Skip Links

Network World

Resource Library

  • King County Washington Avoids More Than $1M in Spend By Backing Up To Cloud
    Source: NetApp
    Webcast: King County has struggled for years with legacy backup solutions for the 20 terabytes of data it must back up daily. By using Amazon Web Services and NetApp AltaVault, King County avoided spending an estimated $1.1 million on infrastructure upgrades.

    In this webinar you will learn:
    - Why King County selected NetApp AltaVault
    - Best practices from the public cloud implementation
    - How to determine if cloud backup is right for your organization
  • NetSure Allows You to Keep What is Working
    Source: Curvature
    Webcast: Watch this video to see how you can upgrade your Servers, Storage, and Networking gear on YOUR TERMS.
  • 5 Actions to Convert Mobile Insurance Metrics into Customer Insights
    Source: Apteligent | Forrester
    Webcast: Live Event Date: Tuesday, February 23, 2016, 11:30 AM EST

    Today, it's no longer enough to identify and collect mobile insurance metrics. To fulfill the promise of your mobile business strategy, you have to do something with the information you gather. Digital insurance teams must use analytics to develop customer insights from the vast amounts of contextual data that mobile phones generate. But too often, mobile measurement strategies are failing to deliver key insights, especially around customer experience. Join Forrester Research principal analyst Ellen Carney for answers to these questions:
    * What's the state of mobile insurance performance measurement?
    * How can mobile insurance metrics strategies evolve to meet the evolving needs of mobile insurance customers?
    What are the five actions that mobile insurers must take to identify the right metrics that measure mobile ROI?
  • Identity-Defined Security for the Digital Enterprise
    Source: Ping Identity Corporation
    Webcast: The transformation to a digital enterprise requires a fundamental shift in security. Cloud-based identity and access management solutions are a core component of any modern security strategy.

    In this audio webcast, you will hear about the challenges of securing a digitally transformed enterprise and the steps you can take to shift from perimeter-defined security to identity-defined security.
  • Simplify Management
    Source: Rackspace
    Webcast: Watch the full session of this video and learn about the latest flexible, scalable solutions for hosting SQL Server on Private Clouds and Microsoft Azure in multi-cloud environments.
  • Avoiding Data Breaches in 2016: What You Need to Know
    Source: EMA Research
    Webcast: Register now for this live event, February 23 @ 11AM/ 2PM Eastern

    Join David Monahan, research director for security and risk management at leading IT analyst firm Enterprise Management Associates (EMA), and David Cramer, vice president of product management for Data Center Automation and Cloud at BMC, for this webinar that will cover how to set a strategy to protect your organization.
  • Is Your Data Center Sustainable? How to Proactively Prepare Your Business
    Source: CenturyLink
    Webcast: Live Date: Wednesday, March 02, 2016, 01:00 PM EST

    Sustainability is no longer an optional benchmark for today's data centers. It's mandatory. Faced with emerging green and compliance requirements, business leaders must proactively invest in alternative energy resources across IT infrastructures. Our expert panel will discuss challenges and solutions on:

    - What strategies and technologies leaders employ to ensure sustainability
    - How to leverage emerging technology directly, or via strategic partnerships
    - The corporate and legislative commitments for sustainability
    - How CenturyLink is using latest fuel cell technology to drastically reduce the data center carbon footprint.

    Hear from:
    Sophia Vargas, Analyst, Forrester Research
    Peter Gross, Vice President, Mission-Critical Systems, Bloom Energy
    Drew Leonard, Vice President, CenturyLink

    We look forward to you joining us for the live event!
  • Secure Shadow IT with aPaaS
    Source: Intuit QuickBase
    Webcast: With as much as 30% of total IT budgets being spent outside of IT departments, technical workarounds by the business, also known as "shadow IT", can no longer be ignored.

    In order to strike a necessary balance between IT control and business-driven efforts, many IT leaders are turning to aPaaS solutions for Citizen Development. Successful implementation of aPaaS hinges on effective change management around people, processes, and technology.

