Watch the full OnDemand Webcast: http://bit.ly/WihOoX
IT and Telecom departments are realizing that the performance of the underlying infrastructure is paramount to successful VoIP implementation with Unified Communications (UC). To get the real benefits of UC, your network needs to perform at optimal levels.
In this webcast, you will receive a framework that allows you to answer the following questions:
How Do You Deal with the Challenges of Jitter, Packet Loss, Echo/Delay, and Voice Signal to Noise?
How Do You Balance High-speed, Bursty Data Requirements with Requirements of High Quality Voice Calls?
How Do You Create Help Desk Guidelines to Correctly Direct Problems to a Voice or LAN/WAN Subject Matter Expert?
How Do You Make Sure that When Adding UC to the Mix that Your Users are Receiving the QoS that They Deserve?
European after-sales service company, with technical agencies all over France and the United Kingdom, dedicated to industrial machine manufacturers.
Installation, maintenance, technical assistance, customer support, field engineers.
Customer service based on skilled and experienced engineers spread over several countries, a unique software management tool and Video Assisted Maintenance technology.
Multi-Link Inc. is offering a leasing program for corporate accounts installing The Stick for their own use. The program provides for rapid deployment, and long term product protection and support, all without any upfront equipment costs.
Understanding the Dynamics of the Cloud, Current and Emerging TrendsProformative, Inc.
Proformative presents Understanding the Dynamics of the Cloud, Current and Emerging Trends. Special thanks to Ken Piro, Western Region CTO and Sungard Availability Services.
To download full presentation, visit http://bit.ly/9E0J0s
European after-sales service company, with technical agencies all over France and the United Kingdom, dedicated to industrial machine manufacturers.
Installation, maintenance, technical assistance, customer support, field engineers.
Customer service based on skilled and experienced engineers spread over several countries, a unique software management tool and Video Assisted Maintenance technology.
Multi-Link Inc. is offering a leasing program for corporate accounts installing The Stick for their own use. The program provides for rapid deployment, and long term product protection and support, all without any upfront equipment costs.
Understanding the Dynamics of the Cloud, Current and Emerging TrendsProformative, Inc.
Proformative presents Understanding the Dynamics of the Cloud, Current and Emerging Trends. Special thanks to Ken Piro, Western Region CTO and Sungard Availability Services.
To download full presentation, visit http://bit.ly/9E0J0s
Automated Management of Intelligent Devicesuplogix
The trend toward smarter, more connected devices and systems will drive business requirements for networks that provide uptime and security, but at an acceptable operating cost. A key piece of the solution is to scale network management through distributed, local automation.
Considerando as necessidades do mercado e embasada por experiência própria, a Camanho & Consultores, formatou um novo serviço, chamando-o de CaaS - CIO as a Service.
Savvius Vigil is the first network appliance able to intelligently store months of packet-level information to enhance security investigations. Savvius Vigil integrates with your existing SIEM platform to examine packets related to a breach weeks or months after the incident occurred. This information is often vital to a full understanding of the threat.
Automated Management of Intelligent Devicesuplogix
The trend toward smarter, more connected devices and systems will drive business requirements for networks that provide uptime and security, but at an acceptable operating cost. A key piece of the solution is to scale network management through distributed, local automation.
Considerando as necessidades do mercado e embasada por experiência própria, a Camanho & Consultores, formatou um novo serviço, chamando-o de CaaS - CIO as a Service.
Savvius Vigil is the first network appliance able to intelligently store months of packet-level information to enhance security investigations. Savvius Vigil integrates with your existing SIEM platform to examine packets related to a breach weeks or months after the incident occurred. This information is often vital to a full understanding of the threat.
Presentation to the Oregon Legislature on the latest economic and revenue outlook for the State of Oregon. Overview of the U.S. and international economic landscape in addition to what is happening in Oregon. Tax revenue tracking and outlook for personal income taxes, corporate income taxes and Lottery sales.
An immersive workshop at General Assembly, SF. I typically teach this workshop at General Assembly, San Francisco. To see a list of my upcoming classes, visit https://generalassemb.ly/instructors/seth-familian/4813
I also teach this workshop as a private lunch-and-learn or half-day immersive session for corporate clients. To learn more about pricing and availability, please contact me at http://familian1.com
How to Become a Thought Leader in Your NicheLeslie Samuel
Are bloggers thought leaders? Here are some tips on how you can become one. Provide great value, put awesome content out there on a regular basis, and help others.
