment scenarios in different industries.

    These features include:
    - Overlay capability over MPLS, Broadband and LTE
    - Unified and centralized management of the infrastructure
    - Network segmentation with per-segment topologies
    - Predictable Application SLA with centralized policies and real-time traffic steering
    - Mature routing capabilities with BGP, OSPF, VRRP, and IGMP
    - Robust zero-trust WAN security
  • How to Solve your Top IT Security Reporting Challenges with AlienVault
    How to Solve your Top IT Security Reporting Challenges with AlienVault Sacha Dawes Principal Product Marketing Manager, AlienVault Oct 31 2017 4:00 pm UTC 60 mins
    If you needed to provide reports to management or an auditor to prove that your IT security controls are in place and working, how long would it take you to do that? And, how many different tools would you need to consult? The AlienVault Unified Security Management (USM) platform integrates many of the core security capabilities you need along with built-in reports to help you implement IT security best practice frameworks like the NIST Cybersecurity Framework (CSF), as well as demonstrate compliance with PCI DSS, HIPAA and other regulations.

    Join this webcast to see how the USM platform makes it easy to:

    Automate log collection, analysis and event correlation in a single console
    Continuously scan for new assets and vulnerabilities
    Get alerted of suspicious behavior like privilege escalations, account changes, malware and ransomware threats, and more
    Simplify compliance with pre-built and customizable reports mapped to numerous regulatory requirements
  • 3 Steps to Stop Data Protection Sprawl
    3 Steps to Stop Data Protection Sprawl Storage Switzerland, Cloudian, Rubrik Oct 31 2017 5:00 pm UTC 60 mins
    It’s time to stop the madness! Join Storage Switzerland, Cloudian and Rubrik as we explain the three causes of data protection sprawl and more importantly – how to stop it.

    Learn how to solve the 3 data protection sprawl challenges:
    - Reduce the number of components in the process
    - Manage storage data growth without impacting user experience
    - Recover rapidly from any failure of any type
  • Newest Backup Storage Architecture for Veeam
    Newest Backup Storage Architecture for Veeam Stephane Estevez, Solutions Marketing Manager- Quantum; Ronn Martin, Solutions Architect - Veeam Oct 31 2017 5:00 pm UTC 45 mins
    DXi® appliances now integrate Veeam Data Mover Service (VDMS) and support Veeam’s advanced features (IMVR, Synthetic full-backup…) directly from an inline global deduplication appliance. Why choose between performance and retention when you can get both?

    Quantum converged tape storage solution supports a Veeam proxy server and you can now protect your data against ransomware without requiring a separate physical tape server. Join us and learn more on how to improve your 3-2-1 data protection strategy with Veeam and Quantum.
  • Transactional Models & Their Storage Requirements
    Transactional Models & Their Storage Requirements Alex McDonald, SNIA-ESF Vice Chair, NetApp, J Metz, SNIA Board of Directors, Cisco Oct 31 2017 5:00 pm UTC 75 mins
    We’re all accustomed to transferring money from one bank account to another; a credit to the payer becomes a debit to the payee. But that model uses a specific set of sophisticated techniques to accomplish what appears to be a simple transaction. We’re also aware of how today we can order goods online, or reserve an airline seat over the Internet. Or even simpler, we can update a photograph on Facebook. Can these applications use the same models, or are new techniques required?

    One of the more important concepts in storage is the notion of transactions, which are used in databases, financials, and other mission critical workloads. However, in the age of cloud and distributed systems, we need to update our thinking about what constitutes a transaction. We need to understand how new theories and techniques allow us to undertake transactional work in the face of unreliable and physically dispersed systems. It’s a topic full of interesting concepts (and lots of acronyms!). In this webcast, we’ll provide a brief tour of traditional transactional systems and their use of storage, we’ll explain new application techniques and transaction models, and we’ll discuss what storage systems need to look like to support these new advances.

    And yes, we’ll explain all the acronyms and nomenclature too.

    You will learn:

    •A brief history of transactional systems from banking to Facebook
    •How the Internet and distributed systems have changed and how we view transactions
    •An explanation of the terminology, from ACID to CAP and beyond
    •How applications, networks & particularly storage have changed to meet these demands
  • Tales from the Trenches: Cybersecurity War Stories
    Tales from the Trenches: Cybersecurity War Stories Sam McLane, Head of Security Engineering, Arctic Wolf Networks; Narayan Makaram, Sr. Director of Product Marketing Oct 31 2017 6:00 pm UTC 45 mins
    In today’s business environment, it’s imperative for organizations of all sizes to have a dynamic online presence. However, with always being connected, there comes real risk to your business. Ransomware attacks, like Petya and WannaCry, have demonstrated how businesses can be brought to a halt by locking access to business-critical data. So, how do you protect yourself? What should you be looking for?

    In this fire-side chat with Sam McLane, Head of Security Operations at Arctic Wolf Networks (AWN), hear some of the most interesting attacks that AWN security engineers have successfully hunted down in 2017. You will also get an inside look at:

    - The detection and response process 
    - The communication and teamwork that takes place between a robust Security Operations Center (SOC)-as-a-service and a customer
    - The impact of human augmented machine learning

    When it comes to security, you must take a proactive approach in assessing the risks and vulnerabilities. Register now to learn how!

