Hi [[ session.user.profile.firstName ]]

Virtualization

  • Benefits of Engaging with an Open Source Project
    Benefits of Engaging with an Open Source Project Dave Neary, NFV/SDN Community Strategist, Red Hat Recorded: Nov 17 2017 22 mins
    Listen to Dave Neary, SDN and NFV with Open Source at Red Hat talk about the benefits of engaging with an open source project as a user and what we can expect to see next for NFV and SDN standards.
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA


    NOT BICSI accredited.
  • Why you need to stop copying data forever.
    Why you need to stop copying data forever. Marc Keating, Director of Technology & Alliance Strategy; Darren Miller, Manager of Engineering Test & Performance Recorded: Nov 16 2017 56 mins
    Whether you keep your enterprise data in the cloud, on-prem or in a hybrid environment, chances are, you’re making more copies than you’d like to.
    Of course, you must meet data protection requirements. Unfortunately, what sounds like a two-step process – store the data and back it up – often multiplies into many more steps with many more copies. And every time you duplicate your data, you increase your costs.

    In this webcast, we’ll look at why this is and what your options are to stop copying data and start accessing it.
  • Three Steps to Eliminating Storage Silos
    Three Steps to Eliminating Storage Silos Storage Switzerland, Nexsan Recorded: Nov 16 2017 51 mins
    As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
  • vCPE and vPE: Gateway to Service Agility and Virtualization
    vCPE and vPE: Gateway to Service Agility and Virtualization Shaji Nathan, VP, Product Marketing, IP Infusion and Srikanth Krishnamohan, Director, Business Development, IP Infusion Recorded: Nov 16 2017 39 mins
    This webinar will provide attendees an overview of capabilities of VirNOS virtual network function (VNF) and the use cases. We will cover virtualizing services at the customer edge and how service providers can enable services such as VPN and IPSec to their end customers at lower OPEX. The presenter will also discuss vPE/vRouter running at the data center or cloud providing MPLS WAN services.
  • Taking the Path to Real Time Big Data Analytics
    Taking the Path to Real Time Big Data Analytics Paul Krein, Red River; Joe Paiva, Commerce; Linda Powell, Protection Bureau; Ashok Sankar, Splunk; Nick Psak, Pure Storage Recorded: Nov 16 2017 64 mins
    The shift to the cloud is modernizing government IT, but are agencies' storage models keeping up with that transition? When it comes to big data, the proper system is necessary to avoid major data bottlenecks and accessibility challenges, allowing agencies to get the right information to the right people at the right time. Flash storage is the latest technology that improves scale, speed, and efficiency of data storage. Join us for a panel discussion on the challenge of scale, increased demand for user-focused data management tools, and security and risk reduction with sensitive data.

    Featured Speakers:

    - Paul Krein, Chief Technology Officer, Red River
    - Joe Paiva, Chief Information Officer, International Trade Administration, U.S. Department of Commerce
    - Linda Powell, Chief Data Officer, Consumer Financial Protection Bureau
    - Ashok Sankar, Director, Solutions Strategy, Public Sector and Education, Splunk
    - Nick Psaki, Principal, Office of the CTO, Pure Storage
  • Hedvig Introduction with CEO & Founder Avinash Lakshman
    Hedvig Introduction with CEO & Founder Avinash Lakshman Avinash Lakshman, Eric Carter Recorded: Nov 16 2017 51 mins
    Intro webinar and demo featuring Hedvig CEO and co-founder Avinash Lakshman. Learn how software-defined storage transforms your data center and delivers more agile and lower cost data management for VMware and Docker, spanning on premises and public cloud.
  • DevOps & Automation: How to Modernize Enterprise Workflows
    DevOps & Automation: How to Modernize Enterprise Workflows Walter Bentley, Red Hat Automation Practice Lead Branden Pleines, Consultant, Automation Practice Recorded: Nov 15 2017 65 mins
    The promise of workflow modernization through automation is great — speed, efficiency, and productivity are the hallmarks. But, the process to get there can be complex: How do you prioritize and modernize those designated workflows as you move to new platforms or implement new processes and ways of working? With workflow modernization, your organization can become fully cross functional, enabling all teams to collaborate to create automation content.

    In this webinar, we’ll show you the strategic approach to workflow automation and provide actionable guidance on to make operations more repeatable, predictable, and automated. You’ll learn how to:

    - Bring a DevOps mindset and approach to the network
    - Create fully automated workflows that are interchangeable between projects
    - Extend the power of Ansible automation across the enterprise
  • Get Total Visibility into Microsoft IT Services through a Single Pane of Glass
    Get Total Visibility into Microsoft IT Services through a Single Pane of Glass John Worthington, Product Management Director, eG Innovations Recorded: Nov 15 2017 49 mins
    Microsoft System Center Operations Manager (SCOM) allows system and application administrators to monitor operations, services, devices and applications within an enterprise through a single console. This single pane of glass can simplify operations, but monitoring the performance of end-to-end digital business services requires more than aggregating measurement data using multiple management packs.

