Hi [[ session.user.profile.firstName ]]

BrightTALK webinars and videos

  • Introduction to SNIA Swordfish™ ─ Scalable Storage Management
    Introduction to SNIA Swordfish™ ─ Scalable Storage Management Alex McDonald, Vice-Chair SNIA Europe and NetApp Recorded: Aug 21 2018 75 mins
    The SNIA Swordfish™ specification helps to provide a unified approach for the management of storage and servers in hyperscale and cloud infrastructure environments, making it easier for IT administrators to integrate scalable solutions into their data centers. Swordfish builds on the Distributed Management Task Force’s (DMTF’s) Redfish® specification using the same easy-to-use RESTful methods and lightweight JavaScript Object Notation (JSON) formatting.

    Join this session to receive an overview of Swordfish including the new functionality added in version 1.0.6 released in March, 2018.
  • Endpoint and Network Security: Better Together
    Endpoint and Network Security: Better Together Danny Milrad, Director of Endpoint Products, and Scott Simkin, Director of Threat Intelligence, Palo Alto Networks Live 60 mins
    Threats are evolving far too quickly for point products to keep up. Security point products that operate and analyze in silos have led to security gaps and fragmented policies that fail to prevent successful cyberattacks. With more than 9 million new instances of malware each month, deploying disparate point products is no longer enough.

    Join Danny Milrad, Director of Endpoint Product Marketing, and Scott Simkin, Director of Threat Intelligence Product Marketing, as they discuss:

    - The need for endpoint security to augment perimeter protections
    - The value of threat intelligence collected, analyzed and shared across the security architecture
    - 3 requirements for effective endpoint protection
    - How Traps, Palo Alto Networks advanced endpoint protection, extends protections from the firewall throughout the organization
  • Fighting Cybercime with Artificial Intelligence
    Fighting Cybercime with Artificial Intelligence Mr Keith Rayle, Security Strategist, Fortinet FortiGuard Labs Recorded: Aug 21 2018 54 mins
    See how artificial intelligence can be used to stop malware more quickly. Learn more about the history of artificial intelligence dating back to nearly a century plus an examination of a system comprised of highly efficient deep machine learning neural networks that are currently deployed and proactively defeating malware attacks.
  • Cybersecurity in the wake of recent attacks - Is Browser Isolation the solution?
    Cybersecurity in the wake of recent attacks - Is Browser Isolation the solution? Rajiv Raghunarayan, VP - Products, Cyberinc Recorded: Aug 21 2018 49 mins
    The spate of cyber-attacks continues with an increasing level of sophistication and precision and sometimes finding the easiest path – through the weakest link in the chain – the human factor. Businesses and even government organizations are constantly in an alarmed state having to deal with the aftermath of such attacks. Be it the case of City of Atlanta or the more recent SingHealth breach, it is evident that CIOs and CISOs across the globe need to re-assess their traditional security approach.

    What is Browser Isolation? And how can this technology aid CISOs, security leaders & practitioners in managing cyber threats?

    Register to watch Rajiv Raghunarayan, VP Products at Cyberinc outline a simple yet effective approach organizations - enterprise or government - could take towards reducing risk and vulnerabilities, while also driving up the productivity of their IT security teams.
  • SOC Capabilities & Usefulness: SANS 2018 SOC Survey Results Pt 2
    SOC Capabilities & Usefulness: SANS 2018 SOC Survey Results Pt 2 Christopher Crowley, Gary Golomb, Lital Grossman, John Moran, and John Pescatore Recorded: Aug 20 2018 62 mins
    As the network perimeter melts away, SOCs have no choice but to evolve. The use of cloud, mobile, personal and Industrial IoT are but a few of the technology innovations forcing this evolution. In this webcast, learn the tools and technologies SOCs are deploying to integrate and manage all their security, operational and response data for better protection, detection and response.

