Data Centers

Along with the rise of cloud computing, data centers are being reinvented via virtualization, servers and high-performance computing. Find out more in with the latest white papers and case studies.

  • Webcasts // Mar 2015

    On-demand Webcast: Continuous Delivery in the Enterprise

    As the pace of technology change increases, you need to continuously — and reliably — deploy updates to your infrastructure while minimizing risk and downtime. To do that, you need repeatability, speed, and visibility into your infrastructure. Automation gives you all three. In this webinar, you'll learn how Puppet Enterprise...

    Sponsored By Puppet Labs

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Feb 2015

    Trusting Your Cloud Provider - Protecting Private Virtual Machines

    There are effective measures to protect these data, one of which is encryption. As the user write in CfP 2013: "Uses encryption and access control". Concerning (IaaS) clouds the presenter has data in execution. That is, the virtual image/Virtual Machine (VM) sent to the cloud provider is the secret to...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Apps to the Future Predicting Enterprise Mobility in 2015

    Discover how to take your business MobileFirst and learn key trends around mobile enterprise apps from IDC’s latest FutureScape Report; including Top EMM and mobile security predictions, Key enterprise mobility management and how enterprise mobility stakeholders can enable secure mobile enterprise apps in 2015 and beyond. Watch Now..

    Provided By IBM

  • Webcasts // Feb 2015

    Enterprise Mobility: The Year in Review with Ovum

    With 2014 almost in the books, we once again joined forces with Ovum analyst, Richard Absalom, to revisit our trends and look to the future of mobile in the enterprise.Watch as we look back at our 2014 predictions, explore how fast the EMM market is maturing, and look into new...

    Provided By IBM

  • Webcasts // Dec 2014

    Live Webcast: A Fast, Secure Path to the Cloud

    Many companies are wary of sending their sensitive and highly regulated assets to public cloud resources. The cost efficiencies and scalability of cloud models, however, are too compelling to ignore. From on-demand compute capacity to modernized backup and recovery tools, your organization can't afford to write off the cloud. ...

    Provided By NetApp

  • Webcasts // Nov 2014

    On-demand Webcast: Moving the Data Center to Hyper-Converged & Web-Scale: A Customer and Analyst View

    As enterprises take their data centers to 100% virtualization, the needs for IT infrastructure have moved beyond converged infrastructure such as VCE Vblock and toward hyper-converged, web-scale architectures. Join this technical webinar to hear from CBSi editors, Taneja Group analysts, and Nutanix customers about how web-scale converged infrastructure is...

    Provided By Nutanix

  • Webcasts // Nov 2014

    Eliminating the NFS Hotspot Bottleneck - Webcast

    In this presentation, we will discuss filer bottleneck problems common to manufacturing design environments and provide a solution that will streamline data access, improve storage management and data availability, and lower operational costs. • Are filer hotspots an issue in your environment? • Do filers ever get unstable due to...

    Provided By IBM

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Sep 2014

    Flash Storage Designed for the Most Exacting Requirements - Yours

    Flash is transforming the industry. Yes Flash is fast, but harnessing the power of Flash requires architecture and software. With a purpose built scale-out architecture and unique in memory data services as well as a consistent performance at scale, XtremIO is unmatched in the All-Flash array market. Flash can also...

    Provided By EMC

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Provided By Druva Software

  • Webcasts // Jul 2014

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Provided By Druva Software

  • Webcasts // Jul 2014

    IBM Systems Magazine Webcast: What’s new for end-to-end workload automation to support new technologies

    Learn what’s new from IBM® that can help you automate workload scheduling across cloud, zEnterprise® and distributed environments.

    Provided By IBM

  • Webcasts // May 2014

    CloudBridge CSX Solution Overview

    In this webcast, the presenter will give a quick overview of the CloudBridge Cloud Services eXtended (CSX) solution. It simplifies deliver of data and application with minimum IT cost. It leverages the power of windows server technology.

    Provided By Citrix Systems

  • Webcasts // May 2014

    Accelerated Results and Optimize Infrastructure with IBM Platform Computing

    This webcast short spotlights ways you can accelerate results and optimize your infrastructure and how IBM Platform Computing software and IBM Technical Computing solutions are helping to simplify the complexity of deploying and managing a high-performance IT infrastructure.

