Hi [[ session.user.profile.firstName ]]
Sort by:
    • Case Example – Agile Delivery Leading to Successful OSS Transformation
      Case Example – Agile Delivery Leading to Successful OSS Transformation Ulla Huopaniemi, Comptel Recorded: Jun 9 2016 12:45 pm UTC 31 mins
    • In this third webinar part of a series of ‘Winning with Fibre’, we will focus on the OSS/BSS transformation - especially on the delivery phase of it. While agile methods have been widely used in software development, it is still relatively new way of doing large telco transformation projects. POST Luxembourg, an innovative CSP from Europe, is in the middle of their transformation covering a vast amount of BSS and OSS systems. POST Luxembourg case provides is a great example of a transformation project which has successfully adopted agile ways of carrying out
      the project in manageable increments.

      Sign up now and get insights into the POST case!

      Read more >
    • Guest Webcast | OSS Security Maturity: Time to Put On Your Big Boy Pants!
      Guest Webcast | OSS Security Maturity: Time to Put On Your Big Boy Pants! Jake Kouns of Risk Based Security and Christine Gadsby of Blackberry Recorded: Aug 30 2016 5:00 pm UTC 60 mins
    • This guest webcast features Jake Kouns of Risk Based Security and Christine Gadsby of Blackberry who will be giving their Black Hat 2016 talk, analyzing the real risk of using OSS and the best way to manage its use within your organization.

      Through real world examples and personal experience, the speakers will...
      - Examine the current hype around OSS, highlighting what organizations should be the most concerned about, and how to evaluate the true cost of using OSS
      - Explore how to utilize learnings from your incident response function to create smarter products and avoid maintenance costs of OSS
      - Introduce a customized OSS Maturity Model and walk through the stages of organizational maturity with regards to how they prioritize and internalize the risk presented by OSS

      Learn more about Jake Kouns:
      https://www.blackhat.com/us-16/speakers/Jake-Kouns.html

      Learn more about Christine Gadsby:
      https://www.blackhat.com/us-16/speakers/Christine-Gadsby.html

      Read more >
    • OSS has taken over the enterprise: The top five OSS trends of 2015
      OSS has taken over the enterprise: The top five OSS trends of 2015 Richard Sherrard, director of product management, Rogue Wave Software Recorded: Nov 19 2015 6:00 pm UTC 54 mins
    • It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s free, easy to find, and pushes software to the market faster, it’s vital to understand how to use OSS safely.

      Join Richard Sherrard, director of product management at Rogue Wave, for a live webinar reviewing the top five OSS trends of 2015. From OSS discovery, to risk, and governance, we’ll take a deep dive into the trends we’ve noticed this year while providing you with some predictions for 2016.

      In this webinar you’ll learn how to:

      -Discover the OSS in your codebase to ensure that code is free of bugs, security vulnerabilities, and license conflicts

      -Implement controls on OSS usage at your organization

      -Create a multitier approach to OSS risk reduction with open source tools, static code analysis and dynamic analysis

      Read more >
    • Konvergenz in Telekommunikationsnetzen – übergreifendes Datenmodell für OSS & IT
      Konvergenz in Telekommunikationsnetzen – übergreifendes Datenmodell für OSS & IT Ulrich Schälling Recorded: Jul 3 2014 8:00 am UTC 47 mins
    • Konvergenz in Telekommunikationsnetzen – ein übergreifendes Datenmodell für OSS und IT Automatisierung

      Die integrierte Verwaltung aller Netz- und Serviceressourcen in Telekommunikationsnetzen bildet die Basis einer modernen OSS/BSS Architektur. Die Konvergenz der Technologien führt aber gleichzeitig zu einem Verschmelzen von OSS und IT Themen. Weiterhin werden im Rahmen von Virtualisierungen in naher Zukunft verstärkt auch Aufgabenstellungen aus dem Netz in das Data Center verlagert. Die Herausforderung für die Netzbetreiber ist somit, Transparenz über alle Ressourcen der gesamten Service-Kette zu erhalten, d.h. von der physikalischen, über die logische bis zur Service Ebene und von Telekommunikation über IT bis Data Center. Diese Transparenz ist die Grundlage für alle Planungs- und Engineering, Service Fulfillment und Service Assurance Prozesse und bildet somit die Basis für jegliche Art der OSS und IT Automatisierung. Neben funktionaler Themen in den unterschiedlichen Bereichen steht also insbesondere die für einen effizienten Netzbetrieb zwingend erforderliche Durchgängigkeit im Vordergrund. Das übergreifende Datenmodell bildet die Basis für die „out of the box“ integrierten Lösungen von FNT Command, wodurch diese nahtlose Navigation zwischen den unterschiedlichen Layern und Bereichen ermöglicht wird.

      Read more >
    • Open Source Adoption in Enterprises - The Risks, and How to Mitigate
      Open Source Adoption in Enterprises - The Risks, and How to Mitigate Jeff Luszcz, Founder & CTO of Palamida, and Anupam Bonanthaya, CMO of Aujas. Recorded: Jan 1 2017 6:00 pm UTC 69 mins
    • The popularity of Open Source Software (OSS) Technologies in the recent years has greatly impacted the development and innovation of software.

      The typical enterprise and application stack is made up of over 50% open source technologies. This mass adoption has helped every organization increase developer productivity and software production, as well as speed up the adoption of new technologies.

      While many companies take advantage of OSS to improve their products and infrastructure, they often lag behind in the management and support of the OSS technologies they use. However, due to the fact that an organization's process involves hundreds to thousands of OSS components, errors and vulnerabilities are likely to arise and affect the enterprise's process, risk profile and DevOps productivity.