    Join Francois Tricot, CIO of Ceva as he and QuickBase Manager Angela Maglione explore:

    Factors contributing to the rise of shadow IT
    Rules of engagement for IT leaders and business users who both want to benefit from aPaaS
    Real-world examples of effective IT leaders who are currently managing shadow IT
    Actionable next steps and key questions to consider before embarking on your own Citizen Development journey
  • Shielding Office 365 from Advanced Threats
    Source: Proofpoint Inc
    Webcast: Today, email is the most effective option for delivery of advanced threats, such as 0-day exploits. Many organizations have migrated to Office 365 for performance benefits and although there are security tools built into the cloud platform, it can't protect your data from all advanced threats.
    In this webinar, learn how to secure your Office 365 environment and defend users and data from advanced threats and phishing attacks. Examine how to harden your data to fulfill rigorous compliance requirements and mitigate:
    -Compromised USB keys
    -Drive by downloads
    -Watering holes
    -And more
  • Woolworth: A Compelling Customer Perspective of VCE VBlock
    Source: VCE
    Webcast: Woolworths Ltd. is the world's 15th largest retailer, and Australia's largest online retailer. They were looking to simplify and consolidate their infrastructure through virtualization and chose VCE VBlock to provide the availability, elastic capacity and scalable performance their business required. Watch this brief video as their Head of Infrastructure describes the many benefits their decision.
  • Make Cloud Part of Your BI Strategy
    Source: Birst
    Webcast: Companies are increasingly looking at cloud business intelligence (BI) as a more agile alternative to traditional on-premises BI products that no longer meet the needs of the business. According to The Forrester Wave™: Cloud Business Intelligence Platforms, Q4 2015, "vendors that combine the advantages of cloud delivery with enterprise BI features offer optimal platforms to their customers."

    Join guest speaker, Forrester Principal Analyst Martha Bennett, as she shares findings from The Forrester Wave and discusses what organizations must do to make cloud solutions part of their BI strategy. You will also hear from Pedro Arellano, Sr. Director of Product Strategy at Birst, who will discuss how modern cloud architectures are transforming the way companies deliver and consume BI applications.
  • Straight Talk about Hybrid Cloud: How to Navigate the Challenges to Get the Results your Business Needs
    Source: CDW
    Webcast: Hybrid Cloud is the new "must-have" technology for businesses. According to a 2015 Frost & Sullivan survey of IT decision-makers, the % of businesses deploying hybrid cloud will double in the next two years (to 74%), representing a faster growth rate than any other cloud model. But what do those new buyers think they're getting?

    Join Frost and Sullivan and CDW on Tuesday, March 22, 2016, 01:00 PM EDT for a live discussion on:
    - Why make a move to a Hybrid Cloud model?
    - The challenges related to deploying a hybrid cloud.
    - The benefits of turning to a 3rd party expert for help.

    We look forward to you joining us for the live event!
  • User Behavior Analytics and The Benefits To Your Company
    Source: SpectorSoft
    Webcast: When insiders go "rogue" their behavior changes as they shift from simply performing their function to engaging in activities that harm your organization. User Behavior Analytics (UBA) software watches for signs of change that are directly related to insider threats, and alerts you as soon as meaningful anomalies are detected.
  • How User Behavior Analytics & User Activity Monitoring Work Together to Improve Insider Threat Detection & Response
    Source: SpectorSoft
    Webcast: Higher risk positions require analysis of user behavior & monitoring of user activity. Watch this short video to learn more.
  • Fox Sports: Software Defined Data Centers Delivers
    Source: VCE
    Webcast: Fox Sports in Australia delivers high quality content in real-time to over 3.5 Million households across any device. With a modern data center based upon VCE VBlock that is fully integrated with cloud computing, Fox Sports is able to centralize the management of their operations, and has become a software-defined television station that is 100% responsive to the needs of the business. Watch this video to hear their story.

Results 1 - 15 of 85