    Provided By IBM

  • Webcasts // May 2014

    Breakthrough "big data" storage solutions: IBM System x GPFS Storage Server

    This webcast short spotlights breakthrough “big data” storage solutions using IBM System x GPFS Storage Server -- a ground breaking, modular solution that can be optimized to balance client needs in terms of performance, capacity, cost and scale. This webcast short also shares capabilities in the broader IBM technical computing...

    Provided By IBM

  • Webcasts // Apr 2014

    Customers on CommVault - LWG Consulting Deployment

    Paul Slager from LWG will discuss how he is achieving the following amazing results by leveraging the singular Simpana software solution from CommVault to deliver deeply integrated application-aware backup, archive and replication that spans physical and virtual environments: Reduce backup times by over 400%, recover VMs in under 10 minutes,...

    Provided By CommVault Systems

  • Webcasts // Apr 2014

    Snapshot Management – Ask the Educator Series

    Want a first-hand look at how easy it is to enhance and simplify snapshot backup? For a detailed technical tour and demonstration of Simpana IntelliSnap Technology, view this Ask the Educator session from CommVault Technical Instructor, Eric Mars.

    Provided By CommVault Systems

  • Webcasts // Mar 2014

    Reducing the Risk of Catastrophic Failure in the Software Defined Data Center

    The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power...

    Provided By Nlyte Software

  • Webcasts // Mar 2014

    Now It's Easier Than Ever to Get Started with DCIM

    Nlyte On-Demand makes it possible for companies of any size to deploy a scalable DCIM solution without incurring large up-front costs and complexities. Based on the flagship offering Nlyte 7, Nlyte On-Demand enables organizations to begin retooling their data center practices for efficiency and cost control. In this recorded...

    Provided By Nlyte Software

  • Webcasts // Feb 2014

    Webcast: See into the Future of Managed File Transfer

    Join this webcast with experts from IBM to get a Managed File Transfer strategy update and learn about IBM’s vision for ensuring end-to-end visibility, universal connectivity and dynamic communities.

    Provided By IBM

  • Webcasts // Jan 2014

    Watch the Gartner Webcast to learn how fabrics reduce complexity

    Banish network complexity with expert input. In this Gartner Webcast, you’ll discover best practices for transitioning to a fabric-based network and how to find the networking vendor that best suits your business. Also learn how GEHA improved service delivery for more than one million subscribers with Ethernet fabrics.

    Provided By Brocade

  • Webcasts // Jan 2014

    The 3 Pains of Systems Management and Server Monitoring

    In this webcast, the presenters explain about the ease adoption for the user's server monitoring, capacity planning and virtualization. The speakers will also describe about comprehensive reporting and monitoring for easy IT decision making.

    Provided By DABCC

  • Webcasts // Jan 2014

    The Exploration and Exploitation Of an SD Memory Card

    In this webcast, the presenter demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card. All \"Managed flash\" devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of reliable, contiguous...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Reverse Engineering Secure HTTP API's with an SSL Proxy

    In this webcast, the presenter will explain a common (but insecure) method of securing HTTP APIs with SSL. As the presenter will demonstrate, properly configured SSL will protect a protocol from eavesdropping (man-in-the-middle attack) but will not protect that protocol from the end user himself.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Modsecurity Apache Module Primer

    In this webcast, the presenter explains about the basics of ModSecurity and how to use it effectively to secure web applications. ModSecurity is an Apache web server module that provides a web application firewall engine.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hardware Hacking with Microcontrollers: A Panel Discussion

    Microcontrollers and embedded systems come in many shapes, sizes and flavors. From tiny 6-pin devices with only a few bytes of RAM (ala the DEF CON 14 Badge) to 32- bit, eight core multiprocessor systems (ala DEF CON 20 Badge) each has their own strengths and weaknesses.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to Processor Design

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to ARM

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    A Syscall to ARMs

    ARM processors are growing more and more prevalent in the world; ARM itself claims that more than 20 billion chips have been shipped. Take a moment to appreciate that is about three chips for every man, woman, and child on earth. The three main topics, the presenter aim to cover...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    All Your Baseband Are Belong to Us

    In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army or Gained in Translation

