Browse communities
Browse communities
Presenting a webinar?

BrightTALK webinars and videos

  • The road to data center efficiency is paved with good intentions…but littered with unintended consequences. In this presentation, Chris Crosby will discuss how the industry-wide drive to increase data center efficiency by data center operators, end users, IT equipment manufacturers and others can ironically lead to major inefficiencies and dysfunction that go directly against the objects of these efforts. Crosby will discuss how high-density server architecture, government regulations, virtualization and other efficiency-minded initiatives are resulting in unexpected challenges and negative results. Crosby will also talk through approaches to achieving data center efficiency that avoid these unintended consequences.
  • In this webinar Sucharita Mulpuru, Forrester VICE PRESIDENT, PRINCIPAL ANALYST SERVING EBUSINESS & CHANNEL STRATEGY PROFESSIONALS, will share "5 Things That Are Driving Shopper Expectations Today" helping your organization to be "Customer Ready".

    1.Need for Speed: Expectations around delivery speed, innovations from companies like Amazon and Co.
    2.The Price Competition: The economy, driving prices down.
    3.M-Commerce: Mobile moments and the concept of continuous partial attention.
    4.Connectivity: Fast connectivity and ubiquitous connections.
    5.Customer Journey: The Ease of finding anything, anywhere, anytime. Seamlessly catalogued content.

    Business and information leaders will learn from Sucharita’s experience as a leading expert on eCommerce, multichannel retail, consumer behavior, and trends in the online shopping space. She is also a noted authority on technology developments that affect the online commerce industry and vendors that facilitate online marketing and merchandising.
  • A 2015 PwC survey found that 96% of CEO’s in the US have indicated rising concern about data breaches - and rightly so. With the record-breaking breaches of 2014 barely behind us, organizations want to take steps to avoid becoming the next victim and are looking for signs that can indicate troubling performance. BitSight Technologies may have found one such indicator. Using their Security Ratings data, recent research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach, demonstrating that Security Ratings are a powerful metric for communicating cyber risk across the enterprise.

    Join BitSight CTO and Cofounder Stephen Boyer to discuss this research and to learn why continuous security performance monitoring should be an essential part of your enterprise risk management strategy.

    Attendees will learn:
    -What is the correlation between botnet grades and publicly disclosed breaches
    -Why botnet grades vary across key industries and what the top infections are by sector
    -How Security Ratings are generated and the impact botnets and other risk vectors have on these security performance metrics
  • Confused by Big Data? Have applications ideally suited for Big Data but not sure how to manage the infrastructure? Facebook1 ingests 500 terabytes of new data every day; a Boeing2 737 will generate 240 terabytes of flight data during a single flight across the US; the proliferation of smart phones, the data they create and consume; sensors embedded into everyday objects will soon result in billions of new, constantly-updated data feeds containing environmental, location, and other information, including video3.

    The chances are that you are or at some point will be dealing with Big Data driven applications and managing the performance of those applications. In this webcast you will learn about MongoDB and its role in the Big Data universe and the role of APM with Big Data. CA Technologies and MongoDB have teamed to provide database performance insight with CA Application Performance Management to help quickly identify the source of degraded application performance and assure a flawless customer experience.

    1 http://news.cnet.com/8301-1023_3-57498531-93/facebook-processes-more-than-500-tb-of-data-daily
    2 http://www.mckinsey.com/insights/business_technology/big_data_the_next_frontier_for_innovation
    3 http://en.wikipedia.org/wiki/Internet_of_Things#Size_considerations
  • Please join AvePoint and Rackspace at 11:30 a.m. – 12:30 p.m. EST on Tuesday, April 28, 2015 as we discuss how the cloud affects governance and management strategies in the final webinar in the three-part series.

    In this 60-minute webinar, Dux Raymond Sy, Chief Technology Officer for AvePoint Public Sector, Jeff DeVerter, Chief Technology Officer - Microsoft Technologies for Rackspace, John Peluso, Vice President of Product Management for AvePoint, Todd Klindt, SharePoint Consultant for Rackspace, and Shyam Oza, Senior Product Manager for AvePoint, will address strategies and tools for ensuring your cloud-hosted SharePoint content remains properly managed and protected.