    In this webcast, SANS Principal Instructor Chris Crowley will discuss the results of the SANS 2018 SOC Survey, including:

    Differences between SOCs that identify as MSSPs and SOCs that do not identify as MSSPs
    Tools and technologies used to prevent, detect and respond to attacks
    SOCs' likelihood to address IoT and non-traditional IT
    Integration between tools for needed data sharing before, during and after events
    Automated and manual actions taken and the value of both
    Challenges holding organizations back from fully realizing SOC usefulness
  • Live Demo of OptiView XG
    Live Demo of OptiView XG Mike Pennacchi, Network Protocol Specialists Recorded: Aug 20 2018 61 mins
    Troubleshooting performance problems in today’s networks is only getting more complex:

    • Growth of 10G links with limited visibility
    • Increasing demands on wireless networks
    • Complex infrastructure with outdated documentation

    Last thing you need are hard-to-use tools that are complex in themselves or require extensive training before you can effectively use them.

    Please join us for a free webinar where Mike Pennacchi will talk about these issues and present a live demo of the OptiView® XG Network Analysis Tablet.

    XG expedites network performance problem solving by automating root cause analysis and providing guided troubleshooting to address problem areas - anywhere on the network – wired or wireless.
  • Encryption & Tokenization as effective GDPR Best Practices
    Encryption & Tokenization as effective GDPR Best Practices An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson Recorded: Aug 20 2018 63 mins
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • Better Test Data = Better Applications
    Better Test Data = Better Applications Prashant Pandey, CA Technologies Recorded: Aug 20 2018 60 mins
    Companies struggle to find the right test data when testing applications which leads to bottlenecks, defects and constant delays. There is a better way and we want to show you how:

    Join us for this webcast to learn:
    - How Test Data Manager finds, builds, protects and delivers test data fast!
    - How to get your testing teams moving towards self sufficiency with test data

    Get your questions answered. Come away happy!
  • BrightTALK Masterclass Series: Time Management
    BrightTALK Masterclass Series: Time Management Abigail Barnes, Author of Time Management for Entrepreneurs Recorded: Aug 20 2018 56 mins
    This webinar is part of BrightTALK's Masterclass Series.

    Do you often become overwhelmed because of all the things you have going on in your life? Do you wish you could be more confident in your endeavours but see yourself continuing to take on more and more?

    Join this Masterclass where you will learn:
    -How to stop feeling overwhelmed by your to-do list
    -How to prioritise your activities
    -How to avoid distractions & maintain focus

    Abigail Barnes is an award-winning entrepreneur and author of Time Management for Entrepreneurs, a book that helped thousands of readers learn how to prioritise their time and resources, increase their efficiency and create more of the results they want.

    Abigail understands human motivation and uses her life-changing wake-up call to inspire, motivate, and show audiences how they can transform their lives and results in turning fear of change into their foundation for success.
  • MyFolio Quarterly Update
    MyFolio Quarterly Update Bambos Hambi Recorded: Aug 20 2018 28 mins
    Bambos Hambi, Head of Multi-Manager Strategies, provides an update on the MyFolio Range. The MyFolio Funds are carefully constructed risk-based portfolios which offer your clients a choice of active and passive investment strategies across five risk levels.

    +44 (0) 20 3059 2627 - Standard International Access
    0800 368 0707 - UK Toll Free
    Access PIN: 9975890#
  • PMI TV: How to improve your DB scheme admin without having to start from scratch
    PMI TV: How to improve your DB scheme admin without having to start from scratch Tom Cowley, Associate, Barnett Waddingham Recorded: Aug 20 2018 16 mins
    Tom Cowley, Associate at Barnett Waddingham, discusses why pensions administrations have recently been brought to focus, how trustees can engage with pensions administration providers, and exercises that can be done to improve the pensions admin service.
  • VM Consolidation with Vexata NVMe Storage Systems
    VM Consolidation with Vexata NVMe Storage Systems Rick Walsworth Recorded: Aug 17 2018 5 mins
    Vexata provides NVMe-based storage solutions that maximize VMware virtualized workloads providing massive consolidation, high performance for enterprise workloads such as Oracle, SQL Server, and SAS Analytics. This demo provides an exclusive view into consolidating mission critical Oracle workloads on VMs supporting a range of mixed OLTP, Analytics and Data Warehouse workloads delivering ultra-low latency over increasing workloads. If you are considering moving enterprise applications into VMware virtualized environments, Vexata delivers the performance and scale to do so with confidence.
  • Operational Alignment: Rebalance IT Process with Customer Needs
    Operational Alignment: Rebalance IT Process with Customer Needs Troy DuMoulin - VP Research & Development, Pink Elephant Recorded: Aug 17 2018 59 mins
    Let’s say your IT organization has processes in place that seem effective on the surface — you resolve service outages, provision resources, and manage changes as required. Your monthly reports may satisfy IT executive requirements, but how aware are you of your business customers’ needs and service expectations in relation to these processes? In their initial efforts to define IT service delivery processes, many organizations have unintentionally pushed customers to the end of the equation.