Gigamon U - Missing Link TAP TechnologyGrant Swanson
One of the most difficult challenges facing Security, VoIP, and Network Management Solutions is how to implement network tools onto enterprise networks. Enterprise networks are becoming more complex when looking at how to monitor and capture data. It can be difficult or impossible to gain access to network SPAN Ports or inserting In-line Devices like Intrusion Prevention Systems into enterprise networks. Contention for network access is a major problem. Learn how to design a network access solution that meets the requirements for security, network monitoring, and overall network access solutions. We help solve the questions, How do I get secure access to the network for capturing data or monitoring data traffic? Why TAP your network?
Best Practices for Analyzing VoIP at 10GSavvius, Inc
Watch the full OnDemand Webcast: http://bit.ly/networkanalysis10G
Network analysis on highly utilized 10G network segments is already a complicated business, and that’s just for traditional TCP/IP data protocols. Add time-sensitive protocols like VoIP into the mix, with its associated complexities like QoS configuration and MPLS segmentation, and you could have a real mess on your hands.
Which network analysis systems can handle throughput at 10Gbps, especially with a high percentage of small packets that are characteristic of VoIP traffic? Which systems can display VoIP statistics in real-time, providing critical data and alerts on current VoIP performance, while also saving 10Gbps traffic to disk for more detailed post capture analysis? Which systems can capture and analyze the traffic from your busy enterprise VoIP system - thousands of concurrent VoIP calls?
Your choices in addressing these issues are limited. In this webinar, Jim Frey, Managing Research Director at Enterprise Management Associates and Jay Botelho, Director of Product Management at WildPackets discuss the challenges network engineers face and walk you through your options.
They will cover:
Challenges of capturing and analyzing mixed network data on heavily utilized 10G network segments
Conflicting demands of traditional (TCP/IP) data analysis and VoIP analysis
Critical VoIP statistics and their relationship to call quality
A real-time demo of the TimeLine appliance for network forensics
What you will learn:
Best practices for monitoring and analyzing heavily utilized 10G network segments with mixed data types
How to configure TimeLine for optimum network analysis and troubleshooting
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
With over 10 years of deployment history, VoIP is the primary voice solution for just about every company in existence - large, medium, or small. But even with all that history, recent research from TRAC shows that VoIP is still the number one IT initiative impacting network performance. And with the growth of 802.11 and Wi-Fi enabled smart phones, the use of voice over Wi-Fi (VoFi) promises to increase the volume of VoIP traffic even more. Analyzing VoIP traffic alone is not enough. VoIP analysis must be part of your overall network performance analysis. After all, VoIP is just another data type on your network, and according to TRAC, it is impacting your network performance, so you must monitor and analyze the network as a whole, including voice and video over IP. Join us to see how easy it is to capture and analyze voice, video, and data traffic simultaneously, allowing you to pinpoint the impact of each data type on your overall network performance.
Bandwidth Management and Control – Who Cares? BW Is Cheap.Savvius, Inc
Watch the full OnDemand Webcast: http://bit.ly/bandwidthmanagement
Bandwidth is cheap, and getting cheaper. That’s probably why the solution to most network problems today is to just throw more bandwidth at it. And although this may alleviate the symptoms of the problem de jour, it doesn’t address the root cause. Bandwidth-related network issues are often an early warning sign of brewing problems, or they can indicate a problem that needs immediate attention, like an infected client reaching out to everyone else on the network.
Bandwidth management and control spans several factors, with the most important being breadth and time. For large enterprise networks, you need to take a top-down approach, assessing overall bandwidth usage at the geographical level first, then drilling into specific areas when anomalies occur. Monitoring and management needs to occur in real time, with the ability to quickly transition into troubleshooting mode, but also needs to support long-term statistical storage for historical and trending analysis. Without a baseline of past behavior, how do you know if there’s a problem now?