    About our speaker:

    Sam McLane leads Security Engineering at Arctic Wolf, bringing over 20 years of security experience to the team. Prior to joining Arctic Wolf, Sam led Product Management for and other sales functions for Blue Coat Systems’ Cloud Security Services business. Before Blue Coat, Sam was a sales leader at Lucent Technologies, managing the system engineering team for the eastern US. Prior to Lucent, Sam was a networking consultant at KPMG and network manager at Temple University. Sam holds a master of science in mathematics from Temple University and a bachelor of science in mathematics from Washington and Lee University.
  • SQL Server Parallelism: Putting all those Cores to Work
    SQL Server Parallelism: Putting all those Cores to Work Augie Gonzalez, Director of Product Marketing, DataCore Software Oct 31 2017 6:00 pm UTC 60 mins
    Learn new ways SQL Server can leverage idle cores to improve the responsiveness of highly concurrent, I/O-intensive OLTP workloads.

    It’s surprisingly simple.
  • Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider
    Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider Jim Curtis 451 Research, Steve Croce, Product Manager for ElasticSearch and DBaaS Object Rocket Oct 31 2017 6:00 pm UTC 60 mins
    Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
  • Smart Communities and Autonomous Vehicles
    Smart Communities and Autonomous Vehicles Jill North - DOT City of San Jose; Robert Grant - Lyft; Jeff Stewart - AT&T: Tim Weisenberger - SAE Int'l;Limor Schafman, TIA Nov 1 2017 3:00 pm UTC 60 mins
    Level 5 autonomy for automotive and the broader intelligent transportation industry will require hyper broadband connectivity. Smart communities and corporations developing products and services for ubiquitous connectivity understand that it requires a holistic vision of a fully 5G-connected environment.

    This webcast will discuss the work cities, and automotive suppliers and OEMs are doing to build infrastructure and transportation vehicles that will move from human driven, through connected to autonomous capabilities.

    Speakers:
    >> Jill North, Innovation Program Manager, Department of Transportation, City of San Jose
    >> Robert Grant, Senior Director of Public Policy, Lyft
    >> Jeff Stewart, Assistant Vice President, Global Public Policy, AT&T
    >> Tim Weisenberger, Project Manager, Technical Programs, Ground Vehicle Standards, SAE International
  • Technical Webinar: Container management with Kubernetes and Helm
    Technical Webinar: Container management with Kubernetes and Helm Rob Knight, EMEA Technical Director Nov 2 2017 2:00 pm UTC 30 mins
    Get some excellent technical details about "Container management with Kubernetes and Helm" in only 30 minutes!
  • A NaaS approach to SD-WAN: Simplifying GTM and delivery
    A NaaS approach to SD-WAN: Simplifying GTM and delivery Brian Fink - Co-Founder, VergX; Robert McBride - Director of Telco and Enterprise Solutions, Versa Networks Nov 2 2017 5:00 pm UTC 45 mins
    In this joint webinar, Versa Networks and VergX will discuss the benefits of a Network-as-a-Service approach to SD-WAN and SD-Security.

    SD-WAN and SD-Security are hitting the mainstream market – and with Garter predicting that “by 2020, more than 50% of WAN edge infrastructure refreshes will be based on SD-WAN” and IDC forecasting SD-WAN to be a “$6 billion market,” by 2020, every service provider and enterprise should have WAN transformation on their radar.

    With many services now being offered in a as-a-Service (XaaS) format, service providers need to take a deep look at how their customers are managing and refreshing their WAN technologies – the Versa NaaS format for providing SD-WAN and SD-Security is both a digestible and managed approach, and offers unique advantages for UCaaS companies looking to expand and improve the experience their services provide.

    Learn how SD-WAN and SD-Security can seamlessly fit into an existing product and services portfolio without the infrastructure investment and lost time to market.
  • The comeback of captive cloud.
    The comeback of captive cloud. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Nov 2 2017 5:00 pm UTC 60 mins
    In the latest IT episode of “Everything Old is New Again,” captive cloud is making a comeback – at least in market conversations. As enterprises navigate the pros and cons of public versus private versus hybrid clouds, “captive” is back in the mix. What does this mean for data centers trying to balance the elasticity of the public cloud with the realities of its actual operational costs for some workloads? In this webcast, we’ll dive into what’s behind the latest rise in captive cloud interest.
  • Is Your Compliance Mindset Leaving You at Risk?
    Is Your Compliance Mindset Leaving You at Risk? Dave Martin, Head of Product Management Nov 2 2017 6:00 pm UTC 60 mins
    Digital businesses of all sizes are facing a myriad of new and complex threats. Passing regulatory compliance checks and adhering to security standards is a good first step, but that's not enough to protect your IT infrastructure from being compromised or suffering a data breach.

    CIOs/CISOs should stop focusing on check-box compliance just to meet regulatory requirements that apply to their industry (e.g. SOX, PCI, HIPAA/HITECH), and shift to a risk-based mindset. What does this mean to those in the small and medium business market segment?

    In this webinar, we will address the following 3 key principles for implementing a risk-based security mindset.

    - Determine how information flows, rather than controlling flow of information
    - Stop trying to perfectly protect your organization, and invest in detection and response
    - Accept the limitations of technology and become people-centric

    About our speaker:

    Dave Martin brings to Arctic Wolf more than 20 years of experience with IT security and networking technologies in a variety of engineering, product marketing, product management and business development roles. He currently serves as the Head of Product Management responsible for market positioning, product strategy and feature definition for our market leading CyberSOC services. Prior to joining Arctic Wolf, Mr. Martin has held executive and technical positions at companies including NSFOCUS, Edgewater Networks, Nokia, Ipsilon Networks and Newbridge Networks. Mr. Martin is a US Patent holder, a recognized security and networking expert and regular speaker at trade shows, partner conferences, insight panels, webinars and other industry events.