Hi [[ session.user.profile.firstName ]]

Virtualization

  • [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    [Ep.24] Ask the Expert: Service Monetization in the XaaS Era
    Arun Trivedi, Partner, Wipro and Kelly Harris, Senior Content Manager, BrightTALK Recorded: Dec 11 2018 49 mins
    This webinar is part of BrightTALK's Ask the Expert Series.

    Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.

    This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.

    Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
  • Will You Still Love Me When I Turn 64GFC?
    Will You Still Love Me When I Turn 64GFC?
    Dean Wallace, Marvell; Barry Maskas, HPE Recorded: Dec 11 2018 50 mins
    Fibre Channel’s speed roadmap defines a well-understood technological trend: the need to double the bit rate in the channel without doubling the required bandwidth.

    In order to do this, PAM4 (pulse-amplitude modulation, with four levels of pulse modulation), enters the Fibre Channel physical layer picture. With the use of four signal levels instead of two, and with each signal level corresponding to a two-bit symbol, the standards define 64GFC operation while maintaining backward compatibility with 32GFC and 16GFC.

    This advanced technical session will cover the T11 standards which define 64GFC serial Fibre Channel, backwards speed auto-negotiation compatibility, and compatible form factors:

    •New physical layer and specification challenges for PAM4, which includes eye openings, crosstalk sensitivity, and new test methodologies and parameters
    •Transceivers, their form factors, and how 64GFC maintains backward compatibility with multi-mode fibre cable deployments in the data center, including distance specifications
    •Discussion of protocol changes, and an overview of backward-compatible link speed and forward error correction (FEC) negotiation
    •The FCIA’s Fibre Channel speed roadmap and evolution, and new technologies under consideration
  • The No-BS Guide to Data Privacy in 2019 … and Beyond
    The No-BS Guide to Data Privacy in 2019 … and Beyond
    Kevin Moos, Kina Ratanjee, and Sarah Davis Recorded: Dec 11 2018 38 mins
    Now that data privacy has entered mainstream conversations around the world, some businesses are finding it difficult to separate fact from fiction — "Is an updated privacy policy all we really need?" "This company says their data tool will make us compliant — is that true?" "Can't I just use a survey to find out what we're doing with personal data?"

    Join Primitive Logic at our next webinar, where we'll bust the most common myths about data privacy as we show you how to adapt to the demands of our current environment and prepare for what lies ahead.

    You will learn:

    The most common myths around data privacy … and the real truth behind them
    How to build a foundation for alignment with present and future data privacy laws
    How to address the four key areas of data privacy compliance
    The realities of where technology products can help your compliance efforts
    Common challenges and pitfalls to avoid

    Speakers:

    Kevin Moos, President, Primitive Logic
    Kina Ratanjee, Delivery Director, Primitive Logic
    Sarah Davis, Senior Consultant, Primitive Logic
  • Optimizing Data Plane intensive NFV workloads on VMware vCloud NFV and Intel®
    Optimizing Data Plane intensive NFV workloads on VMware vCloud NFV and Intel®
    Jambi Ganbar, Sr. Technical Solutions Manager NFV Ready Program, VMware and Petar Torre, Intel Lead Telco Architect Recorded: Dec 11 2018 61 mins
    Intel and VMware will explore the impact of NFV Infrastructure on VNF Data Plane performance. We will explain the correct hardware design and then discuss the optimal use of VMware vCloud NFV to achieve high throughput and low latencies. This will be excellent opportunity to learn about Data Plane HW configurations with Intel® Xeon® Scalable Processors and Intel® Ethernet Adapters 710 Series, as well as VMware’s latest vCloud NFV OpenStack Edition 3.0 and NSX.
  • Aprovecha los beneficios de desplegar SAP en AWS, con SUSE y Linke
    Aprovecha los beneficios de desplegar SAP en AWS, con SUSE y Linke
    Roberto Isidoro, Sales Engineer en SUSE y Guillermo Torres, AWS Solutions Architect and SAP Expert en Linke Recorded: Dec 11 2018 53 mins
    Descubre de la mano de Roberto Isidoro, Sales Engineer en SUSE y Guillermo Torres, AWS Solutions Architect and SAP Expert en Linke, AWS Premier Partner con la SAP Completency, cómo y por qué desplegar SAP en la nube de Amazon Web Services utilizando SUSE Linux Enterprise Server for SAP.
  • A View from the IT Practitioner: End User Predictions for 2019
    A View from the IT Practitioner: End User Predictions for 2019
    Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd Recorded: Dec 11 2018 55 mins
    2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

    We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

    Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:

    - What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
    - How their priorities have changed over the last 15 years and where they will focus for the next 15 years
    - Which cyber security trends have impacted their cyber security strategy
    - How to prepare your organisation for these new trends

    Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
  • CEO Insights: 2019 Cybersecurity Predictions
    CEO Insights: 2019 Cybersecurity Predictions
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Recorded: Dec 10 2018 35 mins
    Cybercriminals continued on their rampage in 2018 stealing millions of records from Department of Homeland Security and successfully hacked into name brand companies like Adidas, Twitter, Cathay Pacific, and Ticketmaster. The pace is not expected to slow in 2019. With porous on-premises infrastructure, new cloud assets, and not enough people with cybersecurity skills to detect and respond to threats, 2019 should be a lively year.

    The cybersecurity experts at Arctic Wolf Networks (AWN), a leading Security Operation Center (SOC)-as-a-Service provider have seen all types of attacks that have attempted to sneak through many a company’s perimeter and endpoint defenses.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf will walk through the top predictions for 2019, based on what our security services team has seen across more than 500 customers.

