Alex Rodriguez, VP - Systems Engineering and Product Development, Expedient
Alex Rodriguez, Vice President of Systems Engineering and Product Development at Expedient, addresses security concerns about entering the cloud, and how Expedient and Intel are facing the challenges and opportunities in cloud security at VMWorld 2012.
Oracle Open World is the usually the last big "big data" conference of the year; everyone who is anyone is there. Intel was there and we captured our customers and partners talking about the Intel Xeon Processor E7 family in the mission critical computing segment.
IDF attendees from Oracle, Intel, Cisco, NEC, Rackspace, TIBCO and more
Learn more about Intel's Mission Critical products and technologies and the innovations they have fueled in the marketplace. Hear from Customers Intel engineers, Software and Hardware partners on Intel's Xeon Processor family, and in particular the Xeon E7. You'll see that Xeon E7 based platforms offer breakthrough performance, reliability and availability features to ensure business continuity of mission critical systems running applications and workloads such as Enterprise Resource Planning, Big Data and Database applications.
Missed VMworld? Here you will be able to absorb some key highlights from the 3 day show in 3minutes. Intel and VMworld have a close partnership that extends to bring business value to customers and partners alike. Find out what customers, partners, Intel and VMware are doing together on the journey to the Cloud.
Find Out How Intel is Powering The Most Intense Workloads
Intel’s Data Center group will be sharing information you can use for planning your server and data center needs. Areas of focus will be Virtualization, Business Continuity, Cloud Computing, Next Generation Server Planning, positioning of Intel Xeon and Itanium servers, Multi Core evolution and more.
Ransomware and destructive attacks have changed the cybersecurity landscape. Modern business requires enhanced access to data to improve productivity, attract and retain customers, and run efficient supply chains – making the network perimeter more difficult to defend. At the same time, criminals are no longer content to just steal information, instead extorting ransoms after encrypting data or sometimes seeking to cripple organizations by destroying their data.
In this webcast you will learn about:
-Dangerous new threats such as ransomware and hacktivism, and how they differ from traditional threats
-Why new threats require a new focus
-Cybersecurity frameworks and best practices
-Enhancing your data protection and recovery capabilities to improve your cybersecurity defenses
-Why some data protection approaches may not be sufficient for advanced threats and how an Isolated Recovery approach provides a best layer of defense
The competitive landscape of cloud computing in China and India looks very different today than it did a few years ago. Aside from gaining wholehearted support from local governments, positive investment climate has a role to play to ignite market interest and vendor support. While early cloud leaders like Amazon and Salesforce have helped define the evolving marketplace and invited further competition, local players, which used to be hampered by process oversights, are now turning to cloud-based business models and service delivery to reinvent themselves and stay agile as technology innovation collides with reality. How does the cloud market shape up in China and India so far? What types of cloud services will be important in near future? What does it mean for you going forward?
Today, Communications service providers face real challenges in terms of their ability to innovate and deliver new services with greater speed and agility and at lower costs. Software-Defined WAN (SD-WAN) is fast becoming a disruptive intersection of cloud, telco and enterprise. SD-WAN offers an alternative to delivering managed services with centralized configuration, management, and optimization of Enterprise applications across the WAN. According to IDC, SD-WAN is projected to be a $6B market by 2020, with an estimated compound annual growth rate of 100 percent.
In this webinar, viewers will learn about the technologies that enable SD-WAN and the value proposition for enterprises and communications service providers. They’ll also hear about specific deployment options where SD-WAN delivers benefits over traditional methods.
This webinar is being delivered in conjunction with the UKDCIG, PTS Consulting and Square Mile Systems.
Migrating data centres or moving to co-location is complex and subject to cost overruns, especially where existing infrastructure documentation is of questionable quality. We'll show how the use of database driven toolsets can help automate the project processes and avoid many of the typical problems that organisations with overstretched teams encounter.
VCE VxRail Appliance with EMC data protection provides simple, fast and efficient protection of data and applications regardless of where they live, against whatever might happen, and at the right service level based on business value.
Learn how all employees can work and collaborate securely! The new world of work demands that people collaborate faster and more seamlessly than ever before.
Your employees have access to cloud-based apps, personal devices, and pervasive internet connectivity. All these things are great for getting work done, but your company is still held to high standards around security, and auditing, and you can't afford to make a wrong move.
Join this webcast to explore some common security scenarios such as:
•How do you provide access when you can't always control the endpoint?
•How do you know where all your company's files are right now?
•If you terminate an employee, how would you know what files they had in their possession.?
•Could you wipe a terminated employee's corporate data while leaving their personal content alone?
This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
If you’re a typical Chef user, you learned cookbook design by writing recipes and then tuning functionality with node attributes—and you probably didn’t focus too much on the underlying Ruby concepts. This approach can lead to messy designs that are more difficult to verify and maintain.
Chef’s fundamental building blocks are resources, not recipes. In this webinar, Kevin Dickerson of Loom (a Chef Certified Partner), will demonstrate a resource-centric approach to designing and verifying cookbooks that can reduce defects, increase clarity, and provide greater isolation of logic and various configuration concerns.
Kevin will show you how to create and use resources and resource properties instead of emulating resources with recipes. He’ll also teach you how to verify cookbooks, and how verification is simplified when a resource is only concerned with the conditions that affect its behavior.
You’ll also be introduced to some Ruby concepts that don’t seem to get a lot of attention—after all, Chef cookbooks are written in Ruby.
On September 27th, Datera invites you to join an exclusive event where you will hear from leading industry visionaries and experts who will offer executive-level insights into cloud technologies, processes, and solutions needed to keep pace with the speed of business.
Key experts from Comcast, Google and Mesosphere will be discussing the storage for clouds landscape and how it is changing fast and open source solutions, like Ceph, are just not delivering on the promise.
This is the storage breakthrough EMC, NetApp and HP don’t want you to know about. Don't make your next storage infrastructure investment on a legacy solution. Find out how an intent defined, infrastructure aware, API-first Dev/Ops, cloudy approach to storage streamlines application infrastructure operations and dramatically improves storage economics for private cloud operators.
Join this webcast to learn how to seamlessly deploy and orchestrate virtual network functions and services for the branch as both cloud-based and on-premises solutions. You’ll discover how easy it is to operationalize new service offerings and create a path to cost savings, rapid service monetization, and competitive differentiation.
RIFT.io and Brocade have collaborated to integrate the Brocade Vyatta Network Operating System, deployed as a Virtual Network Function (VNF) Platform, with RIFT.ware’s network service orchestration capabilities (NFV-O). This combination creates an on-premises branch services solution (vCPE) and cloud-based service.
The webcast will discuss best practices and feature a demo that will show:
• How Brocade and RIFT.ware jointly deliver a robust and scalable solution for operators to deploy virtualized network services for vCPE in the cloud and customer premises.
• How RIFT.ware and Brocade work together to deploy Vyatta Network OS as a VNF and VNF platform.
• Details on why an open architecture approach to interfaces is critical to ensure interoperability and rapid operationalization of services.
Success in the idea economy requires technological agility. You have to act quickly to seize opportunity, respond to threats, turn great ideas into reality and stay ahead of the competition – and these capabilities rely on having an amazing IT organization.
Amazing IT teams are competent, aligned to the business, highly collaborative and constantly adapting to change. These attributes just don’t happen. You need talent, you need a continuous education strategy and you need the tools to make it happen. Join this webinar to learn how implementing a continuous education strategy using the new HPE ART Enterprise Learning Edition (ELE) will help your journey to amazing.