Hi [[ session.user.profile.firstName ]]
Sort by:
    • Case Example – Agile Delivery Leading to Successful OSS Transformation
      Case Example – Agile Delivery Leading to Successful OSS Transformation Ulla Huopaniemi, Comptel Recorded: Jun 9 2016 12:45 pm UTC 31 mins
    • In this third webinar part of a series of ‘Winning with Fibre’, we will focus on the OSS/BSS transformation - especially on the delivery phase of it. While agile methods have been widely used in software development, it is still relatively new way of doing large telco transformation projects. POST Luxembourg, an innovative CSP from Europe, is in the middle of their transformation covering a vast amount of BSS and OSS systems. POST Luxembourg case provides is a great example of a transformation project which has successfully adopted agile ways of carrying out
      the project in manageable increments.

      Sign up now and get insights into the POST case!

      Read more >
    • Guest Webcast | OSS Security Maturity: Time to Put On Your Big Boy Pants!
      Guest Webcast | OSS Security Maturity: Time to Put On Your Big Boy Pants! Jake Kouns of Risk Based Security and Christine Gadsby of Blackberry Recorded: Aug 30 2016 5:00 pm UTC 60 mins
    • This guest webcast features Jake Kouns of Risk Based Security and Christine Gadsby of Blackberry who will be giving their Black Hat 2016 talk, analyzing the real risk of using OSS and the best way to manage its use within your organization.

      Through real world examples and personal experience, the speakers will...
      - Examine the current hype around OSS, highlighting what organizations should be the most concerned about, and how to evaluate the true cost of using OSS
      - Explore how to utilize learnings from your incident response function to create smarter products and avoid maintenance costs of OSS
      - Introduce a customized OSS Maturity Model and walk through the stages of organizational maturity with regards to how they prioritize and internalize the risk presented by OSS

      Learn more about Jake Kouns:

      Learn more about Christine Gadsby:

      Read more >
    • OSS has taken over the enterprise: The top five OSS trends of 2015
      OSS has taken over the enterprise: The top five OSS trends of 2015 Richard Sherrard, director of product management, Rogue Wave Software Recorded: Nov 19 2015 6:00 pm UTC 54 mins
    • It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s free, easy to find, and pushes software to the market faster, it’s vital to understand how to use OSS safely.

      Join Richard Sherrard, director of product management at Rogue Wave, for a live webinar reviewing the top five OSS trends of 2015. From OSS discovery, to risk, and governance, we’ll take a deep dive into the trends we’ve noticed this year while providing you with some predictions for 2016.

      In this webinar you’ll learn how to:

      -Discover the OSS in your codebase to ensure that code is free of bugs, security vulnerabilities, and license conflicts

      -Implement controls on OSS usage at your organization

      -Create a multitier approach to OSS risk reduction with open source tools, static code analysis and dynamic analysis

      Read more >
    • Konvergenz in Telekommunikationsnetzen – übergreifendes Datenmodell für OSS & IT
      Konvergenz in Telekommunikationsnetzen – übergreifendes Datenmodell für OSS & IT Ulrich Schälling Recorded: Jul 3 2014 8:00 am UTC 47 mins
    • Konvergenz in Telekommunikationsnetzen – ein übergreifendes Datenmodell für OSS und IT Automatisierung

      Die integrierte Verwaltung aller Netz- und Serviceressourcen in Telekommunikationsnetzen bildet die Basis einer modernen OSS/BSS Architektur. Die Konvergenz der Technologien führt aber gleichzeitig zu einem Verschmelzen von OSS und IT Themen. Weiterhin werden im Rahmen von Virtualisierungen in naher Zukunft verstärkt auch Aufgabenstellungen aus dem Netz in das Data Center verlagert. Die Herausforderung für die Netzbetreiber ist somit, Transparenz über alle Ressourcen der gesamten Service-Kette zu erhalten, d.h. von der physikalischen, über die logische bis zur Service Ebene und von Telekommunikation über IT bis Data Center. Diese Transparenz ist die Grundlage für alle Planungs- und Engineering, Service Fulfillment und Service Assurance Prozesse und bildet somit die Basis für jegliche Art der OSS und IT Automatisierung. Neben funktionaler Themen in den unterschiedlichen Bereichen steht also insbesondere die für einen effizienten Netzbetrieb zwingend erforderliche Durchgängigkeit im Vordergrund. Das übergreifende Datenmodell bildet die Basis für die „out of the box“ integrierten Lösungen von FNT Command, wodurch diese nahtlose Navigation zwischen den unterschiedlichen Layern und Bereichen ermöglicht wird.

      Read more >
    • Building and managing websites with open source software through AWS Marketplace
      Building and managing websites with open source software through AWS Marketplace Brad Bock, Bitnami | Guy Kfir, AWS Marketplace | Matthew Freeman, AWS Marketplace Upcoming: Oct 10 2017 1:00 pm UTC 60 mins
    • Join Bitnami and AWS Marketplace for best practices in building and managing websites with open source software, and a look into the accelerating growth of the open source community.

      At the conclusion of the webinar, attendees will be given the chance to launch OSS through AWS Marketplace and receive $25USD in AWS credits.


