Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Webcasts // Mar 2014

    On-demand Webcast: As threats become more sophisticated, so too must next generation firewalls

    Not a day goes by without security threat news. Whether it's foreign hackers who have been living inside a famous company's network for years, or criminals stealing data from credit cards, employment and patient records, and selling them for pennies to other criminals, each day the situation gets worse. As...

    Sponsored By Dell Software

  • Webcasts // Mar 2014

    On-demand Webcast: Enterprise-proofing the Apple ecosystem with Centrify and Aqua Connect

    Here's something new. Most IT folks are familiar with terminal services on Windows Server, but did you know you can provide remote, secure terminal services with OS X? It's not only possible; it's a technology that allows you to provide the entire Macintosh experience to neglected corporate and enterprise users...

    Sponsored By Centrify

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Sponsored By Centrify

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    Watch the Gartner Webcast to learn how fabrics reduce complexity

    Banish network complexity with expert input. In this Gartner Webcast, you’ll discover best practices for transitioning to a fabric-based network and how to find the networking vendor that best suits your business. Also learn how GEHA improved service delivery for more than one million subscribers with Ethernet fabrics.

    Sponsored By Brocade

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Sponsored By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Sponsored By Workday

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Sponsored By Centrify

  • Webcasts // May 2014

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Sponsored By Dell Software

  • Webcasts // Mar 2014

    Reducing the Risk of Catastrophic Failure in the Software Defined Data Center

    The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power...

    Sponsored By Nlyte Software

  • Webcasts // Apr 2014

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Sponsored By CommVault Systems

  • Webcasts // Jun 2014

    Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

    Sponsored By IBM

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Sponsored By VMware

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Sponsored By Citrix Online

  • Webcasts // Oct 2013

    On-demand Webcast: Protect your Microsoft server applications and data across physical, virtual, and cloud environments

    If you rely on Microsoft’s server applications – ranging from Exchange to SharePoint to SQL Server, and more – you know how mission-critical those applications are to your core business operations. A catastrophic loss of data or disaster hitting any one of these bottom-line systems could have devastating consequences that...

    Provided By Dell Software

  • Webcasts // Oct 2013

    On-demand webcast: Top 20 cloud and virtualization do’s and don’ts for IT infrastructure

    There are two types of IT professionals in this world: those who use cloud services and those who provide cloud services for others to use. The lure of being a cloud service user is simple: all you have to do is pay-as-you-go and everything will be taken care of for...

    Provided By TechRepublic

  • Webcasts // Sep 2013

    Live webcast - Anticipate and act: how analytics enhances the supply chain

    Data is constantly being created as a byproduct of customer interactions and business activities. That data can have tremendous value because it can be used help you take the pulse of all the factors related to your business processes and customer needs. Today’s analytics systems can be easily used and...

    Provided By SAP

  • Webcasts // Nov 2013

    On-demand Webcast- Machine-to-Machine Security: How to Stay Secure While Building an Internet of Things

    Much of what we now refer to as the Internet of Things (IoT) has existed for decades but the Internet and cloud computing have further enabled automation, data, and security problems. As powerful and as valuable as IoT is, it's important to remember the security risks involved. Connected devices can...

    Provided By Wind River

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Sep 2013

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Aug 2013

    On-demand Webcast: Which Mobile Device is Most Secure?

    BlackBerry was once the go-to mobile device for security-savvy enterprises. The iPhone has since taken its place, with Android and Windows Phone 8 adoption steadily on the rise. The increasing trend of mobile consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a...

    Provided By Sophos

  • Webcasts // Sep 2013

    Calculating ROI for PC hardware and Client OS Upgrades

    Nearly a quarter of all businesses are still using Windows XP, despite two current and effective Windows OS options. Now, with the end-of-support for Windows XP upcoming in 2014, many organizations are faced with the challenge of how to keep end users productive, while retaining necessary applications and security. The...

    Provided By Dell & Microsoft

  • Webcasts // Jan 2012

    How To Increase Wifi Signal

    In this webcast, the presenter keys to solving weak reception is higher signal strength and less network noise. Certain devices such as cordless phones and microwaves are obvious generators of wireless network noise. So if it's all possible, keep one router as far away from these other devices and other...

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    How to Find and Use Wireless Internet Hotspots

    In this webcast, the presenter shows some great ways to find and use wireless hotspots in public places which is a hotspot area where a wireless internet signal can be picked up and used by a computer or other wireless internet - or "WIFI" - capable device.

