Networking

As cloud computing grows, how will it impact the network and communications technologies and management?

  • Webcasts // Nov 2014

    Catching Malware En Masse DNS and IP Style

    The Internet is constantly growing, providing a myriad of new services both legitimate and malicious. Criminals take advantage of the scalable, distributed, and rather easily accessible naming, hosting and routing infrastructures of the Internet. As a result, the battle against malware is raging on multiple fronts: the endpoint, the network...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Cellular Exploitation on a Global Scale the Rise and Fall of the Control Protocol

    In this webcast, the presenter will discuss and disclose how over-the-air code execution can be obtained on the major cellular platforms and networks (GSM/CDMA/LTE). Including but not limited to Android, iOS, Blackberry, and embedded M2M devices. The listener will come away from this webcast, armed with detailed insight into these...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    It Just (Net)works the Truth About iOS 7's Multipeer Connectivity Framework

    With the release of iOS 7, Apple has quietly introduced a nifty feature called multipeer connectivity. Using a surprisingly small and simple set of APIs, developers can create applications that have the ability to discover and directly communicate with nearby iOS devices over Bluetooth or WiFi, without the need for...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Gaining The Upper Hand In Today's Cyber Security Battle

    Threat intelligence uses the symptoms of an attack to foster an understanding of who the attackers are and what their motives and capabilities may be offering the insight necessary to develop a proactive stance and thwart attackers. Read More..

    Provided By IBM

  • Webcasts // Oct 2014

    Mirage - Next Gen Honeyports

    In this webcast, the presenter explains about Honeyports. Honeyports are a great way for defenders to not only see what the attackers are doing, but to quickly, and automatically, deploy countermeasures. Does the people's business cringe when they talk about auto shun on the firewall? Mirage takes honeyports to the...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    How to Secure and Sys Admin Windows Like a Boss

    In this webcast, the presenter looked at some of the specifics of how to secure a windows network from 6000 hostile users with domain creds. Those users are still there, still hostile and still hell bent on breaking their stuff. The presenter will recap the security measures they have in...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    The Wireless World of the Internet of Things

    In this webcast, the presenter explains about the Internet of Things (IoT), which brings all the hardware are home together. Most of these devices are controlled through wireless command and control network. But what kind of wireless? And what is the security is in place? The speaker covers the wireless...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Provided By Citrix Online

  • Webcasts // Sep 2014

    Secrets of DNS

    DNS is a weird and fantastic protocol that lets any system on even the most secure networks talk to an evil system without ever sending it a packet. Who wouldn't love that? Every pentester needs to know how to leverage the DNS infrastructure to find vulnerabilities-exploit vulnerabilities- and even set...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Code Insecurity or Code in Security

    In this webcast, the presenter explains about what constitutes insecure code and the associated attacks that stem from such code. The presenter also demonstrated to reinforce the applicable attacks ranging from injection to reversing. This way, the presenter not only teaches about \"What not to do?\" but also, \"Why this...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Stealing a Mobile Identity Using Wormholes

    Authentication in mobile networks is usually done using a secure element which is commonly a sim-card. It is a tamper resistant device that should prevent cloning of mobile identities by legitimate users as well as attackers. Mobile network operators as well as most users have an interest in preventing the...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Node.JS as a Networking Tool

    Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. In this webcast, the presenter explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Centrify for Samsung Knox - Product Overview

    The idea that employees may be storing corporate data together with their vacation photos on their smartphones is enough to give IT administrators and corporate compliance managers nightmares. At the same time, nobody wants to lug around separate devices for work and home use, and BYOD makes workers happier and...

    Provided By Centrify

  • Webcasts // Sep 2014

    The Business Value of Cloud-Managed Wireless Networks - IDC Webinar

    Cloud-managed Wi-Fi promises greater networking efficiencies and flexibility in managing, scaling and upgrading the wireless network. But cloud-managed Wi-Fi may not be the right solution for everyone. Watch this webcast to hear IDC analyst and Vice President, Rohit Mehra, discuss the critical factors to take into account as you...

