This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Recently, Cisco hosted a webinar discussing many reasons to modernize VPNs to ZTNA, which included better security, more flexibility, improved user experience, and reduced IT complexity. Pitfalls to avoid with modern remote access Transitioning from VPN to ZTNA isnt without its challenges, according to this webinar.
Ericsson is best known for its role in telecom infrastructure, but it recently did a webinar onIoT. The Ericsson webinar describes the essential features our empowerment of the missing demands, but not applications that actually reach them. Candidates for that role, it seems to me, are in fact the target of the webinar.
Zero-trust architectures that are built for management simplicity can mitigate these issues. To learn more about EMAs new zero-trust networking research, check out this free on-demand webinar , which highlights our key findings.
This webinar format will enable us to dynamically present and then interact with the architects, program managers and technology executives attending. This webinar will examine how to economically enhance security and functionality by leveraging Cloudera and Intel. Please join us and come ready to ask the hard questions.
With data stored in vendor-agnostic files and table formats like Apache Iceberg, the open lakehouse is the best architecture to enable data democratization. In this webinar, Dremio and AWS will discuss the most common challenges in data architecture and how to overcome them with an open data lakehouse architecture on AWS.
This webinar format will enable us to dynamically present and then interact with the architects, program managers and technology executives attending. This webinar will examine how to economically enhance security and functionality by leveraging Cloudera and Intel. Please join us and come ready to ask the hard questions.
Widely known security practitioner Dave Schackleford is presenting a webinar on Thursday 15 may at 2pm Eastern that should be of high interest to any enterprise technologist seeking to understand the dynamics of the modern data breach. By Bob Gourley. The following is from the invitation: You’re a target for data breach.
In a way, the battle between sustainability objectives and AI and development objectives inside government and across society hasnt really begun, Lawrence explained on a recent webinar sharing the research firms predictions.
On Thursday April 23 at 2pm Eastern/11am Pacific, I’ll be participating in a webinar I hope you will find of interest. This online discussion will provide insights into how data architectures can be improved in the age of hybrid cloud computing.
Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered. What methods and architectures you should consider to proactively protect your data. We are excited to be joined by a CTO who is an expert in pragmatic choices around security.
Forrester’s multi-episode webinar series on AI delves into the profound impact AI has – and will continue to have – both on how data scientists and software engineers approach their work and how other job functions will have to adapt to […]
Register now for our 21 May webinar with SAS focusing on architecture and design patterns for optimizing SAS and Hadoop. Bob will be joined by one of SAS's leading big data architects for a dive into the architecture of this mission-focused approach. Signup: Webinar Link. Date: 21 May.
We will be presenting some new design patterns examined in this paper in a webinar we have just announced for 11 December at 10am. To sign up for the webinar see: [link]. Download the paper here: Cloudera-Intel Partnership. Analysis Big Data CTO Cyber Security DoD and IC'
on 21 May at 1pm, CTOvision publisher Bob Gourley will host a webinar SAS engineers in an overview of architectural best practices for SAS and Hadoop. This webinar will examine lessons learned, best practices and concepts of operation designed to help you make the most of your data. By Bob Gourley.
Speaker: Jeremiah Morrow, Nicolò Bidotti, and Achille Barbieri
In this webinar, learn how Enel Group worked with Agile Lab to implement Dremio as a data mesh solution for providing broad access to a unified view of their data, and how they use that architecture to enable a multitude of use cases. Register now for the webinar on June 9, 2022 at 2:00 am PST, 5:00 am EST, and 11:00 am CEST.
Please join us for a discussion on automated removal of cyber threats on Thursday June 12 at 11am eastern for a webinar that will provide insights on how to execute on automating for defense. Participants in this webinar will: . Odds are you have concluded that the only way to mitigate the threat is through automation.
Please join us for a discussion on automated removal of cyber threats on Thursday June 12 at 11am eastern for a webinar that will provide insights on how to execute on automating for defense. Participants in this webinar will: . Odds are you have concluded that the only way to mitigate the threat is through automation.
By Bob Gourley Cloudera and Zoomdata Introduce the Next Generation of Data Analytics in a 27 Aug webinar (11am Eastern). Join us for this webcast to see how Zoomdata is able to leverage Impala to connect, access, and stream process billions of records in real-time using a no-ETL architecture. Discuss next generation data analytics.
As a networking and security strategy, zero trust stands in stark contrast to traditional, network-centric, perimeter-based architectures built with firewalls and VPNs, which involve excessive permissions and increase cyber risk. The main point is this: you cannot do zero trust with firewall- and VPN-centric architectures.
It’s no surprise many CIOs and CTOs are struggling to adapt, in part because their architecture isn’t equipped to evolve. This webinar will discuss what’s at stake if companies continue to use long term architecture plans. The connection between software architecture and team structure.
Perimeter-based architecture means more work for IT teams More doesnt mean better when it comes to firewalls and VPNs. Expanding a perimeter-based security architecture rooted in firewalls and VPNs means more deployments, more overhead costs, and more time wasted for IT teams but less security and less peace of mind.
Analysts are able to leverage comprehensive enterprise data stores by use of familiar interfaces and methods and with the well engineered SAS and Hadoop architecture can dramatically improve their results for mission. The post Webinar 21 May: SAS and Apache Hadoop for Government appeared first on CTOvision.com. Sign up here.
