Hi [[ session.user.profile.firstName ]]

The End of Proprietary Software

Is it worth it for companies to spend millions of dollars a year on software that can't keep up with constantly evolving open source software? What are the advantages and disadvantages to keeping enterprise licenses and how secure is open source software really?

Join Data Society CEO, Merav Yuravlivker, as she goes over the software trends in the data science space and where big companies are headed in 2017 and beyond.

About the speaker: Merav Yuravlivker is the Co-founder and Chief Executive Officer of Data Society. She has over 10 years of experience in instructional design, training, and teaching. Merav has helped bring new insights to businesses and move their organizations forward through implementing data analytics strategies and training. Merav manages all product development and instructional design for Data Society and heads all consulting projects related to the education sector. She is passionate about increasing data science knowledge from the executive level to the analyst level.
Recorded Dec 8 2016 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Merav Yuravlivker, Co-founder and CEO, Data Society
Presentation preview: The End of Proprietary Software

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Exploring Kubernetes and Containers for Edge Computing Aug 12 2020 3:00 pm UTC 45 mins
    Panel of experts
    Kubernetes has emerged as a hugely important foundation for edge computing. But should you incorporate Kubernetes and Containers into your Edge computing strategy? And if so, how?

    Join this expert panel on BrightTALK, where we discuss why Kubernetes is ideal for running containers in edge computing environments. We’ll cover:

    - The impact of using containers and orchestration as tools for enterprises to create small server farms at the edge
    - How Kubernetes enables developers and DevOps engineers to deploy applications and services in a standard way at the edge
    - Which orchestration tools make it easy to install Kubernetes on the edge infrastructure
  • A Multi-tenant Multi-cluster Kubernetes Datapocalypse is Coming Jun 23 2020 5:00 pm UTC 75 mins
    Paul Burt, Technical Product Marketing Engineer, NetApp; Jim Fister, Principal, The Decision Place
    The need for rapid deployment of scalable clusters is creating an opportunity for container solutions such as Kubernetes. But what are the implications of multiple Kubernetes clusters in a broad deployment? What happens if a cluster goes down? What’s the impact on business resiliency? Managing and securing multiple clusters is becoming a key topic and area of debate. Multi-cluster Kubernetes that provides robustness & resilience is rapidly moving from “best practice” to a “must have”.

    In this webcast we’ll dive into:
    •The history of multi-cluster Kubernetes
    •How multi-cluster setups could affect data heavy workloads (such as multiple microservices backed by independent data stores)
    •Managing multiple clusters
    •Keeping the business functioning if a cluster goes down
    •How to prepare for the coming datapocalypse
  • CI/CD Pipelines for DevSecOps with Hybrid Cloud Jun 18 2020 5:00 pm UTC 45 mins
    Mike Fraser, CEO, Refactr
    The days of manually deploying infrastructure are over. IT teams need automation tools to modernize towards IT-as-Code. This is achieved through flexibility; IT teams must operate on a platform that accommodates CI/CD pipelines. The pipelines, in turn, must meld with DevOps tools to integrate with ticketing systems, run security remediation playbooks, deploy Kubernetes with a security benchmark, and even harden on-premise sensors.

    Takeaways:
    - What is DevSecOps and what are CI/CD pipelines
    - How CI/CD Pipelines work for DevSecOps
    - Why enterprises need hybrid CI/CD pipelines
    - Use cases
  • The Hybrid Cloud: Key Takeaways from the Pandemic Jun 17 2020 9:00 pm UTC 45 mins
    David Ginsburg, Aryaka VP of Product and Solutions Marketing
    COVID-19 was (and is) a wake-up call for CIOs and their teams as to the flexibility, resiliency, and scalability of their hybrid cloud and WAN infrastructures. We look at how enterprises prepared for this ‘black swan’ event, how they were able to quickly adapt in a ‘lights-out’ operation, and best practices for the future. I’ll cover architectures, support for remote workers and remote operations, and what we’ve learned for the future.
  • Out of Many, One: Tying Together Your Hybrid Multicloud Jun 17 2020 3:00 pm UTC 60 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Enterprises accumulate new cloud solutions rapidly, but still run 40% of their workloads in their own data centers. Without a plan, the result is an unsupportable mess. Join Nemertes Research as we discuss how to pull all the pieces together to make a coherent hybrid multicloud IT can manage, and use to deliver real business value.
  • Storage Scalability in Hybrid Cloud and Multicloud Environments Jun 11 2020 5:00 pm UTC 75 mins
    Robert Cone, Intel; Piyush Chaudhary, IBM; Pekon Gupta, SMART Modular
    As data growth in enterprises continues to skyrocket, datacenter cloud scalability, whether on premises, in hybrid cloud or in multicloud deployments, is key for businesses. So, what are enterprise IT organizations supposed to do, given that 'run anything anywhere' is becoming more important than ever? Customers are finding that hybrid cloud storage solutions better meet their IT and business growth needs, so they can rapidly scale their IT infrastructure and cover a wider array of services. This webcast will help architects and consumers of hybrid cloud storage solutions better understand:
    oTrends and benefits of hybrid cloud storage and multicloud deployments
    oThe range of technologies and capabilities under development to help enterprise hyperscalers and cloud service providers (CSPs) serve IT customers
    oHow scalability differs in block vs. file workloads
    oThe important requirements to keep in mind when considering a 'run anything anywhere' objective
  • Storage Networking Security Series – Key Management 101 Jun 10 2020 5:00 pm UTC 75 mins
    Judy Furlong, Dell Technologies; J Metz, Rockport Networks
    In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised.