    Provided By Hewlett-Packard

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Provided By Alert Logic

  • Webcasts // Aug 2014

    HP Software-Defined Data Center Webinar

    The concept of the software-defined data center (SDDC), an abstraction of the physical data center into a software-defined set of resources and services, has gained traction over the last year. Understanding the potential benefits, pitfalls and the commercial reality of the SDDC is critical for enterprise infrastructure architects and engineers...

    Provided By HP & Intel® Xeon® Processor

  • Webcasts // Aug 2014

    Phone Phreaks: What We Can Learn From the First Network Hackers?

    Before Smartphone's and iPads, before the Internet or the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. In this webcast, the presenter will explain about some lessons identified (if not actually learned!) relevant to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring

    Sometimes, hiding the existence of a communication is as important as hiding the contents of that communication. While simple network tunneling such as Tor or a VPN can keep the contents of communications confidential, under active network monitoring or restrictive IDS such tunnels are red flags which can subject the...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Aug 2014

    Absolute Backdoor Revisited

    In this webcast, the presenter will includes a live demonstration of security flaws in modern anti-theft technologies that reside in firmware and PC BIOS of most popular laptops and some desktop computers. While the general idea behind anti-theft technology is good, improper implementation can render it useless as well as...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    OAuth App Impersonation Attack: How to Leak a 100-Million-Node Social Graph in Just One Week? - A Reflection on OAuth and API Design in Online Social Networks

    Many Online Social Networks (OSNs) are using OAuth 2.0 to grant access to API endpoints now-a-days. Despite many thorough threat model analyses (e.g. RFC6819), only a few real world attacks have been discovered and demonstrated. To the presenter's knowledge, previously discovered loopholes are all based on the misuse of OAuth.

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Provided By Druva Software

  • Webcasts // Jul 2014

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Provided By Druva Software

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Provided By Imperva

  • Webcasts // Jun 2014

    On-demand Webcast: Your Strategy at the Intersection of Cloud and Mobile

    We live in an enterprise world where Bring Your Own Device (BYOD) is a fait accompli and mobile is part of all of our lives. IT and mobility stakeholders continue to address ongoing changes with audiences, OS environments, data formats, coding methods, business processes and more. The case for investing...

    Provided By SAP

  • Webcasts // Jun 2014

    Splinter the RAT Attack: Create Your Own Botnet to Exploit the Network

    In this webcast, the presenter will show how to create the dropper, implant bots, master controller, and launch new payloads on the victim box through the use of Splinter the RAT, an open-source red-team collaboration framework they developed and released to the community to show the ease at which RATs...

    Provided By SecurityTube.net

  • Webcasts // Jun 2014

    Financial Services Mobility Webinar brought to you by VMware and IDC

    What you will take away from the webinar: Perspective on today’s mobile financial enterprise Drivers and business imperatives for the growth of mobility Transformative nature of mobile innovation Style of IT that mobility brings to the financial enterprise

    Provided By VMware

  • Webcasts // May 2014

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Provided By Dell Software

  • Webcasts // May 2014

    On-demand Webcast: Internet of Everything: What it is and why it matters to IT

    By 2018, it’s projected that 9 billion devices will be connected to the “Internet of Things.” To top it off, many analysts argue that the web will encompass more than just devices, evolving into an “Internet of Everything". But what are these networks really? And more importantly, what do...

    Provided By Citrix Online

  • Webcasts // May 2014

    Webinar: Workday 20 Webinar

    Workday announces the arrival of Workday Big Data Analytics in Workday 2.0. Watch the webinar to learn how this powerful new application lets you combine Workday data with multiple non-Workday data sources to get more comprehensive insight and lets you run your business your way.

    Provided By Workday

  • Webcasts // May 2014

    Webinar: Workday 21

    Workday 21 introduces a brand-new user experience with a clean, new look and even greater usability. With 246 new features and 67 of these coming from customer suggestions, this update demonstrates the continued influence our customers have in the development of Workday. Watch the webinar to learn more.

    Provided By Workday

  • Webcasts // May 2014

    Accelerated Results and Optimize Infrastructure with IBM Platform Computing

    This webcast short spotlights ways you can accelerate results and optimize your infrastructure and how IBM Platform Computing software and IBM Technical Computing solutions are helping to simplify the complexity of deploying and managing a high-performance IT infrastructure.