    Panelists will cover best practices, strategies, and tools for managing and protecting cloud-hosted users and content, ensuring you remain in compliance with your governance policies – no matter where your content resides. Whether you’re an IT manager, developer, administrator, or someone that wants to learn logistics behind moving to the cloud, please join us for what promises to be a lively and informative discussion!
  • HR organizations are looking to transform employee engagement & support as a strategic approach to driving both employee productivity and retention. Not only do today’s employees expect instant, personalized, and effortless service from their employer, but employers themselves are looking to streamline their HR service delivery process on a global scale. Join Salesforce and their customer, Manulife, to learn about:

    - Key technology trends in employee engagement & HR service delivery
    - How Salesforce is helping leading companies overcome challenges with employee self-service, fragmented HR processes and systems, and limited reporting capabilities
    - Manulife’s journey scaling HR service delivery globally with Salesforce
  • Please join AvePoint and Rackspace at 11:30 a.m. – 12:30 p.m. EST on Tuesday, April 28, 2015 as we discuss how the cloud affects governance and management strategies in the final webinar in the three-part series.

    In this 60-minute webinar, Dux Raymond Sy, Chief Technology Officer for AvePoint Public Sector, Jeff DeVerter, Chief Technology Officer - Microsoft Technologies for Rackspace, John Peluso, Vice President of Product Management for AvePoint, Todd Klindt, SharePoint Consultant for Rackspace, and Shyam Oza, Senior Product Manager for AvePoint, will address strategies and tools for ensuring your cloud-hosted SharePoint content remains properly managed and protected.

    Panelists will cover best practices, strategies, and tools for managing and protecting cloud-hosted users and content, ensuring you remain in compliance with your governance policies – no matter where your content resides. Whether you’re an IT manager, developer, administrator, or someone that wants to learn logistics behind moving to the cloud, please join us for what promises to be a lively and informative discussion!
  • This session will demonstrate how our English Literature Specification A has been designed to enable you to teach AS and A-level students together. We’ll focus on:
    • the different approaches to co-teaching AS and A-level and how they might work in your school
    • the text selections available within Specification A, and how they could fit with your approach
    • the free resources available to support you in your planning and teaching
  • In our always-connected business world today, customers expect instant and seamless communications. Come learn how companies of all sizes can decrease response times, increase agent productivity and improve customer satisfaction while reducing demand for IT support.

