Hi [[ session.user.profile.firstName ]]

Network Infrastructure

  • Join this panel to discuss the challenges, experiences and successes in deploying some of today’s newest telecom technologies in xDSL.

    Anyone deploying new technologies can benefit from discussions around:
    •the learning experience
    •up-to-date testing processes
    •network changes and their impact on the work of technicians
    •the teamwork behind a successful network

    Joining Larry Holcomb of EXFO on this panel:
    •Chris Gerrald, I&R Supervisor – HTC
    •Bryan Tyler, OSP Technician – HTC
    •Bruce Altman, Network Engineer – HTC
    •Brian Rabon, Network Engineer – HTC
  • ヘルス・マネジメントの4つの支柱 - モニタリング、分析、診断、改善

    このセッションでは、これら4つの支柱と、これらがなぜ重要なのかお話ししていきます。サーバの標準インタフェースを活用したシリコンに組み込まれたセンサー情報を取得し、ITプロフェッショナルが上記4つの支柱をどのように運用に組み込み、MTTR(平均故障間隔)を縮小することができるのか。問題が発生したサーバに、インテル バーチャル・ゲートウェイを利用してリモートで解決する方法について解説致します。
    4つの支柱のハイライト:
  • Attend this webinar to find out why USG&E, Engie and other energy companies choose OutSystems for application development and integration. You’ll see:

    •How to build a mobile application visually in minutes
    •How easy continuous change can be with Integrated App Feedback
    •How simple and fast integration with existing back-office systems and data can be
  • Health management in the data center has four main pillars. Monitoring, Analytics, Diagnostics and Remediation.

    In this session we will cover these main pillars and why they are important. We will unveil how you can use embedded sensors in the silicon available through standardized interfaces on your servers to help IT professionals start to add these pillars to their environment and begin to leverage them to help with MTTR reduction to outage avoidance. In the case of actual server issues, we will explain the ways to access those machines remotely and fix them with Intel Virtual Gateway.

    Highlights of the Four Main Pillars:
    •Monitoring: automated server health monitoring, failure alerting, health dashboard, and more.
    •Analytics: root cause with health details, failure device report severity indication, and health history.
    •Diagnostics: Remote vKVM access, integrated in-band access, component level health details.
    •Remediation: remote power on/off and remote vMedia
  • Dispersion, if not properly tested and managed, can have very serious impacts on system performance ranging from sporadic errors to systematic failures. This advanced webinar will discuss key concepts related to dispersion (e.g., chromatic dispersion, polarization mode dispersion or PMD, material dispersion, differential group delay and birefringence), as well as the thresholds for optimal network operation. In addition, it will examine the main criteria used to determine whether dispersion testing should be performed on a link, and review the typical network types in which dispersion should be tested—both in terms of distances and data rates. The webinar will conclude with a case study on dispersion testing. Although no prior knowledge about dispersion is needed to view this webinar, please note that the focus will be on more advanced topics.
  • iSCSI is an Internet Protocol standard for transferring SCSI commands across an Ethernet network, enabling hosts to link to storage devices wherever they may be. In this Webcast, we will discuss the evolution of iSCSI including iSER, which is iSCSI technology that takes advantage of various RDMA fabric technologies to enhance performance. Register now to hear:

    •A brief history of iSCSI
    •How iSCSI works
    •IETF refinements to the specification
    •Enhancing iSCSI performance with iSER

    The Webcast will be live, so please bring your questions for our experts.
  • Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Consider these statistics from IDC:

    • Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
    • Over 90% of threats to enterprises emanate from email
    • 65% of threats go undetected for weeks/months

    IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

    Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Learn how to enhance your Office 365 security to:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication

    Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
  • See how it’s possible to give end-users fast, simple access to enterprise applications, data and resources – without compromising your security.

    In this live webinar, you’ll hear from two Dell Security solution experts on how you can manage the proliferation of devices in your workplace.

    During the interactive session, you’ll see how to:
    • Ensure only authorized users and approved devices are granted access to your business network
    • Quickly and easily provision secure mobile access and role-based privileges
    • Keep company data secure in-flight and at rest on devices
  • As companies expand and rapidly bring new branches online, the need arises to quickly establish connectivity to the datacenter and cloud applications - as well as build the extended network infrastructure. However, the skyrocketing cost and length of time required to connect users to applications via MPLS coupled with the disparate nature of the branch infrastructure is putting increased pressure on IT budgets and resources. While costs soar and time to market increases an organization’s competitiveness is compromised.

    Nutanix, delivering invisible infrastructure for next-generation enterprise computing and Silver Peak, the leader in building broadband and hybrid wide area networks, have partnered to deliver a combined solution that solves this problem – dramatically driving down costs, increasing performance and accelerating branch deployments.

