The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
The architectural pattern of decomposing an application into microservices has proven extremely effective at delivering software faster. However, this type of an architecture comes with its fair share of challenges.
Fortunately, Amazon Web Services (AWS) offers many services that can be leveraged to overcome these challenges and adopt microservice best practices. If you are just starting to consider using AWS for running your microservices or if you have already started on the journey and looking for opportunities to improve, then this webinar will be beneficial for you.
Understanding the customers’ business model and reaching a healthy consensus between the push of technology (e.g., IoT and 5G) is required in data center design and planning to meet the demand for ubiquitous coverage and the demand of data anytime, anywhere. This presentation will provide an overview of data center design, the changes in the upcoming revision of ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers, and review use cases in the implementation of ANSI/TIA-942.
Speakers:
Jonathan Jew, J&M Consultants
Glenn Sexton, President and Principal Consultant, NIS
1 BICSI CEC
About TR-42 Telecommunications Cabling Systems Committee:
The TR-42 Telecommunications Cabling Systems Committee develops and maintains voluntary telecommunications standards for telecommunications cabling infrastructure in user-owned buildings, such as commercial buildings, residential buildings, homes, data centers and industrial buildings. The generic cabling topologies, design, distances and outlet configurations as well as specifics for these locations are addressed.
The ANSI/TIA-942 Telecommunications Infrastructure Standard for Data Centers is developed by the TR-42.1 Generic and Premises Cabling Subcommittee. TR-42.1 develops and maintains cabling standards for generic customer-owned telecommunications networks. These standards are intended to specify open systems designed to support a wide variety of voice, data, video, and other low voltage, power-limited applications. TR-42.1 also develops and maintains telecommunications cabling standards for premises networks such as commercial buildings, data centers, building automation, etc. This Subcommittee specifies cabling system topology, architecture, design, installation, testing and performance requirements. Go to https://www.tiaonline.org/all-standards/committees/tr-42 for further info.
Part of the Industrial Internet Consortium's Webinar Series on Securing the Industrial IoT, this session will feature Protecting Your Industrial Control System from Digital Threats.
Industrial Control Systems are everywhere. They’re running power grids, regulating data center energy use in large buildings, or managing production processes in at your favorite snack food manufacturer. What makes Industrial Control Systems so important, yet so difficult to secure? Learn about types of security challenges that operators of industrial control systems face and the tools available to help alleviate risk.
The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.
• Examine the realities of IoT data processing and analytics
• Describe the architectures needed to support the capability
• Analyze drivers and technique to secure IoT data elements
As Europe’s electricity power sector evolves and utilities embark on their own digital transformation journeys, traditional IT and industrial OEMs have built out adjacent portfolios to address market demand. This presentation looks at what utilities are doing with key digital technologies, such as analytics, digital marketing, cloud, or IoT, and their operational or business objectives. It also compares the routes to market by different types of ecosystem participants to identify utilities’ challenges.
Data-driven applications in the cloud often consist of several components that must ingest, process, and publish their data to users. Deploying and integrating it all on a bare-metal or virtual platform can prove difficult for any organization. Orchestrating and assembling these components on a cloud platform presents a new set of challenges to engineers, operators, and data scientists.
However, by combining Apache Spark's deployment methodology with Kubernetes' proven capability for repeatable integration patterns, it’s easy to create insightful analytics applications. Watch this webcast featuring a case study of an Apache Spark-based, data-driven application developed by a distributed team and deployed onto a containerized cloud platform.
Environments running microservices are highly dynamic and could present a level of complexity in their operational data that makes root cause analysis particularly challenging and time consuming. Join Kamala Dasika from Pivotal and Michael Villiger from Dynatrace, to learn about how teams are overcoming this to manage services at scale by taking advantage of:
- Automatic application-environment discovery
- Service and process flows integrated with platform visibility, and
- Self healing platforms
This is the third webinar in the series presented by Pivotal and Dynatrace on modernizing your application portfolio to cloud-native.