    This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented.
  • Is FC-NVMe Ready for Prime Time? Jun 9 2020 5:00 pm UTC 75 mins
    Mark Jones, Broadcom; Nishant Lodha, Marvell; Marcus Thordal, Broadcom, Joe Kimpler, Independent Expert
    The T11 specification for NVMe over Fibre Channel (FC-NVMe) was completed in 2018, since that time, the FCIA has held numerous plugfest events and products have been shipping for a few years. So where are we today with NVMe over Fibre Channel solutions?

    This webcast will take an early 2020 point-in-time snapshot of where the industry is, discuss products available today, and address common questions around:

    •Which host environments can use FC-NVMe
    •What is required from the fabric
    •Breadth of supporting storage solutions
    •Application benefits we have seen so far
    •FC-NVMe strengths and differentiators

    And most importantly, is FC-NVMe ready for prime time?
  • Fast, Secure, Scalable: Why IoT Needs Automation to Succeed Jun 9 2020 5:00 pm UTC 60 mins
    Johna Till Johnson, CEO and Founder, Nemertes Research; Russell Rice, VP Product Strategy at Ordr
    IoT initiatives are exploding. Nemertes has found that companies with successful IoT initiatives are increasing both the number of projects and the device count, with growth that ranges up to 100%+ year over year.

    Scaling these initiatives requires scaling not only the IoT solutions, but also the infrastructure and cybersecurity environments in which they operate. As enterprise technologists begin to apply next-generation cybersecurity approaches like zero-trust, they need to think seriously about how to automate the control and management of their cybersecurity and infrastructure.

    The answer? Automation. Successful organizations are more likely to automate earlier, more aggressively, and more comprehensively—with dramatic improvements in performance, security, and reliability.

    Find out why automation is critical to securing, managing, and scaling IoT—and what best practices can help ensure success in implementing it.
  • IO-Link enables Industry 4.0 - Getting the most out of IO-Link Jun 3 2020 6:00 am UTC 60 mins
    Ethan Goh, Product Specialist, Industrial Integration & IIoT, SICK
    Get an overview of the possibilities and ways of Industry 4.0 – starting with how you can benefit from IO-Link.

    IO-Link is a key pillar in the path to Industry 4.0. What exactly is it? And are you already embracing IO-Link? Let us show you how to get the most out of your IO-Link investment and how you can use it to enable real Industry 4.0 use-cases. You will walk away with know-how on real industrial applications of IO-Link and get set on a sustainable path to Industry 4.0

    What you will learn:
    - The Basics of IO-Link
    - How to use IO-Link in Automation Systems
    - Visualization of sensor data for efficient troubleshooting and predictive maintenance
    - Read/write process and service data as basis for flexible production (keyword lot size 1)
    - Outlook REST API - the way to the cloud (ERP, MES)

    Live demonstrations of:
    - Sensor self-diagnosis in action with IO-Link
    - REST API in action with an IO-Link Master
    - Data visualization and recording for Cloud applications
  • Navigating Digital Transformation and the Legacy Challenge Jun 3 2020 5:00 am UTC 60 mins
    Ruchir Shastri (SoftSys Hosting), Philip Ng (BitCyber), Adnyesh Dalpati (4 Marketing Technology Venture) + Okta speaker
    The APAC region reportedly spent $375 billion on Digital Transformation projects in 2019. According to IDC, “The adoption of emerging technologies supporting digital transformation strategies in APAC is shaping up as it’s helping organizations reimagine their businesses, re-evaluate their value chain, reconnect with their customers, and rebuild their organization into a digital native enterprise”.