    Join this webinar to learn how you can:

    •Eliminate under-utilized infrastructure silos, using up to 80% less space and 50% lower CAPEX
    •Save up to 90% in WAN OPEX by leveraging broadband vs MPLS
    •Speed up deployment with rapid connectivity, a turn-key infrastructure and zero-touch deployment of broadband WAN
    •Securely connect and accelerate remote office applications
    •Achieve centralized management and control with enhanced visibility into the network and applications
  • Recent versions of Open vSwitch (OVS) provide an accelerated datapath based on the Data Plane Development Kit (DPDK) libraries. This acceleration benefits many users, but it is vital for meeting the high performance, high determinism requirements of NFV workloads. Open vSwitch (OVS) is the most widely deployed switching solution for OpenStack deployments [1], and Intel has been working to bring the benefits of OVS with DPDK to OpenStack.
    In this talk, we explore the work that has been done and the work that is still ongoing to bring the benefits of OVS with DPDK to OpenStack. We detail how users can benefit from these changes, and impact they can expect to see. Finally, we detail how users can get started exploring these changes themselves.

    [1] http://superuser.openstack.org/articles/openstack-users-share-how-their-deployments-stack-up
  • Deploying new WAN services can take a long time and require a significant up-front capital investment. The software-defined nature of SD-WAN enables service agility, rapid rollout, and instant-on WAN that the Service Provider can immediately benefit from. This accelerates the time to market and time to revenue.

    Hear from experts at VeloCloud discuss the key SD-WAN capabilities and how the Service Providers already leverage them to create and operate new WAN services.
  • Dispersion, if not properly tested and managed, can have very serious impacts on system performance ranging from sporadic errors to systematic failures. This advanced webinar will discuss key concepts related to dispersion (e.g., chromatic dispersion, polarization mode dispersion or PMD, material dispersion, differential group delay and birefringence), as well as the thresholds for optimal network operation. In addition, it will examine the main criteria used to determine whether dispersion testing should be performed on a link, and review the typical network types in which dispersion should be tested—both in terms of distances and data rates. The webinar will conclude with a case study on dispersion testing. Although no prior knowledge about dispersion is needed to view this webinar, please note that the focus will be on more advanced topics.
  • 数据中心健康管理涵盖四个主要功能。监测,分析,诊断和修复
    会上我们将针对四大功能及其重要性进行讨论。我们将会展示如何通过服务器及IT设备上的标准化接口使用服务器及IT设备内已存在的嵌入式传感器,帮助IT技术人员将四大功能添加到数据中心管理环境中,进而减少平均修复时间并避免断电。就服务器实际遇到的问题方面,我们会讲解如何通过英特尔Virtual Gateway对服务器进行远程访问和修复。
    四大功能的亮点:
    • 监测:服务器健康状况自动监测,故障报警,设备组件状态,健康状况统计
    • 分析:故障原因及详情,故障设备报告及严重程度指示,健康状况历史
    • 诊断:远程vKVM访问,同时集成带内访问,组件级别健康状况详情
    • 修复:远程控制电源开关,远程虚拟镜像vMedia
  • Health management in the data center has four main pillars. Monitoring, Analytics, Diagnostics and Remediation.

    In this session we will cover these main pillars and why they are important. We will unveil how you can use embedded sensors in the silicon available through standardized interfaces on your servers to help IT professionals start to add these pillars to their environment and begin to leverage them to help with MTTR reduction to outage avoidance. In the case of actual server issues, we will explain the ways to access those machines remotely and fix them with Intel Virtual Gateway.

    Highlights of the Four Main Pillars:
    •Monitoring: automated server health monitoring, failure alerting, health dashboard, and more.
    •Analytics: root cause with health details, failure device report severity indication, and health history.
    •Diagnostics: Remote vKVM access, integrated in-band access, component level health details.
    •Remediation: remote power on/off and remote vMedia
  • Chef Compliance lets you express your compliance rules as code. You can easily run those rules as tests whenever you want. You get immediate feedback on whether your servers are configured as they should be.

    Chef Compliance scans your servers to see if they are configured in accordance with your rules and generates a report that identifies the issues it found. You can then use Chef to remediate those problems.

    In this webinar, Joe Gardiner will demonstrate how Chef Compliance works by scanning a default installation of RHEL 7.0 on the public cloud to see if it is CIS compliant. After the scan identifies the problem areas, Joe will use Chef to bring the server in line with the CIS benchmarks.