    Here is a preview of the top 3 predictions that is bound to surprise you.

    - The new approach cybercriminals will employ to get into target organizations
    - Which industries will be most attractive to 2019’s hackers
    - Whether new security technologies can live up to their expectations
    - And much more!

    To hear from this security expert and to learn what to look for in 2019, register now.
  • Achieve NERC CIP Compliance with FireMon
    Achieve NERC CIP Compliance with FireMon
    Robert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing Recorded: Dec 10 2018 12 mins
    Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.
  • Trust No One Part 3 - User Authentication for a Zero Trust Security Model
    Trust No One Part 3 - User Authentication for a Zero Trust Security Model
    Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Josh Green, Richard Archdeacon, Duo Recorded: Dec 10 2018 59 mins
    During episode 1 in our Trust No One Series, we heard about the origins of Zero Trust. Episode 2 showed us how Banco Santander started their Zero Trust journey.

    In this Part 3, Duo will demonstrate how they deliver Zero Trust models to their customers.
    You’ll leave with a hands-on basic understanding of how to deploy Duo to a cloud-based web-application.

    Duo has been a pioneer in bringing Zero Trust models to the commercial market, allowing organisations to protect themselves quickly and easily.

    Josh Green, Solutions Engineer, Duo Security
    Richard Archdeacon, Advisory CISO, Duo Security
  • StorageSwiss Live PodCast - Talking GDPR and CCPA with Aparavi
    StorageSwiss Live PodCast - Talking GDPR and CCPA with Aparavi
    Storage Switzerland and Aparavi Recorded: Dec 7 2018 16 mins
    Join Storage Switzerland and Aparavi for our live PodCast dealing with data privacy regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA). The regulations potentially force organizations of all sizes to rethink how they protect, retain and remove data.

    During the PodCast we cover:
    - The aspects of the GDPR and CCPA regulations that should concern IT
    - The challenges the regulations create for current data protection retention applications
    - How organizations need to change policies and products to address the regulations
    - Answers to live audience questions about data privacy, GDPR, and CCPA

    All attendees to the live event receive a free copy of Storage Switzerland’s latest eBook “GDPR IS FOR EVERYONE - Designing a Data Privacy Infrastructure”.
  • Automatisierung mittles APIs
    Automatisierung mittles APIs
    Markus Grau, Principal Systems Engineer und Gabor Horvath, Implementation Engineer bei Pure Storage Recorded: Dec 7 2018 30 mins
    Immer häufiger werden Arbeiten an Storage Arrays nicht mehr über ein GUI oder CLI erledigt, sondern werden von Workflows oder Runbooks angestoßen. Ebenso werden Arrays in immer mehr 3rd Party Tools für z.B. Monitoring oder Backup integriert. Durch die offene HTTP REST API können diese Arbeiten sehr einfach und schnell erledigt werden. In diesem Webinar zeigen wir am lebenden Beispiel wie man Pure Arrays mittels APIs verwaltet und welche Integrationen von Partner (z.B. VMware, Veeam, Docker, Microsoft, etc.) diese bereits nutzen. Heute sind python, PowerShell, Ansible, Puppet, OpenStack, etc. keine Exoten mehr sondern ein Bestandteil der modernen IT, um Infrastructure As Code umzusetzen.
  • Converged, Hyperconverged and Composable - The Key to Agile IT Infrastructures
    Converged, Hyperconverged and Composable - The Key to Agile IT Infrastructures
    Eric Slack, Sr. Analyst, Evaluator Group Recorded: Dec 6 2018 37 mins
    Digital transformation is happening! It’s driving companies to adopt new ways to capture and analyze data (the new oil), to discover new insights and optimize the way they run their businesses.

    IT is evolving to meet these new requirements, becoming more agile to keep up with dynamic markets - and the competition. The Cloud is a key, but on-prem infrastructures are, and will be, a part of most enterprise’s future.

    Join Eric Slack, Sr Analyst with the Evaluator Group and see how CI, HCI and Composable can address this need for agile, comprehensive infrastructures that reduce time for design, configuration, deployment and operations.
  • SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    Dr. Jim Metzler and Joel Christner Recorded: Dec 6 2018 43 mins
    The WAN has been fundamentally upended by SD-WAN and IT decision makers now have to reconsider what the branch of today and tomorrow looks like. Do you choose a best-of-breed solution or do you settle on a solution that includes SD-WAN and other capabilities?

    Join our webinar to learn the pros and cons of each and which dimensions should power your decision.

    In this webinar, you will learn:

    * The similarities and differences between best-of-breed SD-WAN and all-in-one systems
    * Which challenges and complexities are either presented or remedied by each model
    * How best-of-breed SD-WAN and all-in-one systems affect long-term remote office architecture
    * And most importantly, which provides the most value in different circumstances

    SPEAKERS
    Dr. Jim Metzler is the Founder and Vice President at Ashton, Metzler & Associates. Dr. Metzler has worked in many positions in the networking industry. His current interests include Application Delivery, Software Defined Networking and Network Functions Virtualization.

    Joel Christner is the VP of Marketing at CloudGenix and has two decades of experience in building distributed systems, infrastructure, and application delivery.
  • Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: Dec 6 2018 52 mins
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • Oracle Workloads in the Public Cloud
    Oracle Workloads in the Public Cloud
    Dave Welch, CTO & Chief Evangelist; House of Brick Technologies Recorded: Dec 6 2018 54 mins
    What’s going on with Oracle core technology workloads in the IaaS Cloud market? What customer activity are we seeing in that space? What are the opportunities and challenges? How have those opportunities and challenges shifted?