    Provided By IBM

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Provided By Centrify

  • Webcasts // Apr 2014

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Provided By CommVault Systems

  • Webcasts // Mar 2014

    Reducing the Risk of Catastrophic Failure in the Software Defined Data Center

    The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power...

    Provided By Nlyte Software

  • Webcasts // Jan 2014

    The shift from servers to services: Charting your future in the cloud era webcast

    The cloud is not only changing how you source and deliver technology. It’s also leading IT organizations to be more service-centric. This shift impacts IT on many levels. It refocuses IT organizations and changes how they operate and provide services. Find out why shifting from servers to services will help...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Jan 2014

    Watch the Gartner Webcast to learn how fabrics reduce complexity

    Banish network complexity with expert input. In this Gartner Webcast, you’ll discover best practices for transitioning to a fabric-based network and how to find the networking vendor that best suits your business. Also learn how GEHA improved service delivery for more than one million subscribers with Ethernet fabrics.

    Provided By Brocade

  • Webcasts // Jan 2014

    SS7MAP : Mapping Vulnerability of the International Mobile Roaming Infrastructure

    SS7 has been shown repeatedly as an insecure protocol: spoofing, faking, crash through fuzzing and fraud. The main question of the presenter study is to determine how this insecurity is mitigated by network operator's action to prevent compromise on both network exposure of infrastructure and privacy compromise of subscribers. It's...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Trustworthy Secure Modular Operating System Engineering

    The presenter will present Mirage OS, a modular library operating system developed from scratch in the functional programming language OCaml. Each service, called unikernel, is an OCaml application using libraries such as a TCP/IP stack, DNS. It is either compiled to a Xen virtual machine image or to a Unix...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Revisiting SSL/TLS Implementations

    The presenter present four new Bleichenbacher side channels and three successful Bleichenbacher attacks against the Java Secure Socket Extension (JSSE) SSL/TLS implementation and against hardware security appliances using the Cavium NITROX SSL accelerator chip. 16 years ago, the researcher presented a protocol-level padding oracle attack against SSL/TLS.

    Provided By SecurityTube.net

  • Webcasts // Jan 2010

    Overview of High Availability With GlassFish

    As a business, the competition for the short attention span of customers is intense. Business services should be available to customers even though parts of the system have failed. This availability is provided through multiple mechanisms - clustering for service availability, session state persistence for availability of business sessions, fault...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Net Talk: Java CAPS Release 6

    The presenter of this webcast shows some of the key benefits of Java CAPS. The presenter will walk through some of the great new features in this version and shows how to get started today.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Access Management & Federated Single Sign-On

    How to enable federated communication without tearing apart the existing identity infrastructure? The presenter will give an overview of the technology and issues behind the management of identities - both inside and outside the organization - and examines Sun's standards-based access management and federated single sign-on solutions.

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    HP® Network Data Storage

    Boost Productivity w/ Shared Local And Remote Network Data Storage.

    Provided By Hewlett-Packard (HP)

  • Webcasts // Feb 2010

    "Dialing In" Has Changed Forever

    Virtually every business needs audio conferencing and it's a great low-cost tool for connecting your team. But the options available today are overwhelming and complicated features, non-intuitive controls, and low audio quality is common. So how do you select a solution that provides just the opposite? In this webinar,...

    Provided By Citrix Online

  • Webcasts // Mar 2010

    How Web Controls Are Changing Audio Conferencing

    While the advent of the Web changed the way we do just about everything, audio conferencing kept a steady low profile. Until now. The next generation of audio conferencing adds Web-based capabilities to the traditional infrastructure, making it easy to manage users and get real-time usage and billing reports;...

    Provided By Citrix Online

  • Webcasts // Mar 2010

    Audio Conferencing That Won't Break the Bank

    Whether you are having an internal meeting, customer meeting or a large Webinar, you rely on audio conferencing to get your work done and decisions made. What if you could partner with a communications service provider offering enterprise scale and reliability, global access numbers and Web-based conference management to...

