With Kong 1.0, we confirm that Kong is a proven, robust, stable, and production-ready API management platform. Kong stands poised as an API gateway, service mesh, and the basis for a control platform that will serve users faithfully as their information exchange needs, and those of the industry, change.
As the amount of data and services explodes, enterprises must prepare for a cloud-native world that enables them to free and scale their architectures.
In this presentation, Kong CTO & Co-Founder, Marco Palladino, and Director of Ecosystem, Cooper Marcus, walk us through the journey towards Kong 1.0 and share the vision that positions Kong as a service control platform for all of your data flows, regardless of your chosen architecture or deployment patterns.
- Learn about the three forces leading us towards cloud-native first architectures
- Understand how we got here – the milestones marking the maturity of Kong
- Gain visibility into the future of APIs and the implications for your architecture – Cloud-Native First, but hybrid while you get there.
- Why you need a solution that can support all of your deployment patterns.
Discover what's trending in the Enterprise Architecture community on BrightTALK and how you can leverage these insights to drive growth for your company. Learn which topics and technologies are currently top of mind for Data Privacy and Information Management professionals and decision makers.
Tune in with Jill Reber, CEO of Primitive Logic and Kelly Harris, Senior Content Manager for EA at BrightTALK, to discover the latest trends in data privacy, the reasons behind them and what to look out for in Q1 2019 and beyond.
- Top trending topics in Q4 2018 and why, including new GDPR and data privacy regulations
- Key events in the community
- Content that data privacy and information management professionals care about
- What's coming up in Q1 2019
Audience members are encouraged to ask questions during the Live Q&A.
Students may be diligently working on their computers, but what are they actually doing? Our reports provide you a wealth of data about students' progress, and success within Rosetta Stone. Today learn about the different reports you can run, and what all that data means once you run the reports! We'll discuss red flags, positive trends, and what teachers should be looking for (and what you can ignore!)Read more >
This webinar is part of the 2019 Trends and Predictions series on BrightTALK.
Join top security leaders for an interactive discussion on how to better secure the enterprise in 2019:
- Top threats on the horizon and what's at risk
- Cyber defenses and your employees
- Basic cyber safety recommendations to protect against social engineering, phishing and email cyber attacks
- Use cases and examples
- Actions to take today to protect your employees and enterprise from cyber criminals
- What to expect in 2019
- John Bambenek, VP Security Research & Intelligence, ThreatSTOP
- JP Bourget, Founder & Chief Security Officer, Syncurity
- Jan Liband, CMO, SlashNext
There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.
Join us on December 18th to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.
During this session, you will learn:
-How DevOps and InfoSec teams can align to the new DevSecOps paradigm
-Why continuous compliance management is a new business imperative
-How to build security in to your Continuous Integration/Continuous Development pipeline
Free Giveaway: Register for this webinar and join the live session for your chance to win a $500 AWS promotional credit. You can use your AWS credit to offset your AWS infrastructure costs when getting started on the marketplace*. Five lucky live attendees will be the winners!
* subject to the applicable terms and conditions currently available at https://aws.amazon.com/awscredits/.
Adding a vendor to your staffing model can be a strategic move if you need to reduce budget, deliver new content types, scale fast, or co-locate writers in new geographies.
Join Scott Abel, The Content Wrangler, and his special guests, Jennifer Kaufman a Senior Content Services Manager at NetApp, and Debbie Roemer, a highly experienced content consultant, for this free, one-hour webinar. Jennifer and Debbie will talk about how to find the right vendor, plan for the engagement, and nurture the relationship. You'll learn how to plan for success when building a mixed team of vendor and staff content creators.
Technical communications has progressed from monolithic paper and digital manuals, to structured, topic-based authoring, and more recently down to 'microcontent' to improve quality, ease of access and consistency of message. 'Nano-content' is the next logical step in that progression and lives at the 'coalface' between content and data. It is the bridge between structured data and structured topics which, when properly managed, can add several new dimensions to technical publications work.
Universally faceted nano-content is a technique that takes a page from GPS applications that use triangulation (latitude, longitude, and elevation) to locate things in geographic space. Locating things in digital space should be just as intuitive and precise.