    From a performance management perspective, unified monitoring is most effective when there’s a single source of actionable truth; it moves us away from diagnosis-related activities and toward collaborating on how to establish self-healing properties when that diagnosis is identified. Not only is this more cost-effective, it’s a more “unifying” activity than troubleshooting.

    A single pane of glass without an understanding of end-to-end IT service dependencies may just lead to more alert fatigue-- little actionable information due to lack of effective correlation and root cause diagnosis. The results are long problem isolation and diagnosis cycles, resulting in poor user experience and increased IT operation costs.

    Join us for this webinar as John Worthington, Director of Product Marketing at eG Innovations, demonstrates how you can achieve end-to-end performance monitoring of Microsoft IT services such as SharePoint, Exchange or custom .Net applications--even if those IT services incorporate non-Microsoft components or cloud services—and unify Microsoft SCOM at the same time.
  • Multi-cloud Primary Storage: Avoid lock-in while shifting apps to the cloud
    Multi-cloud Primary Storage: Avoid lock-in while shifting apps to the cloud Senior Analysts Jeff Kato and Jeff Byrne Recorded: Nov 15 2017 54 mins
    As the result of extensive primary end-user and multi-vendor research, including responses from 700+ IT decision makers, Taneja Group has learned that an increasing number of organizations are more motivated than ever before to move their applications in the cloud. However, they prefer to easily move those applications between on-premises and multiple clouds without having to modify the underlying storage infrastructure.

    Join us as we unpack this emerging market category along with SoftNAS, one of the vendors at the forefront of this trend.

    In this webinar we’ll cover:

    • How multi-cloud primary storage can span multiple cloud environments and mitigate the risk of moving to the public cloud

    • Lifting and shifting applications to a single public cloud or multiple public clouds without re-engineering the applications

    • Why the SoftNAS Cloud Data Platform enables enterprise on-premises file services to be collocated in public clouds

    About your hosts:
    Taneja Group’s Senior Analysts Jeff Kato and Jeff Byrne will discuss the research behind the Taneja Group’s Multi-Cloud Primary Storage market category. They will be joined by Rick Braddy, Founder, CEO and CTO at SoftNAS, who will describe how the SoftNAS Cloud Data Platform provides the best pathway to shift applications among on-premises, AWS, and Azure clouds.
  • Tackling the f-word: The smarter approach to ad fraud
    Tackling the f-word: The smarter approach to ad fraud Emily Storino, Network Strategy Lead, Electronic Arts (EA) Recorded: Nov 15 2017 61 mins
    Ad fraud isn’t becoming more prevalent -- the fraudsters are just getting slicker. From bot nets to device ID spoofing, the tricks are getting more sophisticated, and raking in more and more cash for the swindlers.

    Staying ahead of the fraudster’s learning curve is the key — and collaboration is the crucial element. While vendors and advertisers are directly impacted by fraud, tracking partners provide the technology to help fight fraud – all three players have to work together to circle the wagons.

    Making a game plan can be complex, when there are no clear benchmarks for defining or measuring fraud, as each player defines it differently and different benchmarks are needed for each app type, geo, traffic source, and so on.

    Join this VB Live event to learn how to tackle that complexity, how to define benchmarks, detect and manage fraud, and work with your partners to circle the wagons against the fraudsters.

    Register for free!

    You’ll learn:
    * Who the stakeholders are, plus why and how is each is affected
    * The MMPs’ role in this ecosystem
    * What fraud is and what benchmarks should be used for defining it
    * How to collaborate to detect and manage fraud on an ongoing basis
    * What tools are out there to fight fraud

    Speakers:
    * Emily Storino, Network Strategy Lead, Electronic Arts (EA)
    * Grant Simmons, Head of Client Analytics, Kochava
    * Tal Nissenson VP Client Success US, Taptica
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Taptica
  • Amazon RE:Invent for Storage Professionals - Three Capabilities to Look For
    Amazon RE:Invent for Storage Professionals - Three Capabilities to Look For Storage Switzerland, Avere Systems, SwiftStack Recorded: Nov 15 2017 64 mins
    The sixth year of Amazon RE:Invent is almost upon us (November 27 to December 1 in Las Vegas). In this webinar join Storage Switzerland, Avere Systems and SwiftStack for a storage professional’s guide to the event.