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to Firmware Analysis

    In this webcast, the presenter gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    General Notes About Exploiting Windows X64

    During the last few years, x64 processors have been a growing technology adding performance and memory range to the old 32-bits cores. Now-a-days, most of the PCs make use of them, and Microsoft has ported its operating system, Windows, adding several changes and protection measures. Security measures have evolved since...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Using Web Proxy Servers for Hacking

    Sometimes the user wants to pentest on some website so it is very difficult to hide their identity when they hack some website, so using web proxy they can hide their identity. And if in their network there is one firewall so they are not able to access some website...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Scanning Web Server Using Nikto

    In this podcast, the speaker will scan on apache server and Ubuntu 11.04. The speaker will explain how to learn Nikto tool for scanning the web server. Nikto is an open source web server scanner tool.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Darknet and Hidden Servers at Blackhat DC 2011

    Locally ran proxies that the users' can connect to and control via a web browser. These connect other I2P routers via tunnels. Network information is distributed via a DHT know as NetDB. In this webcast, the presenter will discuss the Darknets and hidden servers identifying the true IP/network identity of...

    Provided By SecurityTube.net

  • Webcasts // Dec 2013

    Server & Application Monitor Guided Tour: Awesome Server Monitoring Software

    In this podcast, the speaker explains about the Server & Application Monitor (SAM). The speaker describes an SAM robust capability to monitor and fix their servers and applications, including custom application monitoring.

    Provided By SolarWind

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Mar 2015

    Securing SMEs in an evolving Threat Landscape - On Demand Webcast

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // Mar 2015

    On-demand Webcast: Continuous Delivery in the Enterprise

    As the pace of technology change increases, you need to continuously — and reliably — deploy updates to your infrastructure while minimizing risk and downtime. To do that, you need repeatability, speed, and visibility into your infrastructure. Automation gives you all three. In this webinar, you'll learn how Puppet Enterprise...

    Sponsored By Puppet Labs

  • Webcasts // Dec 2014

    Live Webcast: A Fast, Secure Path to the Cloud

    Many companies are wary of sending their sensitive and highly regulated assets to public cloud resources. The cost efficiencies and scalability of cloud models, however, are too compelling to ignore. From on-demand compute capacity to modernized backup and recovery tools, your organization can't afford to write off the cloud. ...

    Provided By NetApp

  • Webcasts // Jan 2010

    Top HPC Use Cases in Life Sciences

    The attendee of this webcast will learn from the experts how best to apply cutting edge high-performance computing techniques - such as cloud clustering and multi-core optimization - in a life sciences environment. The presenter will address the top use cases cited by the customers, including high performance life science...

    Provided By Sun Microsystems

  • Webcasts // Feb 2015

    Apps to the Future Predicting Enterprise Mobility in 2015

    Discover how to take your business MobileFirst and learn key trends around mobile enterprise apps from IDC’s latest FutureScape Report; including Top EMM and mobile security predictions, Key enterprise mobility management and how enterprise mobility stakeholders can enable secure mobile enterprise apps in 2015 and beyond. Watch Now..

    Provided By IBM

  • Webcasts // Jan 2011

    Secrets of a Successful Cloud Data Protection Strategy

    More and more businesses of all types and sizes are now considering the cloud for an ever-increasing number of IT applications and services. Although most business and IT decision makers already understand the benefits in terms of savings and scalability, many are still uncertain exactly where the cloud fits in...

    Provided By Iron Mountain

  • Webcasts // Jan 2011

    Are Your PCs and Laptops Recovery and Discovery Ready? (With Laura DuBois of IDC)

    Find out why corporations are quickly adopting a centralized PC Backup and Protection strategy to mitigate their risks from data loss and to gain visibility and accessibility to critical data across the network. IDC Program Vice President Laura DuBois will examine the critical reasons why corporate PC data loss should...

    Provided By Iron Mountain

  • Webcasts // Jan 2011

    The Dash For Cash: Competing In China's Booming Sportswear Market

    The Olympic flame may have been extinguished at the 2008 Beijing Olympics, but the competition for the spending power of Chinese consumers remains red-hot for sportswear firms Adidas and Puma.