    Join this live webinar with Dave Welch, CTO and Chief Evangelist at House of Brick Technologies to answer these questions and more, and take a technical deep dive into Infrastructure-as-a-Service and the cloud market in 2019.
  • Next-Generation Hyperconvergence and Security
    Next-Generation Hyperconvergence and Security
    Mike McGhee - Technical Marketing Engineer at Nutanix | Shaun Donaldson - Director of Strategic Alliances at Bitdefender Recorded: Dec 6 2018 58 mins
    Since Nutanix pioneered hyperconverged infrastructure (HCI) in 2011, HCI has become an optimal way to run enterprise cloud. Meanwhile, the cyber threat landscape has worsened, demanding new approaches to protecting from advanced attacks.

    Join this webinar to see how Nutanix and Bitdefender work together to provide you the following:

    -An easy way to build a cutting-edge enterprise cloud for your environment
    -A bullet-proof combination of a hardened cloud and next-generation security for its files and workloads
    -An integrated solution to help you save time on infrastructure and security management and compliance
  • What’s Your 2019 NVMe Strategy?
    What’s Your 2019 NVMe Strategy?
    Storage Switzerland, Western Digital Recorded: Dec 6 2018 47 mins
    The flash optimized NVMe protocol has been on the market for over a year and the technology is available in several forms. NVMe, both storage and networking (NVMe over Fabrics) is more expensive than the typical SAS based solution and not all applications or environments can take advantage of the performance NVMe promises. At the same time there are workloads like artificial intelligence, machine learning and high velocity analytics that need all the performance that NVMe can offer and some organizations are buying NVMe solutions just for those workloads.

    Most data centers already have too many storage systems to manage, and adding another silo just for extreme performance workloads may make the problem even worse. IT needs a strategy to not only correctly integrate NVMe into the data center but to do so in a way that doesn’t further fragment the architecture. In fact, with the right strategy, IT can use the NVMe system as a point of storage consolidation.

    In this live webinar join experts from Storage Switzerland and Western Digital for an interactive webinar the will help you develop an NVMe strategy that makes the most sense for your organization.
  • Do More With New Supermicro Entry-Class Servers & Intel® Xeon® E-2100 Processors
    Do More With New Supermicro Entry-Class Servers & Intel® Xeon® E-2100 Processors
    Jim Sangster, Sr.Director Product Mktg, Supermicro; Brian Watson, DCG Product Mktg, Intel Recorded: Dec 6 2018 40 mins
    Unparalleled performance and enterprise-class capabilities are now available in the industry’s broadest portfolio of entry level UP servers and multi-node blades from Supermicro. Learn how you can now “do more” than ever before in this class of system, at the same entry prices.
    Together with latest Intel® Xeon® E-2100 Processor and Supermicro UP systems, the broad portfolio offers the right server optimized for your environment.
  • How to Get Your Business Digital Ready
    How to Get Your Business Digital Ready
    Ghassan Abdo, Research VP, IDC and Danny Johnson, Director of Product Marketing, Verizon Recorded: Dec 6 2018 61 mins
    Join Verizon and Ghassan Abdo, Research VP, Worldwide Telecom Cloud, & Virtualization Services, IDC for an engaging discussion about digital transformation and what organizations should consider as they take the next step in their digital journey. Get more insight into the key findings from the recent IDC MarketScape: Worldwide Communication SP SD-WAN
    Managed Services 2018 Vendor Assessment as well as the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment. Plus, find out what your organization needs to do to become a digital leader and improve business outcomes. Participants will be able to download a complimentary copy of the IDC study, Digital Transformation: Discover the Right Path to Avoid Hype and Disappointment, and a Verizon authored decision-maker’s guide.

    About the speakers:
    Ghassan Abdo, Research VP, WW Telecom Cloud, & Virtualization Services, IDC
    Mr. Abdo, Research Vice President in the Telecommunications group, covers the evolution of the Telco Cloud Ecosystem as well as the emerging Virtualized Enterprise Networking services. His primary focus areas include Service Provider SD WAN and Managed Services, and emerging NFV-based Virtual Networking Services as well as other Managed WAN Services. In the Hosting & Cloud segment, Ghassan covers Service Provider Managed Hosting services, including Hybrid Managed Private/Public Cloud Services, Colocation Services, Secure Cloud Connect and CDN services.

    The session will be moderated by Danny Johnson, 20+ year veteran in the technology industry. He is a seasoned executive possessing experience in software development, engineering, sales, consulting, product development, and marketing. Danny has started and launched innovative products and solutions within multi-billion dollar markets and is currently the head of product marketing for Verizon where he shares responsibility for the profitable growth of Verizon’s Strategic Network Portfolio.
  • Cybersecurity Ratings Part 3: The Third Way
    Cybersecurity Ratings Part 3: The Third Way
    Brandon Dunlap, Moderator, (ISC)², Nick Trigg, BitSight, Bob Lewis, (former) Barclays Recorded: Dec 6 2018 59 mins
    In the third of the series exploring BitSight Security Ratings, we will be focusing on the challenge of third party supplier risk management:

    - How can we manage suppliers using the dimensions of inherent risk impact and residual risk appetite?
    - How can we place suppliers cyber risk posture into context of our business?
    - How can we continuously monitor and remediate according to sensible risk prioritisation?

    Bob Lewis (former head of External Cyber Assurance and Monitoring, Barclays UK) will be discussing real life examples with Nick Trigg from BitSight.
  • Join the Stress-Free Data Protection Revolution!
    Join the Stress-Free Data Protection Revolution!
    Florian Malecki, International Sr. Product Marketing Director Recorded: Dec 6 2018 44 mins
    Midsize businesses are increasingly embracing digital technology to gain a competitive advantage. However, the explosive data growth, coupled with a lean IT staff at most midmarket organizations has placed an immense burden on data protection and storage infrastructure requirements.

