Skip the navigation

Topic Center Webcasts

Topic Center webcasts and technology videos for implementing and optimizing IT strategy, technology products, enterprise solutions, and more.

 
Live Webcasts
Sign up now for complimentary access to these upcoming Computerworld webcasts.
 
 
LIVE May 14, 2014 01:00 PM ET
Sponsor: VMware | IBM
 
Top 4 Digital Signage Fails

Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to prevent those failures and realize the full potential digital signage represents.

Sponsor: RMG Networks


 

Building Tomorrow's Infrastructure

Listen to this podcast to discover how Crider Foods worked with PC Connection to update their IT infrastructure, while maintaining compliance and control. PC Connection's experts helped Crider deploy Cisco UCS with Intel® Xeon® processors as part of their total data center overhaul.


Intel®, the Intel logo, Xeon®, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

Sponsor: PC Connection | Cisco | Intel®


 

Enhance Your Virtualization Infrastructure With IBM and Vmware

Date: Wednesday, May 14, 2014, 1:00 PM EDT

Using virtualization for your x86 server infrastructure has become commonplace. Virtualization technology is now expanding beyond the server compute elements to encompass networking and storage aspects as well. IBM x86/PureFlex and VMware have been working closely to help drive better business value from your virtualization projects and delivering technologies to help manage your infrastructure. Attend this webcast and see how IBM and VMware can help you be more responsive to your business requirements.

Sponsor: VMware | IBM


 

Transforming Finance, Procurement and Supply Chain Effectiveness with Cross-Functional Analytics

Date: May 6th, 2014
Time: 1 PM EDT

To succeed in today's information-driven age, line-of-business managers need to access, interpret, and take action instantly on data that goes beyond their specific functional areas. However, many businesses are failing to meet that need because analytical teams and tools are typically deployed in silos and are disconnected partially or wholly from the rest of the enterprise. Attend this Webcast to find out how Oracle's packaged analytic applications enable line-of-business managers examine all their business concerns - irrespective of which departments the issues arise from - to improve processes such as cash flow management, procure- to-pay, supply chain and order management using out-of-the-box best practice metrics. You will also learn how Interactive Data, a leading global provider of financial market data, gained efficiencies across numerous global operations with Oracle Business Intelligence Applications.

Sponsor: Oracle


 

Cloud Knowledge Vault

According to market research, 59 percent of enterprises are still identifying IT operations that are candidates for cloud hosting. Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources in this HP & Intel® Cloud Knowledge Vault. Your one-stop for cloud computing gives advice and tips on the best strategy for moving to the cloud, how to determine which cloud is best for your organization, how to overcome cloud security challenges, and more.

Intel and the Intel logo are trademarks of Intel® Corporation in the U.S. and/or other countries.

HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please review HP's privacy statement.

Sponsor: HP and Intel®


 

LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture.

Date: Wednesday, May 7, 2014, 10:00 AM EDT

The backup and recovery market is quickly morphing as end-users weather a perfect storm hitting their infrastructure, affecting the efficiency of their operations. While trends point to a healthy and dynamic data protection market, end-users are faced with significant operational challenges driving the need to revisit the very essence of their data protection architecture.

Traditional backup is going away, but where does this leave end-users?

In this webcast, Eric Burgener, Research Director, Storage at IDC, and Christophe Bertrand, VP ARCserve Product Marketing at CA Technologies, will provide a perspective on these key trends and identify the requirements next generation data protection architectures need to meet to support IT and business objectives.

Sponsor: CA Technologies


 

On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"

It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.

Sponsor: Code42


 

Mobile Security: Containerizing Enterprise Data

Enterprise mobility presents many exciting opportunities for the business, but it can also create a new set of competing requirements within the organization. Mobilizing an entire workforce introduces significant risk to the enterprise; before any technology is implemented, organizations must review corporate requirements and respond with the appropriate security measures.

Enterprise IT teams exploring the realm of mobile device management (MDM) must first determine the best way to ensure security and compliance of corporate data while giving users the flexibility to work how and where they want. But which data and apps need to be protected, and what type of security should be added?

