Skip Links

Network World

Resource Library

  • vCloud Air DR Overview Video
    Source: VMware
    Webcast: Discover Disaster Recovery done right! Watch this 2-minute animated video for an introduction to vCloud Air Disaster Recovery and learn about the highlights and key benefits of the service.
  • Expert Panel Answers Key SDN Questions
    Source: CDW
    Webcast: The impact Software-Defined Networks (SDNs) is having on the enterprise data center is significant. Watch as this expert panel discusses the strategic, technical, operational and financial issues that must be considered when deploying an SDN. And hear lessons learned as one IT leader shares his SDN story.
  • Network Upgrade Supports Digital Learning
    Source: CDW
    Webcast: Connecting 27,500 students over 72 square miles to support a digital learning initiative was the goal for the Shawnee School District in Kansas. Hear from the IT and education leaders involved in this project as they explain how CDW assessed their needs and deployed a wireless infrastructure to seamlessly connect their 50+ building campus.
  • How to Secure Your Big Data Environment
    Source: Cloudera | Imperva
    Webcast: A 2014 Poneman Institute study found that 43% of companies said they experienced a data breach in the last two years. With the amount of data constantly expanding, how can IT leaders secure their big data environments? Join the experts as they discuss how you can have a strategy for your data that keeps it secure and compliant while giving examples of companies that have already done this successfully.
  • 9 Noble Truths of Network, Server and Application Monitoring
    Source: Ipswitch
    Webcast: Nearly every organization is highly dependent on the reliability, availability and performance of its IP networks, physical and virtual servers and IT applications. This connected web of IT infrastructure, software, virtual and mobile technology is the backbone of business across almost every industry.

    Register for this Live Webcast on Feb. 25 at 2 PM EST to learn how IT teams can meet the need to thrive while dealing with an increasingly large and complex environment. The nine noble truths of network, server and application monitoring explain the problem and describe the path to its solution.
  • Breaking the Kill Chain
    Source: Fortinet
    Webcast: Too many data breaches occur because of a lack of focus across the spectrum of possible threats or attack vectors, known as the Kill Chain. In this webcast subject matter experts discuss, in technical detail, 1) the current trends and the latest information on the global cybercrime eco-system 2) all the different elements that make up the "Kill Chain" 3) protective steps that forward-thinking companies are taking to break the kill chain to minimize the chances of a data breach.
  • What Does Customer Experience Mean for Your Social Business?
    Source: IBM
    Webcast: Respond promptly to customer needs. Make sure customer interactions are extremely tailored. Provide the right information to the right place at the right time. These are all the actions businesses must take to deliver a seamless customer experience. However, one person can't do it. It is even too much for one department.

    Join our panel and us on this webinar to learn how to:

    - Understand each customer's specific situation
    - Deliver personally relevant and rewarding experiences
    - Find the moment customers browse, buy, or abandon a transaction
    - Identify real-time trends based on internal and external customer data
    - Co-create authentic brand experiences with customers, employees, and partners
  • The Mobile Experience - Increase Your Competitive Advantage
    Source: IBM
    Webcast: Download this half hour webinar to learn how to increase your competitive advantage using the latest in mobile technology design and trends. Best practices expert, Bill Loller, VP Mobile at IBM, will review what's wrong with the mobile customer experience today and what can be done to improve that experience.
  • Mobile Security Video
    Source: CDW
    Webcast: CDW's solution architect Ziyad Roumaya expands on the security threats introduced by a growing mobile workforce and the "Bring your own Device" (BYOD) trend; and provides tips for addressing those issues, including creating internal policies and employing a Mobile Device Management (MDM) solution.
  • Achieving Complete Security: Endpoint, Mobile, and NAC
    Source: CDW
    Webcast: Is sensitive data leaking out of your business? For many enterprises, mobility is the enemy of security. As more devices and platforms enter the workplace, security strategy must be constantly refined to ensure the safety of data and users.
  • Talking Results: Nuance Communications and IBM Harness Big Data with Elastic Storage
    Source: IBM Corporation
    Webcast: Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM Elastic Storage to improve the power of their voice recognition applications by managing storage growth, cost and complexity while increasing performance and data availability.

    Attend this webcast and hear how you can:
    -Lower data management costs through policy driven automation and tiered storage management
    -Manage and increase storage agility through software defined storage
    -Remove data related bottlenecks to deliver application performance

    IBM Software Defined Storage, code named Elastic Storage, is based on IBM General Parallel File System (GPFS) technology, and is a proven, scalable, high-performance data and file management solution. Elastic Storage is used extensively in many industries worldwide, provides simplified data management and integrated information lifecycle tools. IBM's Elastic Storage allow you to manage petabytes of data and billions of files, controlling the growing cost of increasing amounts of data.

    Nuance Communications, Inc. is a leading provider of voice and language solutions for businesses and consumers around the world. Its technologies, applications and services make the user experience more compelling by transforming the way people interact with devices and systems. Every day, millions of users and thousands of businesses use Nuance's proven applications. Nuance R&D has a large worldwide user community who interacts with big data every day. Multiple petabytes of storage are managed with IBM Elastic Storage (GPFS).
  • Why Your Virtualization Matters
    Source: IBM Corporation
    Webcast: Over 61,000 virtualization customers have weighed in. Join the webcast and hear how other companies like yours are using virtualization to their benefit.

    In today's marketplace there are many choices for virtualization that profess to offer efficiency, simplicity of management, and security -but do they all offer the same levels? And how about IT staff load, project deployment times, risk, agility, and other key items?

    Solitaire Interglobal Ltd. (SIL) has conducted surveys and will report on their conclusions as to the advantages and disadvantages of various virtualization solutions on this webcast.

    Join us to learn which virtualization solution offers the highest security, lowest risk, best workload density, and highest executive satisfaction.
  • Enterprise Mobility Management Solutions for IT
    Source: MobileIron
    Webcast: This video illustrates how end-users are rapidly adopting mobile technology, and coming to work with heightened expectations around mobility. This Mobile IT transformation presents unique challenges for the IT organization. As consumer devices gain acceptance in the enterprise, IT needs a new generation of enterprise mobility management solutions to secure and manage mobile devices.
  • Unclogging the Network Bottleneck
    Source: CDW
    Webcast: Software-defined networking is one of the hottest buzzwords of 2014, but saying exactly what SDN is can be a challenge.

    Technologist Deepak Munjal explains how Software Defined Networks (SDNs) deliver performance in this HP and CDW sponsored webinar.
  • Breaking the Kill Chain
    Source: Fortinet
    Webcast: Too many data breaches occur because of a lack of focus across the spectrum of possible threats or attack vectors, known as the Kill Chain. In this webcast subject matter experts discuss, in technical detail, 1) the current trends and the latest information on the global cybercrime eco-system 2) all the different elements that make up the "Kill Chain" 3) protective steps that forward-thinking companies are taking to break the kill chain to minimize the chances of a data breach.

Results 1 - 15 of 57