With effective bandwidth management and control, you’ll be the hero. Please join us to see how WildPackets can help you meet the bandwidth management challenge while simplifying your network monitoring and analysis infrastructure. You’ll know exactly when more bandwidth is really needed, and you’ll be able to justify it with detailed reports. But you’ll also know when bandwidth usage deviates from normal, indicating a potentially dangerous condition on the network that needs immediate analysis, and you’ll have the tools in place to instantly begin the root cause analysis.
In this web seminar, we will cover:
- The basics of bandwidth management and monitoring
- Key requirements for a complete bandwidth management and monitoring solution
- The importance of establishing network performance baselines
What you will learn:
- How to identify network problems masked as bandwidth issues
- How to use real-time and historical reporting to justify bandwidth upgrades
- How to employ a single solution that spans simple reporting to detailed, root-cause analysis
This is a PowerPoint Presentation I updated for the VP of I.T. Most of the copy is his, however the format itself is all new. Due to the fact I downgraded this to a PDF for this site's purposes, the movement and sound has been compromised. With that in mind, I've been told it's quite a zippy slideshow for such a dry subject! I have also deleted several slides which had pictures of employees and changed their names elsewhere.
One indication that you’ve become really successful in your profession is when you have budget for an assistant. Let’s face it, as a network engineer, this just isn’t in the cards. Or is it? WildPackets is introducing the OmniPeek Remote Assistant, and it’s exactly the kind of assistant that a network engineer needs. Let’s say you work for a large retailer and you’re having an issue with a PoS system at a store clear across the country. Or perhaps you work for a network equipment company, and one of your customers has called to report degraded performance of the system. The OmniPeek Remote Assistant allows you to send a lightweight software utility to the location in question, and any network user, even one with no network engineering expertise at all, can run the utility and collect all the data you need without you ever leaving your desk. You have the data you need in record time, and you can immediately begin analyzing it at your desk. And best of all the data is fully encrypted, so even if the data in question is sensitive you are the only person who can access it. With the OmniPeek Remote Assistant, you’ll save time and money with each use, and you’ll feel as important as the assistant-wielding executive in the corner office.
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Savvius, Inc
Watch the full OnDemand Webcast: http://bit.ly/networkmonitoringandreporting
History repeating itself is often a bad thing. But how about on your network? When your network is running smoothly you want history to repeat itself, but when problems occur you want to know when, where and why they occurred and prevent them from repeating themselves. The theme here is history, and if you can’t adequately display, analyze and report on your network’s history, you'll never know if you’re repeating it – good or bad.
WatchPoint from WildPackets records your network history, minute by minute, from multiple sources, including SNMP, NetFlow, sFlow and WildPackets network analysis probes. Data from these varied sources are aggregated into a single reporting solution, for months or even years, providing both up-to-the-minute and long-term historical reporting and analysis of network events. When used with WildPackets network analysis and recording probes, including TimeLine, additional network details like Expert analysis and VoIP performance are also recorded for both up-to-the-minute and long-term historical reporting. With WatchPoint, you'll understand when history should be repeated, and when it should be avoided!
In this webcast, we will cover:
Key technologies used in long-term network reporting
The limitations of single technology approaches
The value of long-term historical reporting and analysis
What you will learn:
Determining long-term trends using WatchPoint
Troubleshooting ongoing issues with WatchPoint
Generating detailed, scheduled reports
Linking directly from high-level reporting to detailed packet analysis
Network Analysis Tips & Tricks with OmnipeekSavvius, Inc
With a corporate history spanning 25 years, and hundreds of person-years of customer-facing network analysis and troubleshooting experience, we’ve come across more than a few best practices along the way. OmniPeek Enterprise is WildPackets’ flagship product, offering an intuitive, easy-to-use graphical interface that you can use to rapidly analyze and troubleshoot enterprise networks. In this web seminar, our subject matter experts will demonstrate some of their favorite OmniPeek features, including steps on how to quickly analyze, drill down and fix network performance bottlenecks across multiple network segments.
The blind spot in virtual servers - seeing with network analysisSavvius, Inc
Virtual servers are now commonplace. Virtual storage is taking the IT market by storm. And the virtual data center and virtual networks are visible on the horizon. Virtualization provides tremendous efficiencies, reducing the cost of equipment, management, and even utilities. But as with most technological shifts there are consequences, especially in network analysis, that must be addressed. Virtualization, regardless of the “flavor”, creates a blind spot - a loss of visibility into traffic between virtual applications or virtual systems - when using traditional network analysis products and techniques. In this webinar, we will dissect this problem and demonstrate ways to overcome these network blind spots.