    In recent years, a disruptive technology has emerged, creating a brand new category of backup & recovery and storage solutions: converged data protection appliances.
    The concept is very simple: combine backup and recovery software with a scale out storage appliance that can be used as a backup target as well as accommodating most storage requirements.

    Join this webcast to learn about the benefits of converged data protection platforms and what to look for when making your final decision.
  • 5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    5 Questions to Ask When Considering Cloud Backup for Enterprise Workloads
    Seyi Verma, Director of Product Marketing, Druva Recorded: Dec 5 2018 63 mins
    With data growing faster than ever before, managing data center infrastructure can be costly and complex. In addition to adding resources, hardware and tapes, you need to ensure visibility and control over remote and global sites to avoid data silos, and risks and compliance issues. That’s why the cloud became such a game changer for modern IT environments.

    Join us for this upcoming webinar, discussing the five questions to ask about cloud data protection for enterprise workloads, and find out how to:
    - Centralise and simplify management of corporate data environments
    - Reduce costs and demands on local resources, and achieve 60% lower TCO
    - Modernise data protection for virtual workloads
    - Meet critical application data recovery speeds, and business continuity SLAs
    - Harnesses the efficiencies and global reach of the public cloud, while delivering unmatched storage flexibility, data durability, and security

    We will conclude with a product Demo, when you can get an in-depth look at product admin consoles and client UIs.
  • Atipa Polaris Select HPCV Clusters: A Unified Platform for HPC and Visualization
    Atipa Polaris Select HPCV Clusters: A Unified Platform for HPC and Visualization
    Jim Jeffers, Sr. Director, Principal Engineer, Intel; Bart Willems, Director, Sr. HPC Engineer/Architect, Atipa Recorded: Dec 4 2018 26 mins
    Scientific simulations and modeling continue to produce larger and larger data sets. For our brain to understand and digest these vast amounts of data, visualization becomes an indispensable tool for post-simulation processing. Data produced by simulations is therefore often copied to high-end workstations and servers with special-purpose GPUs. As simulations continue to grow, moving and copying data becomes increasingly inefficient, time consuming, and wasteful of resources. The Atipa Polaris Select HPCV Cluster Family built on Intel Xeon Scalable Processors and Intel Omni-Path Fabric technology is the industry's first unified platform for scientific simulation and visualization. Using Intel Xeon optimized rendering engines, Atipa Polaris Select HPCV clusters offer in-situ visualization of big data on the same HPC system used to generate the data, eliminating the need for wasteful data transfers and special purpose hardware.
  • Delivering Secure, Hybrid Cloud Digital Workspaces. VDI Made Easy
    Delivering Secure, Hybrid Cloud Digital Workspaces. VDI Made Easy
    Bernie Hannon, Sr. Director, Citrix; Pankesh Mehta, Sr. Product Mgr, Lenovo Recorded: Dec 4 2018 61 mins
    For years, we’ve talked about the virtues of virtual desktop infrastructure (VDI). However, at the end of the day customers who invested time, resources and significant budget, often found that the benefits of VDI came with some hefty challenges. Complexity and time-to-value are difficult enough, but striking the balance between security and anytime/anywhere/any device access with has increasingly caused headaches for IT (not to mention the users!). Traditionally, securing apps and data meant keeping everything running in the data center, requiring IT to invest in expert resources to deploy and manage everything. In this session, you will see how these challenges have been addressed and how the barriers to adopting hybrid cloud digital workspaces are a reality with Citrix Cloud services deployed on Lenovo ThinkAgile HX. You’ll learn what VDI hasn’t been able to do, is now being delivered by Citrix and Lenovo. If you’ve already deployed VDI, we’ll show you how to relieve yourself of the burden of managing and maintaining a complex VDI environment, enabling you to put resources to better use. If you haven’t deployed VDI yet, we’ll show you just how simple it is to create secure, easy-to-use, and manage intelligent workspaces you and your users have been looking for. It’s called The Future of Work, and it’s here today.
  • VMware NSX and Intel: Getting the Most Out of Your Infrastructure
    VMware NSX and Intel: Getting the Most Out of Your Infrastructure
    Bob Ghaffari, Director, Intel & Calvin Chai, Director, VMware Recorded: Dec 4 2018 48 mins
    In today’s world of applications, dynamic workloads, and software-defined technologies, performance matters more than ever. Metrics like latency, availability, throughput, and processing power are all critical to designing a hyper-converged, software-based data center. Intel and VMware have been actively collaborating on technologies optimized for network workloads, and helping customers build solutions for enterprises of all sizes. In this session, we will explore how VMware, Intel, and customers are building multi-cloud networking solutions that combine all the speed and agility of the software experience with VMware NSX, together with platform benefits such as, Intel ISAs, DPDK, QAT.
  • Monitoring and Managing Ceph with openATTIC
    Monitoring and Managing Ceph with openATTIC
    Tim Serong, SUSE Dec 12 2018 12:00 am UTC 45 mins
    openATTIC is a web-based management and monitoring tool for Ceph storage clusters. This webinar covers the functionality available in the most recent release, including performance graphs, node and disk monitoring, along with storage and gateway service management.
  • How to Rule Your Data World
    How to Rule Your Data World
    Jacqueline Bloemen, Senior Analyst BI (BARC) and Becky Smith, Sr. Product Marketing (Denodo) Dec 12 2018 10:00 am UTC 60 mins
    In a digital World data is really everywhere. It enables innovative use cases, optimizes internal processes and will significantly affect tomorrow´s businesses.