Join Scott Abel, The Content Wrangler, for this webinar with his special guest, John O’Gorman, Principal and Chief Disambiguation Officer at Quantum Semantics. John will walk through the process of identifying, classifying and using terminology to connect the language of a business or application to the content that supports its use. He will demonstrate how the same process can be extended to the content itself and how, in combination, faceted terminology takes findability to a whole new level.
ABOUT JOHN O'GORMAN
John O'Gorman is a 30-year veteran of the information management trenches. He is the inventor of a universal classification protocol called Q6, and co-founder of Q6FSA, an enterprise information management collaboration with Robert Vane in the UK. His experiences run the gamut from terminology stores and data catalogs, to executive information reporting, data warehousing, activity-based costing and technical communications, localization and internationalization. His big 'aha' moment came when he realized that all of them are made of the same stuff and follow the same rules.
Planning on doing business overseas? Establishing a new office in a foreign land, or selling online to consumers in a new country? When going over company requirements for working in your new neighbourhood, don’t forget to review corporate privacy practices.
When it comes to privacy, expectations, safeguard minimums and rights of the data subject can vary between jurisdictions. From Canada and the United States, the European Union with its new GDPR, Japan, Australia, even between China and Hong Kong, there’s no single set of global standards. Fortunately however, many privacy legislations do contain common ground. There are also ways to proactively account for the differences.
Information and Privacy Professional Victoria McIntosh presents a taste of privacy across the globe, with some of the ways businesses can prepare in dealing with data across borders.
This webinar will cover how public sector agencies are working with Red Hat and NuoDB to:
Seamlessly deploy and manage applications in a modern architecture.
Maintain the benefits of SQL and gain on-demand, horizontal scalability.
Deploy a technology stack that facilitates efficiency and a DevOps structure.
Today every industry is feeling the effects of the Digital Transformation brought about by disruptive technologies like the AI, Cloud, Internet of Things, Blockchain, and Microservices. While some enterprises are already benefiting from these new technologies, many are overwhelmed and struggle to transform all of these new digital signals into business value.
Join us to learn how to:
* Embrace digital transformation while defending against digital native competition
* Monetize your data and enhance the customer experience with Search & AI
* Increase data access and data fluency across your organization
* Reduce decision latency and accelerate response times
We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?
NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
Advancement, Student Success, Marketing, Recruitment and Admissions--You need a 360-degree view of your students and alumni. We’ve all heard about becoming a connected institution before, but what does that really mean? Learn how to overcome the challenges of multiple systems and student databases with a powerful connected campus solution.
Join Cloud for Good and Jitterbit to learn about what it really takes to become a connected institution. Get details from experts in integration and implementation for institutions including:
- How the Salesforce platform is built to eliminate both data silos and departmental process silos.
- How do you know if your systems can integrate with Salesforce?
- How to overcomes challenges like connecting to a Student Information System (SIS) where Salesforce will not be the system of record.
- Ideas for enabling your school to better serve the needs of your students, staff, alumni and donors.
- Andrew Leigh, VP of Alliances
- Eric McCune, Account Executive and Kristin Kiester, Alliances Manager, CloudForGood
- Ali Ganjalizadeh, Product Manager, Salesforce.org
You don't have to look far to find a current news story about ransomware taking down networks in record time, or a data breach involving millions of customer records by a malicious actor who has hid in an environment for months.
In an "Assumption of Breach" world, we accept that it's statistically impossible to keep all the bad guys out. That inevitably at some point, we will receive that phone call or email that says it's happened to our organization. But that doesn’t mean we are powerless against it either. We have the tools and practices to help limit the impact that such an incident can have on our business, we just have to exercise them.
Segmentation is one of those practices that has the ability to significantly impact your overall security posture, but it's impact depends on how well it's implemented. The industry has been using VLANs for segmentation for decades, but they are combat ineffective when it comes to stopping the spread of ransomware and other malicious threats.
We need to look at more advanced capabilities like Data Center Next Generation Firewalls, Micro-Segmentation practices, Behavior Analytics, and even Network Access Control (NAC) among others to help us contain, mitigate, and eventually remediate the threats that face us.
Join Josh King, Carousel's Director of Security Solutions to discuss what an assembly of the right mix of people, process, and technologies might look like to combat this evolving threat landscape.
