Skip Links

Network World

Resource Library

  • Cloud BI Overview: Jaspersoft for AWS
    Source: TIBCO Jaspersoft
    Webcast: Check out this overview of Jaspersoft for AWS, to easily and affordably build business intelligence solutions as well as embed visualizations and analytics inside applications. Pricing starts at <$1/hr in a pay-as-you-go model.
  • Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc.
    Source: TIBCO Jaspersoft
    Webcast: See how Kony, Inc., a leading enterprise mobility company, is using TIBCO Jaspersoft for Amazon Web Services and Redshift to achieve embedded analytics within its mobile platform.
  • On-Demand Webinar: Transform Your Datacenter with Cisco ACI and Citrix NetScaler
    Source: Citrix Systems
    Webcast: Citrix NetScaler and Cisco ACI enable datacenter and cloud administrators to holistically control L2-L7 network services in a unified manner via seamless insertion and automation of best-in-class NetScaler services into next-generation datacenters built on Cisco's ACI Architectures. Together, the solution dramatically reduces time to service delivery from days to minutes by offering a common policy framework and a single point of automation and management. NetScaler leverages the Cisco Application Policy Infrastructure Controller (APIC) to programmatically automate network provisioning and control based on application requirements and policies for both datacenter and enterprise environments.
  • Discover the Top Ten Most Useful Toad Features
    Source: Dell Software
    Webcast: Simplify your work by learning the most valuable hidden features in Toad. With step-by-step guidance from Oracle® ACE and Toad Product Architect Bert Scalzo, you'll get inside tips that will help you finish your tasks with renewed speed and accuracy. Watch the Webcast.
  • Tips to Simplify Database Administration and Development
    Source: Dell Software
    Webcast: Make your job easier while getting the most from the leading productivity tool for database professionals. Learn tips from Dell Software's Oracle® ACE, Bert Scalzo, and see how Toad's hidden functionality can save you hours each day, whether you're a developer or a DBA. Watch the Webcast.
  • API Management: The Key to Improving the Consumer Travel Experience
    Source: Intel Services
    Webcast: With mobile hitting the mainstream, travel suppliers and intermediaries need to evolve their mobile offerings in order to satisfy the always-connected traveler. Unfortunately, they have not been able to keep up with expectations and consumers continue to express frustration with the booking and purchase process.

    Join PhoCusWright's Senior Technology Analyst, Norm Rose, as he shares his insights on how travel suppliers and intermediaries can improve industry data flow and customer satisfaction by adopting API management.

    In this webinar you will learn:
    * Key drivers and frustrations in the way consumers view the online travel planning and booking process
    * How to improve the user travel experience by incorporating 3rd party innovation
    * How API management allows providers to get the right data to the right user at the right time
  • Data Breaches - Don't Be a Headline
    Source: Absolute Software Corporation
    Webcast: Whether it's a HIPAA/HITECH, Sarbanes Oxley, Gramm-Leach-Bliley violation, or a State breach notification law, a data breach can have substantial legal and financial consequences, regardless of industry. All it takes is a single security lapse and the next thing you know, you're trending on Twitter (and not in a good way), and your CEO is resigning.

    Just ask the former CEO and the CIO at Target, that data breach affected some 110 million people. Thanks to the breach, Target saw its sales drop to their lowest point in three years...and the jury's still out in terms of regulatory and civil penalties.

    But it doesn't have to be this way. On July 22nd, join Stephen Treglia, Legal Counsel at Absolute Software and former Assistant DA, Chief, Technology Crime Unit in New York, for an in-depth look at:

    * Why every data breach to-date has been settled out of court
    * Why regulators care about the security protocols you had in place before a data breach ever occurs
    * Technical options to consider that could help you minimize - or even avoid - damaging outcomes
    * Other vulnerabilities that should be considered when responding to a security incident

    Speaking Panel:
    * Stephen Treglia, Legal Counsel, Absolute Software
    * Geoff Glave, Senior Product Manager, Absolute Software