    Provided By Citrix Online

  • Webcasts // Jan 2009

    The Delta Nervous System 2.0 - Implementing Mission-Critical SOA

    Delta is in the process of implementing the next version of their backbone, Delta Nervous System 2.0, that supports everything from booking, checking in and upgrades to flight rescheduling and baggage handling. The attendee will learn more about Delta's approach to mission critical SOA, some of their best practices, and...

    Provided By TIBCO Software

  • Webcasts // Nov 2009

    Evolutionary Computation - Evolve, Don't Invent

    Evolutionary Algorithms are a type of Machine Learning that simulate natural evolution to discover solutions to problems. They have been used to solve optimization problems as varied as circuit design, anti-lock brake system design, antennae design, and network routing, and have also been used as automatic programming tools, which gives...

    Provided By EMC

  • Webcasts // Oct 2009

    How Virtualization Changes Exchange 2010

    The presenter of this webcast will find out how to leverage EMC SAN storage to virtualize Exchange 2010 servers and store Exchange 2010 mailboxes - ensuring high availability and enabling to consolidate hardware.

    Provided By EMC

  • Webcasts // Feb 2010

    Automating Oracle Business Continuity With VMware

    The dependencies associated with business continuity and disaster recovery make it difficult to implement an automated solution. With VMware and EMC technologies, one can automate failover and ensure that the virtualized applications, middleware, and database servers are fully protected. The attendee of this webcast will learn how to automate failover...

    Provided By EMC

  • Webcasts // Jan 2010

    Extending Lotus Sametime with HD Video

    Many users investing in unified communications solutions have already deployed room video conferencing and require a solution that fully supports and interoperates with those systems. This session focuses on extending IBM Lotus Sametime's award winning unified communications and collaboration platform into a complete high definition video conferencing solution including HD...

    Provided By IBM

  • Webcasts // Jan 2010

    Building an Effective SOA and Integration Program

    The attendee will learn about building an effective SOA and integration program.

    Provided By TIBCO Software

  • Webcasts // Jan 2010

    Beyond Process Modeling: Why and How to Move Ahead With BPM and SOA

    The attendee of this webcast will learn how to take that process model and use it to generate real returns for the organization. The presenter of this webcast will discuss how they were able to effectively deploy a comprehensive solution of BPM (Business Process Management) and SOA (Service-Oriented Architecture) to...

    Provided By TIBCO Software

  • Webcasts // Jan 2010

    A Convenient Marriage: Uniting BPM & SOA in Business 2.0

    The new release of TIBCO Business Studio can help to play matchmaker for BPM and SOA. Business Studio (available as a download) provides a unified environment for designing end-to-end business processes. The presenter will focus on the IT view of Business Studio - including a deep dive demo of new...

    Provided By TIBCO Software

  • Webcasts // Jan 2010

    A Planning Guide to SOA

    Looking for a planning guide and methodology for SOA? The attendee of this webcast will learn about TIBCO's SOA Execution Model. This webcast will summarize some of the challenges companies have faced with enterprise-wide SOA compared to traditional development. The presenter outline the six steps of TIBCO's SOA Execution Model...

    Provided By TIBCO Software

  • Webcasts // Dec 2009

    Momentum Webcast: Reduce Your Operational Expenses! (Level 100)

    The attendee of this webcast will learn how to start saving on both the travel and telephony expenses allowing to invest those dollars in other components of the business success. Reduce travel costs by giving employees new ways to communicate using and integrated audio, video, and Web conferencing solution. Reduce...

    Provided By Microsoft

  • Webcasts // Jan 2010

    Implementing Governance for SOA

    Governance is critical to being successful with SOA. Having the proper governance in place can lead to large cost savings. The attendee of this webcast will learn the different aspects of governance for SOA and how best to implement them. The presenter will explain what governance is, the different type...

    Provided By TIBCO Software

  • Webcasts // Jan 2010

    Improving Policy Acquisition and Servicing Using SOA

    Effective automation of policy acquisition relies on deployment of Service-Oriented Architecture (SOA) and Business Process Management (BPM) strategies. Using SOA and BPM, insurers can automate and streamline new business processes; provide easy access to shared information across operational silos and lines of business; integrate agents and other distributors into the...