In this web seminar, we will cover:
How network blind spots occur
Where network blind spots occur
How to identify which flavors of virtualization are most vulnerable
You will learn how to:
Establish goals for virtual network analysis
Identify the best network analysis solutions for each virtualization flavor
Configure your virtual network for the realities of network analysis
mimacom & Liferay Roadshow : Introduction to Liferay platformJán Gregor
A talk from Joseph Shum, the General manager of Liferay Germany, focused on Introduction to Liferay platform on mimacom & Liferay Roadshow in Vienna on 6th June 2012
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
With over 10 years of deployment history, VoIP is the primary voice solution for just about every company in existence - large, medium, or small. But even with all that history, recent research from TRAC shows that VoIP is still the number one IT initiative impacting network performance. And with the growth of 802.11 and Wi-Fi enabled smart phones, the use of voice over Wi-Fi (VoFi) promises to increase the volume of VoIP traffic even more.
Analyzing VoIP traffic alone is not enough. VoIP analysis must be part of your overall network performance analysis. After all, VoIP is just another data type on your network, and according to TRAC, it is impacting your network performance, so you must monitor and analyze the network as a whole, including voice and video over IP. Watch to see how easy it is to capture and analyze voice, video, and data traffic simultaneously, allowing you to pinpoint the impact of each data type on your overall network performance.
Network Forensics Backwards and ForwardsSavvius, Inc
When you suspect an attack, you need to answer the questions who, what, when and how - fast. Network forensics is the answer. In this webinar, you'll learn from our special guest, Keatron Evans, how network forensics—network traffic recording along with powerful search and analysis tools—can enable your in–house security team to track down, verify, and characterize attacks. Keatron will walk you through a few real-world security breach scenarios and demonstrate live best practices for attack analysis using network forensics to find the proof you need quickly to take action.
Special Guest: Keatron Evans:
Keatron, one of the two lead authors of "Chained Exploits: Advanced Hacking Attacks From Start to Finish", is regularly engaged in training and consulting for members of the United States intelligence community, military, and federal law enforcement agencies. Keatron specializes in penetration testing, network forensics, and malware analysis. Keatron serves as Senior Security Researcher and Principle of Blink Digital Security which performs penetration tests and forensics for government and corporations.
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
When you suspect an attack, you need to answer the questions who, what, when and how - fast. Network forensics is the answer. In this webinar, you'll learn from our special guest, Keatron Evans, how network forensics—network traffic recording along with powerful search and analysis tools—can enable your in–house security team to track down, verify, and characterize attacks. Keatron will walk you through a few real-world security breach scenarios and demonstrate live best practices for attack analysis using network forensics to find the proof you need quickly to take action.
Special Guest: Keatron Evans:
Keatron, one of the two lead authors of "Chained Exploits: Advanced Hacking Attacks From Start to Finish", is regularly engaged in training and consulting for members of the United States intelligence community, military, and federal law enforcement agencies. Keatron specializes in penetration testing, network forensics, and malware analysis. Keatron serves as Senior Security Researcher and Principle of Blink Digital Security which performs penetration tests and forensics for government and corporations.
Omnipliance WiFi, the only WLAN analysis solution to enable monitoring, analysis, and troubleshooting of distributed, multi-gigabit 802.11ac traffic. The latest release allows WLAN administrators to identify and solve network access, capacity, security, and performance problems as they occur, without ever leaving their desks.
With organizations rapidly transitioning to the 802.11ac wireless standard, wireless network data rates now easily exceed one gigabit per second (Gbps), and have been recorded maxing out at nearly seven gigabits per second. These speeds exceed the capabilities of the 433 Mbps capture-rate of traditional USB-based adapters for laptops that network engineers have been relying on for years to monitor and troubleshoot WLANs.
Join us for this short, 30-minute webinar where Jay Botelho, Director of Product Management, will give an intro to the new Omnipliance Wifi.