This webinar, presented by Jim Davis of Fluke Networks, will start with a basic review of the need for cleaning fiber and the differences between singlemode and multimode fibers. It will then cover the inspection and cleaning of fibers, the loss length and reflectance requirements, measuring loss, Tier 1 testing of MPO/MPT Connectors, Tier 2 testing for troubleshooting, and reading a test report.Read more >
Employees are increasingly remote and mobile, and they need access to cloud applications. Traditional concepts of network security are fading away. Organizations are turning to cloud-delivered security services that offer complete, "Direct-to-Net" protection. But not all service providers are the same - and the stakes are high. If you are looking at cloud service solutions to simplify your network security infrastructure while improving performance, be sure you make the right choice.
Are you Responsible for:
- Setting security objectives and strategies for your IT department
- Identifying, controlling and reporting security incidents
- Developing enterprise wide security programs
- Driving security or compliance or regulatory initiates
Then this webinar is for you!
What will the webinar address?
- How to plan for security in the move to the cloud?
- How to protect your users from an evolving threat landscape?
- How to make sure your data is secured and maintains compliance with legal regulations?
- How to effectively manage new types of devices and your mobile/remote users?
In today’s competitive content services space (including music, OTT, eBooks and other licensed content), traditional telcos, content owners and content distributors must compete with the likes of Netflix, Amazon, Facebook and other new economy companies to attract and retain customers. Join our latest Data Disruptors webcast to hear how Catch Media is helping traditional players drive revenue and gain deep customer insights so they can compete in the new world of cord-cutting and over the top and digital content technologies.
Yaacov Ben-Yaacov, CEO of Catch Media, will show how his company enables content owners and distributors to achieve 50%+ increase in engagement through the segmentation of end consumers into distinct audiences that can be targeted in near real-time with messaging and recommendations personalized to their content consumption behavior.
On this webcast you’ll learn:
• Key market trends and challenges facing traditional telcos, pay TV operators, digital content service providers and content owners
• 4 steps needed to engage consumers, drive lifetime value and increase revenue
• Why Catch Media chose Vertica for scale, performance, and flexibility
• How businesses that embed Vertica can deliver higher value to customers
24/7 connectivity is fast becoming an integral part of everyday life. Most of us now routinely bank, shop and socialise online, and the Internet is the life-blood of business.
Yet too many of us fail to secure our online identities adequately. This presentation will examine why this is important, what we should do to secure our online accounts and how criminals exploit our lack of security.
Steven Furnell is a the Associate Dean and IT Security Professor at the University of Plymouth. His research interests spans multiple areas including: Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security; Internet Technologies and Applications; Mobility.
A published author, Steven will share his insights we can all individually make it harder for Cyber Criminals to access your passwords.
David Emm is a Principle Research Analyst at Kaspersky Lab and regularly delivers presentations on malware and other IT security threats at industry events, highlighting what organisations and consumers can do to stay safe online. He also provides comment to broadcast and print media on the ever-changing cyber-security and threat landscape. David has a strong interest in malware, ID theft and the human aspects of security, and is a knowledgeable adviser on all aspects of online security.
The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.
With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?
Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:
•The current threat landscape and unique security challenges healthcare organizations face
•Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
•How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
This webinar is part of BrightTALK's Ask the Expert Series.
Service monetization is sometimes a competitive differentiator or an answer to disruptive competitors. Irrespective of the reason for transformation, service monetization provides a great platform to model business models to improve customer retention and increase revenue in the longer term.
This session will provide participants with an understanding of service monetization challenges and how companies can transform their overall business process and quote to revenue in particular.
Join Arun Trivedi, Partner, Wipro Technologies and Kelly Harris, Senior Content Manager, BrightTALK for a live discussion on service monetization and revenue streams from XaaS.
While companies have been ditching traditional marketing methods in their race to capture the online-savvy millennials, no one is on their phone 24/7, and delivering brand messages out in the world is still vital to capturing mindshare.
Those first-gen marketing methods, including outdoor, tv, direct mail, and more, are still valuable and essential to building a stronger bottom line, especially when integrated as a vital part of an overarching marketing campaign, firing on all cylinders. That’s easier than ever, because traditional doesn’t mean old-school and analog anymore, and innovations in marketing technology don’t only apply to your online channels. You can apply your martech capabilities not just for tracking, measurement, and attribution, but to keep tabs on omnichannel competitor strategies, design the most effective campaign copy in every arena, create the most impactful rollouts between all your channels and more.
