Hi [[ session.user.profile.firstName ]]
Sort by:
    • MEF CE 2.0: Foundation to Agile, Assure & Orchestrated Third Network Services MEF CE 2.0: Foundation to Agile, Assure & Orchestrated Third Network Services Emerson Moura, Sys. Engr., Cisco; Andres Ramos Acosta, Prod. Mgr., Internexa; Andres Madero, Director SP Arch., Infinera Recorded: Jun 9 2016 3:00 pm UTC 78 mins
    • This webinar for the CALA region will be held in Spanish with supporting slides in English.

      A significant transformation is taking place in data communications networks that is accelerating the ability to deliver on-demand services with unprecedented user control over interconnected networks. MEF refers to this transformation and the underlying network that deliver these services as the “Third Network.” The Third Network combines the on-demand agility and ubiquity of the Internet with the performance and security assurances of Carrier Ethernet (CE) 2.0.

      As the global defining standards development body for Carrier Ethernet for the past 15 years, MEF has accelerated the growth and adoption of CE services through its specifications, service definitions and information models that are agnostic to the underlying transport technology used to deliver them. MEF offers certification programs for CE services, network equipment and individuals.

      Lifecycle service orchestration (LSO) is a key enabler to deliver Network as a Service as defined in MEF’s Third Network vision. The objective of the Third Network is to provide an on-demand cloud-centric experience with unprecedented levels of user control over the network’s capabilities. Such capabilities are orchestrated between physical and virtual service endpoints across multiple networks and technology domains.

      This webinar will present MEF CE 2.0 as the foundation upon which to build Third Network services. This webinar will provide a description of retail and wholesale services and also cover the MEF certification programs (professionals, services and equipment). Finally, a brief overview of agile, assured and orchestrated Third Network services powered by CE 2.0, LSO, SDN and NFV will be presented.

      Read more >
    • Movie Sentiment Rating App Powered by Text Analysis on HANA One Movie Sentiment Rating App Powered by Text Analysis on HANA One Nicole O'Malley, Senior Product Marketing Manager, SAP HANA, Wenjun Zhou, SAP TIP CE&SP China Recorded: Sep 25 2013 9:00 pm UTC 60 mins
    • Have you ever wanted to see a movie but you don't know what to see? Sentiment analysis of movies is a smart application built on SAP HANA One. It can predict ratings on new released movies based on social sentiment and recommend movies to users.

      HANA One analyzes social media data from tweets after a film is watched, like “The Wolverine is amazing!” or “The Wolverine is not worth watching…”

      Learn how this application gathers real-time sentiment rating based on real-time tweets, e.g., for The Wolverine, 78% positive, 20% neutral and 2% negative. Through a live demo, see how it provides potential watchers with quantifiable data on whether the movie is good or not. In addition, the application can recommend movies based on user’s Twitter data. It semantically detects user’s movie taste from Twitter and matches it with other users preferences. The smart app uses social profiling to accurately recommend movies.

      Read more >
    • The next step for a better customized defense The next step for a better customized defense Paulo Villegas & Renan Salunga, Technical Product Expert, Trend Micro Recorded: Aug 27 2015 12:00 pm UTC 40 mins
    • As the threat landscape continues to evolve and expand, how best can your security solution adapt to the changes? To keep up with the pace, IT security needs quick and accurate information in order to identify and remediate these incidents. The new updates for Trend Micro OfficeScan and Trend Micro Control Manager offers you just that. A better security with products working together to provide customized defense to help you rapidly adapt and respond to this ever evolving threats.
      Join this webinar to learn:
      1.Trend Micro’s new technology to protect against Ransomware
      2.What’s new with the release of OfficeScan 11 SP1 and Control Manager 6.0 SP3
      3.How does our “Connected Threat Defense” fits in your company security

      Read more >
    • The next step for a better customized defense The next step for a better customized defense Paulo Villegas & Renan Salunga, Technical Product Expert, Trend Micro Recorded: Aug 19 2015 3:00 am UTC 40 mins
    • As the threat landscape continues to evolve and expand, how best can your security solution adapt to the changes? To keep up with the pace, IT security needs quick and accurate information in order to identify and remediate these incidents. The new updates for Trend Micro OfficeScan and Trend Micro Control Manager offers you just that. A better security with products working together to provide customized defense to help you rapidly adapt and respond to this ever evolving threats.
      Join this webinar to learn:
      1.Trend Micro’s new technology to protect against Ransomware
      2.What’s new with the release of OfficeScan 11 SP1 and Control Manager 6.0 SP3
      3.How does our “Connected Threat Defense” fits in your company security

      Read more >
    • What you need to know about SUSE Linux Enterprise Server for SAP Applications What you need to know about SUSE Linux Enterprise Server for SAP Applications Michael Tabron and Hannes Kuehnemund Recorded: Jun 29 2016 2:00 pm UTC 51 mins
    • SUSE Linux Enterprise Server for SAP Applications 12 SP1 delivers one Linux solution for optimized performance, high availability and faster deployment with superior service supporting your SAP application landscapes.

