Hi [[ session.user.profile.firstName ]]
Sort by:
    • Managing Infrastructure as Code: DevOps Engineering with Cloud Automation
      Managing Infrastructure as Code: DevOps Engineering with Cloud Automation Tom O’Rurke, Senior Manager, Solutions Engineering, vRealize Code Stream Recorded: Aug 8 2017 5:00 pm UTC 62 mins
    • In this session our DevOps engineering expert will provide a demonstration of the vRealize Code Stream Management Pack for IT DevOps (vRCS MP), a.k.a. Houdini. This product allows the Cloud Admin to design, test, and execute DevOps processes for Software-Defined Infrastructure content through continuous integration/delivery (CI/CD) process.

      By adding Content Endpoints into the vRCS MP such as vSphere, vRealize Automation/Operations/Orchestrator content (metadata) can subsequently be captured and versioned in the Xenon Repository, tested in a staging environment and then released to the target (test, staging, or production) environments in a single request.

      Join this webcast to:
      -See a brief installation of vRCS MP
      -Capture content from vRA/vRO & show how artifacts (based on JSON) are saved to Xenon Repository
      -Test content to staging
      -CI/CD: Release content to production
      -Recapture & rollback

      Read more >
    • How Tableau pairs Jamf with Code42 to provide a better device choice experience
      How Tableau pairs Jamf with Code42 to provide a better device choice experience Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf Recorded: Mar 23 2017 6:00 pm UTC 37 mins
    • Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

      In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

      Watch this 30-minute webinar to learn:

      *The benefits and challenges associated with Tableau’s mixed device environment
      *How Tableau performs data migrations for users who are switching platforms
      *Recommendations and considerations for offering Macs to your users


      Matt Peterson,Technical Support Specialist,Tableau
      Aimee Simpson, Product Marketing Manager, Code42
      Tad Johnson, Solutions Architect, Jamf

      Read more >
    • Secure Coding Practices: Avoiding SQL Injection Attacks
      Secure Coding Practices: Avoiding SQL Injection Attacks Zach Jones, Sr. Manager - TRC Static Code Analysis, WhiteHat Security Recorded: Jul 25 2017 5:00 pm UTC 57 mins
    • SQL injection attacks enable attackers to tamper with, delete or steal sensitive data from corporate databases. In this webinar, Zach Jones, senior manager for static code analysis from WhiteHat Security’s Threat Research Center, will discuss SQL injection attacks and how to best defend against them.

      In this webinar, we will:
      - Provide examples of vulnerable code
      - Discuss data boundary concepts between input and target interpreters
      - Explain the differences and advantages of using parameterized queries versus custom stored procedures
      - Discuss the pitfalls of using selective parameterization or trying to sanitize inputs by escaping or encoding them manually

      WhiteHat Security has extensive experience working with customers to identify and fix the latest web application vulnerabilities. Join us to gain a deeper understanding of common web application vulnerabilities, get expert technical advice on defensive tactics, and learn best practices to safeguard your apps from being exploited.

      Read more >
    • Spark Summit 2017 - Connect Code to Resource Consumption to Scale Production
      Spark Summit 2017 - Connect Code to Resource Consumption to Scale Production Vinod Nair, Director of Product Management Recorded: Jun 6 2017 10:25 pm UTC 26 mins
    • Apache Spark is a dynamic execution engine that can take relatively simple Scala code and create complex and optimized execution plans. In this talk, we will describe how user code translates into Spark drivers, executors, stages, tasks, transformations, and shuffles. We will also discuss various sources of information on how Spark applications use hardware resources, and show how application developers can use this information to write more efficient code. We will show how Pepperdata’s products can clearly identify such usages and tie them to specific lines of code. We will show how Spark application owners can quickly identify the root causes of such common problems as job slowdowns, inadequate memory configuration, and Java garbage collection issues.

      Read more >
    • Top 6 Cases for Implementing a Low-Code Platform - and Two Real Examples
      Top 6 Cases for Implementing a Low-Code Platform - and Two Real Examples John Rymer of Forrester Research Recorded: Mar 1 2016 4:30 pm UTC 61 mins
    • Low-code platforms have become a critical factor in helping AD&D organizations rapidly deliver applications to win, serve and retain customers.

      With these platforms, enterprises are routinely delivering apps much faster than conventional methods. But can these platforms truly scale across the full modern app lifecycle? What are the top use cases for deploying a low-code platform?

      Join John Rymer of Forrester Research for an engaging discussion about the innovative ways organizations are utilizing low-code platforms across the app lifecycle. Hear from IT executives with Autoliv, Estafeta and NES Financial as they talk candidly about how low-code platforms have driven growth and competitive advantage in their organizations.

      Read more >
    • Unlocking Hard-to-Reach Data with No-Code Integration
      Unlocking Hard-to-Reach Data with No-Code Integration Michael Wacht, VP of Operations and Infrastructure & Scott Lasenby, Supervisor, Financial Planning & Analytics, Helm Recorded: Mar 17 2016 4:00 pm UTC 59 mins
    • Are you struggling to access vital business data locked in your company's on-premises systems like ERP?

      In this webinar, you'll discover how business professionals can easily and automatically connect to data stored in any system, on premises or in the cloud, via CSV files in the cloud to drive seamless processes and better decisions.

      Hear Michael Wacht and Scott Lasenby from Helm explain how a leading distribution company transformed a key business process, saving their accounting department 300 hours a year.