    Learn about:
    - The different tiers of the Amazon storage offering
    - How to create hybrid cloud storage combining private and public offerings
    - Learn how to interconnect multiple cloud providers
  • Redefine Hybrid with Google Cloud and Nutanix
    Redefine Hybrid with Google Cloud and Nutanix Gil Haberman, Director of Product Marketing, Nutanix and Manvinder Singh, Strategic Partnerships Lead, Google Cloud Recorded: Nov 15 2017 29 mins
    Blending public and private clouds is a strategic goal for many organizations. Join us in this unique session describing how Google and Nutanix join forces to bring this objective to fruition. We will preview how Nutanix customers can natively and instantly extend their environment to cloud services delivered from Google datacenters. We will also discuss how customers can benefit from bleeding-edge technologies like Kubernetes in their on-prem infrastructure
  • Digital Enterprises Need Adaptable and Fast ITSM Software at Low Cost
    Digital Enterprises Need Adaptable and Fast ITSM Software at Low Cost Bruno Labruere, Jacques Conand, Torrey Jones Recorded: Nov 15 2017 66 mins
    Digital transformation, acceleration, innovation. Buzzwords or not, these words reflect the reality of every existing business fighting for new revenue streams, better customer experience, and faster delivery of new services.

    To support these business objectives, IT organizations need to focus on increasing performance and workforce productivity without driving additional costs. At the same time, it is imperative that tools need to adapt to the way people work today.

    In this session we will present the new, re-architected Micro Focus ITSM Automation solution (formerly known as HPE ITSM Automation). Micro Focus ITSM Automation software can be installed on Amazon Web Services, brings a new user experience, greater collaboration, and many other new capabilities. It is based on machine learning and analytics, to adapt the tools to the needs of business users and IT.

    Join our live webinar and learn:

    •Why choice, flexibility and speed in ITSM deployment is important
    •What data is needed so that service desk agents can become more productive and proactive
    •How to solve issues faster with increased collaboration among both end users and ITSM staff

    Greenlight Group, a managed service provider, will discuss what helps them meet the most stringent SLAs while constantly providing new service offerings to their customers.

    During the webinar, you will also see the new ITSM Automation release live in action.
  • Cat 8 Data Center Cabling Systems Update
    Cat 8 Data Center Cabling Systems Update Frank Straka, Panduit; Mark Mullins, Fluke Networks; Moderated by Limor Schafman, TIA Recorded: Nov 15 2017 69 mins
    The Telecommunications Industry Association (TIA) TR-42 Telecommunications Cabling Systems Engineering Committee is issuing a Category 8 cabling systems update. Join this webcast to learn the details.

    Speakers:

    >> Mark Mullins - Global Communications Manager, Fluke Networks
    Mark is one of the founding members of Fluke Networks, starting in 1993. He has been involved in all of the key areas of the business, including cable testing, network troubleshooting and analysis. He holds a B.S. in Computer Science and an MBA from the University of Washington.


    >> Frank Straka - Product Line Manager, Panduit
    Frank Straka manages Panduit’s copper and fiber cable product lines. Frank holds multiple degrees in both engineering and business, including a BSEE, MSEE, and MBA. He holds 26 patents in copper connectivity and cable design. Frank is active in the TIA TR42.7 standards group, which developing new standards to support new applications like 25 and 40GBASE-T, 100W PoE++ and NBASE-T. He has spoken at multiple conferences such as BICSI, IWCS, and the Ethernet Summit on new copper developments.


    This program does not offer accreditation.
  • Technical Webinar: Container management with Kubernetes and Helm
    Technical Webinar: Container management with Kubernetes and Helm Rob Knight, EMEA Technical Director Recorded: Nov 15 2017 24 mins
    Get some excellent technical details about "Container management with Kubernetes and Helm" in only 30 minutes!
  • Who, What, and Why of Enterprise Cloud
    Who, What, and Why of Enterprise Cloud Ulrich Slothuus, Tintri Recorded: Nov 15 2017 46 mins
    The shift to cloud is on. The challenge is to adopt the right mix of cloud models for your organization. Public cloud is setting the pace with agility and scale ... and that has inspired a few myths (that we'll de-bunk). Can private cloud and the IT department keep pace? We'll make the case for a building block architecture -- introducing public cloud-like web services in your data center. We will share the stories of organizations that have deployed this type of enterprise cloud to guarantee performance, enable self-service, quiet shadow IT and manage a massive footprint with a fraction of the effort.
  • Top Data Breaches of 2017: Why Prevention Alone Was Not Enough
    Top Data Breaches of 2017: Why Prevention Alone Was Not Enough Narayan Makaram - Senior Director of Product Marketing at Arctic Wolf Networks Recorded: Nov 14 2017 46 mins
    While 2017 was turning out to be a year of ransomware attacks, the mother of all data breaches was carried out on Equifax where the personal information of 146 million people was stolen. Even though these companies had invested in preventive security technologies, it did not stop cyber criminals from stealing sensitive information or bringing their businesses to a grinding halt.