    What attendees will learn:
    - Trends in customer care and communications – expectations in our always-on world.
    - Ways to offer consistent customer experiences across an array of communications mediums
    - How to enable high-definition voice and video collaboration to users – even those on mobile devices
    - Exciting new developments in integrated communications and customer
    - Ability to streamline communications in the cloud
    - How Zendesk and RingCentral integrations enhance customer satisfaction
  • Gap junctions (GJs) are large aggregates of intercellular channels that facilitate the diffusion of small molecules and ions between two interacting cells. GJ intercellular channels are formed through the interaction of two half-channels, called hemichannels, composed of oligomerized connexin protein subunits. Both GJs and hemichannels have numerous important physiological and pathological roles in tissue functions including propagation of the action potential in the heart, tumor growth and metastasis, the inflammatory response and adaptive immunity, wound healing, and electrical synaptic transmission in the central nervous system. The most widely expressed connexin isoform is Cx43, and its regulation in the abovementioned processes has been a major focus of GJ research. Over the past two decades protein-protein interaction with the cytoplasmic carboxyl terminus of Cx43 has come to the fore as an endogenous mechanism for controlling the GJ life cycle, channel gating, and channel-independent functions. We have used the Duolink proximity ligation assay (PLA) as a technique to study protein interactions with Cx43 in cultured cells. Two unique aspects of the technology – specifically, subcellular localization and the binary nature of the labeling – in combination with standard immunofluorescent confocal imaging techniques have yielded unexpected insights into GJ ultrastructure, action potential conduction, and the mechanistic regulation of Cx43 trafficking and hemichannel accretion to GJ plaques. In this context, the practical application of, appropriate controls for, and interpretation of Duolink PLAs will be explicated.
  • Virtualization has revolutionized the modern data center. But traditional storage systems are struggling to keep pace, introducing performance bottlenecks and unnecessary cost and complexity. Flash offers the potential for relief, but where is it ideally placed – in the server, storage or both? And what software is required to best utilize this resource? PernixData FVP software enables an architecture decoupling storage performance from capacity to utilize high speed server media in conjunction with shared storage to deliver the maximum VM performance at the lowest cost.
  • Does your company have a plan for responding to the next Heartbleed? These responses can be time-consuming and costly. Despite the fact that the vulnerability may be achieving mainstream awareness, enterprises need to balance responses against risk. Without a set of response guidelines in place, you could end up reacting rather than responding to the disclosure.
    During this webinar, Jessica Lavery, Rapid Response Process Manager, will outline the steps security and risk professionals can take to create a vulnerability response plan that minimizes risk and minimizes the impact to the organization.
    What you will learn:
    •The five steps to needed in a vulnerability response plan
    •How to create a vulnerability response program that reduces risk while minimizing the impact to the enterprise
    •How companies like Veracode think about vulnerability disclosures
    •Why we are seeing an increase in branded vulnerabilities
  • For years vendors have been trying to drive down the cost of flash so that the all-flash data center can become reality. The problem is that even the rapidly declining price of flash storage can’t keep pace with the rapidly declining price of hard disk. As a result data that does not need to be on flash storage has to be stored on something less expensive. But does that less expensive storage need to be another hard disk array or could it be stored in the cloud?

    In this webinar join Storage Switzerland’s founder George Crump and Avere Systems CEO, Ron Bianchini for an interactive webinar Using the Cloud to Create an All-Flash Data Center.

    In this webinar you will learn:

    1. The Challenges to Building an All-Flash Data Center

    2. The Challenges to using On-Premise Hybrid Arrays

    3. The Cloud Answer

    4. The Three Steps to a truly All-Flash Future

    A. Identifying Data

    B. Designing The Right Infrastructure

    C. Implementing That Infrastructure

    Register today to learn how you can create an all-flash data center today, and be able to afford it. As always, we will leave plenty of time for an extensive Q&A session, so tune in to get your flash and cloud storage questions answered by our panel of storage experts. All registrants will also be able to access Storage Switzerland’s extensive library of on-demand webinars, many with exclusive white papers, without having to re-register.

    Special Offer: All pre-registrants for this webinar will receive a copy of Storage Switzerland's latest white paper "How Cloud can enable the All-Flash Data Center" emailed after they register.
  • This webinar will provide strategies and best practices to secure your network and apps against threats while optimizing availability and performance.

    Computing has extended beyond the exclusive domain of the IT department - a fact that has significantly complicated security, privacy and has put tremendous pressure on today’s networks. IT managers are tasked to automate networking polices, protect against an ever growing and changing number of attacks and keep users happy with the highest level of performance.

    Attend this webinar to learn:

    - How to protect web applications with an integrated Web Application Firewall solution
    - Defend against DDoS and specific application layer attacks
    - Simplify access with SSO and securely authenticate to external applications
    - Encrypt all traffic while ensuring compliance visibility
  • Storage bottlenecks handcuff performance for many applications — especially those running on SQL Server. Using FlashSoft® software to cache I/O with a server-attached flash memory device lowers latency and improves IOPs. It might also mean that you can run more virtual machines on the same hardware or push out your storage upgrade — saving software licensing fees and hardware costs.

    Learn the highlights of FlashSoft for Windows and Hyper-V and how it can help you.
  • Sharing network access and sensitive information with your business
    partners could be putting you at risk of third-party breach. These
    breaches can be very damaging and may account for major losses in
    data, time, and resources. If you’re looking for a better risk
    management method, you’re not alone.