    The growing interconnectedness of people, companies, and devices has led us to a vast volume of data from an ever-widening variety of sources. This has resulted in the rising awareness of the necessity to implement a data strategy.

    In this webinar Jacqueline Bloemen, Senior Analyst BI at BARC and Becky Smith, Senior Marketing Manager at Denodo, provide an overview of the current state of data strategy and data governance initiatives from companies around the world, based on the findings of a recently conducted study.

    Key Questions this webinar will address:

    - What are the most striking benefits of data governance?
    - Which technological approaches are companies taking to control and provide data?
    - What are the critical success factors of effective data governance?


    Agenda:

    1) Introduction and Challenges (Denodo)
    2) Insights into the current state of data strategy and data governance initiatives (BARC)
    3) Key Takeaways
    4) Q&A
  • Benefits of NVMe™ SSDs in Client Implementations
    Benefits of NVMe™ SSDs in Client Implementations
    Cameron Brett, Toshiba and Jonmichael Hands, Intel Dec 12 2018 5:00 pm UTC 60 mins
    NVM Express® over PCI Express® SSDs is the mainstream solution in the client space because it is low cost and has a smaller form factor than HDDs, while touting high performance and low power usage. Evolving to meet the needs of consumers, NVMe™ implementations touch various markets like gaming, content creation, workstations, mobile, media creation and more. Join Jonmichael Hands of Intel and Cameron Brett of Toshiba for this NVM Express, Inc. hosted webcast to learn more about real-world examples and how NVMe specifications continue to evolve to support client needs.

    In this webcast, attendees will learn more about the benefits of selecting NVMe enabled products like Intel SSDs and Toshiba SSDs. The webcast explores the client benefits that have surfaced with the different iterations of the NVMe specifications from NVMe 1.2 to NVMe 1.3 to the upcoming NVMe 1.4. Attendees will receive an in-depth overview of critical NVMe features including easier management of power/thermals, NVMe’s enablement in small form factors like M.2 and BGA, boot partitions and host controlled thermal management and namespace write protection.

    About the Presenters

    Cameron Brett is Director of Marketing, SSD and Storage Solutions, Toshiba Memory America, Inc. and a member of the NVMe Marketing Workgroup.

    Jonmichael Hands is a Product Marketing Manager at Intel and the NVMe Marketing Workgroup Co-Chair.
  • How to Easily Migrate Data Without Downtime
    How to Easily Migrate Data Without Downtime
    Alfons Michels, Sr. Product Marketing Manager & Alex Best, Dir. Technical Business Development - DataCore Software Dec 12 2018 6:00 pm UTC 60 mins
    Are you forced to replace your hardware? Are you thinking about different deployment models for your IT infrastructure, e.g. hyperconvergence?

    Well, any change to your IT infrastructure is a major challenge, and typically requires complex data migrations, resulting in service downtime, overtime and more money to spend - but are the results worth it?

    Before you start your next project, think about an alternative approach to rip-and replace, like software-defined storage. You may ask yourself, why should that help me? And there are many good reasons, but an essential one are the unrivaled chained migration options.

    If you're wondering what these benefits can mean to you, just join our brief webinar, which also includes a live demo and audience Q&A so you can see how simple it is to bring software-defined storage into your IT environment and leverage chained migration. Among others, you'll be able to discover:
    • How to integrate software-defined storage into your environment
    • How to migrate data between totally different types of storage
    • How to change towards hyperconverged during regular business operations
  • The Future of Backup Isn't Backup
    The Future of Backup Isn't Backup
    Steve Blow Dec 13 2018 6:00 pm UTC 34 mins
    Old school backup is out! Today’s digital consumers demand an always-on level of service that backups simply cannot provide. Learn how continuous data protection is changing the way companies think about backup.

    Listen in as Steve Blow, Technology Evangelist, explains Zerto’s vision for the future of backup and learn how continuous journal-based protection is disrupting legacy backup. The recently announced Zerto IT Resilience Platform™ converges backup, disaster recovery, and cloud mobility solutions into a single, simple, scalable platform.
  • Challenges of the Software Defined DATA Center of the Future
    Challenges of the Software Defined DATA Center of the Future
    Don Molaro, CTA at WWT & industry expert, Hal Woods, CTO at Datera, and Bill Borsari, Field Technical Lead at Datera Dec 13 2018 6:00 pm UTC 45 mins
    If you are like many out there, the DATA is at the center of what your organization does and it’s getting in the way of achieving a Software Defined DATA Center that is simple, automated and fast. Hear about the challenges enterprises like yours are encountering and evaluate the options available to architect a new approach that can:

    - Automate data storage end-to-end using new capabilities like machine learning
    - Harness the latest tech like NVMe to drive performance @ scale
    - Consolidate data storage and operations
    - Pave the way to adopt new container orchestration technologies like Kubernetes

