ComputerWeekly.com Research Library

Powered by Bitpipe.com

Networking Multimedia

  • IT Infrastructure Management is Evolving – Are Your Monitoring Tools?

    Sponsored by: CA Technologies

    Access your trial of a unified infrastructure management tool you can use to move past your time consuming process of managing complicated, siloed applications.

  • See How the Miami Marlins Protects Sensitive Scouting and Operation Documents

    Sponsored by: Citrix

    Watch this webcast to find out how the Miami Marlins benefit from data management technology. Learn how the Marlins easily and securely share data on any device, anywhere.

  • SD-WAN Securely Delivers a Consistent User Experience

    Sponsored by: Citrix

    This short video shows a user maintaining security while demonstrating network performance despite deteriorating conditions. You'll see how an SD-WAN can make up for failures in your MPLS.

  • Channel Analysis of Tranxition

    Sponsored by: eTECH Channel

    See the endorsement of one migration technology by an expert channel analyst. This video highlights what you need to make your customers happy by mastering their migration on the first at-bat.

  • Unified communications Classroom

    Sponsored by: SearchNetworking.com

    Collaboration tools are chaning the way your employees work together. See the key features you'll need for your agile workforce.

  • Improving Productivity through IT Modernization

    Sponsored by: HPE and Intel®

    Focus on ensuring that your infrastructure is saving you time and money now, and will continue to do so in the future. See also how you can plan on incorporating mobile into your network strategy.

  • What Mobile Policy Suits Your Organization?

    Sponsored by: IBM MaaS360

    BYOD may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.

  • Beyond the Perimeter: Protecting your Network

    Sponsored by: IBM MaaS360

    Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.

  • How Equinix Deploys an Effective Cloud-based SIEM

    Sponsored by: Splunk

    Discover ways one company's cloud-based SIEM delivers instant access to advanced security analytics, valuable context, and detailed insights.

  • What does mobility really mean?

    Sponsored by: Citrix

    In this video learn how one system can play a precise and integral role for enabling flexible workspaces and work styles without exposing your organization to risk. View now to learn more.

  • Customer Story: Implementing Mobility in the Workplace

    Sponsored by: Citrix

    Learn how one of the largest healthcare systems in the United States implemented an efficient, secure mobile strategy and increased collaboration. Discover how you can provide your employees the flexibility of working outside of their offices and increase productivity.

  • Data Centers at the Edge

    Sponsored by: Schneider Electric

    In this webcast, you will discover the benefits and boons of localized data centers on the network edge—paving the way for new capabilities deployed into the network. Tune in now to power the digitization of your business, and learn the different data center localization offers now available.

  • Taking IoT to the Edge With the Analytics of Things

    Sponsored by: SAS

    The IoT is not about embedding software into devices and then walking away. It's about evaluating the data deriving from objects, finding patterns, and extracting value to make more strategic business decisions. This resource uncovers strategies for better leveraging the IoT with an analytics-first approach.

  • Transform Your Enterprise With Software-Defined Hybrid WANs

    Sponsored by: MASERGY

    There is a large migration toward software-defined networking and should this trend continue, SDN will become the way of the future. We're already seeing improvements over legacy IT, but some organizations are still behind on this trend. Three industry experts will teach you what you need to understand about SD hybrid WANs.

  • Wi-Fi in Healthcare, Retail and Education

    Sponsored by: SearchNetworking.com

    In this classroom, analyst Zeus Kerravala considers issues related to wireless in three sectors: retail, education and healthcare.

  • Dimension Data and Department of PM&C G20 Case Study

    Sponsored by: Dimension Data

    In this case study, find out how the cloud was used to deliver a secure networking and virtual desktop to keep world leaders and media seamlessly connected, as well as ensure significant cost savings from the event.

  • Get to Know the Citrix Ready Marketplace

    Sponsored by: Citrix Ready

    Learn about the Citrix Ready Marketplace, a one-stop-shop for you to explore and evaluate Citrix compatible third-party products and solutions for virtualization, mobility, cloud, and networking.

  • Bolster Network Security for the Latest Social Engineering Tactics

    Sponsored by: WatchGuard Technologies, Inc.

    This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.

  • Assure Your Delivery of Quality UC Service with Network and Data Center Visibility

    Sponsored by: NetScout Systems, Inc.

    In this webcast, you will discover how to swiftly resolve problems that affect your UC with a service assurance platform that offers end-to-end networking and data center visibility. Tune in to pinpoint the cause of your UC problems by addressing voice and video media impairments.

  • How to Analyze the SIP Failures in Your Network

    Sponsored by: NetScout Systems, Inc.

    VoIP is commonly thought of as making external connections via simple paths. The truth is that these paths are often complex. This brief video demonstrates how to improve visibility, drill into network issues and triage SIP failures.

  • A Definitive Guide to Windows 10 Management

    Sponsored by: VMware

    This webcast examines the impact W10 will have on enterprise mobility in the next 5 years. Access this video to redefine your mobility management strategy with W10, and reap the benefits of its cloud-based management capabilities.

  • Become a Technology Partner with Citrix and Expand Your Business Reach

    Sponsored by: Citrix

    Discover how to expand your business reach by partnering with an internationally recognized company. See how much your business stands to benefit from leveraging this company's brand and global marketplace solution.

  • Become a Technology Partner with Citrix and Expand Your Business Reach

    Sponsored by: Citrix Ready

    This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. Plus you learn why becoming a technology partner with Citrix will expand your business reach and bottom line.

  • Software Defined Infrastructure for HPC

    Sponsored by: IBM

    Access this slidecast to hear Jay Muehoefer, Director of Software Defined Solutions at IBM, discuss the potential IT and business value of a software defined infrastructure.

  • Machine Learning Anomaly Detection for IT Ops

    Sponsored by: Prelert

    Discover how an anomaly detection solution can not only notify an enterprise when there is a problem, but also narrow down the causes so a fix can be created quickly. Learn how this solution zeros-in on vital information and sifts through bulky data quickly to resolve, in real-time, issues that can cripple an enterprise's operations.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.