Data Virtualization using TIBCO Data Virtualization

Erik Fransen, founder, Connected Data Group, conducts this 30-minute webinar to discuss the basics of the Modern Data Architecture that centres around Data Virtualization that elegantly connects to and integrates existing data sources like big data platforms, data warehouses, custom applications and cloud sources, with less complexity and cost, faster access to analytic data. TIBCO is a market leader in DV and Erik shares his experience with implementing TIBCO DV in (large) organizations that want to create more business value out of the huge amounts of data available. Data that is often scattered, difficult to access and to understand.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Modernize your network to meet the demands of modern workloads

The evolution of networks has seen a shift from legacy, proprietary technologies that are hardware-bound to modern, open technologies that are software-driven. As seen with the rapid adoption of server virtualization throughout data centers, today’s organizations are embracing the disaggregated approach of software-defined networking that bring enhanced efficiency, agility and security. Our vision for the network is open. In this session, explore Dell Technologies broadest open networking portfolios - spanning both hardware and software. The industry has recognized us for leadership in opening up the network through disaggregation of networking hardware and software, providing customers choice based on their unique needs.
Watch Now

Vantage Virtualization

Telestream

Virtualization trends of our customers Review of virtualization technology approaches Comparison of on-prem, public cloud, and SaaS Vantage phase 1 virtualization Future virtualization considerations Pricing options and challenges Q&A and open discussion.
Watch Now

Achieving pci dss compliance for the microsoft cloud using 5nine cloud security

5 Nine

Current PCI DSS standards require organizations to maintain a secure network, protect cardholder data, implement strong access control measures, maintain a vulnerability management program, create information security policies, and regularly monitor and test networks. Strong internal security policies for on-premise, hybrid, and cloud environments and compliance with these standards help to prevent credit card fraud and data breaches while increasing trust between you and your customers.
Watch Now

Virtualization AND Containers with Kubernetes

VMUG

Let’s explore the basics of Kubernetes clusters, including the many layers composed of both virtualization and containers that make every single cloud based Kubernetes cluster possible. We can dig into the pros and cons of both sets of tools, and consider the possibilities for the future. What would a Kubernetes cluster using only virtualization look like? What would the advantages and disadvantages be? Together we’ll wrap our heads more tightly around the technologies that are defining cloud native.
Watch Now

Spotlight

resources