Networking

As cloud computing grows, how will it impact the network and communications technologies and management?

  • Webcasts // Feb 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Come to the Dark Side - We Have (Misfortune) Cookies

    TR-069 is the de-facto standard remote management protocol that ISPs surreptitiously use to control consumer-premises equipment (these would be the user's home routers, set-top boxes, VoIP phones etc.), rumored to be a well-thought conspiracy devised by Internet Service Provider (ISP) secret societies since the 17th century.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Bitcoin Transaction Malleability Theory in Practice

    A mysterious vulnerability from 2011 almost made the Bitcoin network collapse. Silk Road, MTGox and potentially many more trading websites claim to be prone to \"Transaction malleability\". In this webinar, the presenter will shed some light and show in practice how to exploit this vulnerability.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Provided By Hewlett-Packard

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • Webcasts // Jan 2014

    Watch the Gartner Webcast to learn how fabrics reduce complexity

    Banish network complexity with expert input. In this Gartner Webcast, you’ll discover best practices for transitioning to a fabric-based network and how to find the networking vendor that best suits your business. Also learn how GEHA improved service delivery for more than one million subscribers with Ethernet fabrics.

    Provided By Brocade

  • Webcasts // Jan 2014

    Trustworthy Secure Modular Operating System Engineering

    The presenter will present Mirage OS, a modular library operating system developed from scratch in the functional programming language OCaml. Each service, called unikernel, is an OCaml application using libraries such as a TCP/IP stack, DNS. It is either compiled to a Xen virtual machine image or to a Unix...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Privacy in the Social Semantic Web

    However, many people have privacy concerns with such applications but the advantages and features often outweigh them. Instead of arguing against such services, the speaker proposes an alternative architecture based on the eXtensible Messaging and Presence Protocol (XMPP). Within a social network, members can link with each other in order...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Mining Social Contacts with Active RFID

    In this webcast, the presenter describes the implementation of a distributed proximity detection firmware for the OpenBeacon RFID platform. The presenter also discuss some properties of the networks of social contact, and show how these networks can be analyzed, visualized, and used to infer the underlying social structure.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Tor: Attacks and Countermeasures

    Tor is an anonymisation network which allows users to browse the internet without their true IP address being identified. In this webcast, the presenter explains about how Tor works into the infrastructure and high-level protocol. The presenter also introduces Tor hidden services, untraceable websites, and how this service is provided...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Pentesting Layers 2 and 3

    Lower level network protocols have been around for decades and haven't changed much in that time. A number of tools to exploit weaknesses in those protocols have been released over the years, and those haven't changed much either. In this webcast, the presenter will focus on layer 2 and layer...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Shameful Secrets of Proprietary Protocols

    There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all. Binary TCP connections, unlike anything, impossible to be adapted by a well-known local proxy....

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jul 2013

    Bethany Mayer on what SDN is and isn't

    HP Networking chief Bethany Mayer highlights definitions of what SDN is and isn’t, the impact it will have on the networking market, why SDN isn’t the end of networking hardware innovation and why applications are the key element in an SDN environment.

    Provided By Hewlett-Packard (HP)

  • Webcasts // Jun 2013

    Mobile to the Future

    When something new comes along, it's common for one to react with what the users' already know. Radio programming on TV, print design on web pages, and now web page design on mobile devices. But every medium ultimately needs unique thinking and design to reach its true potential. In this...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jun 2013

    Fiber Nonlinearity Compensation

    In this webcast, the presenter will give an overview of both digital and optical nonlinearity compensation. The advantages and limitations of each method will be discussed for the different optical network topologies, including point-to-point links, mesh optical networks and future super-channel applications.

    Provided By Oleksiy Kovyrin

  • Webcasts // May 2013

    GTAC 2013: Mobile Automation in Continuous Delivery Pipeline

    In this webcast, the presenter will share the experience and learning of utilizing open source tools to build automated testing in Expedia's Agile development and continuous delivery environment. The presenter will also explain about Test Pyramid and go into more detail of specific open source tools that have worked well.

    Provided By Oleksiy Kovyrin

  • Webcasts // May 2013

    GTAC 2013: Web Performance Testing With WebDriver

    In web performance testing, the users' know pretty well how to analyze a page load. Different people, including presenter, have integrated WebDriver into web performance test harnesses, which helps, but still keeps performance tests separate from the rest of the UI test suite. The presenter proposed to build performance testing...

