Skip Links

Network World

Resource Library

  • Microwave is in Your Future with Ericsson
    Source: Ericsson Inc.
    Webcast: For the last few decades, microwave links have been massively deployed in mobile networks, and now there is an increasing interest in microwave for other applications. Businesses and industries are seeing the advantage of the rapid deployment and cost-efficiencies that microwave technologies offer.
  • Ericsson's iPECS UCP, a truly unified communication solution
    Source: Ericsson Inc.
    Webcast: The world is more mobile than ever, but the office is still our hub where people come together, the literal and symbolic center of business. iPECS UCP delivers advanced features and capabilities, connecting people with one another, with customers, and with the technologies that matter most.
  • Cellular and Wi-Fi Converge in the Enterprise with Ericsson
    Source: Ericsson Inc.
    Webcast: With 70% of mobile communication originating indoors, businesses need dynamic mobile networks that handle real-world obstacles. Is your network built for data-intensive usage and growing user needs? Ericsson's indoor solutions cut through the noise to deliver connectivity to help get business done.
  • The Next Generation in Enterprise Authentication
    Source: Entrust, Inc.
    Webcast: Watch this video and discover why mobile is the future of enterprise authentication.
  • Staying out of the Headlines
    Source: Cisco, Damballa, Fortinet, HP
    Webcast: Dave Finger from Fortinet, Dave Stuart from Cisco and Industry Analyst Robin Layland explore the role of sandboxes and big data analytics in finding advanced threats and keeping your organization from being next to make headlines in a bad way. We discuss why sharing information between devices is the key to an effective defense. We also cover the role of automation in effectively responding to the attacks and what to look for when shopping for an advanced threat protection solution.
  • Dealing with Threats that Get Through your Defenses
    Source: Cisco, Damballa, Fortinet, HP
    Webcast: Industry Analyst Robin Layland is joined by Steve Povolny of HP and Brian Foster of Damballa to focus on what you need to do to stop attacks that have made it past your perimeter defenses. We also cover mitigation needs based on your risk profile. We then review how you can spot breaches and how to easily keep your security up to date. Finally we cover what to look for in an advanced threat protection vendor.
  • Accelerate Your Innovation With IBM Bluemix
    Source: IBM
    Webcast: Join us for a webcast introducing the new IBM BluemixTM. IBM Bluemix ( is a developer oriented Platform as a Service (PaaS) environment that is based on the Cloud Foundry open source project. It provides you easy access to a rich library of IBM, 3rd party and open source runtimes, services and APIs. Learn about how other developers are using IBM Bluemix to go quickly from coding with confidence to deploying with enterprise class services and scale.

    During this webcast, you'll learn:
    * IBM's cloud strategy and the purpose of IBM Bluemix
    * How developers can benefit from IBM Bluemix
    * What makes IBM Bluemix different
    * How business partners can take advantage of IBM Bluemix


    Christopher Ferris
    IBM Distinguished Engineer and CTO for Cloud Interoperability

    Nathan Vega
    Developer Engagement, IBM Bluemix

    Sanjay Joshi
    Project Manager, jStart Cloud
  • IBM Fluid Query - Unifying Data Access Across the Logical Data Warehouse
    Source: IBM
    Webcast: Wednesday, July 29, 2015 01:00 PM EDT

    The three decade old Data Warehouse is evolving into a Logical Data Warehouse architecture where new types/forms of data require new technologies, and cannot be forced into the data warehouse. Hadoop and other noSQL data stores are becoming more prevalent, as are cloud based data services due to this new, and ever increasing data.

    IBM Fluid Query provides an application, and end user transparent solution to provide access to, and insight from our data - across the enterprise. So, you need not change your existing applications as you start to bring in this new data, to gain a deeper understanding of your business and your customers.

    Attendees will find out how to install and use Fluid Query, and what the benefits are from actual Use Cases.


    Dwaine Snow, Strategy Lead, IBM Big Data & Analytics Platforms and Integration
    Doug Dailey, Product Manager, IBM PureData System for Analytics
  • DocuSign Case Study: Centralize. Automate. Secure
    Source: Okta
    Webcast: Watch this short video and learn how DocuSign, with Okta single sign-on, increased cost savings, end-user productivity and overall security.
  • An Insider's View on Cyberattack Planning and Response
    Source: Everbridge
    Webcast: According to the Ponemon Institute, data breaches cost U.S. organizations, on average, $5.4 million per incident. Join cybersecurity expert Terry A. Stevenson, CEO/CISO at GlobalNSA, and Imad Mouline, CTO at Everbridge, as they present strategies to ensure business continuity in the aftermath of a data breach.
  • Solving the Data Identity Crisis: Finding Context in Your Data with IBM Entity Analytics
    Source: IBM
    Webcast: Many organizations still struggle to connect the dots and extract meaningful insights from the growing volume and variety of data they collect. Entity analytics helps to integrate data from multiple sources to give you better insights into the entities or things that matter to your business--including customers, employees, equipment, vehicles, and more-and see and understand relationships between entities.

    Join us for this informative discussion, where you'll learn how IBM entity analytics can help you:
    * Eliminate manual data manipulation and cleansing for more accurate models in less time.
    * Remove compromised data such as fake identities or nonexistent product codes.
    * Predict outcomes more accurately for instant decision-making, improving functions such as customer service and fraud detection
  • Breach Containment: Your Guide to Preparing for the Inevitable
    Source: CDW
    Webcast: Your datacenter is no doubt ripe with valuable data, a target for malcontents. That means you have to plan for the inevitable: a security breach. Tune into this webcast for an informative look at what it takes to minimize the impact of security breaches--from putting in the right controls to building the right strategy. It's a must see for any IT professional.
  • How | HauteLook Uses New Relic Insights
    Source: New Relic
    Webcast: Find out how the fulfillment-center team at this flash-sale retailer has already integrated New Relic Insights.
  • How APM can Improve Operations and Development
    Source: New Relic| Emulex| AppNeta| CA
    Webcast: Industry analyst Robin Layland joins Dan Kuebrick of AppNeta and Stevan Arychuk from New Relic to discuss what operations and developers need from a performance management solution. They explain how APM can help quickly solve problems without causing information overload, and what it takes for a solution to enable operations to understand the application. We also explore the developer's role in helping operations and what to look for in a solution.
  • Security Protection Before, During, and After an Attack
    Source: CDW
    Webcast: The security threat landscape continues to evolve quickly. Hacking has become an industry, new attack surfaces emerge, and the one silver bullet to fix everything just doesn't exist. How can you ensure you are covering the entire attack continuum when developing a security strategy? CDW can help.

Results 1 - 15 of 79