Presented by Dasher Technologies
Overview of Erasure Coding, including its early adoption within Object Storage and how it is used in the modern datacenter. We will also include future projections.
Presented by Dasher Technologies
Overview of Erasure Coding, including its early adoption within Object Storage and how it is used in the modern datacenter. We will also include future projections.
Presented by World Wide Technology & Veritas
Exponential data growth, rising storage costs, complex cloud migrations, and stringent regulations are forcing organizations to find efficient and economical ways to take control of and manage their growing data environment.
Join this session to learn how a global financial institution and a large data analytics company were both able to successfully implement an end-to-end data management strategy, which encompassed the following:
Presented by Darktrace
In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.
Presented by ServiceNow
As a member of IT, have you found yourself doubting your relationship with the rest of the organization as you’re perceived as a cost center rather an equal part stakeholder with a common goal? Do you find yourself struggling to collaborate with the rest of the organization as the tech debt in your organization has created seemingly insurmountable silo’s? If you feel any of this describes your work environment and how IT may be perceived, please join the discussion in how the concepts of IT Service Management need to shift to a more inclusive Enterprise Service Management strategy. Ultimately, driving more effective technology purchasing, collaboration across the enterprise and re-branding of IT as an organizational enabler.
Presented by Atmosera
In pursuit of enhanced connectivity, scalability, and efficiency, cloud migration is hastening across all industry sectors. In order to unlock the cloud’s benefits, these environments—public, private, and hybrid–must be explicitly architected and engineered to suit the respective applications they will host, while also meeting security and compliance requirements. How do businesses determine their ideal cloud environment and optimize it post-migration?
In this presentation, we will review and compare:
Presented by F5 Networks
The way we build applications today differs greatly from how they were built just a few years ago. The rise of architectural approaches to development like microservices, function-as-a-service, and injectable components have simplified some aspects of application development but has made our applications into lumbering Frankenstein’s monsters in other ways. Learn how to properly map out your monster’s anatomy and identify hidden, critical weaknesses in delivery, security, and operability…before they come after you with torches.
Presented by IVOXY Consulting
How do you know if your SQL Server VM’s are as fast as they could be? When a SQL VM is “slow”, is it the database or the way the VM is built? What should we do differently when we build a virtual SQL server? If you’ve asked – or been asked – questions like these, allow us to share our 12 years’ experience in designing virtual infrastructure for mission-critical applications & databases.
Presentation topics include:
Presented by Zerto
In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!
In this presentation we will address the challenges, needs, strategies, and solutions.
Presented by ExtraHop
As the IT environment becomes more complex and distributed, it is more important than ever that Security Operations and Network Operations teams work together. This presentation explains the opportunities for optimizing budgets, cross-training staff, accelerating threat response, and improving end-user experience that come with integrated security and network operations. Attendees will also learn practical steps they can take toward building an integrated Security and Network Operations Center (SNOC).
Presented by Malwarebytes
Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.
This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.
Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.