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2013

    GTAC 2013: Appium: Automation for Mobile Apps

    Appium is a Node.js server that automates native and hybrid mobile applications (both iOS and Android). Appium's philosophy dictates that apps should not be modified in order to be automated, and that the user should be able to write their test code in any language or framework. The result is...

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2013

    GTAC 2013 Day 1 Closing Keynote: How Facebook Tests Facebook on Android

    Facebook is one of the most popular Android applications there is. In this webcast, the presenter discusses what Facebook does to ensure that each release is as good as it can be. The presenter will cover everything from how the user manages their code, through their approaches to testing and...

    Provided By Oleksiy Kovyrin

  • Webcasts // Apr 2013

    GTAC 2013: Espresso: Fresh Start to Android UI Testing

    Developing a reliable Android test should be as quick and easy as pulling a shot of espresso. Unfortunately, with existing tools, it may feel more like making a double-shot-caramel-sauce-upside-down-single-whip-half-decaf-latte - confusing and rarely consistent. Espresso is a new Android test framework that lets the user write concise, beautiful, and reliable...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jan 2013

    Bottle Mobile UI Library

    In this webcast, the presenter discusses about a mobile UI library called Bottle that features components packaged as YUI widgets for better reusability. The library is available in the YUI Gallery.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2012

    Get the Most Out of Your B2B Community: IBM B2B Cloud Services

    In today's increasingly competitive global business environment, more and more organizations are seeing the value and use of B2B services--moving beyond basic connectivity and into more sophisticated integration with the cloud. But the growing number of partners and complexity of connections and platforms make it hard to find a solution...

    Provided By IBM

  • Webcasts // Oct 2012

    Provenance for System Troubleshooting

    System administrators use a variety of techniques to track down and repair (or avoid) problems that occur in the systems under their purview. In this webcast, the presenter argues that system-level provenance (metadata that records the history of files, pipes, processes and other system-level objects) can help expose these dependencies,...

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2012

    Mysteries of a CDN Explained

    Content delivery networks are generally treated like a black box; some hand waving happens and suddenly things are expected to go faster from around the world. Time to reveal how a CDN actually works. At its core, it is a distributed system operating under the worst possible conditions - long...

    Provided By Oleksiy Kovyrin

  • Webcasts // Oct 2012

    The Architecture Behind Super Fast DNS - Routing, Redundancy & Geography

    In this webcast, the presenter will explain how companies can architect their network for optimized speed and performance, and how top companies have been winning the battle against website latency. For some, DNS is just DNS and they believe there is nothing they can do to improve its performance. But...

    Provided By Oleksiy Kovyrin

  • Webcasts // Sep 2012

    DoubleClick Ad Exchange: Connecting the World of Online Advertising

    When the users see an ad on a website, where did it come from? The answer to that question might not be as simple as it sounds. Ads on the internet take a long, often roundabout journey to make it from the advertiser to the user, a journey that sends...

    Provided By Oleksiy Kovyrin

  • Webcasts // Sep 2012

    C 2012: Why Architecture Matters

    In this webcast, the presenters will explains about why architecture matters. The presenter also explains about how to build the working software and secret for the high scalability for good data storage.

    Provided By Oleksiy Kovyrin

  • Webcasts // Aug 2012

    Cisco Medianet - Simplifying the Enterprise QoS Policy With Media Awareness

    Get an overview of the Cisco Medianet solution and architecture with Cisco in this webcast, the presenter discusses the simplified approach for validating QoS for critical business applications by using medianet media awareness.

    Provided By Cisco Systems

  • Webcasts // Jul 2012

    AFTR the Fire: Carrier Networks and Incremental Deployment of IPv6

    With the impending end of the unallocated pool of IPv4 addresses, the Internet faces a problem: there will be no more unused IPv4 space to assign as networks grow, only IPv6. Growth of the network in the future depends on effective deployment of IPv6. In this webcast, the presenter will...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jul 2012

    Cisco Smart CallConnector

    In this webcast, the presenter going to provides an overview about Cisco Smart CallConnector. The presenter also explains how to properly install the Cisco CallConnector solution that includes features like click-to-dial and click-to-send from presence-enabled directories among others.

