Watch this video to learn, how using REST APIs alongside of an SDK can multiply the power of both.
An API is to software code what a UI is to users. It helps different bits of software interact with each other. And can help you turn a data application into a data platform. If you have access to them, you can do a lot with REST APIs that weren’t built into a particular SDK. For example, you could accept user inputs and pass them to the platform to be stored. Or acquire data and metadata from the application or from users. This can be very powerful when building portals.
Want to take vRealize Operations to the next level by integrating with ServiceNow, PagerDuty, Slack and more? You can do that! Join us to learn how easy (and fun!) it can be to explore using vRealize Operations extensibility with two powerful features.
First, we will cover how you can use the REST Notification plugin in to send alert information to practically any system with a Web API including vRealize Automation and vRealize Orchestrator for ultimate automation power. All possible with Webhook Shims, an open source project available today.
Next, we will take a look at the vRealize Operations REST API to discover how you can perform many different tasks without even opening the UI. This includes using PowerCLI for tasks such as looking at stats, alerts, object properties and more.
If you want to know how vRealize Operations can feed and interact with other IT tools in your environment, this session is for you!
Business data exists in three different states: at rest, in use and in motion. This short video reviews best practices for protecting sensitive data in each of these different states.Read more >
In the final part of this Security Briefings series, we’ll examine why protecting data-at-rest is so important. We’ll discuss problems of the “perform storm”, what analysts have concluded, and discuss how Enterprise Secure Key Manager technology helps protect data, eliminate risk, and reduce your operational and capital costs.Read more >
Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern enterprises need flexibility in how they apply data security, yet also need ease of management. Vormetric is a leader in data security, with a large global footprint of securing data in cloud and on-prem environments.
In this webinar, you will learn critical aspects to securing data in a variety of ways:
1) Three approaches to securing data-at-rest
2) How software-defined policies can ease security management
3) The role that key management plays in securing data-at-rest
4) How real-time alerting can take your security posture to the next level
In this month's Master of Disaster Webinar we'll be looking at how you can make the most of software-defined replication and recovery by utilising ZVR Rest APIs with PowerShell to automate your virtual infrastructure and remove manual processes.
We'll look at some key use cases including; Automating VM Protection, Bulk VRA Deployment and Bulk VPG Configuration, as well as exploring how you can obtain reporting statistics from your protected infrastructure.
Ready-made scripts created by Zerto's Technology Evangelist, Joshua Stenhouse, will be available at the end of the session for registrants to leverage in their own ZVR environment.
Today’s applications are becoming more complex. From multi-layer applications, to micro-services to containers, QA & automation engineers are required to test more with less and without compromising the quality of the app.
In this session we’ll explain the pros & cons of testing at each of the different layers of the application and also share some best practices around Agile Testing. Everything will be demonstrated on a demo application built with the latest technology stack including NodeJS, REST APIs and MongoDB and tested using UFT 12.52.
Storage has become the Achilles’ heel for many datacenter applications. It’s become expensive, constantly requires capacity expansion, and requires staff to keep it operational. Many customers are also dealing with the perpetual cycle of costly support and maintenance.
Today, there are dozens of different storage options at your disposal. All of these solutions have a place in the market and each one carries its own set of benefits. Whether you’re looking for capacity, performance or TCO savings, an appropriate solution does exist for you.
This webinar is your opportunity to get a better understanding of Tegile and the unique differentiation it provides in the storage market.
Now is the time to assess how you're doing against your digital goals. As the summer holiday season draws to a close and everyone’s focus switches to the important end of the year, it’s critical you understand how you are delivering against your digital objectives.
In this free webinar, Marketing Week and Silverpop’s Michael Cottrell will help you assess where you are and share a framework for evaluating multiple aspects of your digital marketing.
You’ll take away from this webinar –
· How to assess your digital efforts in 2014 so far.
· A firm action plan to evaluate elements including content, list management, automation, mobile and more.
· A refreshed momentum on how to make the best of digital for the rest of the year.
It’s time to make the necessary adjustments to your plans, have focused conversations with your team and take on the rest of the year.
Register for this free webinar and make the best of your digital efforts for the rest of 2014.