    But with reimagining and reevaluating comes the challenge of navigating what’s currently in place. Nowhere is this more apparent than with technology and legacy systems. For organisations that have been around since before the internet, Digital Transformation has a whole host of extra challenges.

    Join this expert panel as they address these challenges, including:

    - How the functionality of legacy systems can make it tricky to know when to stick or twist
    - How to ensure your Digital Transformation strategy is robust enough to avoid failures and gain competitive advantage
    - How to manage the impact of Millennials in the workplace - who expect continuous change and evolution

    Speakers:
    Ruchir Shastri, President & Founder, SoftSys Hosting (Moderator)
    Philip Ng, CEO, BitCyber
    Adnyesh Dalpati, Chief Technology Officer, 4 Marketing Technology Venture
    Okta, Speaker TBD
  • The Five Pitfalls of Digital Transformation Jun 3 2020 3:00 am UTC 60 mins
    Allan Waddell, co-CEO, Kablamo & Angus Dorney, co-CEO, Kablamo
    Allan Waddell and Angus Dorney, co-CEOs of Kablamo, will walk through lessons learned from taking Australia’s largest banks, media companies and fintechs on digital transformation journeys.

    They’ll share the common mistakes that these experiences revealed and the things that enterprises can do to avoid these pitfalls. Drawing on insider knowledge and analysing projects as pioneers in prop-tech and AI applications in media, Waddell and Dorney will deliver concrete and actionable information that will overturn assumptions, short-circuit institutional inertia and help organisations and individuals ignite effective innovation with a fresh set of transformation tools.
  • Digital Resilience: Reshaping DX Jun 3 2020 1:00 am UTC 60 mins
    Rod Crowder, Managing Director, OpsCentre & Chris Shannon, Manager Product Development, 5G Networks
    The current pandemic has forced all organisations to face into the new normal. The survivors are already restarting by adapting to new market opportunities, optimising change and preparing for uncertainty. This dramatic shift has also changed the face of digital transformation (DX).

    Learn from industry experts Rod Crowder and Chris Shannon as they guide us through the key learnings from previous events and apply these to reshaping the new face of DX. They will analyse key requirements every market is demanding right now in the search for control, agility and speed.

    The presentation will also explore the key success factors for organisations considering changes to their digital strategy and outline why Digital Resilience has become the new currency for strategic transformation.
  • Uniting Compute, Memory, and Storage Jun 2 2020 6:00 pm UTC 75 mins
    Alex McDonald, Jenni Dietz and SNIA CMSI volunteer leadership
    Discover how the themes of computational storage, persistent memory, and solid state come together in a webcast from the new SNIA Compute, Memory, and Storage Initiative. We’ll explore how expertise in these three areas can help understand storage architectures, common solution areas, and their impacts on storage devices, systems, and software.
  • Storage Networking Security Series: Protecting Data at Rest Recorded: May 27 2020 40 mins
    Pierre Mouallem, Lenovo; Ahmad Atamli, Mellanox; Steve Vanderlinden, Lenovo
    One of the most important aspects of security is how to protect the data that is just “sitting there.” How easy is it to get to? Who can get to it? If someone does get access to the data, can they read it? What are the potential risks of the wrong people reading the data? These are just a few of the questions that we try to answer when we go through the process of securing data.

    Contrary to popular belief, however, securing “data at rest” is not simply encrypting the data. While it is true that data encryption plays a major role in securing “data at rest,” there are several other factors that come into play and are equally as important – if not more so.

    For this webcast, we’re going to talk about those other factors (Encryption is deserving of its own, specific webcast). We will present the end-to-end process to securing “data at rest,” and discuss all the factors and trade-offs that must be considered, and some of the general risks that need to be mitigated, discussing:

    • How requirements for “data at rest” differ from “data in flight”
    • Legal and regulatory reasons to protect (or delete) data at rest
    • Where and how data could be attacked
    • Understanding the costs of ransomware
    • How to protect cryptographic keys from malicious actors
    • Using key managers to properly manage cryptographic keys
    • Strengths and weaknesses of relying on government security recommendations
    • The importance of validating data backups... how stable is your media?
  • Storage Networking Security Series – Encryption 101 Recorded: May 20 2020 60 mins
    Judy Furlong, Dell Technologies; Ed Pullin, Intel; Alex McDonald, NetApp
    Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots.