    Provided By TIBCO Software

  • Webcasts // Jan 2010

    Dancing With Elephants - Making SAP More Agile With Event-Driven SOA

    The presenter will review SOA best practices in SAP-centric environments and provide guidelines to help to avoid common mistakes as well as plan a more dynamic SOA roadmap. The attendee of this webcast will understand the inherent benefits - and risks - of pursuing an enterprise-scale SOA initiative.

    Provided By TIBCO Software

  • Webcasts // Jan 2010

    Making SAP Part of Your SOA Webinar

    The attendee of this webcast will learn more about the best ways to enable services for SAP in an SOA environment. The presenter will detail the options for exposing different versions of SAP as services, along with the tradeoffs associated with each approach.

    Provided By TIBCO Software

  • Webcasts // Jan 2010

    Master Data Management and Why It Is Essential for Successful SOA

    The presenter will address the value of Master Data Management (MDM) and why it has become more critical than ever for organizations to have a coherent information strategy. The presenter will focus on information explosion and why the time is now for MDM and why an MDM strategy is essential...

    Provided By TIBCO Software

  • Webcasts // Jan 2010

    SOA Governance: Policy Management in Practice

    Governance is critical to SOA and a core part of governance is policy management. The attendee will learn more about policy management, the different types of policies and, more importantly, the best ways to actually implement and enforce policies. The presenter will explain what policy management is and why it's...

    Provided By TIBCO Software

  • Webcasts // Mar 2010

    Improve Customer Satisfaction: Deliver More Revenue

    Insight into customer satisfaction is a key indicator to a repeatable, lasting revenue stream and loyal customers. Gaining information into how active customers are, repeat product purchases, volume of returns and fulfillment commitments help to establish a customer-focused organization, but also accelerates sales cycles and bolsters revenue generation. This video...

    Provided By IBM

  • Webcasts // Jan 2010

    MSDN Webcast: Business Process Automation & Integration: Connecting Partner, Applications and Devices (Level 200)

    Tough economic times cause organizations to focus on improving efficiencies, cutting costs, and extracting more value from existing systems. Tough economic times also present excellent opportunities to streamline information sharing among partners, customers, employees, and suppliers, as well as automate sophisticated, high-value transactions, both inside and outside the organization. Automation...

    Provided By Microsoft

  • Webcasts // Jan 2010

    Achieve Faster Deployments With GlassFish ESB

    The attendee will learn how to achieve faster deployments with GlassFish ESB. Sun GlassFish ESB offers an agile, lean, modular, pluggable, open-source integration platform that improves developer productivity, and time-to-market. With GlassFish ESB one can achieve faster and more cost-efficient deployments than expensive, complex proprietary software. GlassFish ESB's fit to...

    Provided By Sun Microsystems

  • Webcasts // Jan 2010

    Robust, Scalable Systems Management without the Overhead of Software-only Solutions

    Effective systems management is a tough job, especially for larger organizations. With thousands of PCs and servers to manage, the demands of a growing, diverse and often far-flung user base means dedicating a large team and significant time to implementing and administering a systems management solution. Hear from Francois Chevalier,...

    Provided By KACE

  • Webcasts // Mar 2010

    Up-Scale Your Apps in 2010 with Distributed Caching

    The market continues to recover and change all around us. Applications written just years, and in some cases months ago, are already appearing outdated in the wake of growing market demand. Learn how to strengthen your business applications to scale and perform as you originally envisioned. You will hear...

    Provided By IBM

  • Webcasts // Jan 2010

    Dynamic Virtual Clients

    Dave Buchholz and Clyde Hedrick from Intel explain how Intel IT is considering implementing Dynamic Virtual Client (DVC) technology that will provide a more robust and flexible platform that users want and that the enterprise needs.

    Provided By Intel

  • Webcasts // Nov 2009

    TechNet Webcast: Windows File Services in Windows Server 2008 R2 and Windows Storage Server (Level 200)

    Microsoft has delivered state-of-the-art file services functionality since the inception of the Windows Server operating system, and through the years the file services capabilities have evolved with the operating system to meet customers' ongoing needs. The attendee will discover the new enhanced file services capabilities in Windows Server 2008 R2...