      Watch now to learn how you can:

      -Access critical data stored in hard-to-reach systems with no code
      -Leverage data to drive seamless processes and better decisions
      -Eliminate copy/paste and manual imports between systems
      -Use a top application development platform designed for business professionals and its built-in no-code integration feature to automatically pull critical business data and instantly put it to use

      Read more >
    • 3 Proven Workflows for A Successful Windows 10 Migration
      3 Proven Workflows for A Successful Windows 10 Migration Aimee Simpson, Product Marketing Manager, Code42 Recorded: Mar 22 2017 3:00 pm UTC 28 mins
    • Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

      *The facts on enterprise adoption of Windows 10
      *Planning considerations for your Windows 10 migration project
      *Three distinct approaches to performing device replacements—and the pros and cons associated with each

      About the speaker:

      Aimee Simpson, Product Marketing Manager – Code42
      Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.

      Read more >
    • Building a Blueprint for an Insider Threat Program
      Building a Blueprint for an Insider Threat Program Jadee Hanson, Dir of Security, Code 42; Joji Montelibano, Rockwell; Chris Walcutt, Black & Veatch; Brandon Dunlap (Moderator) Recorded: Mar 16 2017 5:00 pm UTC 58 mins
    • While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.

      Read more >
    • Neue Maßstäbe in der Versicherungswirtschaft mit dem Code of Conduct
      Neue Maßstäbe in der Versicherungswirtschaft mit dem Code of Conduct Wolfgang Epting, Data Security Group Subject Matter Expert / Product Specialist / EMEA Recorded: Jul 21 2015 8:00 am UTC 48 mins
    • Wie Sie sicher wissen, untersagt das deutsche Bundesdatenschutzgesetz in seiner Zweckbindungsklausel das Verwenden von sensitiven Echtdaten in Test-, Entwicklungs- und Schulungssystemen. Dennoch sehen wir, dass eine Vielzahl von Unternehmen dieses Risiko immer noch eingeht und sich davor scheut, die nötigen Anpassungen durchzuführen.

      Die deutsche Versicherungswirtschaft begegnet diesem Thema mit dem Code of Conduct über den GDV als Vorreiter nun offensiv.

      Der GDV (Gesamtverband der deutschen Versicherer) ist der erste Verband in Deutschland, der für eine freiwillige Selbstverpflichtung zum Schutz von personenbezogenen Versichertendaten die Zustimmung der Datenschutzbehörden erhalten hat.

      Sämtliche deutschen Versicherungsunternehmen die dem Code of Conduct (CoC) bis Ende 2014 beigetreten sind haben sich damit verpflichtet, dem Datenschutzkodex des GDV innerhalb von 3 Jahren gerecht zu werden.

      Mit den neuen Verhaltensregeln wird transparent, was von der Antragstellung bis zur Schadenregulierung mit personenbezogenen Daten geschieht.

      Lernen Sie wie Informatica die Anforderungen aus dem CoC (Anonymisierung für sensitive Daten in Produktion sowie Test & Entwicklung) umsetzt und gleichzeitig Ihr Testdatenmanagement modernisieren kann.

      Da gemäß BSDSG als auch neuester EU-Novelle Datenschutz ein branchenübergreifendes Thema ist, sind alle Interessenten herzlich zu diesem Webinar eingeladen, die direkt (z.B. Datenschützer) oder indirekt (z.B. Test-Manager, Enterprise Architekten) mit dem Thema konfrontiert werden.

      Unternehmensweiter Datenschutz vom Marktführer – seien sie dabei !

      Read more >
    • The Low Code Movement – Disruption with Power
      The Low Code Movement – Disruption with Power Jason Bloomberg, President of Intellyx and Renu Motwani, Sr. Director of Product Management at CA Technologies Recorded: Sep 21 2017 4:30 pm UTC 64 mins
    • The low code movement is erupting in the enterprise, creating some confusion but also providing opportunity. The boundaries between IT and Lines of Business are blurring as a need for agility and velocity drives adoption of less code-centric development tools. Low code approaches to building microservices and APIs offer a way to simplify complex application development and data integration into graphical, declarative configuration, thus accelerating the development lifecycle and making developers more efficient and productive. This provides an opportunity to accelerate delivery of key initiatives without sacrificing quality.

      Jason Bloomberg, president of Intellyx, will discuss the low code movement, its impact on the enterprise and developers, and its future. Renu Motwani, Product Manager for CA Live API Creator, will then discuss CA’s low code solution for creating and executing low code APIs and microservices, and provide a demonstration of its capabilities.

      Read more >
    • How to Ensure Your Code Meets Policy Compliance
      How to Ensure Your Code Meets Policy Compliance Jonathan Harper, Solutions Architect, Veracode Recorded: Jul 18 2017 4:00 pm UTC 28 mins
    • Enable your developers to quickly identify and remediate security-related code defects throughout your SDLC without having to manage a tool. Veracode’s patented static analysis technology analyzes major frameworks and languages without requiring source code, so you can assess the code you write, buy or download, and measure progress in a single platform. Sign up for this 20 minute Static Analysis webinar to learn best practices for:
      •Integrating static analysis into your development process
      •Complying with internal and external security policies
      •Creating policies for your application security program
      •Evaluating code against policy before check-in
      •Analyzing results and reporting capabilities (flaw viewer)
      •Defining user roles and team views within the platform

      Read more >
    • DBA Code Reviews Done Dirt Cheap
      DBA Code Reviews Done Dirt Cheap Robert Davis Recorded: Apr 30 2014 9:00 pm UTC 79 mins
    • Do you know what code is going into your production systems? How can you support something you haven't seen? Whether you currently do code reviews or think it might be a good practice to start doing, this session will help you make the most of the code review process. For DBAs, we'll cover key things to look for such as looking for potential problems. For developers, this will be insight for you into how DBAs think when reviewing your code so you have a better idea what to expect.
      •Learn what kind of things to look for when reviewing code
      •Gain insight into what to expect from a DBA when they review your code
      •Discover how to have an effective communication between DBA and developer

      Read more >