    Aligning interdependent resources and workflows is crucial for IT operations to be successful — but not at the expense of the customer. Too frequently, IT faces excessive pressure to deliver business metrics, and not enough significance is placed on the goals and values of the customers.

    Join Troy DuMoulin, VP Research & Development at Pink Elephant discusses how team misalignment can hinder service delivery.
  • Transforming Security for Digital Education
    Transforming Security for Digital Education Muhammad Abid Recorded: Aug 17 2018 37 mins
    FortiGuard 7000 Series offers industry’s best consolidated SSL performance, threat protection that results in lower CapEx & OpEx benefits
    1.Sharing of threat insight across the entire network to prevent lateral attacks
    2.Inspection of encrypted traffic & prevention of threats at wire speed
    3.Reduce management complexity and need for incident response by consolidating into a single console across all network use cases
  • Designing a Distributed Cloud Database for Dummies
    Designing a Distributed Cloud Database for Dummies Patrick McFadin, VP of Developer Relations at DataStax Recorded: Aug 17 2018 46 mins
    Watch Designing a Distributed Cloud Database for Dummies—the webinar. The webinar “stars” industry vet Patrick McFadin, best known among developers for his seven years at Apache Cassandra, where he held pivotal community roles. Register for the webinar today to learn: why you need distributed cloud databases, the technology you need to create the best used experience, the benefits of data autonomy and much more.
  • PMI TV: Pension transfers under the spotlight
    PMI TV: Pension transfers under the spotlight Jonathan Watts-Lay, Director, WEALTH at Work Recorded: Aug 17 2018 7 mins
    DB pension failures have been making headlines recently casting into the spotlight the support that members receive. Jonathan Watts-Lay, Director, WEALTH at work, discusses DB transfers and the best ways to protect members.
  • Rise above the Noise - Zero Trust from Centrify
    Rise above the Noise - Zero Trust from Centrify Rhonda Shantz, Centrify CMO and Bill Mann, Centrify Chief Product Officer Recorded: Aug 17 2018 7 mins
    There is a lot of noise in the market place, with over 100 companies talking about Zero Trust.

    However, there's only one company whose entire product line, and whose position in the market place is Zero Trust Security, and that's Centrify.

    In this 7 minute video, Centrify CMO Rhonda Shantz talks about the 'noise' in the market place, and how this is fuelling misconceptions as to what the real problem actually is, and why, despite billions of spending on cybersecurity, 66% of companies are still being breached.

    This is followed by a summary overview of the 4 pillars of the Centrify Zero Trust model; Verify the User, Validate the Device, Limit Access and Privilege and Learn and Adapt, delivered by Centrify's product experts.
  • How financial markets are grossly underestimating recessionary risk
    How financial markets are grossly underestimating recessionary risk Edward Park, Mike Riddell Recorded: Aug 17 2018 38 mins
    Mike Riddell will talk about the macroeconomic risks to global financial markets, and some of the signals that suggest the next recession may be sooner than many people think. The talk will touch on the risks posed by global trade wars, tighter monetary policy, commodity prices and China.