    Watch this webinar to will learn more about:

    - Security risks that could be facing your corporation today.
    - How you can utilize selection criteria to build the best solution.
    - Methods you can use to assess partner security risk.
    - How to make better risk-based decisions by factoring in the security
    posture of your organization.
  • With NFSv4.1 implemented on several commercial NFS systems, along with a new Linux server and client, there is a continued growth of NFS usage in the IT industry. NFSv4.1, first introduced in 2010, meets many needs in the modern datacenter, but there are still technologies and advanced techniques that NFS developers want to deliver. This presentation covers a brief update of where we are with NFSv4.1 and more detail on the proposed features for NFSv4.2 that are currently being ratified at the IETF.
  • As we move away from legacy models for providing network services, namely dedicated physical appliances, to virtualized network functions servicing single or multiple data centers, the industry is experiencing the heavy lifting of bringing up new technologies for orchestration, SDN, and integrating the dynamic NFV model with the OSS/BSS Telco providers are using to control their ever-growing networks.

    The community of vendors, enterprises, and service providers is using Open Source to share and expedite this technology shift with a focus on quickly modernizing the infrastructure.

    The lower three layers of the stack enjoy broad community support as the Reference Architecture for NFV and SDN:

    •OpenStack – Used to orchestrate the infrastructure
    •OpenDaylight (ODL) – The SDN controller, enabling feature-rich, scalable solutions for network virtualization, service chaining, and other functions
    •Open vSwitch (OVS) – An entity controlled remotely by the SDN controller, providing inter-VM connectivity and emerging SLA, QoS, and security functionality at customizable granularity down to per-flow levels

    In this webcast, ConteXtream and Intel will describe the roles of each layer and the status of the basic functionality available today. A special focus will be given to ODL’s scalability and functionality challenges and solutions for intra- and inter-data-center networks (e.g. Telco networks). We will further discuss how overlay network standards are used to achieve these goals and how ODL federation is performed along IETF-RFC lines to achieve robust fan-out of control capacity. We will also demonstrate new capabilities and levels of flexibility powered by a combination of inter-data-center ODL, service chaining, and NFV technologies.
  • Cybersecurity has become more than a technical problem. A data breach can have a major impact on your business – loss of jobs and customers, reduced brand reputation, stock price drops and more – with recent research placing the average cost of a breach at $2.7 million dollars. Yet too many organizations continue to drown in low-level threat data and individual response tactics, with security teams pouring through hay stacks that may or may not contain that “needle”.

    Join this webcast to learn how to improve the resiliency of your organization’s strategic risk management and business operation. Our panel of expert speakers include a former intelligence analyst, a CISO and a CEO, who will examine the business impact of cyber threats, why the traditional cybersecurity approach no longer applies, and offer tips for:

    · Taking a data-driven approach to cybersecurity – through evaluated intelligence
    · Continuously measuring cybersecurity key performance indicators
    · Facilitating collaboration across key stakeholders for an improved security strategy and cyber defense
  • Join Lattice for a guided tour of the marketing tech stack that powers Uberflip's demand gen engine.

    In recent years, B2B marketers have been confronted with a barrage of new technologies and systems aimed at making them more productive, efficient and successful. But which technology investments are worth making and what do you need to know before adding new systems to your technology stack?

    Show Me Your Stack (#MKTGstack) is an ongoing webinar series featuring a roster of forward-thinking B2B marketers that provides a glimpse into the marketing infrastructure that powers their demand gen engines and serves as the critical backbone to their business.

    Everything from CRM and marketing automation to content management, business intelligence and analytics systems will be covered – basically, anything in the stack!

    Each episode features a different marketer who will walk you through their marketing tech stack, share their goals and explain how their teams are structured. Don’t miss this rare chance to see how the best in the business invest in and use marketing technology.

    About Hana Abaza:

    Hana Abaza is the VP Marketing at Uberflip, a platform that helps marketers create, manage and optimize content experiences at every stage of the funnel to boost engagement and generate leads. A blend modern chic, tech geek and entrepreneurial hustle, she combines a data-driven approach with her knack for communicating inspired tech solution to mainstream audiences to get results.