Info

World Wide Technology - TEC17

This podcast series is hosted by World Wide Technology, the leader in integrated IT solutions. In each episode a different group of WWT subject matter experts and partners have an informative and entertaining discussion on the important topics facing organizations in today’s dynamic IT environment.
RSS Feed
World Wide Technology - TEC17
2020
February
January


2019
November
October
September
August
July
June
April
March
January


2018
December
November
October
September
August
July
June
May
April
March
February
January


2017
December
November
October
September
August
July
June
May
April
March


2016
December
October


Categories

All Episodes
Archives
Categories
Now displaying: January, 2020
Jan 31, 2020

In our always-on, ever-connected age, businesses can no longer tolerate operational downtime.  Many are turning to sophisticated AI Operations (AIOps) solutions to help nip operational disruption in the bud.  But what exactly is AIOps?  In the first of a four-part TEC17 series on AIOps, Jas Binning from World Wide Technology’s London team and Keith Whiteside from E2Tech look to define AI Operations, and explore its potential to solve real-world business challenges.

Getting Started with AIOps

Defeating the Loading Wheel:  Is APM enough to keep your customers happy? 

WWT is Taking AppDynamics from the War Room to the Board Room

WWT + AppDynamics:  Better Together

Turbonomic Lab

Jasbir Binning, WWT

Paul Robinson, WWT

 

 

 

Jan 17, 2020

Zero Trust architecture is the nirvana of enterprise segmentation.  With the current state of cybersecurity and advanced threats that exist today, security teams want this approach.  In today’s episode of World Wide Technology’s TEC17, experts Aaron Woland of Cisco and Kent Noyes of WWT discuss this ultimate approach to cybersecurity threats.  Aaron and Kent discuss what Zero Trust is, how it helps business organizations, why it is a journey worth moving toward, what are some common applications for Zero Trust architecture and the solutions that Cisco and WWT can provide to businesses to advance on the journey toward the ultimate goal of Zero Trust.

Forrester Zero Trust Extended Report

Jericho Form Commandments

NIST Zero Trust Report

AppSec is Eating Security - Alex Stamos Keynote

Cisco Zero Trust - A Holistic Approach

5 Steps to Building a Zero Trust Security Model

WWT Enterprise Segmentation Practice

Cisco Zero Trust Security Practice

 

 

1