Skip the navigation

Webcasts

IT webcasts and technology videos for implementing and optimizing IT strategy, technology products, enterprise solutions, and more.

 
Live Webcasts
Sign up now for complimentary access to these upcoming Computerworld webcasts.
 
 
 
Cloud Knowledge Vault

According to market research, 59 percent of enterprises are still identifying IT operations that are candidates for cloud hosting. Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources in this HP & Intel® Cloud Knowledge Vault. Your one-stop for cloud computing gives advice and tips on the best strategy for moving to the cloud, how to determine which cloud is best for your organization, how to overcome cloud security challenges, and more.

Intel and the Intel logo are trademarks of Intel® Corporation in the U.S. and/or other countries.

HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP's privacy statement.

Sponsor: HP and Intel®


 

LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture.

Date: Wednesday, May 7, 2014, 10:00 AM EDT

The backup and recovery market is quickly morphing as end-users weather a perfect storm hitting their infrastructure, affecting the efficiency of their operations. While trends point to a healthy and dynamic data protection market, end-users are faced with significant operational challenges driving the need to revisit the very essence of their data protection architecture.

Traditional backup is going away, but where does this leave end-users?

In this webcast, Eric Burgener, Research Director, Storage at IDC, and Christophe Bertrand, VP ARCserve Product Marketing at CA Technologies, will provide a perspective on these key trends and identify the requirements next generation data protection architectures need to meet to support IT and business objectives.

Sponsor: CA Technologies


 

On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"

It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.

Sponsor: Code42


 

Mobile Security: Containerizing Enterprise Data

Enterprise mobility presents many exciting opportunities for the business, but it can also create a new set of competing requirements within the organization. Mobilizing an entire workforce introduces significant risk to the enterprise; before any technology is implemented, organizations must review corporate requirements and respond with the appropriate security measures.

Enterprise IT teams exploring the realm of mobile device management (MDM) must first determine the best way to ensure security and compliance of corporate data while giving users the flexibility to work how and where they want. But which data and apps need to be protected, and what type of security should be added?

In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the need for more than MDM, and how the containerization of data can help your organization "bring-work-to-devices" (BWTD) in the most secure and compliant manner.

Sponsor: Code42


 

Endpoint Data Management: Protecting the Perimeter of the Internet of Things

Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and store all this unstructured data while providing decision makers with access to it. Watch this on-demand webinar to learn more.

Sponsor: Code42


 

How to Protect Enterprise Data Yet Enable Secure Access for End Users

Watch this on-demand webinar to learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT pros in the trenches and immediate steps for better protecting enterprise data while providing end users with secure data access.

Sponsor: Code42


 

On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"

It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.

Sponsor: Code42


 

Ecommerce Site Needs Protection Against Cyber 'Pirate'

Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.

Sponsor: Neustar Inc.


 

Tales from the Trenches - Industry Risks and Examples of DDoS

Watch Neustar experts as they discuss how DDoS impacts technology companies including online gaming, e-commerce and more. We'll discuss specific examples with DDoS protection experts who are fighting attacks in the trenches.

Sponsor: Neustar Inc.


 

Video Stream Quality Impacts Viewer Behavior

Today content providers are challenged to provide a high-quality streaming experience for their viewers and also monetize their video content through ad-based or subscription-based models. This scientific white paper, using statistical data from Amakai's streaming network, analyzes how changes in video quality cause changes in viewer behavior. Download it now.

Sponsor: Akamai Technologies, Inc.


 

Delivering Events of Olympic Proportions

In this webinar, Eric Black, VP of Technology, NBC Sports & Olympics; Greg Ireland, Research Manager for Multiscreen Video, IDC; and Bill Wheaton, SVP & GM, Media Division, Akamai, discuss:
- How to deliver quality, complex video at scale
- Methods for mitigating security risks present in high profile events
- Best practices for partnering with vendors to integrate across technology platforms

Sponsor: Akamai Technologies, Inc.


 

Online Video and Web Traffic: Sochi 2014 Winter Olympic Games

Over 25 leading global broadcasters worked with Akamai to deliver the action, excitement and inspiration of Sochi because they understand online viewers expect to see every second of competition without delays or dropped streams. Watch this video and learn how Akamai's expertise and technology helped NBC Sports deliver winning performance.

Sponsor: Akamai Technologies, Inc.


 

Zoning in on Energy and Physical Infrastructure Management

Running an energy-efficient data center has never been more important. By breaking down a data center into six zones, ranging from the physical building to the rack and cabinet, managers can better identify areas of improvement - most notably, cooling. In this Webcast you will learn how to develop and execute a strategy to optimize the energy efficiency of your data center.

Sponsor: Panduit Corp.


 

Service-Enabling CICS Applications: Best Practices

This informative webcast provides an informed, thorough look into CICS service-enablement options and how they can affect your environment. You'll learn how to get the most from your CICS applications without compromising the best possible outcome.

Sponsor: Attachmate


 

Making Legacy Apps Available to Your Mobile Workforce

How is your IT organization responding to the mobility revolution? When it comes to your legacy IBM mainframe and midrange applications, you can give your mobile workforce the same functionality they have on their desktops, without requiring invasive changes to those applications. Watch how Attachmate Verastream can enable mobile access, in three different ways.

Sponsor: Attachmate


 

Workforce Mobilization for Improved Productivity

A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how easy it can be.

Sponsor: Attachmate


 

Modernizing Legacy Mainframe Applications for Fun and Profit

Discover the fastest, simplest way to webify mainframe applications and streamline workflow for internal and external users. Watch this three-minute video podcast on web enablement.

Sponsor: Attachmate


 

Teaching Legacy Application Elephants How to Dance

Find out how you can create services to continuously reuse enterprise mainframe applications, however and whenever needed, while leaving legacy logic untouched. Watch this four-minute video podcast on service enablement.

Sponsor: Attachmate


 

Defining the New Mobile Enterprise

Your legacy mainframe and midrange applications play a key role in your enterprise today. See how Attachmate Verastream enables mobility for those applications - in any format, for any user, from any device.

Sponsor: Attachmate


 

Freightliner Uses Verastream to Simplify Mainframe Processes

This UK-based freight transporter automated EDI messaging and rolled out real-time online tracking, generating 2 million customer messages per year. They used an SOA approach to ensure ongoing flexibility and competitive advantage. See why Freightliner calls Verastream "our most reliable employee."

Sponsor: Attachmate