Webinars in this series are searchable by title:
- Journey to Cloud-Native: Where to start in your app modernization process
- Journey to Cloud-Native: Continuous Delivery with Artificial Intelligence
- Journey to Cloud-Native: Making Sense of Your Service Interactions
- Journey to Cloud-Native: Reducing Production Risks at Scale
Thank you in advance for joining us.
About the Speakers:
Kamala Dasika has been working on the Cloud Foundry product team since its inception in 2011 and previously held various product or engineering positions at VMware, Tibco, SAP and Applied Biosystems.
Mike Villiger helps Dynatrace customers implement Application Performance Management technologies and processes in the worlds of Public/Private Cloud, DevOps, Platform-as-a-Service (PaaS) and NoSQL.
Reinforcement Learning (RL) is a field within AI that makes machines learn by trial-and-error. RL systems have improved enormously in the recent years, being able to master games like Space Invaders or Go.
However, we have many challenges ahead: How can we make RL systems that live in the real world, with real people? How can we make sure these systems remain stable and well-behaved?
In this talk we will explore these challenges and suggest a few ways forward to bring useful RL technology to people's daily lives.
Did you know if your organization receives criminal history information as part of licensing or a background checks, you are required to comply with the FBI CJIS Security Policy (CSP)? State agencies are also authorized to conduct formal audits to make sure compliance is met.
Compliance is just one benefit. Advanced authentication is also required when remotely accessing the FBI’s CJIS repository. Putting in place this technology helps law enforcement in the field have secure and timely access to important information when they need it.
Join us for an informative webinar where you will learn the basics to secure your devices, networks and users and become compliant with the FBI mandate.
Key attendee takeaways:
•Overview of CJIS mandate and Advanced Authentication
•Use case – our experience from the field
•Comprehensive solutions that meet the stringent requirements of the CJIS mandate
•Mapping solutions to the needs of your department
Quali’s CloudShell has become the de-facto cloud sandbox software platform for a variety of use-cases ranging from DevOps automation, continuous testing, cyber ranges, lab-as-a-service, hybrid cloud, demo and POC compliance and many more. With hundreds of marquee customers worldwide, it continues to add new capabilities that significantly increase Dev/Test productivity and innovation velocity while lowering costs. Release 8.0 expands upon these capabilities focusing on a multi-cloud offering with “one-click” cloud deployment paths for Microsoft Azure and OpenStack. It also includes Ansible integration.
Quali’s VP of Engineering, Edan Evantal, shares what’s under the hood of Release 8.0 and provides a no-BS engineer’s perspective.
Learn how Extremely Heavy Industries successfully develops beautiful, data-intensive applications for desktop and mobile platforms using Ext JS. Join this webinar to see Anselm McClain, Partner and Developer at Extremely Heavy Industries, share his real-world development experience of using robust web development stacks. You’ll learn about:
- Best practices and challenges of developing high-performance JavaScript applications with a large code base.
- Building your own toolkit of custom components and code patterns to maximize application usability and consistency for end-users while enhancing productivity and encouraging code re-use for developers.
- Improving the success of data-dense web applications through the visualization of information and the tight integration of traditional grid data with technologies such as D3.
The session will include a review of a cross-platform demo trading application, and discuss how Ext JS is particularly well suited to data-intensive industries like asset management and financial services.
Sencha will also provide a brief overview and demonstration of Ext JS, highlighting some of the 115+ high-performance, pre-tested, and integrated UI components.
Join Carter Morgan, Developer Programs Engineer at Google and Ryan Jarvinen, Developer Advocate at CoreOS, for an introduction to Kubernetes concepts, including:
- A general overview of Kubernetes
- What it means for the industry overall
- General concepts you need to be familiar with to jump start your way into using and seeing the benefits of a Kubernetes world
As data is increasingly accessed and shared across geographic boundaries, a growing web of conflicting laws and regulations dictate where data can be transferred, stored, and shared, and how it is protected. The Object Management Group® (OMG®) and the Cloud Standards Customer Council (CSCC) recently completed a significant effort to analyze and document the challenges posed by data residency.