    Key points:

    • Volatility over the last 10 years has been suppressed by central banks, but if history is any guide, recent monetary policy tightening is a lead indicator of greater asset price volatility and higher risk premia.
    • Tighter monetary policy contributes to slower real money supply growth, which is also a lead indictor for global economic activity.
    • Higher commodity prices are a sign of strong current growth, but they also imply weaker future growth.
  • Security, Privacy and the Next Generation Workforce (Podcast)
    Security, Privacy and the Next Generation Workforce (Podcast) Barry Scott, CTO Centrify EMEA Recorded: Aug 17 2018 30 mins
    Yahoo, Equifax and Uber are just some of the high-profile brands hit by breaches during the past twelve months but could it be younger workers that pose the biggest risk to an organisation's IT security?

    Centrify surveyed 1000 UK office workers aged 18 to 24 and 500 UK senior decision makers to measure what the decision makers think of the next generation workforce’s approach to security and compare it to real-world attitudes.

    Is there a significant gap between perception and reality in decision makers view of younger workers? The results may surprise you!

    In this podcast, Centrify's CTO Barry Scott and SC Media's Editor-in-Chief Tony Morbin discuss the next generation of workers and how their behaviour could impact the workplace.

    After listening to the podcast, don't forget to download the full report.
  • Asset class outlook: Expected real returns over the medium-term
    Asset class outlook: Expected real returns over the medium-term Peter Brooke Recorded: Aug 17 2018 31 mins
    Investors are concerned about whether “hanging in there” is a sensible strategy for meeting their real return objectives in this challenging market environment.

    We consider the Themes and Risks faced by investment markets and how we expect these to play out. This gives insight to our strategic asset-allocation including our views on offshore vs local exposure. We set out our real return expectations on the key asset classes.

    In active solutions “hanging in there” does not mean your investments are passively waiting it out
  • The Deathly Hallows of Application Security - Flaws, Vulnerabilities & Exploits
    The Deathly Hallows of Application Security - Flaws, Vulnerabilities & Exploits Paul Farrington - Director of Solutions Architects @ CA Veracode Aug 21 2018 10:00 am UTC 45 mins
    To understand the severity of a flaw you need to understand the extent to which it can be exploited. With software becoming more and more complex so does the difficulty of securing it.

    Join Paul Farrington, Director of Solutions Architect @ CA Veracode for this live webinar, where he will explore the distinctions between various security flaws and how you can combat them.

    You will leave the session understanding how to identify and address risk factors, how attackers exploit vulnerabilities & the extent to which organisations rely on AppSec technology to secure the SDLC.
  • Pervasive Integration - Introducing Hybrid Implementation Platform
    Pervasive Integration - Introducing Hybrid Implementation Platform Mikkel Iversen, Head of Integration, NNIT Aug 21 2018 11:00 am UTC 45 mins
    This session will focus on introducing pervasive integration with the different integration personas as Integration Specialists, AdHoc integrators and Citizen integrators. The session will cover the implementation of a Hybrid Integration platform and the components it can consist of: ESB, iPaaS, Api Mgt. and iSaaS. It will be described, how a HIP can supplement agile development organizations and BiModal IT.


    About Mikkel Iversen:

    Mikkel Iversen has worked with enterprise integration for the last 12 years with tasks ranging from developer, architect, business liaison to management of integration CoEs. Today he is responsible for all integration technologies and consultants in NNIT – A leader in the integration space in the Nordics.
    Mikkel focuses on integration organization and overall implementation of Pervasive integration solutions, with a shift from Center of Excellence to Center of Enablement.

    Other webinars in this Cloud Webinar Series:

    Session 2: Welcoming the Informatica Intelligent Cloud Services
    Session 3: Using IICS to orchestrate complex order processing
    Session 4: Lift & Shift (EDW) Enterprise Data warehouse to Azure
    Session 5: Customer Case: Rockwool’s Cloud journey
    Session 6: How to engage with Cloud Computing?
  • Advanced & Frictionless Security in a Multi-Cloud Environment
    Advanced & Frictionless Security in a Multi-Cloud Environment Anuj Sawani, Product Marketing Manager Aug 21 2018 1:00 pm UTC 60 mins
    Today, organizations need higher performance and faster access to the latest innovative technologies in order to grab whatever competitive edge they can. This almost always means going to the cloud.