    Don Molaro, Chief Technical Advisor at World Wide Technology joins Hal Woods, CTO at Datera, and Bill Borsari, Field Technical Lead at Datera, to share their experience and advice. Learn the key requirements and technology options available to architect your future data operations, rightsize your budget and transition to a software-driven world.
  • Transform Learning with Powerful, Scalable Desktops in Azure
    Transform Learning with Powerful, Scalable Desktops in Azure
    Adrian Wilson, Account Technology Strategist, Microsoft & Mirela Cunjalo, Dir. Product Mgmt., Teradici Dec 13 2018 6:00 pm UTC 60 mins
    Join Teradici and Microsoft for a glimpse into how scalable desktop resources in the cloud can help in education.
    In this webinar, you'll learn how education institutions can leverage virtual desktops in the cloud to provide improved computing resources to students, strengthen security, and help make university IT operations more efficient. Teradici Cloud Access Software and Microsoft Azure enable a solution that will solve today’s desktop management challenges and drive improved access for students, personalized learning, and improved student outcomes.
    We’ll cover:
    •The unique benefits of hosting desktops and applications on Azure
    •A reference architecture for the education use case
    •The security and performance benefits PCoIP technology provides
    •Endpoint flexibility, from ultra-secure PCoIP Zero Clients to personal devices
    Don’t miss this webinar and a chance to learn how you can get started with Teradici and Microsoft.
    Q&A will follow.
    Register today!
  • Design your hybrid cloud for the end user - or fail
    Design your hybrid cloud for the end user - or fail
    Cameron Wyatt and Ian Tewksbury, Red Hat Dec 13 2018 7:00 pm UTC 52 mins
    The usual approach to beginning business transformation lies with the cloud, and the benefits of a hybrid cloud are clear and uncontested. So why is it that so many enterprises struggle to adopt this exceedingly prevalent technology? Historically, the problem has been an exclusive focus on the tools instead of the people using the tools.

    In this webinar, we we'll discuss why it's imperative in today’s IT landscape to keep the end user as your primary focus when designing and implementing your hybrid cloud.

    We'll cover:
    - How to build your cloud incrementally to accommodate future fixes and enhancements.
    - Why you need to consider your existing policies and procedures when defining your new cloud experience.
    - How to iteratively design and implement a successful hybrid cloud experience.

    Featuring:
    Cameron Wyatt, Consulting Architect, Red Hat Consulting, Red Hat
    Ian Tewksbury, Consulting Architect, Red Hat Consulting, Red Hat
  • Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Netzwerk Upgrades bereiten Ihnen Kopfschmerzen?
    Daniela Fusaro, Senior Solutions Architect Dec 14 2018 9:00 am UTC 30 mins
    Trotz der unstillbaren Nachfrage nach Bandbreite müssen Unternehmen die Sicherheitsrichtlinien des Netzwerks immer noch schnell überprüfen und durchsetzen. Das ist besonders schwierig, wenn Sie Netzwerke von 10 Gb auf 40 Gb oder von 40 Gb auf 100 Gb aufrüsten.

    Nehmen Sie teil am Webcast von Daniela Fusaro, Senior Solutions Architect bei Gigamon. Sie erläutert, wie Sie die mit diesen Netzwerkupgrades verbundenen Sicherheitsrisiken lösen, Ihre Sicherheit stärken, die IT vereinfachen und Kosten senken können.

    Sie erfahren folgendes:
    - Erhöhen Sie Ihren ROI für die Sicherheit: Filtern Sie die richtigen Daten aus dem Netzwerkverkehr der physikalischen, virtuellen und Cloud-Infrastruktur und leiten Sie diese an die relevanten Tools weiter
    - Reduzieren Sie Ihr Sicherheitsrisiko: Überdenken Sie Ihre Netzwerksicherheitsarchitektur neu, indem Sie verschlüsselten Datenverkehr nur einmal entschlüsseln und die Überprüfung dieser Daten durch mehrere Sicherheitstools ermöglichen
    - Verbessern Sie die Reaktion auf Bedrohungen: Erkennen Sie Muster und Bedrohungsvektoren in heterogenen Netzwerken schneller

    Finden Sie heraus, wie sowohl Netzwerk- als auch Security-Teams bei Netzwerk-Upgrades schneller und sicherer zusammenarbeiten können, um Sicherheitsbedenken zu lösen - registrieren Sie sich noch heute!
  • Segurança, Escalabilidade e Econômia de Recursos, por que escolher um só?
    Segurança, Escalabilidade e Econômia de Recursos, por que escolher um só?
    Marcelo Arantes Dec 14 2018 12:00 pm UTC 60 mins
    A SUSE Fornece uma infraestrutura ágil e simples de gerenciar, com maior velocidade de entrega, durabilidade e confiabilidade. Acelere a inovação e reduza os custos, transformando sua infraestrutura corporativa de armazenamento com uma solução inteligente de armazenamento definido por software, verdadeiramente aberta e unificada.
  • Consumption Based Data Management Providing Peace of Mind
    Consumption Based Data Management Providing Peace of Mind
    Storage Switzerland, Veeam, HPE Dec 17 2018 6:00 pm UTC 60 mins
    Consumption based IT is a curated set of IT solutions that focus on business outcomes. As the name implies it is purchased on a pay-as-you-go model. The goal of consumption based IT is to simplify establishing IT infrastructure that incorporates both the on-premises data center and the cloud to support a wide variety of workloads including traditional transactional databases, big data analytics, containers and many others.

    A key aspect of consumption based IT is how the data created by these workloads will be protected. In fact, the right consumption based IT solution should curate end-to-end backup directly into the solution.