      In order to mitigate the possible risks posed by these vulnerabilities, organizations, software executives and risk analysts need to understand the underpinnings of their infrastructure in order to be ready to repel attacks and threats.

      Most organizations are only aware of 2% of their OSS usage. Organizations and enterprises must establish an efficient and effective process for choosing, managing and remediating the OSS they base their company's success on.

      In this webinar, We will provide guidance for understanding the fundamental framework, important issues and concerns in Open Source adoption within the Enterprise, and share expert thoughts and practical tips in maximizing the benefits of using open source technologies and the best practices in managing security and legal risks.

      Key Takeaways
      1. Open Source basics
      2. Choosing commercial and Open Source (OSS) Technologies
      3. Security Risks and Challenges
      4. Opportunities and Threats
      5. OSS Tools and Work Process
      6. Recent Trends and Developments

      A must-attend webinar for senior leadership in IT and technology.

      Read more >
    • Data Warehouse Augmentation: Cut Costs, Increase Power
      Data Warehouse Augmentation: Cut Costs, Increase Power Pradeep Varadan and Scott Gidley Recorded: Jan 26 2017 9:00 pm UTC 46 mins
    • The data warehouse (DW) is one of the most effective tools for complex data analytics. But the downside is… it can drain your budget. How do you maximize the value of your DW and save on storage costs?

      Don't clog your DW's analytics bandwidth with less valuable storage and ETL processing. Those in the know are migrating storage and large-scale or batch processing to data lakes built on scale-out architectures such as Hadoop and the Cloud to save on costs and get increased processing power for the DW.

      Pradeep Varadan, Verizon's Wireline OSS Data Science Lead and Scott Gidley, Zaloni's VP, Product Management, discuss the benefits of augmenting your DW with a data lake. They also address how migrating to a data lake allows you to efficiently exploit original raw data of all types for data exploration and new use cases.

      Topics covered include:

      - Reducing storage costs
      - Increasing process speeds
      - Maximizing EDW for business intelligence
      - Extending data retention and extracting more value from all data

      About the Speaker:

      Pradeep Varadan is a data scientist and enterprise architect who specializes in data challenges within telecommunications. As the Wireline OSS Data Science Lead at Verizon Data Services, Pradeep is tasked with providing a competitive edge focused on utilizing data analytics to drive effective decision-making. He is skilled in creating systems that can be used to understand and make better decisions involving rapid technology shifts, customer lifestyle and behavior trends and relevant changes that impact the Verizon Network.

      Read more >
    • Reduce Risks and Secure Your Mobile Endpoints
      Reduce Risks and Secure Your Mobile Endpoints Phil Hochmuth, Program Director, IDC’s Enterprise Mobility; John Michelsen, Chief Product Officer, Zimperium Recorded: Oct 27 2016 4:00 pm UTC 57 mins
    • A long-held assumption about mobile technology in general is that endpoint security technologies are unnecessary since mobile operating systems (OSs) are inherently more secure than PC OSs. For policy enforcement and security on mobile devices, IT organizations have looked to enterprise mobility management (EMM) platforms for additional security and device control. However, there is a detection and enforcement gap between devices and back-end EMM, which does not provide real-time monitoring of app activity, network traffic, and overall endpoint health.

      Mobile endpoint protection is critical and BYO complicates the issue since enterprises may or may not own the mobile endpoint. Employee owned devices introduce many more risks and variables than enterprises account for and we wish to inform you on this webinar. Join Phil and John to learn how to privately secure your BYO devices and measure the risks these devices bring into your network.

      Agenda

      - How to privately secure BYOD mobile endpoints
      - How to classify risky devices by examining installed applications
      - How to create a plan to reduce risks introduced by mobile devices

      Read more >
    • Best Practices for Combining DevOps, Cloud and IaaS on Azure
      Best Practices for Combining DevOps, Cloud and IaaS on Azure David Hansford, Technical Solutions Professional, Microsoft Upcoming: Feb 22 2017 9:00 pm UTC 60 mins
    • In today's day and age, it's more important than ever to work at the forefront of cutting edge cloud technologies and continue to inspire and empower your IT organizations.

      Microsoft Azure IaaS (Infrastructure-as-a-Service) empowers IT Implementers to reduce project backlog faster than ever before with flexible cloud solutions to develop, test, and run applications. Your team can practice agile development without having to wait for new hardware, or availability of existing dev/test boxes, and secure virtual machines (VMs) in a matter of minutes, not weeks.

      Join this webcast to learn how to:
      - Build bigger test environments to simulate real customer load, including spikes, without resource constraints on the cloud’s “infinite” resources
      - Develop cutting edge “born in the cloud” applications
      - Bring open source applications to the cloud and easily manage a hybrid OSS and Windows environment

      Read more >
    • Get started with Azure Infrastructure-as-a-Service
      Get started with Azure Infrastructure-as-a-Service David Hansford, Technical Solutions Professional, Microsoft Recorded: Nov 30 2016 7:00 pm UTC 37 mins
    • Work on the cutting edge in the cloud and empower your IT.

      Microsoft Azure empowers IT Implementers to reduce project backlog faster than ever before with flexible cloud solutions to develop, test, and run applications. Your team can practice agile development without having to wait for new hardware, or availability of existing dev/test boxes, and secure virtual machines (VMs) in a matter of minutes, not weeks.

      Join this webcast to learn how to:
      - Build bigger test environments to simulate real customer load, including spikes, without resource constraints on the cloud’s “infinite” resources
      - Develop cutting edge “born in the cloud” applications
      - Bring open source applications to the cloud and easily manage a hybrid OSS and Windows environment

      Read more >