Skip Links

Network World

Resource Library

  • On Demand Webinar: Actionable Network Intelligence Drives Digital Business
    Source: Infoblox
    Webcast: Digital transformation is reshaping the business landscape faster than ever before. Organizations that ignore this will struggle and rapidly lose customers and market share. This transformation has introduced many new technologies. All of them have one thing in common, they are network-centric.

    However, legacy networks are not aligned well with today's business needs. Digital businesses need to ensure network and service availability, manage risk, improve operational efficiencies, by using actionable network intelligence. Join Zeus Kerravala, from ZK Research and Krupa Srivatsan from Infoblox as they provide the latest research on actionable network intelligence and its' benefits.
  • Data Driven Healthcare: How Healthcare Companies are Using Analytics to Drive Business Results
    Source: Clarity Solution Group
    White Paper: Healthcare payers' business models are undergoing seismic changes, changes that are affecting the entire industry. The most successful companies are making use of that data to address their challenges. This paper examines some of the best uses of healthcare analytics.
  • Harnessing the Three Forms of Big Data Analytics Innovation
    Source: Clarity Solution Group
    White Paper: While other models address what Big Data "is", or what big data "does", few succeed at providing the pragmatic executive an actionable roadmap to achieve tangible business value. This paper lays out that roadmap by analyzing the three type of big data innovation.
  • Big Data for Good: Using Data & Analytics to Benefit Society (And Make Money)
    Source: Clarity Solution Group
    White Paper: While the application and use of big data to find cost savings, new customers and improve retention is widely embraced, some companies are finding ways to accomplish all of that and more. Learn how companies are saving money and conserving energy, reducing water waste and more.
  • Turning Data into Dollars
    Source: Clarity Solution Group
    White Paper: Learn how Clarity Solution Group worked with a social media giant to revolutionize the art and science of both understanding and influencing customer behavior, successfully boosting advertisers' marketing effectiveness as a result.
  • The Future of Enterprise Data Management with NetBackup 8
    Source: Veritas
    Webcast: This On-Demand webcast will be available on December 13, 2016 at 10am PT/1pm ET/1pm GMT

    Be the first to see the newest innovations in Veritas NetBackup 8.0 and how it provides a new 360 data management approach. Join Veritas the #1 market share leader for 2015 in the Data Protection and Recovery Software Market* for our global launch to get a new perspective.

    Learn how you can gain:

    Unified Protection: across cloud, physical and virtual environments from a single platform.
    Global Data Visibility: reducing data retention and backup storage requirements and confidently planning cloud migration.
    Predictable, Integrated Resiliency: orchestrating data and apps for business resiliency and on-demand access from anywhere, across any cloud.
    Integrated Copy Data Management: eliminating isolated data islands and centralizing all copy management using your existing infrastructure.

    Find out how the powerful combination of these capabilities gives you the visibility and control you need to make the most of your most valuable asset - your data.

    Hear from:
    Laura DuBois
    Group Vice President, Enterprise Storage, Servers and Infrastructure Software, IDC

    Scott Anderson
    Senior Vice President, Veritas Information Protection Solutions

    Lynn Lucas
    Senior Vice President, Chief Marketing Officer, Veritas

    * IDC: Worldwide Data Protection and Recovery Software Market Shares, 2015.
    Phil Goodwin, Liz Conner, July 29, 2016
  • Thwarting Risk in the Modern Digital World
    Source: Entrust Datacard
    Webcast: As organizations expand on legacy infrastructures and build new digital business models, what is the role of trusted identity? We will illustrate how trusted identity technologies - including authentication and PKI - are essential as organizations capitalize on the full potential of cloud and mobile technologies. We will also discuss how to avoid the pitfalls of misaligned identity strategies.
  • Managing the Digital Transformation with SD-WAN
    Source: SevOne
    Webcast: The enterprise and service provider WAN landscape is evolving rapidly. SD-WAN technology is changing the economics, reliability, and security of moving application data around the world.

    Watch this SevOne and Viptela webinar, "Managing the Digital Transformation with SD-WAN," to find out how enterprises and service providers can offer superior levels of service at a significantly reduced cost.

    In this webinar, you'll learn about:

    -Why WANs are Migrating to SD-WAN
    -Benefits of embracing the move to a modern-day SD-WAN strategy
    -Managing the transition to SD-WANs
    -Monitoring your SD-WAN in the context of overall service delivery
  • Seamlessly Transition to Windows 10
    Source: Microsoft Corporation
    eGuide: Written specifically for IT pros and IT decision makers, this e-guide looks at the growing challenge of OS migration in an era when utilizing personal devices for work is becoming a standard practice. It also offers solutions for reducing the cost and complexity of these migrations with app and desktop virtualization. Inside, you'll learn how the right solution should:

    - Simplify BYOD and centrally manage the way updates are distributed across environments
    - Reduce compatibility issues by allowing apps to run from the corporate infrastructure instead of the endpoint
    - Analyze app compatibility across your preferred platforms

    Learn how to take the unnecessary hassle and cost out of your Windows 10 migration. Download this e-guide today.
  • Why Your Business Needs Enterprise-Strength Password Management
    Source: Keeper Security
    White Paper: For over a half a century, the password, a secret sequence of characters known only to the authorized user, provided computer access security. Now, well into the second decade of the 21st century, the venerable password is no longer adequate. At least not in its current form.

    This whitepaper discusses the emergence of the password as the primary authentication method in today's digital world and educates readers on authentication techniques, methodologies, technologies and best practices.

    Download the white paper now to learn more.
  • Password Management Evaluation Guide for Businesses
    Source: Keeper Security
    White Paper: Weak passwords are at the heart of the rise in cyber theft, causing 76% of data breaches. To mitigate this risk, businesses are adopting password management solutions. This is a comprehensive password management evaluation guide with recommended security, implementation and productivity requirements.
  • The Utility of DNS Traffic Management
    Source: Neustar Inc
    White Paper: The domain name system, or DNS, is a protocol that translates user understandable names (like domain names - for example, .co, .biz, .au) and labels (like website addresses - for example, into IP addresses that are understood and accepted by computers and routers to move and direct packets around the Internet.
  • World Wide DDos Attacks and Protection Report
    Source: Neustar Inc
    White Paper: In the summer of 2016, Neustar commissioned a global, independent research study of 1,002 directors, managers, CISOs, CSOs, CTOs, and other c-suite executives to find out how distributed denial of service (DDoS) attacks are affecting them, and what precautions they're taking to mitigate the threat. The respondents represent diverse industries such as technology (18%), financial (14%), retail (12%), and government (7%).
  • Quantifying the Value of NetApp All-Flash FAS (AFF) Storage Arrays
    Source: NetApp
    White Paper: This comprehensive economic analysis by ESG provides prospective customers with a return on investment model for evaluating NetApp AFF storage arrays.​​
  • 2016 Magic Quadrant for Solid State Arrays
    Source: NetApp
    White Paper: Solid-state arrays have matured beyond performance-oriented workloads, and the benefits are now compelling for all primary storage plus old and new unexpected workloads. This Magic Quadrant will help IT leaders better understand SSA vendors' positioning in the market.

    Gain insights into the rapidly evolving market for solid-state arrays with this Gartner report. Discover vendor strengths and the criteria that must be met to be positioned in the leaders' quadrant.

Results 1 - 15 of 896