    But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”

    It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography.

    Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover:

    •A brief history of Encryption
    •Cryptography basics
    •Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
    •Introduction to Key Management

    After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl
  • NGN [Ep.5] The New WAN Economics Recorded: May 19 2020 56 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Next-Generation Networking [Ep.5]: The New WAN Economics

    Enterprise WAN traffic patterns are shifting. The application mix is changing. And the WAN is becoming core to digital transformation (and to resilience in the post-COVID-19 era).

    The two fundamental questions that network and telecom managers must answer right now are these: How much should I be spending on my WAN to achieve measurable success, and what services and solutions deliver the greatest bang for the buck (in terms of quantitative success per dollars invested)?

    This webinar shares the findings of the 2020-2021 Next Generation Networks research study and compares a cost analysis of solutions such as:
    *WAN Cloud Exchanges (WAN-CX)
    * Direct Cloud Connect (DCC)
    * MPLS
    * Carrier Ethernet
    * SD-WAN
    * Business and Broadband Internet
    * Fiber and wavelength services

    We compare the network spend by users of solutions and services from providers such as AT&T, Centurylink, Cisco, Citrix, Comcast, Juniper, Oracle/Talari, VMWare Velocloud, Verizon and others. And we correlate the spend and provider with success overall.
  • The Influence of IoT on Data Strategy Recorded: May 14 2020 61 mins
    Glyn Bowden, HPE, Eric Hibbard, Co-Chair, ABA, IoT Committee; Alex McDonald, NetApp
    More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices.

    This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:
    •New patterns generated by the explosion of the Internet of Things
    •How IoT is impacting storage and data strategies
    •Security and privacy issues and considerations
    •How to think about the lifecycle of our information in this new environment
  • CBA [Ep.3] Contact Center Costs & Provider Ratings Recorded: May 14 2020 54 mins
    Robin Gareiss, President and Founder, Nemertes Research
    Cost-Benefit Analysis - Workplace Collaboration Series [Ep.3] Contact Center Costs & Provider Ratings

    As companies increase their focus on the customer experience, contact centers are front-and-center to any technology decision. Nemertes conducted a study of 564 organizations to gather real-world operational costs and provider ratings. In this webinar, you'll learn:

    *How much do companies spend on contact center licensing and IT staff to support the technology?
    *Do cloud contact center services cost less to operate than on-premises platforms?
    *Which contact center providers deliver the highest-rated customer service, technology, analytics, and more?
    *What do companies spend on operational costs, by provider?

    You'll be armed with information to make provider and architecture decisions based on costs and ratings from actual customers of contact center providers.
  • NVMe and NVMe-oF Configuration and Manageability with Swordfish and Redfish Recorded: May 13 2020 53 mins
    Rajalaxmi Angadi, Intel; Phil Cayton, Intel; Richelle Ahlvers, Broadcom
    SNIA Swordfish is an extension of the DMTF Redfish specification to provide a unified approach for the management of storage and services in converged, hyperconverged, hyperscale, and cloud infrastructure environments. Swordfish uses a client-centric approach to develop the dynamic resource models as part of the specification, which describes client needs, management requirements, and use cases.

    NVMe-oF currently support fabric transports like RDMA (iWarp, RoCE, IB), TCP, and FC. NVMe / NVMe-oF currently lacks efficient remote configuration and provisioning management mechanisms to enable NVMe-oF scaling to large converged infrastructures – something Redfish and Swordfish can provide.

    The SNIA Swordfish specification is currently growing to include full NVMe and NVMe-oF enablement and alignment across DMTF, NVMe, and SNIA for NVMe and NVMe-oF use cases. SNIA members are contributing to specification development and helping to shape the ecosystem. This presentation will provide an overview of the work in progress to map these standards together to ensure NVMe and NVMe-oF environments can be represented entirely in Swordfish and Redfish environments.

    Join us! We welcome your feedback, and encourage participation.
Best practices for achieving Enterprise IT and operational efficiency.
The Enterprise Architecture channel presents the next generation of Enterprise IT: recognizing the strategic importance of digital transformation and the data center to make companies more nimble and competitive. These presentations will help demanding IT and BizOps professionals achieve flexibility, scalability and performance with reduced risk and complexity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The End of Proprietary Software
  • Live at: Dec 8 2016 7:00 pm
  • Presented by: Merav Yuravlivker, Co-founder and CEO, Data Society
  • From:
Your email has been sent.
or close