      According to industry research, enterprise use of open source software (OSS) is on the rise. Development organizations in Enterprise and all sectors are examining the case for using open source software for applications within their own IT infrastructures as well as in the software they sell.

      Bitnami-packaged applications have been downloaded over 2 million times and deployed by users around the world, ranging from consulting companies to governments, universities to non-profits, and Fortune 500 companies.

      Open Source Software (OSS) on AWS can present the opportunity for efficiency and savings in developing applications. AWS Marketplace makes it easy to locate, procure, and include OSS in your development and testing organizations, making it easier to run your overall business.

      Read more >
    • Open Source Adoption in Enterprises - The Risks, and How to Mitigate
      Open Source Adoption in Enterprises - The Risks, and How to Mitigate Jeff Luszcz, Founder & CTO of Palamida, and Anupam Bonanthaya, CMO of Aujas. Recorded: Jan 1 2017 6:00 pm UTC 69 mins
    • The popularity of Open Source Software (OSS) Technologies in the recent years has greatly impacted the development and innovation of software.

      The typical enterprise and application stack is made up of over 50% open source technologies. This mass adoption has helped every organization increase developer productivity and software production, as well as speed up the adoption of new technologies.

      While many companies take advantage of OSS to improve their products and infrastructure, they often lag behind in the management and support of the OSS technologies they use. However, due to the fact that an organization's process involves hundreds to thousands of OSS components, errors and vulnerabilities are likely to arise and affect the enterprise's process, risk profile and DevOps productivity.

      In order to mitigate the possible risks posed by these vulnerabilities, organizations, software executives and risk analysts need to understand the underpinnings of their infrastructure in order to be ready to repel attacks and threats.

      Most organizations are only aware of 2% of their OSS usage. Organizations and enterprises must establish an efficient and effective process for choosing, managing and remediating the OSS they base their company's success on.

      In this webinar, We will provide guidance for understanding the fundamental framework, important issues and concerns in Open Source adoption within the Enterprise, and share expert thoughts and practical tips in maximizing the benefits of using open source technologies and the best practices in managing security and legal risks.

      Key Takeaways
      1. Open Source basics
      2. Choosing commercial and Open Source (OSS) Technologies
      3. Security Risks and Challenges
      4. Opportunities and Threats
      5. OSS Tools and Work Process
      6. Recent Trends and Developments

      A must-attend webinar for senior leadership in IT and technology.

      Read more >
    • Data Warehouse Augmentation: Cut Costs, Increase Power
      Data Warehouse Augmentation: Cut Costs, Increase Power Pradeep Varadan and Scott Gidley Recorded: Jan 26 2017 9:00 pm UTC 46 mins
    • The data warehouse (DW) is one of the most effective tools for complex data analytics. But the downside is… it can drain your budget. How do you maximize the value of your DW and save on storage costs?

      Don't clog your DW's analytics bandwidth with less valuable storage and ETL processing. Those in the know are migrating storage and large-scale or batch processing to data lakes built on scale-out architectures such as Hadoop and the Cloud to save on costs and get increased processing power for the DW.

      Pradeep Varadan, Verizon's Wireline OSS Data Science Lead and Scott Gidley, Zaloni's VP, Product Management, discuss the benefits of augmenting your DW with a data lake. They also address how migrating to a data lake allows you to efficiently exploit original raw data of all types for data exploration and new use cases.

      Topics covered include:

      - Reducing storage costs
      - Increasing process speeds
      - Maximizing EDW for business intelligence
      - Extending data retention and extracting more value from all data

      About the Speaker:

      Pradeep Varadan is a data scientist and enterprise architect who specializes in data challenges within telecommunications. As the Wireline OSS Data Science Lead at Verizon Data Services, Pradeep is tasked with providing a competitive edge focused on utilizing data analytics to drive effective decision-making. He is skilled in creating systems that can be used to understand and make better decisions involving rapid technology shifts, customer lifestyle and behavior trends and relevant changes that impact the Verizon Network.

      Read more >
    • Reduce Risks and Secure Your Mobile Endpoints
      Reduce Risks and Secure Your Mobile Endpoints Phil Hochmuth, Program Director, IDC’s Enterprise Mobility; John Michelsen, Chief Product Officer, Zimperium Recorded: Oct 27 2016 4:00 pm UTC 57 mins
    • A long-held assumption about mobile technology in general is that endpoint security technologies are unnecessary since mobile operating systems (OSs) are inherently more secure than PC OSs. For policy enforcement and security on mobile devices, IT organizations have looked to enterprise mobility management (EMM) platforms for additional security and device control. However, there is a detection and enforcement gap between devices and back-end EMM, which does not provide real-time monitoring of app activity, network traffic, and overall endpoint health.

      Mobile endpoint protection is critical and BYO complicates the issue since enterprises may or may not own the mobile endpoint. Employee owned devices introduce many more risks and variables than enterprises account for and we wish to inform you on this webinar. Join Phil and John to learn how to privately secure your BYO devices and measure the risks these devices bring into your network.


      - How to privately secure BYOD mobile endpoints
      - How to classify risky devices by examining installed applications
      - How to create a plan to reduce risks introduced by mobile devices

      Read more >