    Provided By Microsoft

  • Webcasts // Mar 2010

    Analyst Webcast with Merv Adrian: Leverage your Data Assets Across the Global Enterprise

    We are pleased to have Merv Adrian, IT Market Strategy Analyst, join us in this Sybase sponsored webcast to explore the critical issue of data integration environments in the enterprise - many of which are fragmented and poorly managed. Mr. Adrian will address how heterogeneity is the new standard...

    Provided By Sybase

  • Webcasts // Feb 2010

    Ensuring High Availability for Business-Critical Applications With VMware and Neverfail

    Application availability has a direct effect on the bottom line for technology-driven businesses. From natural disaster to configuration issues and planned maintenance to power failures, threats are abundant, and downtime puts revenue and reputation at risk. But with integrated solutions from VMware and Neverfail, one can virtually eliminate downtime and...

    Provided By VMware

  • Webcasts // Jan 2010

    Secrets of Lead Generation Webinars

    You need your webinars to generate high numbers of leads, yet you don't want to alienate your audience with a too-hard sell. How do you strike that all-important balance between the needs of your registrants and your sales and marketing goals? All it takes is a few key strategies to...

    Provided By Adobe Systems

  • Webcasts // Jan 2010

    TechNet Webcast: How to Use the File Classification Infrastructure to Solve Common Problems (Level 200)

    Data contained in file servers is completely opaque to administrators. The requirements introduced by corporate Governance, Risk, and Compliance (GRC) rules require administrators to understand what kind of data they have and set up automatic policies. With the Windows Server 2008 R2 File Classification Infrastructure, administrators now have a tool...

    Provided By Microsoft

  • Webcasts // Jan 2010

    Momentum Webcast: Learn How Microsoft Dynamics CRM Online Plus BPOS Deliver Greater Value (Level 100)

    The attendee of this webcast learns more about the Microsoft cloud computing strategy. The presenter of this webcast focuses on two solutions from Microsoft Online Services, the Microsoft Business Productivity Online Standard Suite (BPOS) and Microsoft Dynamics CRM Online. The presenter provides an overview of each service, common integration scenarios,...

    Provided By Microsoft

  • Webcasts // Feb 2010

    MSDN Webcast: geekSpeak: Persistence Ignorance and Entity Framework 4 With Dane Morgridge (Level 200)

    Persistence ignorance is one of the biggest features missing in Entity Framework 1 and one of the most exciting features coming with Entity Framework 4. The presenter of this webcast explains how to use Plain old CLR Object (POCO) classes to build applications that take advantage of the Entity Framework...

    Provided By Microsoft

  • Webcasts // Feb 2010

    TechNet Webcast: Voice Administration and Monitoring for Communications Server 2007 R2 (Level 300)

    If one has deployed Microsoft Office Communications Server 2007 R2 or are about to start the deployment, it is critical that one has the right monitoring and administration approach. The attendee of this webcast learns about the Microsoft Quality of Experience approach to voice quality monitoring and how one can...

    Provided By Microsoft

  • Webcasts // Feb 2010

    MSDN Webcast: Improving Business Agility With Enterprise Service Bus (Level 300)

    Businesses across the globe are trying to cope with a faster rate of change. The need to adapt rapidly to new internal and external requirements is pushing organizations to look for more flexible solutions to build and connect their applications. At the same time, IT departments are also pressured to...

    Provided By Microsoft

  • Webcasts // Feb 2010

    TechNet Webcast: Yankee Group: Analyst Perspectives on Office Communications Server and the Enterprise Network (Level 200)

    The presenters of this webcast discuss their perspectives on Unified Communications (UC), customer deployments of Microsoft Office Communications Server, and the effects of UC on enterprise networks. The presenter of this webcast looks at UC through the lens of a strategic collaboration platform, consider four diverse customer UC deployment case...

    Provided By Microsoft

  • Webcasts // Aug 2009

    Momentum Webcast: Leveraging SharePoint Portal Server and BizTalk Server (Level 100)

    Interested in turbo-charging the business processes with the combined power of Microsoft BizTalk Server 2006, Windows SharePoint Services, and Microsoft Office InfoPath? The attendee of this webcast will discover proven strategies to help to design, configure, and monitor a wide array of business processes and create systems that empower the...

    Provided By Microsoft