Business Continuity Talk Series – Part 1: Home Agents
Contact centers are more important today than ever before as agents become the first line of communication for many organizations that have temporarily shut down locations or offices. But agents, too, are being forced to work remotely. WWT’s Ed Villarreal discusses the challenges organizations face when enabling employees remotely and how companies can leverage what they already have to spin up a contact center in short order.
RecordedApr 17 202012 mins
Your place is confirmed, we'll send you email reminders
Robb Boyd, Tanner Bechtel, Arsalan Lari, Ben Haddox (AppDynamics)
In this TEC37, we are taking a technical dive into the AIOps & APM space, bringing in experts to discuss our partnerships and the technical complexities we deal with in today's world. In this episode, our technical experts will take a deep dive into your AIOps journey. You will walk away knowing that what WWT has developed in the AIOps space is real. You will gain understanding about the thought process and behind the scenes collaborations & integrations that only WWT can deliver.
Robb Boyd; Jennifer Huber; Steven Buhler; Keith Parsons (Wireless LAN Professionals, Inc.)
It’s not a question of if your organization will move to a Wi-Fi 6 infrastructure but rather when. While the market has touted the speeds and feeds of Wi-Fi 6, little has been said about how organizations should prepare for a successful Wi-Fi 6 deployment. Join host Robb Boyd as he speaks with WWT’s Jennifer Huber, Technical Solutions Architect; Steven Buhler, Business Development Manager; and special guest Keith Parsons, Managing Director of the Wireless LAN Professionals, Inc. They’ll discuss the foundational components that need to be in place before Wi-Fi 6 deployment, including common blind spots.
We’re at the dawn of a new breed of applications that will unlock the potential of Industry 4.0 —a fourth industrial revolution that will make the enterprise more agile, aware, efficient, intelligent, safe and sustainable. Industry 4.0 is enabled by critical technologies that are each reaching peak maturity at the same time. When these technologies work cohesively and are supported by modern connectivity like private LTE and 5G, massive companies can move at the speed of a startup while maintaining their brut market strength while meeting their internal needs. Host Robb Boyd talks to WWT’s Dan Graham, Don Rogers and Jason Craig to discuss Industry 4.0, how it works, who can piece it together and how it paves the way for a wave of new Fortune 500 companies.
Robb Boyd; Sean Hicks; Jason Lamb (Intel); Pat Dooley (Dell EMC); James Harless
In this TEC37 encore, we explore why many organizations hesitate to take a single-vendor approach when implementing a software-defined data center (SDDC) due to fear of vendor lock-in. Vendor lock-in can occur when an organization exclusively depends on one vendor for products or services, making them unable to use another vendor without significant switching costs. While the concern around vendor lock-in is valid and should generally be avoided, SDDC is an exception to this rule because of its focus on the software layer and the importance of choosing infrastructure components that best support the software platform. Join host Robb Boyd as he speaks with WWT’s Sean Hicks and James Harless — Technical Solutions Architects, Intel’s Jason Lamb — Cloud Solutions Strategist, and Dell’s Pat Dooley — HCI Specialist. They’ll discuss why a single-vendor approach might be your best move for an optimal SDDC environment.
In this TEC37 recast, we explore the relationship between cybersecurity and the business. For years, cybersecurity has been viewed by C-level leadership as cost center. But as cyber attacks grow in sophistication and scale, organizations need to start viewing security threats as business threats and security strategy an integral part of business success. Join host Robb Boyd as he speaks with WWT's Todd Neilson, Global Director of Security Services, and Gregory Schoeny, VP of Services and Strategic Solutions for Global Service Providers. They’ll discuss how cybersecurity can become a business enabler.
Robb Boyd; Chris Konrad; Stephen Gregory; Scott Webb
As threats to organizations’ data environments become more sophisticated and persistent, the need to prevent and rapidly recover from adverse cyber events has become critical. The right data protection and backup solution can help keep an organization’s data secure, and critical infrastructure up and running. In this episode, you’ll hear about how the right data protection and backup solution can help keep an organization’s data secure, and critical infrastructure up and running.
Robb Boyd; Tanner Bechtel; Chris Weis; Neil Anderson
In this TEC37 encore, join host Robb Boyd and WWT’s Tanner Bechtel, Chris Weis and Neil Anderson as they discuss how WWT has developed a true AIOps reference architecture, and a strategy that leverages a multi-product and product agnostic approach to an AIOps Ecosystem. You will walk away with a better understanding of how WWT has built a real architecture around AIOps and how to take the next step in your AIOps journey. This team will help answer the question, “How do we make these silos work better together?” and give insight into what has been built in WWT’s Advanced Technology center.
Businesses moving forward with an AI strategy need to ensure the security of those AI models is part of that strategy. In this TEC37 episode, we revisit issues in AI model security for the organization and suggest approaches for identifying and closing gaps in defending AI models. We will also touch on the importance of building a robust, mature, and repeatable program for assessing AI model vulnerabilities.
COVID took most organizations by surprise. Companies that had previously ignored cloud technology and strategy became increasingly disrupted. Even companies in the process of digital transformation — while better positioned than most — were unprepared for the magnitude of the challenge. As organizations increasingly accept that COVID is a longer-term challenge, they also have a chance to appreciate the pandemic’s silver lining: enabling “work from anywhere” and accelerating technology modernization across all parts of the business — even those areas previously not considered. In this TEC37 episode, we will discuss how many customers had to pause certain initiatives, reappropriate budgets to meet changing demands, and scramble to enable services to maintain even minimum levels of business operations.