    Unfortunately, in the rush to get there, enterprises can find themselves with data and applications scattered across private and public clouds – often multiple public clouds – spanning IaaS, PaaS and SaaS.

    Without the appropriate security and compliance strategy in place, this often results in poor visibility and increased risk. The simple truth is that multi-cloud security isn’t intuitive.

    We can make it easier. This webinar will cover:

    •Common speed bumps your security and DevOps teams face
    •Innovative security strategies to tackle a wide range of cloud risks
    •Security automation and integration within the development lifecycle
    •Achieving consistent and advanced multi-cloud protections

    Register now and learn how to secure your multi-cloud environment with advanced, frictionless protection.
  • Governo na Palma da Mão
    Governo na Palma da Mão Rubens de Souza Aug 21 2018 1:00 pm UTC 60 mins
    CA Technologies lança solução para facilitar a vida dos cidadãos e melhorar os serviços prestados pelos órgãos públicos do estado. O GPM (Governo na Palma da Mão) integra sistemas de secretarias, ministérios e demais órgãos públicos para diminuir deslocamentos e custos de agendamento de consultas médicas e matrículas escolares, entre outros serviços fundamentais.

    Descubra como o GPM tira proveito da familiaridade dos cidadãos com as tecnologias móveis e permite em apenas alguns cliques agendar consultas médicas, fazer matrículas escolares, acompanhar o desempenho dos alunos, realizar campanhas de saúde, entre outras atividades de serviço público, sem enfrentar filas.

    Saiba Mais neste Webinar.
  • Aproveite o maximo da sua solução SAP com a SUSE e Lenovo
    Aproveite o maximo da sua solução SAP com a SUSE e Lenovo Aslan Carlos, SUSE Sales Engineer & Adriano Fratelli, Lenovo SE Aug 21 2018 1:00 pm UTC 75 mins
    Suas aplicações SAP são a base de sua transformação digital!

    Juntas, SUSE e Lenovo fazem a plataforma ideal para aplicações SAP como o SAP Hana. Fornecemos uma solução Linux para todas as aplicações SAP e trabalhamos constantemente com SAP para garantir o melhor desempenho, alta disponibilidade e segurança para sistemas SAP de missão crítica.
    Saiba o valor de seus aplicativos SAP com suporte para migração de plataforma, simplificação e consolidação:

    - Lenovo entregou mais de 7.200 sistemas SAP Hana em todo o mundo.
    - SUSE Linux Enterprise Server para aplicativos SAP é o sistema operacional recomendado e suportado para SAP Hana.
    - SUSE Manager permite que você gerencie várias distribuições Linux.
  • Investing in the Internet…The Evolution Continues!
    Investing in the Internet…The Evolution Continues! Gregg Guerin, Senior Product Specialist Aug 21 2018 1:00 pm UTC 45 mins
    First Trust will be hosting a webinar discussing the power of thematic internet investing, the future potential investment behind the ‘Internet Evolution’, the growth of the internet and a way to gain exposure to the giant and popular FANG stocks. (Facebook, Amazon, Netflix and Google)