      You probably already know that it’s the leading platform for SAP solutions on Linux and the recommended and supported OS of choice for SAP HANA. What you may not know is that since the latest release in February, we’ve provided even more flexibility for deploying SAP applications on x86-64 and IBM Power Systems servers.

      In this webinar, learn what’s new with SUSE Linux Enterprise Server for SAP Applications including the exciting new SUSE Connect Program, and hear a preview of plans for the upcoming Service Pack 2.

      Read more >
    • PowerShell Audit Logging:    Catch Intruders Living off the Land PowerShell Audit Logging: Catch Intruders Living off the Land Randy Franklin Smith: Windows Security Subject Matter Expert. Greg Foss: Sr. Security Research Engineer, LogRhythm, Inc. Recorded: Feb 23 2016 4:00 pm UTC 81 mins
    • PowerShell is like nuclear fission—it’s powerful, and it can be used for good and evil. The bad guys love to exploit PowerShell for at least three reasons:

      1. It’s already installed on most versions of Windows.

      2. It’s powerful. You really can do just about anything in PowerShell—even call into the Win32 API if enabled.

      3.There are no EXEs or DLLs to upload.

      Lee Holmes (Microsoft’s PowerShell extraordinaire) will be joining me to show you how to catch intruders exploiting PowerShell to their own ends.

      First, we will provide a brief overview of PowerShell security capabilities especially enhancements in PowerShell 5.0t. There are some really good preventive steps you can take to limit your exposure to PowerShell-related risks. And PowerShell 5.0 is available on Windows 2008 R2 SP1 and Windows 7 SP1 and up, so this isn’t vaporware.

      Then we will zero in on the auditing capabilities in PowerShell. We’ll show you how to enable PowerShell logging so that you get events for every script block executed. We’ll show you sample events and discuss how to interpret them, how to filter the noise and more.

      I’ll also briefly point out some less powerful, but easy-to-implement techniques for just detecting the use of PowerShell itself using Process Tracking events. This can be useful for highly controlled endpoints where use of PowerShell at all is very limited and easy to recognize if PowerShell is being used in an unusual way.

      Of course producing valuable audit data is one thing. Collecting, analyzing and alerting on it is another. And that’s where our sponsor, LogRhythm, comes in. The security experts at LogRhythm have been following the increased exploitation of PowerShell by the bad guys and been publishing their own tips on how to combat. Greg Foss will briefly demonstrate LogRhythm’s built-in knowledge of PowerShell and its ability to correlate PowerShell events with all the other security intelligence LogRhythm collects from your enterprise.

      Read more >
    • What is WBA Next Generation Hotspot Anyway? What is WBA Next Generation Hotspot Anyway? Bob Friday, CTO WNBU; Lisa Garza, Mobility Marketing Manager Recorded: Jul 21 2011 5:00 pm UTC 59 mins
    • Tune in to learn more about:
      * The future of Service Provider Wi-Fi networks
      * WFA Hotspot 2.0 Specification
      * WBA Next Generation Roaming Trials
      * How Hotspot 2.0 will open up new revenue opportunities for service providers

      Have you looked at Wi-Fi lately? It has reached a whole new level of scale, security, and sophistication – what the market is calling carrier-grade Wi-Fi. And an industry initiative is underway to make Wi-Fi roaming on par with cellular roaming.

      This webcast will provide an overview of the Wi-Fi Alliance Hotspot 2.0 specification and provide some insight into the upcoming Wireless Broadband Alliance Next Generation Hotspot trials. These trials will set the stage for the future of Wi-Fi, establishing it as a robust, secure technology that will augment and complement 3G and 4G networks for years to come.

      Read more >
    • Brocade Advances Cloud Service Delivery Brocade Advances Cloud Service Delivery Pam Dodge, Sr. Product Marketing Manager and Michael Schiff, Product Marketing for Brocade Service Provider Recorded: Nov 17 2011 4:30 pm UTC 31 mins
    • Announcing the Brocade Multi-Service Ironware Release 5.3 for NetIron Family and the availablility of the Brocade 6910 to enable service providers to build resilient, cloud-optimized networks and transform their businesses to maximize profitability and infrastructure investment.

      This release provides enhanced MPLS, IPv6 and Ethernet capabilities that will be added to the Brocade MLX, XMR, CER, and CES platforms for Data Centers, Service Providers Core and Metro customers. The Brocade 6910 extends the reach of service provider networks to the customer premise and wireless cell sites, streamlining the economic delivery of advanced, differentiated business services via Carrier Ethernet.

      AGENDA:
      1) Service Provider Business Growth Drivers
      2) The new Brocade 5.3 release - MCT over VPLS, PBB, LLDP, Auto-bandwidth LSP
      3) The new Brocade 6910 Ethernet Access Switch

      Read more >