Skip Links

Network World

Resource Library

  • Citrix Customers Put Google Chromebooks to Work
    Source: Google
    Webcast: Work is no longer where we go in the morning, work is what we do - what we get done. Watch this Citrix and Google webcast to learn how you can implement a secure, fast, simple and sharable solution within your organization today.
  • Enterprise Security: Be the Hunter Not the Hunted, The Choice is Yours
    Source: Endgame
    Webcast: Discover how you can hunt to protect critical assets, defeat never-before-seen adversaries, and precisely respond with zero business disruption.
  • Citrix Customers Put Google Chromebooks to Work
    Source: Citrix Systems
    Webcast: Work is no longer where we go in the morning, work is what we do - what we get done. Watch this Citrix and Google webcast to learn how you can implement a secure, fast, simple and sharable solution within your organization today.
  • A Revolutionary Approach to Oracle Backup
    Source: Veritas
    Webcast: If your organization uses native database tools, like RMAN, to backup your Oracle databases, you're not alone (82% of Oracle DBs are primarily managed by DBAs). While these tools are simple and convenient, they can create management, scheduling, and governance challenges that put your database team at odds with the backup team and with corporate compliance. There is a better way - find out how NetBackup Copilot for Oracle can help you leverage native tools for protecting databases, without any of the downsides. Join this webcast to learn how to:

    - Avoid common pitfalls that can jeopardize database backups.
    - Empower DBA and backup teams.
    - Shrink Oracle backup times.
    - Improve Oracle data protection without sacrificing flexibility and convenience.
  • Wired and Backbone Networks
    Source: CDW Corporation
    Webcast: IT organizations need a routing and switching foundation to serve as the backbone for both wired and wireless networks. The backbone should be highly available, redundant and efficient in order for your employees to be productive. CDW can help assess, design, implement and manage a highly effective network for your organization.
  • Achieving Digital Transformation through Cloud-Based Data and Analytics Services
    Source: IBM Corporation
    Webcast: How are CIOs managing the new demand for self-service data with stringent requirements for data security? Hear insights from IDC analyst Dan Vesset in this short video.
  • Modern Data Warehouse Strategy: The Engine of Today's Top Analytics
    Source: IBM Corporation
    Webcast: Despite the hype surrounding dashboards and interactive visualization, effective data-driven decisions are the product of efficiency and fluidity in the data environment. Leading companies look to connect their intuitive front-end capabilities with a strong and stable data warehouse architecture that can support their need for faster data retrieval, deployment flexibility, and scalability as their data and applications continue to grow. Those taking a cloud or hybrid approach to their data warehouse are rewarded with broader access to data, quicker decisions, and enhanced business execution.

    On this webinar, join Aberdeen V.P. and Principal Analyst Michael Lock as he discusses key research findings, including:

    · Key pressures and pain points driving the need for better data warehouse architectures
    · Best-in-Class data management strategies (e.g. hybrid/cloud deployment, data preparation)
    · The business impact of connecting analytics to an efficient data warehouse environment

    Mona Patel, IBM Portfolio Marketing Manager for IBM dashDB, will conclude the webcast with IBM's hybrid data warehouse approach.
  • Planning for Software Adoption
    Source: CDW Corporation
    Webcast: Some of the most common challenges around software adoption are making sure that you have a solid game plan. Hear how CDW can help your organization make software adoption a painless process.
  • How to Close the End-user Satisfaction Gap
    Source: Nexthink Inc.
    Webcast: Discover how end-user IT analytics can help you with your security, ITSM and transformation challenges.
  • Driving Database Success
    Source: Dell Inc. & Intel®
    Webcast: Keeping up with fast moving data, leveraging data analysis tools, maintaining a sustainable data center and cutting costs is quickly becoming the mandate in many businesses today. And as organizations assess how they can outpace their competitors, many are finding that there are numerous changes - and challenges - they must address in modernizing database servers to keep up with massive data pools and customer demands.

    Intel Inside®. Powerful Data Center Outside.

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
  • OpenSymmetry and IBM Sales Performance Management Software
    Source: IBM Corporation
    Webcast: The AAA with the help of IBM business partner OpenSymmetry implemented cloud-based IBM Incentive Compensation Management software - dramatically accelerating its compensation calculations and enabling the compensation team to manage and update plans without external support.
  • Focus More on the Customer and Selling with IBM SPM Solutions
    Source: IBM Corporation
    Webcast: Stryker is able to better manage incentive compensation for its US based sales representatives so that they can focus more on the customer, selling, as well as strategizing.
  • Protect Your Organization from Security Breaches
    Source: CDW Corporation
    Webcast: Threats are constantly evolving and, even with reasonable protections, breaches happen every day. See how CDW's risk assessment team can help you test and evaluate your company's security posture.
  • Next Generation Security Solutions and CDW
    Source: CDW Corporation
    Webcast: Data breaches and cyberattacks are evolving, and with the ever-changing role of mobility and the cloud, you have more to protect than ever. See how CDW can orchestrate a next-generation security solutions that protects your network and your organization.
  • How to Solve Today's Mobile and IoT Security Challenges
    Source: Aruba, a Hewlett Packard Enterprise company
    Webcast: IoT devices are on your network. Do you know how what to do with them?

    View this webinar to dive into the NTT i3 Global Threat Intelligence Report, and how to combat new IoT concerns and security gaps. Learn more about:

    •Misconceptions in the security model for wired vs. wireless networks
    •Managing policies for IoT in the enterprise using contextual data
    •The value of device roles and real-time enforcement for IoT

    Rich Boyer, CISO at NTT Innovation Institute Inc. (NTT i3), and Jon Garside, Product and Solutions Marketing Manager at Aruba will lead this technical discussion - don't miss it!

Results 1 - 15 of 115