    Webinar Highlights:
    - Case Study: The Power of Thematic Investing and the Dow Jones Internet Composite Index
    - In-depth Discussion on The Four Mega-Cap Tech Juggernauts – the ‘FANGS’
    - Multiple Facets of the Internet: How we Use it and How It’s Changing our Lives
    - The Potential Investment Opportunities That Arise from Internet Evolution
    - Exposure to a Broad Array of Interned-Based Themes
    - First Trust’s Dow Jones Internet UCITS ETF (“FDN”): A Diversified FANG Plus Opportunity
  • The Blackhawk Webinar Hour w/ Ziad Abdelnour
    The Blackhawk Webinar Hour w/ Ziad Abdelnour Ziad Abdelnour, CEO of Blackhawk Partners, Ryan Ross Sep 11 2018 2:00 pm UTC 60 mins
    With so much information, we are starved for valuable knowledge that we can act on. This webinar will dive into how to find the real information out there, how to separate the real from the fake, how to translate that into actionable ideas, how to define the next steps, and how to empower your team to act on the real information.
  • 6 Ways to Simplify the Management of Your Multi-Cloud Environment
    6 Ways to Simplify the Management of Your Multi-Cloud Environment David Linthicum, Cloud Computing Thought Leader, Linthicum Research and Michael Procopio, Product Marketing, Micro Focus Aug 21 2018 3:00 pm UTC 30 mins
    With 92% of enterprises now using multiple cloud vendors, the complexity of managing a heterogeneous multi-cloud infrastructure continues to increase dramatically.

    But managing a multi-cloud environment doesn’t have to be a complicated affair.

    Emerging IT Operations processes and tools can solve your complexity problems—and eliminate them going forward—but only if you make the right choices.

    Join us on this webcast as we discuss six recommendations that will help you simplify the management of your multi-cloud environment.
  • S1000D: Technical Content Localization Strategies
    S1000D: Technical Content Localization Strategies Bob Hogg, Global Marketing Director, SDL & Michael Davis, Sr. Director Government, Aerospace & Defense Industry, SDL Aug 21 2018 3:00 pm UTC 60 mins
    As the A&D industry grows to support the global market, increasing cross-regional sales are occurring placing additional importance on the management and delivery of technical content in local languages. Join SDL, content management and language translation experts, to explore strategies related to the management of global language translation challenges in S1000D. Michael Davis, Sr. Director at SDL Government, Aerospace & Defense industry, will discuss how your organization can rapidly and more cost effectively create, translate and deliver S1000D content to any language.
  • Gobierno en la Palma de la Mano
    Gobierno en la Palma de la Mano Narciso Lucero Aug 21 2018 3:00 pm UTC 60 mins
    Los hábitos y las expectativas de los usuarios están cambiando en forma acelerada. Esta realidad deben afrontarla tanto empresas privadas como públicas. Las empresas deben tener satisfecho al cliente y las Instituciones deben garantizar la satisfacción del ciudadano. Por esta razón, es indispensable que el gobierno, en todos sus niveles, redoble los esfuerzos de digitalización de sus servicios.
    Para acompañar estos desafíos CA Technologies ha creado el programa Gobierno en la Palma de la Mano (GPM) con el fin de facilitar la interacción de la ciudadanía con todos los niveles de gobierno. Acompáñenos en este Webinar y descubra cómo:
    •Elaborar aplicaciones y servicios digitales que funcionen rápidamente y con calidad
    •Garantizar la seguridad de la identidad de los usuarios y de la información que manejan mediante servicios digitales;
    •Garantizar la disponibilidad y el desempeño de los servicios en línea, para ofrecer una experiencia de usuario única.
  • BrightTALK Masterclass Series: Battling Stress and Worry
    BrightTALK Masterclass Series: Battling Stress and Worry Catherine (Cat) Castellanos, Founder, Sidestep Strategies Aug 21 2018 3:00 pm UTC 60 mins
    This webinar is part of BrightTALK's Masterclass Series.

    In this day and age, everyone struggles with stress and fear. But it doesn’t have to be so hard and you don’t have to go through it alone.

    Catherine Castellanos, founder of Sidestep Strategies, a therapeutic crisis management firm, will show you how to conquer even the toughest moments for a more calm, centered, and focused life.