To find out how to integrate offline marketing channels with your online efforts, how marketing technology can bring those traditional methods into the twenty-first century, and more, don’t miss this VB Live event!
Registration is free.
Attend this webinar and learn:
* How to use martech to digitize offline channels
* How to integrate traditional marketing efforts into their newer tech-driven marketing stack
* The importance of combining online and offline marketing
* How to track offline conversions
* Evan Jones, CMO, Fender
* Mark Coffey, SVP of Strategic Partnerships, GasBuddy
* Myllisa Patterson, Senior Director, Event Cloud Marketing, Cvent
* Shannon Ryan, Head of Marketing, CI&T
* Dilan Yuksel, VentureBeat
Sponsored by Cvent
This webinar introduces MEGWARE’s certified Intel® Select Solution for Simulation and Modeling, an optimized platform specifically tailored to deliver stellar performance in all kinds of HPC applications. Backed by the power of cutting-edge Intel® Xeon® Scalable processors and supplemental Intel® technologies, MEGWARE offers a carefully pre-configured solution for those workloads including computational fluid dynamics (CFD) and computer-aided engineering (CAE). With more than 28 years of experience in building High-Performance Computing Clusters, MEGWARE has proven to be one of the leading vendors in Europe. Also, MEGWARE puts a strong focus on R&D with various software and hardware products developed in-house. One prominent example is the hot-water direct liquid cooling solution ColdCon® supporting high coolant inlet temperatures of up to 55°C. Hence, the Intel Select Solution for Simulation and Modeling is not only available with standard air-cooling but alternatively TCO-optimized with MEGWARE's extremely efficient ColdCon® technology.Read more >
Coaching is now a key component of many development packages, but do we really understand what it is and how to use it to our advantage?
In this practical session we’ll explore the following questions:
- What is coaching and what isn’t coaching?
- What type of challenges and goals can coaching help with?
- What happens in the coaching process?
- Are you ‘coachable’?
- How do you find a coach and assess whether they are the right fit for you?
Julie Smith is diirector and coach at Pressurevalve Ltd. As well as being a qualified executive coach, she’s also an experienced leader with 15+ years in management positions, 10 of which were in senior posts, including heading national operations and an interim CEO post. This means she understands the complexities, challenges and rewards of leadership. Key success factors in her coaching include helping people develop: skills in viewing situations from different perspectives, self-awareness, decision-making, confidence, self-belief, self-coaching and resilience. As well as coaching, Julie designs and facilitates sessions for leadership programmes in London and New York, runs network groups for leaders and is chair of the Global Taskforce of the American Express Leadership Academy, Alumni Network. If you’d like more information on Julie’s coaching services, plus self-coaching resources, visit: https://www.pressurevalvecoaching.com/free-stuff
What pieces of your personal information are most valuable in the underground and how is the data leveraged for financial gain? What can you do to protect yourself? The answers to these questions may surprise youRead more >
Over 15.000 server clusters run Storage Spaces Direct (S2D) to implement hyper-converged infrastructure (HCI) powered by Windows Server 2016/2019 and based on validated hardware. Join this live webinar to understand why organizations around the world are adopting Storage Spaces Direct, the best-kept secret in HCI, and to learn how Dell EMC together with Microsoft can help you accelerate IT transformation with Dell EMC S2D Ready Nodes. This webinar will also cover the latest news about Windows Admin Center and new storage features in Windows Server 2019.Read more >
IT and technical support would love for end users and customers to take advantage of self-service resources. End users and customers would love for self-service to be easier. Finding articles, videos, documents and other resources intended to make life easier for users—and for the analysts and technicians who support them—can be difficult and confusing.
Next-generation tools are here, set to enable users and customers to get accurate answers quickly and easily and solve many common issues for themselves, allowing analysts to concentrate on more complex problem-solving and other tasks. Analysts can benefit as well, having powerful assistance at their command to find knowledge and implement solutions without making users and customer wait.
What You Will Learn:
- What “assisted self-service” means
- Why self-service adoption can be a struggle
- How next-generation tools can help both end users and support analysts
Who Should Attend:
- Knowledge Management professionals seeking ways to improve
- ITSM professionals tasked with building self-service portals
- Support organization leaders who wish free analysts up from repetitive tasks