Data residency issues result from the storage and movement of data and metadata across geographies and jurisdictions. Attend this webinar to learn more about data residency:
•How it may impact users and providers of IT services (including but not limited to the cloud)
•The complex web of laws and regulations that govern this area
•The relevant aspects – and limitations -- of current standards and potential areas of improvement
•How to contribute to future work
Join Dan Waymire, Senior Manager of UCSL Feature Development at HOSTING, as he dives into hybrid cloud best practices and how companies can align business and IT objectives to achieve organization goals. During the webcast, he will go over the following:
- Utilizing hybrid environments to drive better business outcomes
- Aligning IT and business goals to deliver solutions
- Case Study: A look into how HOSTING built a brand new service to resolve a real-life company need
- An introduction to HOSTING’s Monitoring Insights Service, a first-to-market solution that provides a single-pane view of all of your hybrid IT tools
As a partner in the oneM2M global IoT standards development Partnership, TIA supports its deployment around the world. oneM2M is designed as an architecture and standards platform for IoT deployments in many industry sectors including Smart Cities, Industrial Automation, Home Automation and eHealth and Telemedicine, among others.
Now in its second published release, it is being deployed in a number of projects.
Now in its second published release, it is being tested for resilience as an IoT standard in a number of projects. This webcast will focus on:
• 3 projects such as Korean Smart Cities(Busan, Ilsan) and Wise-IoT which is the Joint European-Korean project.
• In England, U.K.’s oneTRANSPORT intelligent system trial which serves four U.K. counties. This trial involves England’s highways transportation agency and two private sector sensor-network owners over a single, interoperable IoT platform powered by the oneM2M™ standard.
• Overview of oneM2M certification(including background of the need for oneM2M certification program).
• Introduction of Certified Product (Target service and use cases are included per each company).
• An update from the National Institute for Science and Technology (NIST) on its IoT-enabled Smart City Framework and oneM2M smart city collaboration.
Speakers:
-- Ken Figueredo, IoT Strategy Industry Advisor, InterDigital
-- Sookhyun Jeon, Senior Engineer, Telecommunications Technology Association (TTA)
-- JaeSeung Song, Associate Professor, Sejong University and Korea Electronics Technology Institite (KETI)
-- David Wollman, Deputy Director, Smart Grid and Cyber-Physical Systems Program Office NIST
To speak to TIA about oneM2M for further information, contact: Victoria Mitchell, Director, Global Standards Programs, at [email protected].
To learn more about oneM2M, visit: http://www.onem2m.org/
To learn more about oneM2M certification by TTA, visit: http://www.onem2mcert.com/main/main.php
Everybody wants to take advantage of the cloud to save money, make their infrastructure more instantly scalable and make app teams more productive. To realize those benefits you need to be able share data between legacy applications deployed on-premise and new apps in the cloud. Many people expect this to be easy, and are surprised to learn that this application connectivity can become quite complex and difficult to achieve if you don’t start with a holistic strategy.
So how do you achieve hybrid and multi cloud application connectivity in a simple, robust and secure manner without losing the functionality your applications need?
Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.
But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.
This webinar explains:
•Challenges to greater cloud adoption in the fintech space
•How strong authentication complements access management
•Why cloud access management is critical to an organization’s cloud adoption strategy
Andy Nieto, Healthcare IT Strategist, discusses how secure data exchange can impact patient outcomes by enabling members of a care team to easily exchange information.
Deliver Customer Value Faster Through Agile and Continuous Delivery
Today, companies must deliver customer value faster, with higher quality—and lower costs. Learn how you can accomplish this, incorporating customer feedback, and allowing developers, testers and performance teams to work in parallel.
View this on demand content to:
- Learn how Agile + Continuous Delivery produce better results when implemented together.
- Quantify the big gains you can achieve in your software delivery process.
- Discover the automated solutions you can take advantage of to see immediate gain in productivity.
Many of our customers sought out Cylance because it is highly effective in preventing ransomware attacks. We have learned firsthand how ransomware is affecting organizations of all sizes, and across all industries. In this live demonstration, Brian Robison, Senior Director, Technical Marketing at Cylance® will show how ransomware works. He will launch several attacks on unprotected machines to deliver a real-world view into how ransomware compromises systems, and how Cylance prevents ransomware attacks.