    Provided By Cisco Systems

  • Webcasts // Jul 2012

    Hierarchical Queuing Framework Overview and Changes on Quality of Service

    The Cisco TAC WAN Team, where it focuses on various WAN-related issues along with QoS issues on various interfaces. In this webcast, the presenter going give an overview of the Hierarchical Queueing Framework and Q0S.

    Provided By Cisco Systems

  • Webcasts // Jul 2012

    Cisco TelePresence Management Suite Extension for Microsoft Exchange (TMSXE 3.0)

    In this webcast, the presenter going to provides an overview about Tele-Presence Management. The presenter also explains how to properly install the Cisco Tele-presence Management Suite Extension for Microsoft Exchange (TMSXE 3.0.).

    Provided By Cisco Systems

  • Webcasts // May 2012

    Get Ready for the World IPV6 Launch

    This webcast sheds light on the upcoming "World IPv6 Launch" and how one can plan for it. The Presenter also focused on IPv6 deployment techniques in core networks and Q & A was answered by a panel of distinguished engineers and experts from Cisco.

    Provided By Cisco Systems

  • Webcasts // Mar 2012

    WAN Optimization: Why go Virtual?

    See why Silver Peak is the new leader in WAN Optimization. In this 3-minute video, you'll learn from CEO Rick Tinsley about Silver Peak's portfolio of virtual WAN Op solutions - from the high end VRX with 20X the capacity of any other virtual appliance to the self-service free downloads...

    Provided By Silver Peak Systems, Inc.

  • Webcasts // Feb 2012

    Surge 2011 - Extracting Scalability and Performance Metrics From TCP Traffic

    Many systems that speak over TCP have simple call-and-response protocols. These lend themselves well to extracting reasonably accurate request and response start and end times. In this webcast, the presenter will introduce tools and techniques for capturing and analyzing the network traffic to give deeper insight into system behavior. This...

    Provided By Oleksiy Kovyrin

  • Webcasts // Jan 2012

    Streaming My Digital Entertainment

    In this webcast, the presenter explains about streaming digital entertainment. The presenter also explains about digital video streaming device, a digital video streaming device is a device that allows customers to stream video content from their home onto a mobile device or a laptop computer of their choice.

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    Getting Connected With My PMP and MP3 Player

    In this webcast, the presenter explains about PmP and MP3 player, how to get connected to the portable music players which can be played on the users television. The presenter also explains about the kind of cable and the connectivity plugins that can be made on their own car stereo.

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    Getting Your Computer Connected

    In this webcast, the presenter explains about computer connection. The presenter also discusses about the difference between "Firewire" and "USB?, personal computer memory card interface association slot will allows to attach different components to the users computer and what is an "Ethernet" cable?

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    Computers and the Internet

    In this webcast, the presenter explains about computers and the internet, the difference between Internet and Intranet and hardware that needed for wireless Internet connection. The presenter also shows a way to chose the best wireless network card.

    Provided By VideoIndiana Inc.

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • Webcasts // Jan 2014

    Tor: Attacks and Countermeasures

    Tor is an anonymisation network which allows users to browse the internet without their true IP address being identified. In this webcast, the presenter explains about how Tor works into the infrastructure and high-level protocol. The presenter also introduces Tor hidden services, untraceable websites, and how this service is provided...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Privacy in the Social Semantic Web

    However, many people have privacy concerns with such applications but the advantages and features often outweigh them. Instead of arguing against such services, the speaker proposes an alternative architecture based on the eXtensible Messaging and Presence Protocol (XMPP). Within a social network, members can link with each other in order...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Mining Social Contacts with Active RFID

    In this webcast, the presenter describes the implementation of a distributed proximity detection firmware for the OpenBeacon RFID platform. The presenter also discuss some properties of the networks of social contact, and show how these networks can be analyzed, visualized, and used to infer the underlying social structure.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Provided By Hewlett-Packard

  • Webcasts // Jan 2014

    Pentesting Layers 2 and 3

    Lower level network protocols have been around for decades and haven't changed much in that time. A number of tools to exploit weaknesses in those protocols have been released over the years, and those haven't changed much either. In this webcast, the presenter will focus on layer 2 and layer...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Shameful Secrets of Proprietary Protocols

    There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all. Binary TCP connections, unlike anything, impossible to be adapted by a well-known local proxy....

