Skip Links

Network World

Resource Library

  • Building Tomorrow's Infrastructure
    Source: PC Connection | Cisco | Intel®
    Webcast: Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. PC Connection's experts helped Crider deploy Cisco UCS with Intel® Xeon® processors as part of their total data center overhaul.


    Intel®, the Intel logo, Xeon®, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
  • Keep Servers Up and Running and Attackers in the Dark
    Source: F5 Networks
    Webcast: An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily take advantage of the asymmetric workload. Attackers request a connection and then renegotiate the SSL connection repeatedly to max out the server's CPU. The result: No legitimate users can connect. However you can easily mitigate these attacks. Watch this video to learn how you can continue to process valid user requests and keep attackers in the dark.
  • Enhance Your Virtualization Infrastructure With IBM and Vmware
    Source: VMware | IBM
    Webcast: Date: Wednesday, May 14, 2014, 1:00 PM EDT

    Using virtualization for your x86 server infrastructure has become commonplace. Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage aspects as well. IBM x86/PureFlex and VMware have been working closely to help drive better business value from your virtualization projects and delivering technologies to help manage your infrastructure. Attend this webcast and see how IBM and VMware can help you be more responsive to your business requirements.
  • Networking in a Software-Defined World
    Source: F5 Networks
    Webcast: The new world of networking--it's a world that is intelligent, automated and self-provisioning. In this KnowledgeVault, see how IT leaders should adjust their networks so they can handle the new technologies accessing them and keep up with the demands of the business. A new architecture that helps enterprises accomplish this is Synthesis from F5. Synthesis lets enterprises deploy its Software-Defined Application Services over a number of devices from F5 and other networking vendors.
  • Answering the Tough Question: Who Has Access to What?
    Source: Dell Software
    Webcast: Learn how to select specific users or groups in Active Directory (AD), and efficiently assess and document permission assignments within your environment, as well as how automating the process can save your organization time and money.
  • Increasing Application Visibility in Your Network Monitoring
    Source: Compuware
    Webcast: Date: Thursday, May 8th, 2014
    Time: 1:00 PM EDT / 10:00 AM PDT

    Join Compuware and guest speaker John Rakowski, Forrester Research Analyst for Infrastructure and Operations, to learn why network monitoring is in need of a strategic change: a focus on application and business-user awareness alongside traditional infrastructure components.
  • Top 3 Network Challenges Limiting IT Agility
    Source: Brocade Communications
    Webcast: Are technical challenges preventing you from building cloud infrastructures? This Webinar will explain the top three challenges facing network architects today, along with the key steps for improving IT agility. Join Brocade and guest Forrester Research in an interactive discussion to help you cut through the hype and focus on the top areas within networking that will propel you forward.
  • Tales from the Trenches - Industry Risks and Examples of DDoS
    Source: Neustar Inc.
    Webcast: Watch Neustar experts as they discuss how DDoS impacts technology companies including online gaming, e-commerce and more. We'll discuss specific examples with DDoS protection experts who are fighting attacks in the trenches.
  • Ecommerce Site Needs Protection Against Cyber 'Pirate'
    Source: Neustar Inc.
    Webcast: Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.
  • Lunch Seminar: Best Practices to Build Elastic, Automated Networks
    Source: Citrix Systems
    Webcast: Join us for a special seminar. Featuring practical insight from Citrix, our discussion will focus on five best practices for building next-generation elastic and automated networks using NetScaler integration with Cisco Nexus. We'll pick up the tab for lunch, so you - along with your IT peers - can focus on best practices for:
    1. Load balancing
    2. Next-gen elasticity
    3. DevOps automation
    4. Routing policy automation
    5. GSLB for Cloud Arbitrage
  • Zoning in on Energy and Physical Infrastructure Management
    Source: Panduit Corp.
    Webcast: Running an energy-efficient data center has never been more important. By breaking down a data center into six zones, ranging from the physical building to the rack and cabinet, managers can better identify areas of improvement - most notably, cooling. In this Webcast you will learn how to develop and execute a strategy to optimize the energy efficiency of your data center.
  • Online Video and Web Traffic: Sochi 2014 Winter Olympic Games
    Source: Akamai Technologies, Inc.
    Webcast: Over 25 leading global broadcasters worked with Akamai to deliver the action, excitement and inspiration of Sochi because they understand online viewers expect to see every second of competition without delays or dropped streams. Watch this video and learn how Akamai's expertise and technology helped NBC Sports deliver winning performance.
  • Delivering Events of Olympic Proportions
    Source: Akamai Technologies, Inc.
    Webcast: In this webinar, Eric Black, VP of Technology, NBC Sports & Olympics; Greg Ireland, Research Manager for Multiscreen Video, IDC; and Bill Wheaton, SVP & GM, Media Division, Akamai, discuss:
    - How to deliver quality, complex video at scale
    - Methods for mitigating security risks present in high profile events
    - Best practices for partnering with vendors to integrate across technology platforms
  • Step Up to the IT Security Challenge
    Source: Kaspersky
    Webcast: Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.
  • IT Agility: How Do You Stack Up?
    Source: Brocade Communications
    Webcast: Date: Tuesday, April 15, 2014, 11:00 AM PDT

    Are you faced with increasing pressure to deploy technology faster? You're not alone. This year, over half of enterprises will be prioritizing building a private cloud, a concept introduced less than five years ago. They are on a journey to improve IT agility, increase cloud-based service usage and reduce costs. Join Forrester Research and Brocade as they discuss first-hand industry experience to learn where companies are today, and the #1 reason people are held back.

Results 1 - 15 of 37