Brian will provide a live demonstration of CylancePROTECT® blocking attacks, and will discuss:
•Different ransomware types
•Delivery methods, including drive-by downloads and fileless malware
•Why launching attacks is cheap and easy with ransomware-as-a service
•How Cylance prevents both file-level and disk-level encryption
Serving public sector constituents efficiently means using today’s digital technologies – cloud services, mobile devices, web portals - to make the services your agencies provide more accessible, responsive and cost effective. But protecting information privacy and maintaining compliance can put the brakes on technology adoption even when new processes are sorely needed.
In this webinar, we will examine how on-demand secure data exchange services can empower government agencies to implement digital workflows using the latest technologies while ensuring trusted security and verifiable compliance for sensitive data:
•Digital technology accelerators
•Security and compliance brakes
•Secure data exchange services solutions
We'll take a look at some real world success stories including:
•Turning a costly background check workflow into a profit center
•Simplified statewide financial reporting workflows
•Secure data collection for sensitive population health reporting
Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere. Join Bitglass and (ISC)2 for the 3rd part of our 3-part Briefings series on May 4, 2017 at 1:00PM Eastern where n this we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.
Text to speech synthesis systems today sound very realistic, with very few artifacts and minimal signal distortion, however with little expressivity or character. While systems are certainly capable of producing a wide range of emotions and speaking styles, enabling rich character driven experiences, these are seldom, bordering to never, used in commercial applications due to one simple problem. They require human manual design.
I will not propose a solution to this, but rather aim to state where the field currently is, and make a case for a more concerted effort into automating the use of human conversational elements in speech going beyond simply reconstructing the original signal as faithfully as possible.
Organizations in every industry face the increasing threat of disruption from new business models and so they must transform to thrive in a digital economy. Leaders tasked with bringing about change, need to invest in technology that will accelerate an organization’s journey to becoming a digital business
Join Bizagi and Innovelocity as we discuss the essential characteristics of a digital business platform.
Register now and join in the discussion covering:
- The role of technology in transforming a business
- What is a digital business platform?
- The five essential characteristics of a digital business platform
- How does a digital business platform accelerate your transformation journey?
Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
Process-oriented mobile applications have the power to transform the way organizations approach digital business. To get these apps to market fast and adapt them on the fly, low-code development tools and approaches are necessary to take the burden off IT and let the business self-serve via the citizen developer.
Watch this webcast to learn about:
- Why digital business places new demands on process-oriented mobile applications.
- Agile business automation—the intersection of mobile, business process management (BPM), and low code.
- 3 mobile and BPM use cases from the field: Field workforce management, asset management, and self-service applications.
The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.
About the presenter:
Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.
Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst.
In the whirlwind of digital business where web, mobile and now line-of-business app growth is exploding across every industry, how should operations teams respond? Do you add more people, automate what your experts already do, or is there another way?
Join guest speaker Forrester Principal Analyst Dave Bartoletti and John Allwright from Pivotal for an interactive discussion of how leading companies have successfully transformed their operations functions to accelerate digital transformation.
They will share data and research on how operations teams are moving from being cost centers to the engine powering modern app development -- and how modern apps delivers value to the business beyond infrastructure efficiency.
Kubernetes is the preferred way to run your containerized applications. With features like scaling, self-hosting, and self-healing clusters, Kubernetes enables running services at scale in the cloud.
Join Rob Szumski, Tectonic product manager, on May 18 for a webinar on setting up and running a Kubernetes cluster on AWS with Tectonic. He’ll demonstrate why the Tectonic installer makes it easy to set up Kubernetes on AWS, and why AWS recommends Tectonic as the preferred tool for running Kubernetes on AWS.