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Bitcoin Transaction Malleability Theory in Practice

    A mysterious vulnerability from 2011 almost made the Bitcoin network collapse. Silk Road, MTGox and potentially many more trading websites claim to be prone to \"Transaction malleability\". In this webinar, the presenter will shed some light and show in practice how to exploit this vulnerability.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Trustworthy Secure Modular Operating System Engineering

    The presenter will present Mirage OS, a modular library operating system developed from scratch in the functional programming language OCaml. Each service, called unikernel, is an OCaml application using libraries such as a TCP/IP stack, DNS. It is either compiled to a Xen virtual machine image or to a Unix...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Dark Art of Data Visualization

    Data visualization is very much a dark art. It is very dependent upon the data the users are using, what they want to get out of it and how it is displayed. They change any one thing and they will get a completely different outcome. The presenter has been doing...

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    Come to the Dark Side - We Have (Misfortune) Cookies

    TR-069 is the de-facto standard remote management protocol that ISPs surreptitiously use to control consumer-premises equipment (these would be the user's home routers, set-top boxes, VoIP phones etc.), rumored to be a well-thought conspiracy devised by Internet Service Provider (ISP) secret societies since the 17th century.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Information Centric Networking

    In this webcast, the presenter will focuses on the security, privacy and censorship aspects of information centric networking. The presenter will also presents the information centric networking paradigm, a radically new networking paradigm for the future internet, which is being a hot topic in networking and future internet research fields.

    Provided By SecurityTube.net

  • Webcasts // Jan 2009

    Moving to the Managed Desktop Environment Part 1

    Having solved several identity and access issues earlier in the series, this webcast focuses on a scenario in which multiple hardware configurations exist. These heterogeneous systems are having an adverse effect on costs, productivity, and security at the fictional company, Contoso. To address these issues, the company's IT group has...

    Provided By Microsoft

  • Webcasts // May 2009

    IT Manager Webcast: Platform Solution Blueprints: Unified Communications (Level 200)

    The presenter of this webcast will illustrate how Microsoft Unified Communications simplifies access to information. The presenter of this webcast shows how context, relevance, and immediacy help move from being available to being ready.

    Provided By Microsoft

  • Webcasts // Oct 2008

    LiveMeeting: Learn How to Make Money With Microsoft CRM!

    This webcast will help Microsoft partners to learn about how to sell Microsoft CRM and make money with VAR Rebates. This webcast will also help to explore the opportunity to expand and make even more money by getting certified and access CSA Fees and Big Easy Rebates.

    Provided By Microsoft

  • Webcasts // Jul 2009

    Work smarter to remain competitive and keep up with customer demands

    This webcast, "Untangle Your Connectivity Infrastructure ? Free Up Your Cost," shows how IBM SOA solutions and IBM WebSphere? untangle costly and debilitating complexities associated with connecting and integrating applications, services, and processes spread throughout the organization. The result is business agility and cost optimization.

    Provided By IBM

  • Webcasts // Jun 2009

    MSDN Webcast: RESTful Services With WCF 3.5 SP1 (Part 1 of 2): Concepts and Introduction (Level 200)

    This webcast is for one who has been looking for an overview of REpresentational State Transfer (REST) and gaining an understanding about the REST support of Windows Communication Foundation (WCF) 3.5 Service Pack 1 (SP1). The presenter of this webcast shows how to build an Asynchronous JavaScript and XML (AJAX)-friendly...

    Provided By Microsoft

  • Webcasts // Dec 2005

    How to Design for the Live Online Classroom: Creating Great Interactive and Collaborative Training Using Web

    The growing prevalence of Web conferencing has led many trainers to look closer at the ideas behind live online learning. Also referred to as virtual classrooms, synchronous learning, or Webinars, all of these terms mean basically the same thing: content delivered live over the Internet to geographically dispersed participants. This...