If you spend any amount of time reading whitepapers, analyst research, or attending webinars you’ll see the term digital transformation used in conjunction with a wide range of enterprise-focused technologies ranging from data centers to application development, to enterprise architecture and AI […].
This webinar format will enable us to dynamically present and then interact with the architects, program managers and technology executives attending. This webinar will examine how to economically enhance security and functionality by leveraging Cloudera and Intel. Please join us and come ready to ask the hard questions.
Speaker: Ahmad Jubran, Cloud Product Innovation Consultant
Many do this by simply replicating their current architectures in the cloud. Those previous architectures, which were optimized for transactional systems, aren't well-suited for the new age of AI. In this webinar, you will learn how to: Take advantage of serverless application architecture.
At 11am EDT Carahsoft is hosting a webinar featuring Datameer and Cloudera diving into ways to find waste, fraud and abuse through big data analytics. From the webinar page: Finding Fraud, Waste, and Abuse through Big Data Analytics with Cloudera and Datameer. The proper architecture for fraud analytics on industry standard hardware.
Join Verisign for their webinar on the " Framework for Resilient Cybersecurity ". A shift in security architecture is needed, to an open platform where devices and services from different vendors can share, and act, on threat intelligence information, all in concert and in the proper context. Katie Kennedy. Duration : 1 hour.
Zero trust architecture with Zscaler Zero trust is not another point product to add to the perimeter-oriented status quo , with its firewalls, VPNs, castle-and-moat security, and the weaknesses of that methodology. Let’s discuss zero trust, AI, and how Zscaler brings the two together to fantastic effect. Let’s discuss a quick example of each.
Join the latest Global Architecture Forum webinar for an insightful session exploring the topic of partnering. • the new zero touch partnering reference architecture • the business success framework to enable partnering as a strategic capability for your organization into the future.
Speaker: Ron Lichty, Consultant: Interim VP Engineering, Ron Lichty Consulting, Inc.
As a senior software leader, you likely spend more time working on the architecture of your systems than the architecture of your organization. In fact, the impact of software architecture parallels the impact of organizational structure. Yet, structuring our teams and organizations is a critical factor for success.
In a recent Gartner webinar poll of more than 2,500 executives , 38% indicated that customer experience and retention is currently the primary purpose of their genAI investments, while 26% say revenue growth as the focus of their AI initiatives. Are you hoping it will open up or drive new lines of revenue?
Analysts are able to leverage comprehensive enterprise data stores by use of familiar interfaces and methods and with the well engineered SAS and Hadoop architecture can dramatically improve their results for mission. SAS and Hadoop work together in ways supportive to enterprise missions. Sign up here.
The business architecture member project team will share the details of their work on business architecture capabilities and value streams, and how they can help derisk strategic planning and transformation initiatives. Register to join this Global Architecture Forum webinar. Register now. Register now. external_url.
Join this webinar to find out: Why the traditional BSS model is end of life. The role of the Open Digital Architecture and Open APIs in migrating to a more open, configurable BSS. What could a new model for BSS look like and how can we get there? What is the Telefónica vision for a new BSS.
Speaker: speakers from Verizon, Snowflake, Affinity Federal Credit Union, EverQuote, and AtScale
Join this webinar panel for practical advice on how to build and foster a data literate, self-service analysis culture at scale using a semantic layer. In this webinar you will learn about: Making data accessible to everyone in your organization with their favorite tools. Driving a self-service analytics culture with a semantic layer.
By Bob Gourley On Wednesday November 6th at 1pm EST Platfora is hosting a webinar providing details of the new Platfora Big Data Analytics platform. This webinar will be conducted by Peter Schlampp, Platfora’s Vice President of Products. From the webinar invite: Using Hadoop to Build a Fact-Based Enterprise with.
Ralph Kimball has some thoughts on Apache Hadoop and will be sharing them during a webinar Wednesday 2 April 2014 at 1pm eastern. Register for the webinar and receive a free guide to dimensional modeling from his latest book. Online Webinar | April 2, 2014 | 10AM PT / 1PM ET. For more see: [link].
In this gathering of the Global Architecture Forum, we’ll explain how Telenor Norway solved this challenge by implementing the concept of a “Model Factory” and boosted productivity in Telenor’s analytical department.
“The cost of building and operating data centers, after a fairly sustained period where [costs were] drifting downwards, has gone up in the last several years,” said Lawrence, during a webinar sharing the survey results.
Join this webinar to understand the move to 5GC and assess its impact on the telecoms industry and its customers. What 5G core means to current operational architectures and the early adopters. This ecosystem will be capable of providing the next generation of B2B and B2C service models.
While a data center migration can be a daunting challenge, it also offers a great opportunity to improve and rethink your IT architecture and examine how well it meshes with your organization''s long term business strategies. Join Data Center Knowledge team for our next webinar where we discuss the.
By taking EXLs expertise in helping enterprises design both legacy and modern architectures and building it into these agents, the tool tackles every migration task with greater accuracy and efficiency: Business Analyst: Code explanation, documentation, pseudo code.
Join this webinar to discuss what it will take to move to a more open, digital architecture. Future OSS must be proactive, predictive and programmable by the customer who needs to see that value is being delivered.
Zero trust has quickly cemented itself as the go-to solution to the problems of these perimeter-based architectures. Zero trust is an architecture ; it is neither an extra lever for the status quo nor a mere figment of a hopeful or naive imagination. Read on to see the four key areas protected by a complete zero trust architecture.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content