The European Union General Data Protection Regulation (GDPR) is a new regulation in Europe with global impact that will come into force on May 25th, 2018. Its objective is to further strengthen data protection. Enforcement will be backed by heavy fines. Organizations that deal with data on a Global scale will need to review their data lifecycle and put in place processes and technology to be compliant. In this webinar, CA experts will be joined by one of our customers to share some thoughts around the journey organizations are on and discuss some real life examples.
Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.
So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
-Software-based security versus hardware-based security
-How this impacts your back-end systems
-Technology such as derived credentials and mobile PKI
-Implementing a mobile PKI solution
What we know and have trained users about phishing attacks has changed. Old methods no longer apply.
IT teams have deployed filters and taught our users to detect phishing attacks by scanning for suspicious URLs, spoofed login pages, and unrecognized senders. We've told people to change passwords, turn on two factor authentication and watch for suspicious logins.
None of these methods can defend against the next generation of automated, malicious API-based phishing attacks that are invisible to users and unmonitored by SaaS.
Once exclusive to advanced state-sponsored actors, the recent Google Docs worm pushed this sophisticated method into the headlines.
In this webinar we will dig deep into the next generation of phishing attack and describe the new methods every IT team must deploy to defend against them. Because the vulnerability is not unique to Google, we will also discuss Office 365, Box, Salesforce and other popular business apps.
Cloud-native platforms have rapidly gained acceptance as a means to deliver multi-cloud application deployments. But with data at the core of almost every application, how can IT organizations in highly regulated industries like healthcare, finance, and public services ensure that their production applications are backed by secure and multi-cloud databases?
Crunchy Data and Pivotal partnered with the Defense Information Systems Agency (DISA) to author the first Security Technical Implementation Guide (STIG) outlining best practices for PostgreSQL databases.
In this session, Kamala Dasika from Pivotal and Jason O’Donnell from Crunchy Data will cover how to:
- Configure PostgreSQL consistent with security best practices.
- Get on-demand, self-service access to certified open source PostgreSQL for use in high security environments.
- Leverage the built-in security and resilience of cloud-native environments to reduce risk and provide developers with a consistent experience on their cloud of choice.
Developers must often build and deploy applications that rely on isolated products. Instead of focusing on development, they find themselves worrying about the deployment and management of underlying services, as well as the configuration of historically error-prone areas like clustering, resource constraint tuning, and software updates.
Red Hat addresses this challenge by making its middleware portfolio available as containerized services, transforming them from isolated products to integrated application services running in a managed container environment.
Join this webcast to learn how to quickly and easily build a wide range of application types using Red Hat® JBoss® Middleware as containerized services on Red Hat OpenShift Container Platform.
IoT is being embraced by an increasingly diverse set of sectors and one which is reaping the benefits is the retail sector, specifically supermarkets and how they are using data in cold-chain (refrigeration) solutions. For this webinar, join Paul Edrich, CTO of IMS Evolve, who is helping major supermarket chains to manage billions of data points in real time to inform operational processes, reduce energy consumption and increase product quality.
This webinar will include the following topics:
- Refrigeration and IoT: problems, new industry trends and benefits
- What IMS Evolve does to solve the problem
- The technologies enabling their solution today
The healthcare sector is experiencing explosive growth in bandwidth demand. From transmitting MRI images to wearable devices to video consultations, networks must work at higher-than-ever speeds to deliver services that ensure patient safety. It’s clear that this demand will continue to grow exponentially, putting more and more strain on your network infrastructure. Topics to be covered include:
- How IP convergence is driving explosive growth in bandwidth demand, particularly in the healthcare sector
- Healthcare requirements and trends that are contributing to ever-increasing need for more bandwidth
- Cabling best practices that will help you avoid costly mitigation and/or reinstalls in the future
Office 365 has garnered widespread adoption from enterprises due to its advantages such as ease of deployment, lower TCO, and high scalability. Additionally, it enables end-users to work and collaborate from anywhere and on any device. Although Office 365 enables IT to shift the burden for app and infrastructure to the cloud vendor, data security remains the responsibility of the enterprise. Given the limitations of native malware protection on Office 365, should the enterprise rely on Office 365 to protect their data from malware and ransomware?