    Learn why anticipation is not the answer, how to keep your body out of “fight mode,” plus tips and tricks to cut the anxiety cycle and get back to the real you, fast.
  • AI-Powered, Blockchain-Protected App Skejul - From Concept to Wefunder Campaign
    AI-Powered, Blockchain-Protected App Skejul - From Concept to Wefunder Campaign Matthew Lamons, Paul Heirendt - Skejul Aug 21 2018 4:00 pm UTC 60 mins
    Join Matthew Lamons and Paul Heirendt of Skejul in this discussion of how they've taken their AI-powered, Blockchain-protected Skejul app from conception through to Wefunder.
  • Health-A-Palooza 2018: Medicare - The Deeper Dive
    Health-A-Palooza 2018: Medicare - The Deeper Dive Dan Arland, LeClair Group Aug 21 2018 4:00 pm UTC 60 mins
    Baby Boomers are aging into Medicare at a rate of 10,000 per day and the state of Minnesota has roughly 370,000 seniors that will be coming off Cost Plans and enrolling in something different. Agents need to understand the pros and cons of enrolling Boomers into Medicare or not enrolling in Medicare. How do employer plans fit into the mix and what are group Medicare plans?What happens to their HSA plans once they turn 65? The challenge for agents is to have a basic understanding of all types of Medicare options and how one choice may affect the other.
  • Business Process Automation, Decision Support and Modern Application Development
    Business Process Automation, Decision Support and Modern Application Development Prakasha Aradhya, Product Management Director, Red Hat Aug 21 2018 4:00 pm UTC 60 mins
    Digital transformation projects present many technological and organizational challenges. A key challenge is developing modern, cloud-native applications that connect customers directly using automated business processes and decisions. Creating these applications requires a radical change in how software is built—moving away from traditional, IT-led software development to a process that lets both developers and business experts contribute directly to application logic. Please join us as Prakasha Aradhya, Red Hat Senior Product Manager, will discuss how Red Hat® business rules and process automation solutions help business users and developers collaborate as equal partners to create modern applications.
  • DPI: The key technology for vEPC Solutions - Build or Buy?
    DPI: The key technology for vEPC Solutions - Build or Buy? Alexander Mueller, Product Manager DPI, Ipoque, Rhode & Schwarz Cybersecurity Aug 21 2018 5:00 pm UTC 60 mins
    When your virtual Evolved Packet Core (vEPC) solution needs deep packet inspection (DPI) as a key enabling feature, highly reliable and accurate real-time identification of network traffic and applications is an important requirement.

    Whether it is for analytics, policy enforcement, tiered pricing, web and video optimization, content filtering, parental control or security services, DPI is a crucial technology to implement virtualized network equipment solutions.

    vEPC vendors looking at the business case can decide to build DPI software in-house, use open source solutions or to license software from a DPI specialist. Within this webinar, we will do a deep dive explaining the different sourcing options and the respective evaluation criteria, which should be considered.

    The real-life vendor scenario of a vEPC vendor will be used to illustrate the different aspects of a realistic use case.

    By the end of this session, attendees will have learned:

    •How DPI has become a crucial technology for vEPC solutions
    •How the scope of needed know-how has changed for vEPC vendors
    •What the benefits of DPI for vEPC use cases are
    •What the sourcing options for DPI solutions are
    •How to evaluate and answer the important aspects of the build or buy DPI decision
  • The SNIA Persistent Memory Security Threat Model
    The SNIA Persistent Memory Security Threat Model Doug Voigt, Co-Chair, SNIA NVM Programming TWG and Distinguished Technologist, HPE Aug 21 2018 5:00 pm UTC 75 mins
    What new security requirements apply to Persistent Memory (PM)? While many existing security practices such as access control, encryption, multi-tenancy and key management apply to persistent memory, new security threats may result from the differences between PM and storage technologies. The SNIA PM security threat model provides a starting place for exposing system behavior, protocol and implementation security gaps that are specific to PM. This in turn motivates industry groups such as TCG and JEDEC to standardize methods of completing the PM security solution space.
  • The Employee Experience: Attract Talent, Retain Top Performers, Drive Results
    The Employee Experience: Attract Talent, Retain Top Performers, Drive Results Tracy Maylett and Matt Wride Aug 21 2018 5:00 pm UTC 60 mins
    DecisionWise will help you understand how to create an engaged workforce. This is the age of the employee, and the majority of organizations are failing to meet their employee's expectations, why?