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
Do you think it requires an advanced degree to initiate an advanced security attack? Think again. Tool kits are readily available for immediate download that guide those with even just basic computer skills through the steps to initiate complex network attacks. But all hope is not lost. One of the best defenses is readily available in the market today – network recorders with network forensics – and when combined with the appropriate visibility fabric architecture, these solutions defend against attacks on even the fastest networks available today.
Join WildPackets and Gigamon as we explore the current state of network attacks, network vulnerabilities, and the solutions available to combat the most aggressive, and the most subtle, attacks.
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
As competition increases and prices drop, 40G networking infrastructure is quickly becoming the norm in large enterprise networks, and those in medium-sized businesses will be quick to follow. Rapidly increasing network speeds are putting a strain on traditional network visibility and analysis solutions, regardless of the technology used. But faster networks require more, not less, visibility!
Join us as we investigate cost-effective solutions that provide not only visibility, but detailed metrics for network performance that enable immediate troubleshooting and root cause analysis, on 40G and even 100G network segments. Don’t compromise on speed, or the underlying visibility and analysis required to maintain high-speed network performance.
Your network is your business, so downtime and performance degradations are mission-critical problems, affecting productivity, revenue, and relationships with customers and partners. Combine this with a widely distributed workforce and the accompanying widely distributed network infrastructure of most modern companies, and the challenges of real-time network management and troubleshooting seem overwhelming. However, by building distributed, intelligent network analysis that includes your remote offices, vital information for management and troubleshooting is always at your fingertips.
WildPackets is leading the charge with its Omni Distributed Analysis Platform. Join this webinar to see how WildPackets provides visibility across your entire network, from data centers to remote offices, providing highly distributed network analysis and troubleshooting with a single, distributed cost-effective solution.
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
The new IEEE 802.11ac standard is changing the rules when it comes WLAN troubleshooting based on packet capture and analysis. No one disagrees that packet-based analysis is the most complete and most accurate when it comes to WLAN troubleshooting, but the software, equipment, and processes required to perform packet-based analysis are being challenged by 802.11ac. Attend this webinar to discover how 802.11ac is changing the rules for packet-based WLAN analysis, and what you can do about it.
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
Network breaches are on the rise, and the consequences are getting more dire. Needless to say, you don't want to be the next Target.You've invested in security tools like firewalls and IPS systems. But today's stealthy attacks can still get through. When you suspect an attack, you need your insurance policy—network forensics.
In this seminar, you'll learn how network forensics—network recording along with powerful search and analysis tools—can enable your in-house security team to track down, verify, and characterize attacks.
You'll also learn about the requirements for effective forensics on today's 10G and 40G networks.
And you'll learn some best practices for configuring captures to help you and your team pinpoint and remediate anomalous behavior that could signal an attack.
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
Today's networks are high-speed, widely distributed and mission-critical, making network and application performance monitoring and troubleshooting essential, and very challenging. Oftentimes the statistical data used to compile the monitoring dashboards and reports are insufficient for performing detailed root cause analysis, driving network engineers to use multiple products from multiple vendors to perform different levels of analysis. This significantly increases the cost for IT departments to do business, in a time when budgets are already razor thin. Join us to see how one product can do it all, on all network segments, 10, 40 and even 100GbE
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
The proliferation of wireless handheld devices, especially tablets and smart phones, puts increased strain on today's wireless networks. As the technology continues to evolve rapidly, network engineers are in a race to keep up—both with system interoperability concerns, and throughput, reliability, and security issues. Now more than ever, you need a solid understanding of requirements and the solutions available for wireless network monitoring and analysis. Special attention is required when managing networks with voice and video over Wi-Fi. This webinar will not only address the tools needed for securing your network and optimizing performance, but will discuss how you can identify and monitor the maximum threshold for voice and video over Wi-Fi capacity.
The Changing Landscape in Network Performance Monitoring Savvius, Inc
Late in 2013 TRAC Research, a market research and analyst company that specializes in IT management, published research findings on key trends in the Network Performance Monitoring market. The research highlights some challenges, and well as some common misconceptions, with the state of Network Performance Monitoring solutions. Join us as we host Bojan Simic, Principal Analyst at TRAC Research, who will share his insights on these research findings as well as his perspectives on the changing landscape in the Network Performance Monitoring market.