    You’ll also learn about an offer from Chef to help you perform a scan of your infrastructure and get you started on the road to compliance.
  • Join us on May 19th 2016 for the "Introducing PROTECT" webinar, offering a complete look at HOW our solution works to find threats that the others simply miss

    You'll learn:

    WHO CylancePROTECT was built to protect
    WHY math and machine learning are the future of security
    HOW CylancePROTECT catches what the others miss

    To reserve your spot, please register today!
  • Join us for a fast-paced and informative 60-minute roundtable as we discuss one of the newest trends in storage: Disaggregation of traditional storage functions. A major trend within IT is to leverage server and server-side resources to the maximum extent possible. Hyper-scale architectures have led to the commoditization of servers and flash technology is now ubiquitous and is often times most affordable as a server-side component. Underutilized compute resources exist in many datacenters as the growth in CPU power has outpaced other infrastructure elements. One current hot trend— software-defined-storage—advocates collocating all storage functions to the server side but also relies on local, directly attached storage to create a shared pool of storage. That limits the server’s flexibility in terms of form factor and compute scalability.

    Now some vendors are exploring a new, optimally balanced approach. New forms of storage are emerging that first smartly modularize storage functions, and then intelligently host components in different layers of the infrastructure. With the help of a lively panel of experts we will unpack this topic and explore how their innovative approach to intelligently distributing storage functions can bring about better customer business outcomes.

    Moderator:
    Jeff Kato, Senior Analyst & Consultant, Taneja Group

    Panelists:
    Brian Biles, Founder & CEO, Datrium
    Patrick Osborne, ‎Senior Director of Product Management and Marketing, HPE
    Kevin Fernandez, Director of World Wide Technical Marketing, Nutanix
  • Financial, geopolitical and economical changes made 2015 a very busy year for the Europe, Middle East and Africa (EMEA) region, particularly in the cyber realm. FireEye has been monitoring these shifting cyber trends and has identified considerable evolutions to the EMEA threat landscape when comparing the second half of the year to the first half.

    Register for this webinar with Yogi Chandiramani, EMEA SE Director and Jens Monrad, Global Threat Intel Liaison who will present the findings from FireEye’s Regional Advanced Threat Report for EMEA 2H2015, a follow on report from our mid-2015 publication. This report provides an overview of the advanced persistent threats (APT) targeting computer networks in EMEA during the second half of 2015, and also contains various other key observations
  • Server virtualization was supposed to consolidate and simplify IT infrastructure in data centers. But, that only “sort of happened”. Companies do have fewer servers but they never hit the consolidation ratios they expected. Why? In one word, performance.

    Surveys show that 61% of companies have experienced slow applications after server virtualization with 77% pointing to I/O problems as the culprit.

    Now, with hyper-converged, companies have another opportunity to fulfill their vision of consolidating and reduce the complexity of their infrastructure. But, this will only happen if their applications get the I/O performance they need.

    Join us for this webinar where we will show you how to get industry leading I/O response times and the best price/performance so you can reduce and simplify your infrastructure.
  • As threat actors display more proficiency, speed and diligence, cloud security is of paramount importance. Choosing a cloud solution has often required businesses to choose between performance, elasticity and security — but not all three.

    In this webcast:

    · Explore how a VMware ecosystem, built on the NSX network virtualization platform, now makes it possible to achieve high performance and elasticity, while maintaining the highest levels of security.

    · Armor will use its Virtual Private Cloud to demonstrate how to architect an environment with fully integrated security that still provides the performance and efficiency customers demand from the cloud.

    · Learn how NSX and the VMware suite form key components of the Armor Virtual Private Cloud, including Server, Network and Security Virtualization.
  • As traditional enterprises look to experiment with emerging Docker use cases, the need to connect containers to persistent data or even just to share data between Docker containers becomes more obvious. However, this expansion has proven to be a challenge for infrastructure that relies on monolithic storage arrays. As a result, enterprises are looking to software-defined storage as a more attractive choice because of its flexibility, programmability and ability to provide well-managed, persistent storage. In this talk, you’ll get:

    • What Docker is and is not, as well as container-specific storage challenges
    • Why you need container-specific storage policies, SLAs, and classes of service (CoS)
    • How to leverage software-defined storage solutions for Docker and containers
    • When to use hyperconverged or hyperscale architectures for your Docker initiatives
  • With the convergence of wired and wireless connectivity, and with the knowledge that many consumers still prefer to shop inside the store, retailers are boldly moving into the future by providing an increasingly digital shopper experience.

    Today’s connected digital signage often features dynamic content, opportunities for real-time interaction, and actionable analytics. With 4G LTE, digital signage also is easier to deploy and more reliable, flexible, scalable, and secure than ever before.

    As much as any component of a modern-day retail store, digital signage is a cost-effective and crucial tool for both enterprises and customers.

    Join Cradlepoint’s Ken Hosac for an exclusive live webinar on Wednesday, May 18, at 12 p.m. ET/17.00 BST to learn how retailers are using software-defined 4G LTE solutions for digital signage to increase revenue and improve ROI.

    Webinar Attendees Will Receive Information About:

    — Ways that retailers save money with 4G LTE and digital signage
    — The emerging capabilities and benefits of remote cloud management
    — Enterprise-grade security through the cloud
    — Software-defined networking solutions that maximize the impact of digital signage