In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the need for more than MDM, and how the containerization of data can help your organization "bring-work-to-devices" (BWTD) in the most secure and compliant manner.

Sponsor: Code42


 

Endpoint Data Management: Protecting the Perimeter of the Internet of Things

Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and store all this unstructured data while providing decision makers with access to it. Watch this on-demand webinar to learn more.

Sponsor: Code42


 

How to Protect Enterprise Data Yet Enable Secure Access for End Users

Watch this on-demand webinar to learn how BYOD, Big Data and the use of rogue applications and devices is putting corporate data at risk, best practices from IT pros in the trenches and immediate steps for better protecting enterprise data while providing end users with secure data access.

Sponsor: Code42


 

On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security"

It used to be possible to reduce the security risks of mobile devices by requiring employees to use those issued by the company. But as more employees require (and demand) the ability to work whenever and wherever they want, enterprise IT is forced to make the corporate network accessible to many types of mobile devices.

And as these bring-your-own-device (BYOD) policies continue to gain momentum, IT must also balance BYOD benefits with increased network security threats. So, is it possible to keep employee-owned devices from creating a gaping hole in the organization's security?

Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy and provides practical tips for securing a mobile workforce.

Sponsor: Code42


 

Ecommerce Site Needs Protection Against Cyber 'Pirate'

Learn how a Neustar customer thwarted 'Blackbeard,' a self-styled DDoS Pirate. Using Neustar SiteProtect, a cloud-based DDoS mitigation service, this everyday IT hero was able to quickly block the attacks.

Sponsor: Neustar Inc.


 

Tales from the Trenches - Industry Risks and Examples of DDoS

Watch Neustar experts as they discuss how DDoS impacts technology companies including online gaming, e-commerce and more. We'll discuss specific examples with DDoS protection experts who are fighting attacks in the trenches.

Sponsor: Neustar Inc.


 

Video Stream Quality Impacts Viewer Behavior

Today content providers are challenged to provide a high-quality streaming experience for their viewers and also monetize their video content through ad-based or subscription-based models. This scientific white paper, using statistical data from Amakai's streaming network, analyzes how changes in video quality cause changes in viewer behavior. Download it now.

Sponsor: Akamai Technologies, Inc.


 

Delivering Events of Olympic Proportions

In this webinar, Eric Black, VP of Technology, NBC Sports & Olympics; Greg Ireland, Research Manager for Multiscreen Video, IDC; and Bill Wheaton, SVP & GM, Media Division, Akamai, discuss:
- How to deliver quality, complex video at scale
- Methods for mitigating security risks present in high profile events
- Best practices for partnering with vendors to integrate across technology platforms

Sponsor: Akamai Technologies, Inc.


 

Online Video and Web Traffic: Sochi 2014 Winter Olympic Games

Over 25 leading global broadcasters worked with Akamai to deliver the action, excitement and inspiration of Sochi because they understand online viewers expect to see every second of competition without delays or dropped streams. Watch this video and learn how Akamai's expertise and technology helped NBC Sports deliver winning performance.

Sponsor: Akamai Technologies, Inc.


 

Zoning in on Energy and Physical Infrastructure Management

Running an energy-efficient data center has never been more important. By breaking down a data center into six zones, ranging from the physical building to the rack and cabinet, managers can better identify areas of improvement - most notably, cooling. In this Webcast you will learn how to develop and execute a strategy to optimize the energy efficiency of your data center.

Sponsor: Panduit Corp.


 

Service-Enabling CICS Applications: Best Practices

This informative webcast provides an informed, thorough look into CICS service-enablement options and how they can affect your environment. You'll learn how to get the most from your CICS applications without compromising the best possible outcome.

Sponsor: Attachmate


 

Making Legacy Apps Available to Your Mobile Workforce

How is your IT organization responding to the mobility revolution? When it comes to your legacy IBM mainframe and midrange applications, you can give your mobile workforce the same functionality they have on their desktops, without requiring invasive changes to those applications. Watch how Attachmate Verastream can enable mobile access, in three different ways.

Sponsor: Attachmate


 

Workforce Mobilization for Improved Productivity

A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how easy it can be.

Sponsor: Attachmate