    In our live webinar join Storage Switzerland, Veeam, and HPE to learn about consumption based IT, what to look for in a consumption based solution, how data protection can protect the solution and how data protection can be offered as a consumption based solution protecting both legacy and new architectures.
  • Flexible Service Orchestration for converging Core and Edge Networks
    Flexible Service Orchestration for converging Core and Edge Networks
    Shay Naeh, Cloudify; Petar Torre, Intel, Telco Lead Architect Dec 18 2018 4:00 pm UTC 60 mins
    Diverse environments between CommSP IT, Core and Edge networks require flexible orchestration to implement multiple design principles from Telco over IT to cloud native. Solving orchestration and platform requirements for edge computing is critical from very small sites to much bigger ones. We will explore much better business and service agility for more performance and cost-optimized Intel(R) Architecture platforms.
  • IoT Series [Ep.1]: Foundations -- Architecture and Framework
    IoT Series [Ep.1]: Foundations -- Architecture and Framework
    Johna Till Johnson, CEO & Founder, Nemertes Research Dec 18 2018 4:00 pm UTC 60 mins
    Everyone talks about IoT, and many organizations are implementing it and reaping the business benefits. But even those who have had IoT projects deployed for years may not have a comprehensive architecture and framework in place to help guide technology decisions and streamline operations.

    Join Nemertes CEO Johna Till Johnson as she reviews the IoT architecture and framework and shares guidance gleaned from leading-edge clients and research study participants.
  • Why Hybrid Cloud Storage is Winning in Multi-Site Environments
    Why Hybrid Cloud Storage is Winning in Multi-Site Environments
    Tom Rose, Vice President of Technical Solutions at Nasuni Dec 18 2018 6:00 pm UTC 60 mins
    Two competing trends are helping Hybrid Cloud file storage emerge as a dominant architecture for IT: Globalization and Data Center Consolidation. How does IT manage to power users and applications at the edge in a competitive global environment while consolidating expensive data center resources? Tune in to learn:

    - Why hybrid cloud solutions for applications and users are leading the way in file storage
    - How to leverage hybrid cloud storage to reduce data center footprint
    - How IT leaders are incorporating a cloud first strategy for file storage in 2019
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Dec 19 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:

    Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Why Machine Learning is Fun and How you can Master It!
    Why Machine Learning is Fun and How you can Master It!
    Joanna Hu, Principal Data Scientist, Exabeam Dec 19 2018 5:00 pm UTC 60 mins
    Machine learning, or AI, may be considered as sophisticated technology which can only be understood by crazy nerds, or some dangerous technology can destroy human beings one day. As a machine learning data scientist, Joanna wants to tell you that machine learning is not either. It is very fun, can be learnt and mastered, and do more benefits than harm to the human beings. More important, it is a very suitable career for women.

    In this presentation, Joanna will use a few use cases to represent its values and its technology (including deep learning), etc. I will also talk about the skill sets needed for machine learning.


    Join this live webinar with Joanna Hu, Principal Data Scientist at Exabeam and recent nominee for Data Leader of the Year for Silicon Valley's Women in IT Award. Joanna will discuss:

    - The data science behind the 2016 US presidential election
    - What is machine learning / artificial intelligence?
    - Use cases of machine learning: cyber security, shopping, search
    - Skills and mindset needed for machine learning and why it's very suitable for women
  • Break the chains of legacy virtualization
    Break the chains of legacy virtualization
    Bhavani Yellapragada, AVP of DevOps, Nasdaq Dec 19 2018 6:00 pm UTC 60 mins
    IT leaders look to technology as a business differentiator and rely on it to foster innovation. Enterprises have discovered that hyper-converged infrastructure (HCI) can be the foundation of a modern, cloud-like datacenter. But don’t stop there — going beyond HCI delivers more savings, increases IT agility, and supports multi-cloud goals when you add virtualization as an integral part of your stack.

    How do you harness the power of HCI and virtualization? Sure, there are a wide variety of tools on the market, but choosing the wrong HCI platform could limit your options in how you operate your datacenter or could impede cloud goals — including those associated with virtualization.

    To learn more about the power of HCI and virtualization, how virtualization can remove complexity and increase efficiency, and how to choose the right HCI tool, don’t miss this VB live event!

    Registration is free.

    Attend and learn:
    * How virtualization platform options on the market compare
    * Why to consider changing virtualization solutions
    * How to choose the right virtualization solution
    * How to save thousands in virtualization licensing costs

    Speakers:
    * Bhavani Yellapragada, AVP of DevOps, Nasdaq
    * Mike Wronski, Principal Marketing Manager, Nutanix
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Nutanix
  • Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Enterprise-Wide Kubernetes Episode 4: Secrets Management with Vault
    Jim Bugwadia Dec 19 2018 7:00 pm UTC 60 mins
    In this episode of the Enterprise-Wide Kubernetes series, we will show
    how Nirmata makes it easy to integrate your Kubernetes clusters and
    workloads with Vault for enterprise grade secrets management.

    What to expect:
    1. Learn best practices for managing secrets in Kubernetes.
    2. Get an overview of HashiCorp Vault and learn how to use the tool for managing secrets i.e. sensitive data like passwords and access keys.
    3. Discover Nirmata integrations with Vault.
  • 10 Key Strategies to Optimize Costs and Govern AWS
    10 Key Strategies to Optimize Costs and Govern AWS
    Jason Monden, VP, Cloud Solutions & Technology Services Dec 19 2018 7:00 pm UTC 60 mins
    The public cloud with its unlimited resource, requires higher financial discipline from IT when compared to traditional data center budgeting/spending. Without any cost controls and governance in place, cloud spend could blow past budgets and derail projects. Customer needs to adopt a proactive approach to avoid out of control spend and poor governance, which can result in significant security issues.

    In this webinar, we will provide 10 strategies to help you
    • Choose wisely among all available AWS alternatives
    • Streamline your operations in AWS, and
    • Continuously optimize your deployment to take advantage of best practices and available arbitrage opportunities within the hundreds of millions of combinations available to you on AWS

    You will have the opportunity to listen to Burwood Group’s Cloud Architect, James Anderton, on tips and tricks to continuously optimize your cloud, take advantage of new technologies from AWS and get more bang for your AWS buck. Learn how you can kick it up a notch with intelligence, analysis and automation to deliver faster results for new and existing workloads.