Think network forensics is just for security? Not with today’s 10G (and tomorrow’s 40G/100G) traffic, not to mention new 802.11ac wireless networks with multi-gigabit data rates. Data is traversing these networks so quickly that detailed, real-time analysis is at best a challenge. Network forensics provides key real-time statistics while saving a complete, packet-level recording of all network activity. You don’t need to worry about capturing the problem – your network forensics solution already has, allowing you to go back in time and analyze any network, application, or security condition.
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
Hear Craig Mathias of Farpoint Group and Jay Botelho of WildPackets discussing 802.11ac: Technologies and Deployment Strategies, where they will offer their insights on the importance of 802.11ac now and in the future.
With a wide variety of enterprise-class 802.11ac products now appearing in the market, IT leaders have some interesting questions to consider: What are the key features and benefits of 802.11ac? Should 802.11ac be deployed now, or later? How should these deployments be staged? What about situations where 802.11ac isn't scheduled for near-term operation, but potential threats like rogue 802.11ac APs demand near-term solutions?
Omnipliance family - Powerful Precise AffordableSavvius, Inc
In a recent survey by WildPackets, we reconfirmed the obvious – a large majority of you are already supporting 10G networks. But we also uncovered some surprises. It appears that although networks are moving to 10G (and beyond), network visibility does not seem to be keeping up. Real-time network analysis—until now, recognized as an essential tool for NOCs and IT engineers generally--is seen as no longer a viable option. In the opinions of survey respondents, current network analysis solutions simply lack the flexibility, along with the power, reliability, and accuracy, to address network analysis needs at 10G and beyond.
Join us as we dive into our survey results, and then compare perception and reality. Are network analysis tools really not keeping up with 10G? Is the era of real-time analysis finally over? As data volumes rise, must every forensic search be slow and laborious? Is 10G turning out to be a step forward for network throughput but a step backward for network management?
It's time for an open and honest assessment of what's really possible. We'll dispel the myths, confirm the realities, and present the best techniques available for performing network analysis at 10G and beyond. No more compromising.
In this web seminar, we will cover:
- The state of faster networks
- The myths and realities in high-speed network analysis and forensics
- How to use the latest technologies to meet your network analysis and forensics needs
What you will learn:
- How your colleagues view high-speed network analysis and forensics
- How to scale your network analysis and forensics capabilities as your network scales
- How to eliminate compromises in network analysis and forensics at 10G and beyond
Watch the full ondemand webcast here: http://bit.ly/1aOEYIb
Gigabit wireless is quickly becoming a reality. With ratification of the 802.11ac specification right around the corner and a wide range of commercial 11ac devices already available based on the draft standard, the pressure is building to have a network monitoring and analysis system in place that can handle the demands of gigabit wireless. Is your wireless LAN (WLAN) network analysis system up to the task? Can it even capture 802.11ac traffic, let alone run at the speed necessary to handle gigabit data rates? Join us as we uncover the demands that 802.11ac places on WLAN analysis, and see a demonstration of the only complete WLAN analysis solution for 802.11ac – both analysis AND data capture.
Real-Time Visibility into High Speed NetworksSavvius, Inc
Real-time network monitoring and analysis is no easy task on highly-utilized 10 and 40 gigabit networks. Span ports for capturing data may be oversubscribed, or not even available. Simultaneous analysis of multiple data-types or multiple network segments at different speeds is often required. What can you do to address this increased management complexity? Which techniques that worked well on 1G network segments should you avoid? What best practices should be applied?
Achieving both real-time visibility and storing historical network traffic for post-incident analysis is possible in 10 and 40G environments. Careful attention to detail when configuring network management systems will reward you with the analysis and troubleshooting results you desire. Join WildPackets and Ixia/Anue as we investigate these advanced network monitoring and analysis needs with the goal of providing extremely flexible and accurate real-time visibility into any network environment.
In this webinar, we will cover:
Limitations of spanning and mirroring for network analysis
Common pitfalls in 10G network analysis
Matching network analysis requirements with the appropriate equipment configurations
You will learn how to:
Determine the key segments in your network where visibility is needed
Leverage multiple points of visibility to reduce MTTR and find faults before they become failures
Maintain control without losing your sanity or emptying your budget
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.