    Provided By INSEAD

  • Webcasts // Jan 2011

    Business Continuity Guaranteed - How to Enable Your Employees to Take the Virtual Road to Work

    Emergencies happen - and the reality is that many organizations and employees will not be prepared when one occurs. So it's essential that organizations set up a business continuity strategy that makes technology resources immediately available to employees in unexpected circumstances. View this BNET Webcast to learn the best...

    Provided By Citrix Online

  • Webcasts // Oct 2010

    Building Secure Private Clouds with VMware vCloud Director

    VMware vCloud Director gives you the ability to build secure private clouds that dramatically increase datacenter efficiency and business agility. Coupled with VMware vSpheretm, the best platform for cloud infrastructures, VMware vCloud Director delivers cloud computing for existing datacenters by pooling virtual infrastructure resources and delivering them to users as...

    Provided By VMware

  • Webcasts // Oct 2010

    VMware vCloud Director: Technical Overview

    VMware vCloud Director is a software solution that enables enterprises to build secure, multi-tenant private clouds by pooling infrastructure resources into virtual datacenters and exposing them to users through Web-based portals and programmatic interfaces as fully automated, catalog-based services. Attend this webcast to learn about: ? The architecture...

    Provided By VMware

  • Webcasts // Oct 2010

    VMware TV Series: The Enterprise-Class Hybrid Cloud. Delivered.

    The enterprise-class public cloud is real. But how do you ensure you're leveraging the VMware technology you know and trust? Learn how VMware vCloud? and the VMware service provider ecosystem can help you extend your VMware private cloud environment with compatible public cloud computing services. Discover how VMware delivers...

    Provided By VMware

  • Webcasts // Mar 2011

    Public Sector Cloud - the Big Debate

    Webinar featuring John Suffolk, who as Government CIO, initiated the G-Cloud programme; David Wilde, CIO, Westminster City Council on bringing cloud innovation into local government;Andy Macleod, Head of Strategy and Policy at Cisco on role of the supplier - chaired by leading industry advisor, Dr Richard Sykes.

    Provided By Cisco Systems, Inc.

  • Webcasts // Mar 2011

    Reporter Analyzer Webcast

    Traffic Analysis gives IT Professionals insight into how applications are impacting network performance. View this webcast to learn about Traffic Analysis as a vital component of service assurance.

    Provided By CA

  • Webcasts // Mar 2011

    In today's uncertain economy, mid-sized organizations are pressured to do more with less?to cut costs and reduce risks, to increase revenues and productivity, and to get more value from information technology.

    With heterogeneous environments, rigid systems, proprietary applications or technology and siloed information across the enterprise, deployment of new applications and services can be time consuming. IBM WebSphere provides the solutions for any size company to to cut costs and reduce risks, to increase revenues and productivity, and to get more...

    Provided By IBM

  • Webcasts // Mar 2011

    What Dell Virtualization Solutions Can Do for Your Business

    What's your greatest motivation for considering virtualization? Chances are, it's the cost savings. Yes, virtualization will save you money, but it will also do so much more. Watch this short, informational video to discover all the benefits Dell Virtualization Solutions has to offer, including making IT more agile, improving quality...

    Provided By VMware

  • Webcasts // Mar 2011

    Empower Your Smart Grid Transformation

    Around the globe, progressive utilities see the inevitability of adopting a smart grid that uses digital technology to modernize the power grid. More than meters and mobility, the smart grid represents a whole new framework for improved management of electricity generation, transmission and distribution. Embarking on a smart grid journey...

    Provided By Carnegie Mellon University

  • Webcasts // Jul 2010

    Haiti's Disaster of Engineering

    Haiti was not a natural disaster, says TED Fellow Peter Haas: "It was a disaster of engineering." As the country rebuilds after January's deadly quake, are bad old building practices creating another ticking time bomb? Haas's group, AIDG, is helping Haiti's builders learn modern building and engineering practices, to assemble...

    Provided By TED Conferences

  • Webcasts // May 2011

    Security and Data Protection in a Google Data Center

    An exclusive, inside look at how Google secures and protects the data that is stored within the Google Data Centers. This is the first time cameras have ever been behind the scenes of a Google Data Center. Watch this short video to get a glimpse of the physical security of...