    In this webinar, we will examine the top 3 cyber-attacks and data breaches of 2017, and discuss the following:

    - How were these cyber-attacks carried out?
    - Why preventive technologies were not enough to stop these attacks?
    - What type of detection and response capabilities and security expertise could have made a big difference?

    About our speakers:

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with in-depthexpertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Recorded: Nov 14 2017 35 mins
    Anybody can deliver technology, but these days Managed Service Providers (MSPs) also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.

    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
    - Current threats and how they are evolving
    - Comprehensive threat protection for the cloud
    - Unified security for detecting threats and responding to incidents
  • vSphere 6.5: Beyond Virtualization
    vSphere 6.5: Beyond Virtualization Julie Roman- Staff Technical Account Manager and Kimberly Jahnz - Principal Technical Account Manager Recorded: Nov 14 2017 62 mins
    VMware’s vSphere 6.5, the latest version of the industry leading virtualization platform, solves for the top challenges for digital transformation including: increasingly complex IT environments, new cybersecurity threats, the need to support both existing and new apps and services, and the need for continuous operations and responsiveness.

    In this webcast, VMware subject matter experts will explore the key components available in vSphere 6.5 including: simplified experience, comprehensive built-in security, universal app platform, and proactive data center management. Plus, get insight into how vSphere can continue to support your business needs into the future with the Update 1 release. We’ll discuss:

    -What’s new in vSphere 6.5 and Update 1
    -Foundational vSphere 6.5 Knowledge
    -Best practices for upgrading to vSphere 6.5
    -How upgrading is the gateway to modern infrastructure.
  • How a Military Concept can Help Build Your Incident Response Framework
    How a Military Concept can Help Build Your Incident Response Framework Nathaniel Ford, Moderator, (ISC)² EMEA, Craig Roberts, European Technical Engineer, IBM Resilient Recorded: Nov 14 2017 53 mins
    In the current cyber threat landscape, organisations are looking at ways to respond as effectively as possible. This session will look at the role that can be played by OODA loops, a military concept developed to improve fighter pilots' abilities to respond in combat, it stands for Observe, Orient, Decide & Act. Companies can build these concepts into their Incident Response (IR) process to aid clarity of thinking and improve their ability to respond quickly and effectively to cyber attacks.
  • How to Create A Two Tier Enterprise With All-Flash and Object Storage
    How to Create A Two Tier Enterprise With All-Flash and Object Storage Storage Switzerland, Tegile Systems Recorded: Nov 9 2017 54 mins
    The only problem with the all-flash data center is most of the data (as much as 85%) organizations store is not accessed in more than a year. Assuming there is a more cost effective way to store that data it should be stored on something else. Object storage seems like an obvious choice. Object storage is very cost effective and has features designed for long-term retention. Instead of a single-tier data center, organizations should look to create a two-tier enterprise, and in this webinar we will show you how.
  • 5 Steps to Hybrid Cloud Storage Success
    5 Steps to Hybrid Cloud Storage Success Ashrut Vora, Cloud customer engineer, Google Cloud + Marc Keating, Director technology & alliance strategy, ClearSky Recorded: Nov 9 2017 41 mins
    Join this webcast and hear from ClearSky Data and Google Cloud Platform experts for this one-hour session. They will explore the challenges with hybrid cloud storage today, the performance demands enterprises are facing and five ways you can realize the benefits of high performance storage with built in offsite backup and DR as a service.
  • High Performance Real Time Computing For Tactical Military Systems
    High Performance Real Time Computing For Tactical Military Systems Ken Jackson CEO at Concurrent Real-Time & Robert Persons Sr. Sales Architect Artesyn Embedded Computing Recorded: Nov 9 2017 45 mins
    Tactical military systems require a huge amount of computing capability to track and defeat a variety of threats which threaten forward deployed troops. Intel has been supplying high performance processing platforms like the Intel® Xeon® Scalable platform for many years. The Navy and other military branches have begun to standardize on systems based on the latest Intel Xeon processors designed into systems from Artesyn Embedded Technologies running Concurrent Real-Time’s Redhawk Real-Time Operating System for a number of major tactical systems. This presentation will show how Intel, Artesyn and Concurrent have worked together to create very dense, high performance, real-time systems used in the most demanding tactical systems.

    Webinar attendees with learn why the military has been adopting systems created by Artesyn Embedded Computing based on an open system architecture known as Advanced Telecom Computing Architecture using Intel Xeon processors and running Concurrent Real-Time’s RedHawk Real-Time Linux. This system design fulfills the desire of the military to have a rugged, high performance computing architecture for those tactical applications which require a great deal of processing but is modular, open and flexible.