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    Streaming My Digital Entertainment

    In this webcast, the presenter explains about streaming digital entertainment. The presenter also explains about digital video streaming device, a digital video streaming device is a device that allows customers to stream video content from their home onto a mobile device or a laptop computer of their choice.

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    Getting Connected With My PMP and MP3 Player

    In this webcast, the presenter explains about PmP and MP3 player, how to get connected to the portable music players which can be played on the users television. The presenter also explains about the kind of cable and the connectivity plugins that can be made on their own car stereo.

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    Getting Your Computer Connected

    In this webcast, the presenter explains about computer connection. The presenter also discusses about the difference between "Firewire" and "USB?, personal computer memory card interface association slot will allows to attach different components to the users computer and what is an "Ethernet" cable?

    Provided By VideoIndiana Inc.

  • Webcasts // Jan 2012

    Computers and the Internet

    In this webcast, the presenter explains about computers and the internet, the difference between Internet and Intranet and hardware that needed for wireless Internet connection. The presenter also shows a way to chose the best wireless network card.

    Provided By VideoIndiana Inc.

  • Webcasts // May 2011

    Client Virtualization. Solved.

    Hear how CDW helped one customer create a virtual desktop infrastructure to centrally manage desktops, reduce costs and maintenance time and improve recovery time.

    Provided By CDW & VMware

  • Webcasts // Jan 2011

    Leaders Of Character: Leadership - The West Point Way

    West Point has historically produced phenomenal leaders because of the emphasis it places on character development. This program takes one behind the scenes at the military academy and then into some of the country's foremost private and government organizations where West Point graduates now work.

    Provided By CRM Learning

  • Webcasts // Oct 2008

    Steven Johnson on the Web as a City

    In this webcast, the presenter says the Web is like a city: built by many people, completely controlled by no one, intricately interconnected and yet functioning as many independent parts. While disaster strikes in one place, elsewhere, life goes on.

    Provided By TED Conferences

  • Webcasts // Feb 2012

    Aleph Molinari: Let's Bridge the Digital Divide

    Five billion people can't use the Internet. In this Webcast, the presenter empowers the digitally excluded by giving them access to computers and the know-how to use them. Through education and technology-focused community centers, the presenter empowers the 5 billion people who cannot access or use the Internet and other...

    Provided By TED Conferences

  • Webcasts // Jul 2009

    How the Internet Enables Intimacy

    The presenter worry that IM, texting, Facebook are spoiling human intimacy, but Stefana Broadbent's research shows how communication tech is capable of cultivating deeper relationships, bringing love across barriers like distance and workplace rules.

    Provided By TED Conferences

  • Webcasts // Jul 2011

    Rebecca MacKinnon: Let's Take Back the Internet

    In this webcast, the presenter describes the expanding struggle for freedom and control in cyberspace, and asks: how do they design the next phase of the Internet with accountability and freedom at its core, rather than control? She believes the internet is headed for a "Magna Carta" moment when citizens...

    Provided By TED Conferences

  • Webcasts // Feb 2013

    On-demand Webcast: 5 Online Collaboration Tips for Small Businesses

    Don’t allow lack of size and resources to be a competitive disadvantage. No matter how modest your workforce, you have the ability to scale by taking advantage of the right technologies. For example: online and mobile collaboration tools enable you to share, send and update files from anywhere in the...

    Provided By ShareFile

  • Webcasts // Aug 2011

    Rethinking the Corporate Network

    Today's corporate networks face unprecedented levels of stress as they try to handle new devices, applications, and technologies. New demands, such as smartphones, tablets, cloud-based services, and virtualization have dramatically changed the way corporate networks need to be designed to deliver a high-quality user experience. But these changes...

    Provided By Alcatel Lucent Enterprise

  • Webcasts // Jan 2012

    netmap: A Novel Framework for Fast Packet I/O

    Many applications (routers, traffic monitors, firewalls, etc.) need to send and receive packets at line rate even on very fast links. In this webcast, the presenter presents netmap, a novel framework that enables commodity operating systems to handle the millions of packets per seconds traversing 1..10 Gbit/s links, without requiring...

    Provided By USENIX

  • Webcasts // Jan 2011

    Josh Nesbit: Mobile Healthcare

    The presenter co-founded medic mobile to bring the innovative use of mobile phones for healthcare to the developing world. A central clinic laptop runs FrontlineSMS software, enabling community health workers to use text messages to coordinate patient care, offer mobile diagnostics, and map health services.

    Provided By CC PopTech