    Provided By Google

  • Webcasts // May 2011

    The Perfect Couple: Business Process and Data Management

    There's no love lost between those responsible for your critical business processes and your data management efforts. Typically, their paths never cross and if they do, the relationship is plagued by miscommunication and misguided goals. Why is it important for these groups to be aligned and how do you...

    Provided By Trillium Software

  • Webcasts // May 2011

    Operational Data Quality - Building the Business Case

    Often times, presenting a coherent business case and obtaining senior management approval often stands in the way of improving data quality and successfully implementing an MDM solution. Hear Andy Hayler from the Information Difference discuss these challenges as he presents the findings of his research report, "Building a Robust Business...

    Provided By Trillium Software

  • Webcasts // Dec 2010

    Live Webcast Series: Learn how to build your shared IT infrastructure

    Start today by registering for our three-part live Webcast series, which will offer interactive Q&A and featuring leading analysts, peer perspectives, NetApp experts, and strategic solution partners, including Cisco and VMware. Register now for all three Webcasts in the series. Your Roadmap to the Cloud Learn the steps...

    Provided By NetApp

  • Webcasts // Jan 2010

    Modernize Your Infrastructure: Move From SPARC/Solaris to Red Hat Enterprise Linux on HP Servers

    Businesses around the world are achieving dramatic cost savings and improving performance by migrating from proprietary SPARC/Solaris environments to the open source, standards-based alternatives offered by Red Hat and HP. For over 11 years, HP, Red Hat and their mutual partners have been modernizing data centers with solutions and migration...

    Provided By Red Hat

  • Webcasts // Sep 2010

    Migrating SAP Applications From Unix to Red Hat Enterprise Linux

    Many organizations are migrating their enterprise applications, such as SAP applications, to Linux. In this webinar the will hear about SAP's involvement and dedication to the Linux community, and how active collaboration with Red Hat can help the build a greener datacenter, reduce IT costs, and increase the performance of...

    Provided By Red Hat

  • Webcasts // Sep 2010

    Managing Red Hat Enterprise Linux in an Increasingly Virtual World

    Red Hat Enterprise Linux is the ideal operating system in today's increasingly virtual world, with its high performance, scalability, and ease of management. Virtualization has many benefits, but increased systems density also increases the complexity of the IT infrastructure. The last thing that the want is for the management costs...

    Provided By Red Hat

  • Webcasts // Sep 2010

    AJAX Applications With JSF 2 and the New RichFaces 4

    RichFaces is a JSF framework with AJAX components (over 100), skins, themes, and a component development kit. Although JSF 2 now offers basic AJAX functionality (which was, in fact, greatly inspired by RichFaces), a broader rich component library is still needed to build most real-world JSF AJAX applications. This webinar...

    Provided By Red Hat

  • Webcasts // Aug 2010

    Red Hat Network Satellite Power User Tips & Tricks

    Red Hat Network Satellite is a powerful, flexible systems management solution for deploying, managing, monitoring, and redeploying Red Hat Enterprise Linux servers. Red Hat Network Satellite allows users to decrease administrative costs and increase time available for strategic tasks by performing single operations through the Web user interface. These single...

    Provided By Red Hat

  • Webcasts // Aug 2010

    Practical Guidance for Moving Business Critical Applications From Unix to Linux

    In a recent study, Harvard Research Group (HRG) examined the real-world customer experiences of migrating IT infrastructure from proprietary UNIX hardware and software-based environments to Red Hat Enterprise Linux on Intel Architecture. In this webinar which was co-hosted by InformationWeek, HRG and Red Hat present the findings from this study...

    Provided By Red Hat

  • Webcasts // Aug 2010

    A Customers Perspective on Managing Red Hat Enterprise Linux

    Kevin will show the how Salt River Project reduces both the administrative cost and complexity of managing their Linux environment with RHN Satellite. According to Kevin, "RHN Satellite is a key component to the management of all of the Red Hat servers, whether on the mainframe or in the distributed...

    Provided By Red Hat

  • Webcasts // Aug 2010

    Introduction to Red Hat Enterprise Linux Webinar Series #4: Gain IT Efficiency With Better Systems Lifecycle Management From Red Hat

    Red Hat Enterprise Linux is suitable for any workload and offers simple yet robust, out-of-the-box, and well-integrated systems management capabilities to help organizations easily automate processes and improve efficiencies across the life cycle (provisioning, updates, patches, change management, and configuration inventory). This session will answer the following questions: What are...