    You’ll also receive a complimentary copy of our e-book that provides valuable insights into how you can optimize your AWS environment while saving 30-50% of your cloud computing costs.
  • Cloud Modernization with Data Virtualization - A Case Study by TransAlta
    Cloud Modernization with Data Virtualization - A Case Study by TransAlta
    Paul Moxon, VP Data Architecture and Chief Evangelist, Denodo and Alejandro Ocando, System Analyst , TransAlta Dec 19 2018 7:00 pm UTC 51 mins
    TransAlta is an electric power generator company headquartered in Calgary, Alberta. TransAlta developed a Energy Trading and Risk Management System (ETRM) for hourly energy pricing, but business users needed the ETRM data to be blended with many other sources of data in near real-time. At the same time TransAlta's IT department wanted to move their entire data layer to the cloud for flexibility, agility and lower TCO. Data virtualization technology played a central role in TransAlta's real-time data integration, while helping them move to the cloud with zero down-time. Attend this webinar to learn:

    * Who is TransAlta and why data driven insight is critical for their energy trading system
    * Why Data Virtualization played a critical role in TransAlta's cloud modernization effort
    * How Data Virtualization offers a faster and better data integration over legacy systems
  • Migrate PC & Mobility with Unified Endpoint Management
    Migrate PC & Mobility with Unified Endpoint Management
    Suzanne Dickson Sr. Dir. Product Marketing, Mobility Citrix; Amandeep Nagra Sr. Product Marketing Manager, Citrix Dec 20 2018 11:00 am UTC 53 mins
    Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embrace unified endpoint management (UEM) to solve the challenges of managing PC, IoT and mobile devices with a centralized solution to manage and secure endpoints.

    Register for this webinar to hear from Suzanne Dickson, Sr. Director, Product Marketing and Citrix Workspace Product Marketing Expert, Amandeep Nagra on how to manage and secure your endpoints.

    This session will address how UEM helps solve challenges of traditional client management in the context of the new digital workspace. Learn more about:

    • UEM and how it fits into a Digital Workspace
    • Managing endpoints through Citrix UEM
    • The future of Citrix UEM
  • Grow Your Business with New Service Offerings
    Grow Your Business with New Service Offerings
    Alexander Kirov, Ivan Loginovskikh, Anastasia Dobrodeeva Dec 20 2018 2:00 pm UTC 45 mins
    Join the Virtuozzo Program Management Team for a live webinar to learn more about ways how to drive new revenue streams with storage-based service offerings.

    Our team will guide you through:
    •Key considerations for Storage as a Service (STaaS) models;
    •Best practices on technologies to use for STaaS solutions;
    •Top STaaS use cases for service providers
  • Hyperconverged infrastructure—open, integrated compute and storage with a compac
    Hyperconverged infrastructure—open, integrated compute and storage with a compac
    Daud Qazen storage specialist, , Red Hat & Ricky Nelson senior solution architect, Red Hat Jan 3 2019 7:00 pm UTC 47 mins
    In this webinar, we'll discuss a high-performing, cost-competitive hyperconverged infrastructure solution. Red Hat® Hyperconverged Infrastructure is the only open, integrated virtualization and software-defined storage solution. We'll cover:

    What it is and how it can help you.
    How it's different than what's currently in the market.
    A live demo creating a virtual machine (VM) from a GUI and with Ansible®, creating templates of VMs, and migrating a VM to a different host.
  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
    Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
    Mark Bouchard, Co-Founder and COO - CyberEdge Group & Narayan Makaram, Sr. Director, Product Marketing - Arctic Wolf Networks Jan 8 2019 6:00 pm UTC 57 mins
    Every company, regardless of size or industry, needs the advanced security capabilities provided by a security operations center (SOC). Until recently, only large enterprises had the means and resources to implement these essential technologies. So, where does that leave small to midsize enterprises (SMEs)?

    In this upcoming webinar, Co-founder and COO of CyberEdge Group, Mark Bouchard, will share insights on the cybersecurity challenges facing small to midsize enterprises (SMEs), drawing on data from the recently published 2018 Cyberthreat Defense Report. We will also hear from Sr. Director of Product Marketing of Arctic Wolf Networks, Narayan Makaram, on the SOC options available to SMEs and will help to identify the top 10 capabilities to look for in a SOC-as-a-service.

    By attending this webinar you will learn about:

    • Cybersecurity challenges facing the IT organization in small to midsize enterprises (SMEs)
    • Insights into what is driving the need for managed threat detection and response
    • The top 10 essential elements of a SOC-as-a-Service

    To discover how SMEs can get access to a SOC in the form of a SOC-as-a-service, register today!

    About our key speaker:

    Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.
  • Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Accelerating Productivity w/o Compromise through Immersive Digital Workspaces
    Chris Marsh of 451 Research & Matt Crawford of Citrix Jan 10 2019 11:00 am UTC 55 mins
    The way the world works is changing. Work is done in more locations, from more devices and in collaboration with more people than ever before. Many companies at the front lines of this change are struggling to transform their technology to meet the demands of their workforce. It is true that many IT organizations have embarked on a “digital transformation” journey, but some have made slow progress due to the way work is organized in their companies and how technology is adopted. Any of this sound familiar? Join this webinar for a fresh take on how work really gets done in the modern era and how technology can enable this new approach.

    Topics discussed will include:
    * Current sources of friction that hamper productivity
    * Barriers to collaboration and execution
    * The importance of context and automation in enabling workers
    * Tips for selecting technologies that map to the new workforce