    Provided By InSync Training

  • Webcasts // Apr 2009

    TechNet Webcast: Operations Manager 2007 R2 Deployment and Upgrade Best Practices (Level 300)

    The presenter of this webcast explains about deploying Microsoft Systems Center Operations Manager 2007, where the attendee will gain useful insights into what worked, as well as what didn't, when deploying Operations Manager 2007 into different environments. The attendee will learn best practices for setup (including recommended approaches for disaster...

    Provided By Microsoft

  • Webcasts // May 2009

    Tapping Into the Power of Unified Communications Securely

    Unified Communications has become a powerful mainstream business resource, permitting rapid and cost-effective communication between internal and external staff alike. But, along with improved productivity, the use of Unified Communications software such as Microsoft Office Communications Server (OCS) has brought with it a new range of security threats that few...

    Provided By Reed Elsevier

  • Webcasts // Aug 2009

    IBM Webcast: Information as a strategic asset for smarter SOA

    Implementation roadblocks cause some SOA projects to fall short of delivering expected ROI. Join the Webcast and see how IBM? data services, data abstraction and your own information assets can help you achieve the business benefits and ROI you expect from your SOA project.

    Provided By IBM

  • Webcasts // May 2009

    H3C Intelligent Management System Webinar

    The attendee of this webcast will learn more about 3Com's new network management solution, the H3C Intelligent Network Center (IMC). H3C IMC is a revolutionary end-to-end network management solution which allows to manage the heterogeneous network through a single interface, dramatically reducing the time and expense associated with network management.

    Provided By 3Com

  • Webcasts // Aug 2009

    Sybase Webcast "Replication 15.2. Do More with your Data"

    During this on-demand Web seminar you will learn how Sybase Replication Server enables you to move and synchronize data across the hetergeneous enterprise, faster than ever before, adressing a wide array of needs including: Data Movement, Distribution and Synchronization System Migration Real-Time Reporting Disaster Recovery Featured Speaker: Bill...

    Provided By Sybase

  • Webcasts // May 2009

    Taming the "Wild West" - A Case Study in Microsoft SharePoint Governance

    The presenter of this webcast will illustrate how EMC can help customers successfully leverage IT to meet business demands. This webcast will target three types of projects that many organizations are considering today Microsoft SharePoint enterprise portals, Infrastructure intelligence and optimization and Platform migrations to Microsoft.

    Provided By EMC

  • Webcasts // Jun 2009

    Beyond Casual Mobility: Building Wireless LANs That Scale

    The attendee of this webcast will learn strategies for deploying high scale, wireless LANs. Discover tips for architecting wireless LANs that integrate with the wired LAN and scale to meet a variety of application needs across an array of topologies. The attendee will find out how to validate the performance...

    Provided By Cisco Systems

  • Webcasts // Sep 2008

    Optimizing 802.11n Design and Performance

    Fueled largely by the emergence of new applications and the need for nonstop access to voice and video by mobile users, demand for 802.11n is growing rapidly. This webcast will help the attendee to gain a technical understanding of how to optimize design and performance for 802.11n networks so one...

    Provided By Cisco Systems

  • Webcasts // Jul 2009

    MSDN Webcast: Building Applications Using the .NET Service Bus (Level 200)

    The presenter of this webcast will provide an overview of the Microsoft .NET Services Service Bus. The presenter will cover what a Service Bus is and why it is necessary, and he step through the features of the Service Bus: the naming system, the service registry, the messaging fabric, and...

    Provided By Microsoft

  • Webcasts // Jun 2009

    MSDN Webcast: geekSpeak: WCF Deployment Strategies With Keith Elder (Level 200)

    The presenter of this webcast shares tips and techniques from his experience deploying Windows Communication Foundation (WCF) services with Internet Information Services 7 (IIS7) in the enterprise. The presenter also shows how to setting up IIS7, configuring IIS 7 with multiple host headers, and how to make IIS7 work with...

    Provided By Microsoft

  • Webcasts // Aug 2009

    Accelerating Server Consolidation in the Branch Office

    Businesses looking to leverage server resources and save costs have increasingly turned to virtualization to consolidate their IT infrastructure while enabling greater flexibility. While the cost saving benefits of consolidation are clear, many businesses are leery of going down this path because of the potential performance hit their users in...