    Continue the conversation. Be sure to join us for a follow-up Ask Me Anything (AMA) session with Stephen Treglia on Thursday, July 24th at 10:00 am PDT in the Absolute Software LinkedIn Group. Stephen will deconstruct a high profile data breach and show the phases of impact that continue to occur even years after the event.
  • Peer 1's Mission Critical Cloud: Your Cloud, Your Way
    Source: Peer 1 Hosting
    Webcast: With the increased agility, unlimited scale and lower costs of IAAS, plus the autoscaling, instant availability and headache-free operation of PAAS, Peer 1 Hosting's Mission Critical Cloud offers the ultimate in flexible customization of infrastructure, resources and support.
  • Cloud and Collaboration: Driving Your Business Value
    Source: Peer 1 Hosting
    Webcast: Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. It's redundant at every level, and provides automatic rolling backups, advanced security, application orchestration and automation. Learn more about workloads and architectures that Mission Critical Cloud can support, and how it can bring your business value.
  • DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution
    Source: IBM
    Webcast: Clients are working to address the challenges of today's complexities and get to market faster with a quality products, services and applications. Many are embracing the principles of DevOps to accelerate the software delivery lifecycle. DevOps includes a range of capabilities that stretch from project initiation and requirements through managing and optimizing applications in production.

    Expert integrated systems allows clients to accelerate DevOps adoption and provides benefits for all key stakeholders in the software delivery lifecycle: Development, Test, IT Operations and the lines of business requesting new products and services. Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational on IBM's market leading Expert Integrated System , PureApplication System. Mark Willemse, an ING executive, will walk through the transformation the company went through and what immediate benefits they have achieved. Senior Technology Architect, Joe Wigglesworth, from IBM will also speak and discuss why the combined value of these two technologies is a winning solution.
  • Accelerate your innovation with IBM Bluemix™
    Source: IBM
    Webcast: Join us for a webcast introducing the new IBM BluemixTM. IBM Bluemix (www.bluemix.net) is a developer oriented Platform as a Service (PaaS) environment that is based on the Cloud Foundry open source project. It provides you easy access to a rich library of IBM, 3rd party and open source runtimes, services and APIs. Learn about how other developers are using IBM Bluemix to go quickly from coding with confidence to deploying with enterprise class services and scale.

    During this webcast, you'll learn:
    * IBM's cloud strategy and the purpose of IBM Bluemix
    * How developers can benefit from IBM Bluemix
    * What makes IBM Bluemix different
    * How business partners can take advantage of IBM Bluemix

    Speakers:

    Christopher Ferris
    IBM Distinguished Engineer and CTO for Cloud Interoperability

    Nathan Vega
    Developer Engagement, IBM Bluemix

    Sanjay Joshi
    Project Manager, jStart Cloud
  • Don't Believe the Hype: Not All Containers are Created Equal
    Source: Good Technology
    Webcast: Tired of the containerization hype? Listen in as Good Technology separates fact from fiction. Hear executives discuss the 3 C's of Secure Mobility-content, credentials, and configurations-and learn the inherent security risks to your organization of using MDM as the foundation for mobile security.
  • One Storefront to Rule Them All
    Source: RES Software
    Webcast: Take the load off managing mobile users with IT service request and delivery across all platforms!

    Give your users the on-demand, enterprise app store experience they want without sacrificing the security and control your enterprise needs.
  • Business-driven Data Protection
    Source: Arcserve
    Webcast: Data protection infrastructures are just like an onion - layers that you peel and make you cry! That's the heritage of year and years of focusing on backup, often on the basis of knee-jerk reactions to data unavailability events, or disasters. Never was data protection conceived as an integral part of core of businesses. Think about it - most organizations are not in the business of backing up data. Setting up data protection infrastructures with your organizations' core mission or business in mind is key. In this webinar, the Arcserve team will offer insights and solutions to make data protection a strategic component of your business.
  • Expert Panel: Enterprise Mobility and Data Loss Prevention
    Source: Box
    Webcast: When it comes to enterprise mobility, it's not just about devices, it's about the way people work. Hear this expert panel discuss the fundamentals of mobile content management. With an emphasis on preventing data loss, you'll hear how to:
    - Tackle the top mobile attack vectors
    - Secure unprotected networks
    - Prevent user data leakage
    - Deploy effective mobile collaboration
    - Integrate applications with Salesforce

Results 1 - 15 of 113