Skip Links

Network World

Resource Library

  • Networking in a Software-Defined World
    Source: F5 Networks
    Webcast: The new world of networking--it's a world that is intelligent, automated and self-provisioning. In this KnowledgeVault, see how IT leaders should adjust their networks so they can handle the new technologies accessing them and keep up with the demands of the business. A new architecture that helps enterprises accomplish this is Synthesis from F5. Synthesis lets enterprises deploy its Software-Defined Application Services over a number of devices from F5 and other networking vendors.
  • Answering the Tough Question: Who Has Access to What?
    Source: Dell Software
    Webcast: Learn how to select specific users or groups in Active Directory (AD), and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.
  • Increasing Application Visibility in Your Network Monitoring
    Source: Compuware
    Webcast: Date: Thursday, May 8th, 2014
    Time: 1:00 PM EDT / 10:00 AM PDT

    Join Compuware and guest speaker John Rakowski, Forrester Research Analyst for Infrastructure and Operations, to learn why network monitoring is in need of a strategic change: a focus on application and business-user awareness alongside traditional infrastructure components.
  • Top 3 Network Challenges Limiting IT Agility
    Source: Brocade Communications
    Webcast: Are technical challenges preventing you from building cloud infrastructures? This Webinar will explain the top three challenges facing network architects today, along with the key steps for improving IT agility. Join Brocade and guest Forrester Research in an interactive discussion to help you cut through the hype and focus on the top areas within networking that will propel you forward.
  • Tales from the Trenches - Industry Risks and Examples of DDoS
    Source: Neustar Inc.
    Webcast: Watch Neustar experts as they discuss how DDoS impacts technology companies including online gaming, e-commerce and more. We'll discuss specific examples with DDoS protection experts who are fighting attacks in the trenches.
  • Ecommerce Site Needs Protection Against Cyber 'Pirate'
    Source: Neustar Inc.
    Webcast: Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.
  • Lunch Seminar: Best Practices to Build Elastic, Automated Networks
    Source: Citrix Systems
    Webcast: Join us for a special seminar. Featuring practical insight from Citrix, our discussion will focus on five best practices for building next-generation elastic and automated networks using NetScaler integration with Cisco Nexus. We'll pick up the tab for lunch, so you - along with your IT peers - can focus on best practices for:
    1. Load balancing
    2. Next-gen elasticity
    3. DevOps automation
    4. Routing policy automation
    5. GSLB for Cloud Arbitrage
  • Zoning in on Energy and Physical Infrastructure Management
    Source: Panduit Corp.
    Webcast: Running an energy-efficient data center has never been more important. By breaking down a data center into six zones, ranging from the physical building to the rack and cabinet, managers can better identify areas of improvement - most notably, cooling. In this Webcast you will learn how to develop and execute a strategy to optimize the energy efficiency of your data center.
  • Online Video and Web Traffic: Sochi 2014 Winter Olympic Games
    Source: Akamai Technologies, Inc.
    Webcast: Over 25 leading global broadcasters worked with Akamai to deliver the action, excitement and inspiration of Sochi because they understand online viewers expect to see every second of competition without delays or dropped streams. Watch this video and learn how Akamai's expertise and technology helped NBC Sports deliver winning performance.
  • Delivering Events of Olympic Proportions
    Source: Akamai Technologies, Inc.
    Webcast: In this webinar, Eric Black, VP of Technology, NBC Sports & Olympics; Greg Ireland, Research Manager for Multiscreen Video, IDC; and Bill Wheaton, SVP & GM, Media Division, Akamai, discuss:
    - How to deliver quality, complex video at scale
    - Methods for mitigating security risks present in high profile events
    - Best practices for partnering with vendors to integrate across technology platforms
  • Step Up to the IT Security Challenge
    Source: Kaspersky
    Webcast: Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.
  • Building Tomorrow's Infrastructure
    Source: PC Connection | Cisco | Intel®
    Webcast: Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. PC Connection's experts helped Crider deploy Cisco UCS with Intel® Xeon® processors as part of their total data center overhaul.

    Intel®, the Intel logo, Xeon®, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
  • IT Agility: How Do You Stack Up?
    Source: Brocade Communications
    Webcast: Date: Tuesday, April 15, 2014, 11:00 AM PDT

    Are you faced with increasing pressure to deploy technology faster? You're not alone. This year, over half of enterprises will be prioritizing building a private cloud, a concept introduced less than five years ago. They are on a journey to improve IT agility, increase cloud-based service usage and reduce costs. Join Forrester Research and Brocade as they discuss first-hand industry experience to learn where companies are today, and the #1 reason people are held back.
  • It's Chaos Out There
    Source: HP
    Webcast: Worried about your mobile apps? You should be; it's chaos out there. Check out this humorous video and see if you can recognize each of the types of vulnerabilities inflicted on these poor people.
  • Regain Control Over Access
    Source: McAfee
    Webcast: Is your access infrastructure too complicated with too many products requiring different ways to access information? Do you have multiple types of internal and external users needing access with special access requirements? Can you control a user's access, based on where they are, their device type or device status? Do you currently use (or wish to use) any cloud applications but aren't happy with the security model and access not being under your control? Are you concerned about user-owned mobile device (BYOD) security? Do your users have too many different credentials for different applications? Is all this costing you too much time and money?

    If these questions sound familiar, join identity and security experts from McAfee and Portsys to find out how you can provide your users access to any device and any application from any location.

Results 1 - 15 of 35