    Provided By VMware

  • Webcasts // Sep 2009

    802.11n Ratification - Come With Questions, Leave With Answers

    For starters, industry experts say that by the year 2012 80% of wireless LAN installations will be 802.11n. The result of that is not only will the vast majority of IT departments need to support 802.11n but the hundreds of millions of legacy 802.11 a/b/g clients need to be accounted...

    Provided By Meru Networks

  • Webcasts // Jan 2009

    How 802.11n Helps Performance, Reliability and TCO

    Ethernet replaced Token Ring because it was simpler, more economical and served the needs of users. But wired Ethernet no longer serves the needs of every user. The demand for mobility makes Wi-Fi better suited to the way people actually work, meaning few networks are now built from Ethernet alone....

    Provided By Network World

  • Webcasts // May 2009

    Key Factors in Deploying Successful WiMAX Services

    The presenter of this webcast will present her findings. WiMAX service providers will be featured and will explain how Cisco's technology advantages have given them a competitive edge in their markets. Cisco will also present a short overview of their end-to-end WiMAX solutions and technology, showing how key WiMAX features...

    Provided By WiMax.com Broadband Solutions

  • Webcasts // Jan 2010

    Improving Policy Acquisition and Servicing Using SOA

    Effective automation of policy acquisition relies on deployment of Service-Oriented Architecture (SOA) and Business Process Management (BPM) strategies. Using SOA and BPM, insurers can automate and streamline new business processes; provide easy access to shared information across operational silos and lines of business; integrate agents and other distributors into the...

    Provided By TIBCO Software

  • Webcasts // Jan 2010

    Dancing With Elephants - Making SAP More Agile With Event-Driven SOA

    The presenter will review SOA best practices in SAP-centric environments and provide guidelines to help to avoid common mistakes as well as plan a more dynamic SOA roadmap. The attendee of this webcast will understand the inherent benefits - and risks - of pursuing an enterprise-scale SOA initiative.

    Provided By TIBCO Software

  • Webcasts // Dec 2009

    Momentum Webcast: Reduce Your Operational Expenses! (Level 100)

    The attendee of this webcast will learn how to start saving on both the travel and telephony expenses allowing to invest those dollars in other components of the business success. Reduce travel costs by giving employees new ways to communicate using and integrated audio, video, and Web conferencing solution. Reduce...

    Provided By Microsoft

  • Webcasts // Nov 2009

    TechNet Webcast: Windows File Services in Windows Server 2008 R2 and Windows Storage Server (Level 200)

    Microsoft has delivered state-of-the-art file services functionality since the inception of the Windows Server operating system, and through the years the file services capabilities have evolved with the operating system to meet customers' ongoing needs. The attendee will discover the new enhanced file services capabilities in Windows Server 2008 R2...

    Provided By Microsoft

  • Webcasts // Feb 2010

    Ensuring High Availability for Business-Critical Applications With VMware and Neverfail

    Application availability has a direct effect on the bottom line for technology-driven businesses. From natural disaster to configuration issues and planned maintenance to power failures, threats are abundant, and downtime puts revenue and reputation at risk. But with integrated solutions from VMware and Neverfail, one can virtually eliminate downtime and...

    Provided By VMware

  • Webcasts // Oct 2009

    Increase developer productivity using IBM RationalTM and WebSphereTM.

    Even in a down economy, it's important to deliver services quickly. This Webcast presentation shows how by using solutions from Rational and WebSphere, development teams can leverage the latest Web and SOA technologies, such as SCA, to develop and deliver services seamlessly.

    Provided By IBM

  • Webcasts // Dec 2009

    Live Event: Turbo-charge your SOA - Cloudy with a chance of services and events

    While the value proposition of SOA is no longer the question, achieving maximum returns on SOA investments remains an art. In the new release of the SOA Suite (11g), Oracle has delivered the next generation SOA platform that greatly simplifies the development, deployment, management and monitoring of service-oriented architectures, while...

    Provided By Oracle

  • Webcasts // Dec 2009

    Live WebEvent: Turbo-charge your SOA - Cloudy with a chance of services and events

    While the value proposition of SOA is no longer the question, achieving maximum returns on SOA investments remains an art. In the new release of the SOA Suite (11g), Oracle has delivered the next generation SOA platform that greatly simplifies the development, deployment, management and monitoring of service-oriented architectures, while...

    Provided By Oracle