    Provided By Red Hat

  • Webcasts // Jun 2010

    Introduction to Red Hat Enterprise Linux Webinar Series #3: Get the Most Out of IT by Virtualizing With Red Hat

    Red Hat can help their organization plan for the successful transition between physical to virtual computing and to cloud computing environments. For each computing model, Red Hat Enterprise Linux offers the optimal set of tools and management capabilities, thus yielding superior performance, scalability, and reliability. The following questions will be...

    Provided By Red Hat

  • Webcasts // Jul 2010

    Cloud Computing: Moving From Hype to Reality the Open Source Way

    With many enterprises looking to deploy cloud solutions, there is a growing realization of not only the benefits, but of the challenges that cloud computing must overcome. Even though the technology has matured rapidly over the last 12 months, there is still a lot of uncertainty about the leading technologies,...

    Provided By Red Hat

  • Webcasts // Oct 2010

    Making Tomcat Enterprise Ready

    With the growing popularity of lightweight applications, enterprise deployments of Tomcat continue to increase. However, deploying Tomcat can also present configuration, management, and security challenges. In this session, learn how JBoss Enterprise Web Server overcomes these issues by providing an enterprise Tomcat solution specifically targeted at enterprise deployments with support...

    Provided By Red Hat

  • Webcasts // Oct 2010

    Red Hat Enterprise Virtualization for Desktops

    This webinar will examine how to achieve increased security, while at the same time delivering an end-user experience that is indistinguishable from that of a physical desktop, using Red Hat Enterprise Virtualization for Desktops. Hear about technical considerations for desktop virtualization and Red Hat capabilities that provide for advanced desktop...

    Provided By Red Hat

  • Webcasts // Sep 2010

    Achieving Compliance in an Increasingly Virtual World

    This webinar will explore compliance requirements facing companies today. The speakers will review a proposed framework for meeting those compliance requirements and discuss best practices for leveraging Red Hat Management solutions to comply with PCI and other compliance initiatives. The combination of Red Hat Enterprise Virtualization Manager and Red Hat...

    Provided By Red Hat

  • Webcasts // Sep 2009

    Reduce Cost and Increase Productivity With Red Hat Enterprise Linux Management Solutions

    Red Hat Enterprise Linux has become one of the fastest-growing and most reliable technology platforms available for mission-critical enterprise applications. Whether deployed on bare-metal or as virtual guests, from x86 to the mainframe, efficient administration and management of the Linux systems also becomes increasingly important. Red Hat Network Satellite can...

    Provided By Red Hat

  • Webcasts // Aug 2009

    Considering a Sun Alternative: HP + Red Hat. Your Platform of the Future

    In light of Oracle's acquisition of Sun, many IT teams are understandably concerned about the future of their Sun Solaris investments. In this live web conference, Red Hat and HP solution experts will share why they believe HP ProLiant and BladeSystem with Red Hat Enterprise Linux provide a superior combination...

    Provided By Red Hat

  • Webcasts // Sep 2009

    Optimizing IT Service Delivery: The Need for Linux Systems Management

    This webcast focuses on the Linux Systems Management challenges IT organizations face to reduce costs while delivering high service quality to end-users. During this webcast program Vice President; Enterprise System Management Software for IDC will examine key functions and benefits of system management software in today's business and enterprise environments....

    Provided By Red Hat

  • Webcasts // Sep 2009

    Current & Future Linux on System z Technology

    Red Hat Enterprise Linux has become one of the fastest-growing and most reliable operating platforms available for mission-critical enterprise applications. Whether deployed on bare-metal or as virtual guests, from x86 to the Mainframe, an understanding of the latest performance and technical features is critical to a successful deployment. This webcast,...

    Provided By Red Hat

  • Webcasts // Sep 2009

    A Successful Migration: How and When to Migrate to Red Hat Enterprise Linux on Intel Xeon Processor

    There has never been a better time to migrate the proprietary RISC servers running UNIX to Red Hat Enterprise Linux on Intel Xeon processor-powered servers. Get the information they must have to make that migration a success. Talk to the teams involved in actual migrations. Learn more about the operational...

    Provided By Red Hat