With all the hype around social selling, it's easy to get pushed into a "me too" corner. This presentation will show you how to leverage your online presence to be seen as a resource and knowledge expert using LinkedIn Groups and connections. This presentation delves into social selling. What is it? How does it affect my sales? Is it worthwhile? How do I know I've succeeded? If you're using social media tools but unsure if you are making a difference, this course will show you how to make the right impression and leverage social selling to benefit your bottom-line.Read more >
In a recent EMA survey, it was found that many IT leaders know the cloud is more secure than their on-premise environment. More security technologies are deployed more consistently in the cloud. Are you throwing a ton of tooling at your cloud security problem?
If so, you may be surprised to learn that the gap has shifted – away from adequate tech and towards straightforward management and easy reporting. Join this webinar to learn:
- What technologies are typically deployed in the cloud
- How most IT leaders are validating cloud security
- Why your security team me be your ally in cloud compliance
- What IT leaders are now demanding from cloud providers – beyond just features
Join iland’s own Lilac Schoenbeck, VP Product Management & Marketing, and Enterprise Management Associates’ David Monahan, Research Director, Security and Management, for this engaging conversation – complete with lessons learned, recommendations, and a chance to get your own questions answered.
Microservices may be small in size, but they have huge potential, especially when you pair them with the idea of event-driven architecture (EDA). Today developers are using microservices as the building blocks behind all kinds of cloud and enterprise applications, but most still think microservices = REST, which limits you to polling/reactive interactions.
Join Jonathan Schabowsky of Solace’s Office of the CTO at Solace as he describes how combining EDA and microservices can help you improve all kinds of data flows. He’ll talk about query and command interactions, synchronous and asynchronous communications, and you’ll learn how to make microservices event-driven.
We will examine current conditions and discuss BlackRock’s views on market direction for the remainder of the year and beyond.Read more >
Okay, maybe not easy, but in comparison to the sales process, it feels like the easy part to sales reps. In some organizations, the process can be so complicated sales reps may be losing margin, or worse, losing deals altogether. Is this happening in your organization?
Do you have deals in limbo and don't really know where they stand?
Have you or your sales reps made a mistake on a proposal or bid that cost you?
Do you need help removing road blocks in the second half of the close or order process?
Do you need a way to simplify your complex selling environment?
If you answered yes to any of these questions, you need to join us for this webinar where you'll learn best practices for simplifying your sales process.
Judy Ruby-Brown gives a thorough overview of system level backup and using FlashCopy for disaster recovery as provided by various vendors. This presentation is quite thorough but yet very easy to understand, even for a beginner. Judy explains the types of services that need to be setup for disaster recovery as well as easy scenarios for the DBA in the implementation of disaster recovery. Just the summary at the end is enough to pass on to the system programmers in your shop as a checklist for implementation.Read more >
Réduction du Time to Market par 10 pour développer votre API REST, développements 40x plus courts : le 14 janvier, rejoignez Benjamin Potet, Principal Consultant chez CA Technologies, pour découvrir un moyen extrêmement rapide de générer des API à partir de vos données grâce à CA Live API Creator, l'édition d'API REST en mutation.Read more >
HTTP is being used to transport new request formats such as those from mobile apps, REST, JSON, AMF and GWTk, but few security teams have updated their testing procedures. All of these new formats are potential new playgrounds for attackers and pen testers. You just need to know how to play. In this talk, Dan Kuykendall will demonstrate the process of breaking down these new formats and where to attack them on various vulnerable applications. Most of the attacks are the familiar classics like SQL and Command injection applied in modern applications. Attendees will learn to leverage their existing pen testing skills and techniques and apply them to these new formats.Read more >
Running the data storage environment can be a costly proposition. In addition to escalating costs for storage resources, there are additional costs associated with managing, powering and cooling the systems.
In response to customers concerns about these storage-related costs, IBM Information Management has been delivering advanced capabilities within the DB2 for Linux, UNIX and Windows product family to reduce storage requirements and improve database performance by focusing on various forms of in-database and in-memory compression.
With an eye toward current industry capabilities, this Tech Talk delves into the benefits and advantages of the DB2 solution in the following areas:
• database compression
• backup and archival compression
• how and when to use file system and storage deduplication technology
Along with these features and capabilities native to DB2, we will also compare these to Oracle and the rest of the database industry to show you why DB2 has a clear advantage when it comes to storage optimization.