    The authors of the best selling book The Employee Experience will share best practices for improving the employee experience and creating engaged employees in your organization.

    What you can expect to learn:

    --What are the different contracts we make with our employees can lead to expectation misalignment.

    --The difference between the Employee Experience and Employee Engagement

    --Company maturity impacts your employee experience strategy.

    --Market trends that may impact the employee experience

    All attendees will receive a free book signed by the authors.

    Dr. Tracy Maylett: Tracy's business, coaching, and consulting background extends over a period of two decades and across five continents.Tracy is the Chief Executive Officer of DecisionWise, and is responsible for guiding the overall strategy of DecisionWise, as well as leading large-scale change efforts for clients throughout the globe.

    Matt Wride, JD:As DecisionWise’s Chief Operating Officer and executive consultant, Matt oversees the company’s operations, as well as its finance, legal, and administrative functions. He consults with executives around the globe on creating employee engagement at the organizational, team, and individual levels.
  • 2018 Security Congress Preview - Professional Development
    2018 Security Congress Preview - Professional Development Sharon Smith, Founder & Princ Consultant, C-Suite Results; Rob Ayoub, Program Dir, IDC; Derrick Butts, Truth Initiative Aug 21 2018 5:00 pm UTC 75 mins
    (ISC)2 will hold its Security Congress 2018 in New Orleans, Oct. 8 – 10. This conference will bring together 2000+ attendees and more than 100 educational sessions. One of the 13 tracks at the conference will focus on Professional Development and the challenges practitioners face advancing their careers, and staying ahead of the latest best practices and strategies with ongoing education. On Aug. 21, 2018 at 1 p.m. Eastern, join (ISC)2 and several speakers who’ll be presenting in the Professional Development track at Security Congress as we preview their sessions and discuss why professional development is so critical to advancing a career and knowledge.
  • Implementing a Sparse Logistic Regression Algorithm in Apache Spark
    Implementing a Sparse Logistic Regression Algorithm in Apache Spark Lorand Dali, Data Scientist, Zalando Aug 21 2018 5:00 pm UTC 39 mins
    This talk tells the story of implementation and optimization of a sparse logistic regression algorithm in spark. I would like to share the lessons I learned and the steps I had to take to improve the speed of execution and convergence of my initial naive implementation. The message isn’t to convince the audience that logistic regression is great and my implementation is awesome, rather it will give details about how it works under the hood, and general tips for implementing an iterative parallel machine learning algorithm in spark.

    The talk is structured as a sequence of “lessons learned” that are shown in form of code examples building on the initial naive implementation. The performance impact of each “lesson” on execution time and speed of convergence is measured on benchmark datasets.

    You will see how to formulate logistic regression in a parallel setting, how to avoid data shuffles, when to use a custom partitioner, how to use the ‘aggregate’ and ‘treeAggregate’ functions, how momentum can accelerate the convergence of gradient descent, and much more. I will assume basic understanding of machine learning and some prior knowledge of spark. The code examples are written in scala, and the code will be made available for each step in the walkthrough.

    Lorand is a data scientist working on risk management and fraud prevention for the payment processing system of Zalando, the leading fashion platform in Europe. Previously, Lorand has developed highly scalable low-latency machine learning algorithms for real-time bidding in online advertising.
  • Getting Started with Machine Learning
    Getting Started with Machine Learning Andrew Stein, Principal Product Manager Aug 21 2018 5:00 pm UTC 75 mins
    You’ve heard the buzz about artificial intelligence and machine learning and now you want to bring their benefits to your organization. In the second webinar in our AI & ML series, we will dive into more depth on machine learning solutions and how they can help you. In this webinar, we’ll talk through using machine learning concepts such as:

    ● Anomaly Detection
    ● Association
    ● Classification
    ● Clustering
    ● Estimation
    ● Prediction
    ● Regression
    ● Re-inforcement learning
    ● And much more!

    You’ll walk away with an understanding of how ML can help improve your decision making, forecast or predict KPIs, alert on deviation and uncover hidden trends or relationships.