Ansible and Terraform are some of the leading tools for automating infrastructure and driving infrastructure as code. In this episode our experts from each side will discuss the foundations for a successful automation strategy and where each tool fits in a larger automation strategy.
In this TEC37 encore, we explore how CISOs can scale cybersecurity across the enterprise as security becomes increasingly tied to business success. Too often, the expense and damage to reputation that occurs after a sophisticated cyber attack can cause businesses irreparable harm. CISOs find themselves stuck between trying to secure new technology that will give their organization a competitive edge and protecting their legacy IT infrastructure and systems. Success requires an approach to cybersecurity that considers the business, architecture and operations. Join host Robb Boyd as he speaks with WWT's Geoff Hancock – Global Director of Cybersecurity Engineering, Warren Perils — Security Practice Manager for Global Service Provider and Comcast’s Shena Tharnish — VP of Cybersecurity Products. They’ll discuss steps organizations can take to implement holistic cybersecurity.
The Biden Administration’s Cyber Executive Order (EO), officially released on May 12, lays out a multi-pronged approach on how to fortify federal agency cybersecurity efforts and mitigate the large-scale, damaging attacks felt across the country. The Cyber EO provides direction, now it’s up to each agency to develop a cohesive strategy.
Robb Boyd; James Harless; Sean Hicks; Shanon Berry (Dell Technologies); Robert Looney (Intel)
Software-Defined Data Centers (SDDC) are designed to overcome the drawbacks of traditional IT infrastructure to offer the accelerated delivery of consistent data center services. Despite the performance gains, some organizations have been hesitant to adopt a SDDC environment. Tune into this TEC37 episode to find out more!
Robb Boyd; Joe Berger; Kait Miller; Arnaud Caigniet (Cisco)
Many companies are actively evaluating and testing technologies that can help them keep employees and visitors safe in workplaces and public spaces when they reopen. There are a lot of possibilities, but what is truly viable and necessary? Join us for a discussion of what we see organizations planning for, and how to prioritize various technologies. We’ll take a look at IoT, office hoteling, shared space management, sensors and occupancy monitoring technologies that are being used to reopen offices and shared spaces.
CIOs and CISOs at state, local, and educational organizations have multiple competing priorities: secure remote access and distance learning programs; provide enhanced citizen and student services; modernize apps; and contain costs – all while protecting data, maintaining operations, and complying with regulatory mandates. Adding to that is the ever-increasing threat landscape, most notably the emergence of successful ransomware attacks on these organizations.
State, local, and educational organizations need to pivot to a strategy that leverages infrastructure and control points in new ways across any app, any cloud, and any device. Combining this capability with threat intelligence enables a shift from a reactive posture to a position of strength. This episode will provide details on how intrinsic security accelerates risk identification, while preventing, detecting, and responding to threats with the right context and insights.
Two major concerns of today’s data center customers: analyzing greater volumes of data more quickly while protecting privacy by keeping it safe at rest and in motion. Join WWT's Vimesh Patel as he hosts a conversation with server infrastructure experts Zach Splaingard - WWT Technical Solutions Architect and Jason Lamb - Intel Cloud & SDI Technology Strategist. The group will explore the pressing challenges our public sector agencies are facing when balancing performance and security requirements of their data centers and how Intel’s latest 3rd Generation Xeon Scalable Processor can address these.
More than ever, government agencies need to be able to deploy data wherever it needs to be whether that’s on-prem, in a private cloud or in the public cloud. Providing the flexibility to adapt to changing work conditions while containing costs and keeping data available, secure, and accessible is critical. But how?
NetApp and WWT help the public sector build and fully realize a data fabric by providing a cloud lead, data centered approach to digital modernization. NetApp enables organizations to confidently manage and maintain control of their data across any cloud, accelerating innovation and IT responsiveness. By providing a data fabric that spans private cloud, service providers and hyperscale cloud providers, NetApp allows organizations to embrace the cloud on their own terms by integrating enterprise-class data management and control with the flexibility, speed and economics of the public cloud.
The Public Sector Tech Talk series provides an opportunity for industry executives and subject matter experts to discuss a thought leadership-related topic with the goal of educating the audience on a specific technology area. Join us for the launch and kick-off event of the series! WWT's Bryan Thomas - Senior Vice President and Rick Pina - Chief Technology Advisor will offer insights into how WWT’s partners, customers and employees are helping to make a new world happen in the public sector.
Robb Boyd; Ricky Boyd; Steve Brodson; Kenneth Dunham
Zero Trust is a framework that combines Identity and Access Management (IAM), Enterprise Segmentation and other security components to provide “least access” protection to corporate networks and resources. WWT Cybersecurity architects Steve Brodson, Ricky Boyd and Ken Dunham join host Robb Boyd to discuss the key ways in which a Zero Trust Architecture could have protected against the Solar Winds-based attacks that made the news in December.
In this TEC37 encore, we pose the question, "In today's ever-changing world, do you ever think about how your organization’s network must evolve with it?" We will also cover the macro factors to consider when looking at the future of networking and what happens if we think differently about the problem.
Webcast topics on the latest in technology solutions.
WWT brings hundreds of technology companies into a physical yet virtualized environment via our Advanced Technology Center (ATC). These companies include Silicon Valley heavyweights and emerging tech players alike. Individually these companies are impressive, but collectively, when integrated by WWT, we produce game-changing solutions.
There are multiple dimensions to the ATC ecosystem, but for many who have experienced it, they simply view it as “Silicon Valley in St. Louis.”