Join Bitglass and Cylance for a discussion on malware protection solutions for Office 365. We will cover the limitations of native Office 365 malware protection as well as the benefits of AI and machine learning based approaches. We will wrap up the session by discussing how CASBs, with Advanced Threat Protection (ATP) capabilities, are uniquely positioned to protect cloud apps and end-points from malware attacks and proliferation.
Join us for a conversation about the Kubernetes Operators ecosystem and the emergence of operators such as Rook, Kafka and ElasticSearch.
Travis Nielson, creator of the Rook Operator, Steve Sloka, creator of the Elasticsearch Operator, Jakob Karalus, creator of the Kafka Operator, will talk with Paul Burt, Community Manager at CoreOS to go over how to deploy these complex applications on Kubernetes, while also providing insight into the future of distributed systems.
Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.
In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Peter Carlisle, EMEA Sales Director for Thales eSecurity, as they share the following helpful insights:
• Short synopsis of the timeline and key provisions of GDPR
• Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
• Summarise the six fundamental strategies for safeguarding sensitive data
• Identify the three most important capabilities for addressing GDPR requirements
Assessing performance of a general and flexible business process management (BPM) products and solutions is challenging. It's notoriously difficult to assess, measure, and accurately predict how a product or solution will scale under normal use and load. Each user's unique business requirements and specific implementation design must be taken into account.
Red Hat has partnered with Vizuri, an IT consulting firm, to provide you with a performance test tool for any BPM framework or process server. The BPM performance test tool can be used to model and assess many different scenarios simulating a set of reusable resources. The results will be a uniform performance evaluation that accounts for as much end-user process design and implementation variability as feasible.
Join this webcast to learn more about this tool through a case study on Red Hat® JBoss® BPM Suite.
Now, you can use Ext JS 6.5 to deliver rich desktop and tablet experiences for your data-intensive, cross-platform web applications – using the Ext JS Modern toolkit. With Cmd 6.5, you get support for ES2015 (formerly ES6) in Ext JS apps, dynamic package loading and support for Progressive Web Apps.
Join us for our upcoming webinar, where you will learn about:
Powerful new components and charts - DatePanel, Box Plot, Navigator
Major enhancements to modern Grid, List, Menu and Form
Enhancements to premium components - Pivot Grid and Exporter
Support for ES6, PWA, and Dynamic package loading with Cmd 6.5
Organizations continue to adopt cloud strategies and technologies at a dizzying pace. Many organizations now look at new IT projects with cloud optics. With the volume of data being transmitted to, from and existing in the cloud ever increasing, protecting that data can be challenging. How can this data, which is always on the move and in myriad locations, have a coordinated security strategy? Join McAfee and (ISC)2 on May 25, 2017 at 1:00PM Eastern for a discussion on how to unify data security across applications, clouds and various locations.
Your enterprise and applications need to communicate – to collect information from many sources and get data where and when it needs to be, which increasingly means in real-time. Complicating matters, as you migrate applications to the cloud and implement IoT strategies, they need to connect increasingly diverse endpoints and systems running in diverse public cloud, private cloud and on-premise environments.
In this webinar, we’ll describe and demonstrate how the Solace Virtual Message Router can give applications and microservices running in Pivotal Cloud Foundry the ability to exchange information using open APIs and protocols like AMQP, JMS, MQTT, Qpid, Paho, REST and WebSockets. Jonathan Schabowsky of Solace’s office of the CTO will show how easily you can enable real-time communications between microservices with the new Solace Messaging Tile for Pivotal Cloud Foundry and how you can integrate Solace into your crucial data movement solution.
Our Speaker:
Jonathan Schabowsky is a Sr. Architect in the Office of the CTO at Solace. His expertise includes architecting large-scale, mission critical enterprise systems in various domains, such as for the FAA, satellite ground systems (GOES-R) and healthcare. Recently, Jonathan has been focused on the use of event driven architectures for microservices and their deployments into platform-as-a-services (PaaS) running within public clouds.
Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.
Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.
While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.
In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:
• The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention
• Practical steps both teams can take to transition to a secure DevOps environment
• Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle