Network Infrastructure

Community information
Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.
  • In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.

    During this webcast, attendees will learn
    * Which tactics have the greatest effect on fostering cyber security awareness throughout the enterprise

    * How to foster a risk-aware security culture while still encouraging trust among your employees and partners

    * How to bridge the gap between IT security and IT operations (hint: knowing more about your assets is the first step)
  • Experience is the single most important factor to achieve service excellence and is one of the major challenges faced by every network provider’s be it within the Enterprise, Campus or TSP networks today. One of the major reasons for this is static configuration and selection of end-to-end paths based on certain configured criteria, not taking into consideration, the real-time network variables.

    Software Defined Networking (SDN) and Network Function Virtualization (NFV) can boost the agility of network, service provisioning and operations. They are designed to merge the network into the age of the Cloud to become a service creation platform that empowers end users and delivers customized experiences. The industry has reached an inflection point and the status quo of the today’s networks is not sustainable. Communication Service Providers must adapt these rising phenomenon towards an open and agile infrastructure that’s simple to manage, efficient and programmable

    ‘Creating Network of Tomorrow with SDN-NFV’ session will give a quick overview on SDN and NFV technologies with a focus on how they differentiate and complement each other in various use cases. We will briefly present the capabilities that Tech Mahindra brings in this space.
  • In this presentation, solution providers learn simple steps to help build and grow their IT security practice. Attendees learn about compliance regulations, cloud integration, how to weave security into each opportunity, adherence to best practices, and re-educating customers.
  • Learn to predict, prepare for and pinpoint performance issues by combining HP OpsA and J9 Accelerators with Splunk. This webinar will cover how your IT operations teams will be able to extract the full value of their data.

    If you’ve made an investment in Splunk and want to increase functionality, while at the same time reducing maintenance costs, you need to attend.
  • Delivering software or device updates to a global user base is complex, with high expectations on the part of customers for a smooth trouble free experience on every device, every time. To meet those expectations, optimization cannot be an afterthought for software and device manufacturers. This webinar will use real customer examples to illustrate how leading companies have built optimization into every stage of the file distribution workflow. We’ll take a close look at how a global security solutions company successfully publishes security updates to tens of millions of customers every 4 hours.

    We’ll also explore: |

    • How regional versions of software can be distributed to the right users with Geo-fencing
    • Strategies for near real-time purging of software files from global cache, ensuring that purged content is never served to end users
    • How to deliver device updates without impacting customer’s data plan charges
    • The importance of optimizing the entire experience, from the download portal to instructional video delivery, for customers on a range of devices

    The latest trends in using downloads and updates as branding reinforcement opportunities, file protection, and access control will also be shared.
  • The first webinar in the high speed/DWDM series discusses the problem of dispersion and the impact it can have on the network. It explains the two types of dispersion (chromatic dispersion and polarization mode dispersion) and why they can cause network failures, the typical dispersion tests and the applicable standards and dispersion thresholds for several types of services.
  • This webinar takes top to bottom approach on deep dive training of Data Plane Development Kit. The attendees will learn as how various Data Plane Development Kit (DPDK) components fit together in delivering final vertical applications such as a router, a security appliance, QoS and load balancer.

    Most of the customers and developers are familiar with L2fwd and L3fwd sample applications. However one of the questions that is frequently asked is regarding availability of not only 1) run to completion applications but also 2) pipeline mode applications or 3) a combination of run to completion and pipeline mode application. To clarify, the webinar will classify the key sample applications into the above three categories. We will take two key applications – 1) IP Pipeline and 2) Packet Ordering Sample application and drill down deeper as how customers can map their own application with these architectural usage models. We will do a brief code walk through of one of the application to showcase how professionally the coding is done with great commenting.

    While earlier release features were focused on CapEx improvement, such as thread pinning, only polled mode driver, the latest releases are including OpEx improvements also. The audience will learn Release 2.1 and Release 2.2 features from the point of view both CapEx and OpEx improvement.

    Data Plane Development Kit is spelled as “P-E-R-F-O-R-M-A-N-C-E”. So, any deep dive presentation is complete only with key performance optimization techniques. So, the attendees will learn top 3 key optimization techniques that they can use while integrating their applications with DPDK.
  • As organizations become more and more data-centric, the way this data is put to use and delivered via applications and services holds the key to the organization’s overall competitiveness and success.

    A consolidated data center environment provides an optimized platform for innovation, applications and services delivery, cost reduction and efficiency.

    Consolidation in the data center has multiple facets, all introducing security challenges and risks that must be recognized and dealt with.

    This session will introduce the consolidated data center environment, the technologies deployed, their related security challenges and the possible solutions available.
  • See how CA manages and monitors our own CA SAP environment

    SAP applications and the business processes they enable often represent the very core of your business. Customers, partners, and employees expect availability, responsiveness and secure access, while the CEO expects that budget objectives will be met and efficiencies exploited to improve the bottom line. CA Technologies provides a robust portfolio of SAP certified IT management solutions which help reduce the cost and risk associated with delivering your SAP enabled business processes, while helping to enable the service levels needed for more optimal business operations.

    In this session you’ll learn:
    • The business drivers, technical challenges and importance of SAP in the daily works of CA
    • How CA manages its own SAP implementation with CA APM solutions
  • Network-dense, interconnection-oriented facilities are not easy to replicate and are typically able to charge higher prices for colocation, as well as charge for cross-connects and, in some cases, access to public Internet exchange platforms and cloud platforms. Mobility, the Internet of Things, SaaS, IaaS and content delivery all depend on network performance. This presentation will look at the following issues:

    - How will Open-IX and the launch of European-model exchanges impact the interconnection market?
    - What are the networking and datacenter technologies that can disrupt this market?
    - What are the advantages of Direct Connect services?
  • Hospitals and other healthcare providers face the daunting challenge of managing information. As patient records, diagnostic information, and even the operating theater increasingly rely on networked electronics, the amount of data that must be created, transmitted, managed, and stored has grown dramatically. The number of devices connected and powered via the healthcare facility’s network infrastructure is also growing. Concerns with how heat rise can degrade network performance from the next generation of Power over Ethernet (PoE) is also top of mind for network administrators in healthcare. In addition, the patient experience is more important than ever, and things like a fast WiFi connection can translate to significantly improve customer experience. In this Berk-Tek webcast, you will learn how you can protect the future health of your network infrastructure

    Topics to be discussed include:
    - The IP Market Drivers
    - New Technology on the Way (PoE, Wireless, 2.5G and 5G)
    - Brief Review of the Healthcare’s TIA-1179 Cabling Standard
    - Planning for Success
    - Conclusions and Recommendations
  • The FireEye Advanced Threat Report for EMEA provides an overview of the advanced persistent threats (APT) targeting computer networks that were discovered by FireEye during the first half of 2015.

    In this webinar we will discuss the findings and also the potential implications this may have on organisations within EMEA.

    Motivated by numerous objectives, threat actors are evolving the level of sophistication to steal personal data and business strategies, gain a competitive advantage or degrade operational reliability.

    The webinar will draw on data gleaned from the FireEye Dynamic Threat Intelligence (DTI) cloud. There will be information and insight around Advanced Threats at a country, vertical and government level.
  • As communications service providers begin to transition network functions to the cloud to bring new and exciting real time communications services to market quickly and more efficiently, they are looking to key vendor ecosystems to help accelerate the deployments with integrated and differentiated network functions virtualization (NFV) and software defined networking (SDN) solutions that use open approaches.

    This webinar demonstrates the power of solutions from vendor ecosystems and highlights the integration of differentiated network infrastructure products from leading vendors bringing unique, end-to-end Carrier Grade NFV solutions to market for service providers.
  • With cloud computing now becoming a mainstream technology for most companies, new opportunities have emerged for cloud and hosting providers that extend beyond their traditional infrastructure-focused businesses. The most interesting changes in cloud infrastructure, applications and services are yet to come.

    A key characteristic of Cloud 2.0 is that 70% of the opportunity is beyond infrastructure hosting, with application, managed and security services demand growing from enterprises. To capture this providers must continue to evolve their offerings to meet the increasingly complex demands of customers who are now in the driver's seat. These customers need not only infrastructure, but also wrap-around services and support that they have come to expect from their corporate IT departments.

    During this data-driven discussion you will learn:

    - What Cloud 2.0 means for your business
    - Cloud adoption trends
    - How to innovate without risk
    - Who are the primary decision makers
    - How customers choose a service provider and what requirements are important to them
    - Where customers allocate their budgets
  • Register for our Interactive Networking Webinar on September 29th.

    Our expert speaker will present the following:
    - How to meet the mobility needs of your employees and customers
    - How to overcome the challenges modern companies are met with when embracing productivity through mobility
    - How to unlock the productivity advantages that this mobile first strategy brings
    - Hear how organisations like TGI Friday’s & WH Smiths cut costs and improved employee and client user experience with HP Aruba mobility solutions.
  • Register for our Interactive Networking Webinar on September 29th.

    Our expert speaker will present the following:
    - How to meet the mobility needs of your employees and customers
    - How to overcome the challenges modern companies are met with when embracing productivity through mobility
    - How to unlock the productivity advantages that this mobile first strategy brings
    - Hear how organisations like TGI Friday’s & WH Smiths cut costs and improved employee and client user experience with HP Aruba mobility solutions.
  • As network performance becomes more business-critical, visibility and improved control over quality is vital. The network is the CSPs most important asset, but staying on top of performance is a challenge. While customers become more aware and demanding, networks become more complex and fluid. Creanord EchoVault enables unparalleled visibility to the service sold and provides the most scalable performance and SLA management solution for almost any installed equipment and a path to future SDN/NFV networks with the increased demands for timeliness and flexibility.
  • MIFID II requires a company to keep electronic transaction logs with greater resolution/accuracy than previously. This webinar examines how Solarflare helps fulfill these requirements with PTP, Hardware time stamping and Capture.
  • Technology trends such as cloud, mobile, and collaboration help businesses boost growth and competitiveness but each brings it own set of security gaps that give attackers a clear path to slip malware into the network, evade detection, and steal valuable information.
    In 2014, global malware attacks increased by 136%. Attackers launch twice as many unique attacks. These are trying times for every organization as it faces elevated risk from the latest threats and cyber-criminals bent of greed and nefarious deed. Join us as security experts look at some of the latest security challenges and discusses the building block of developing a resilient security defense system to help you effectively combat evolving threats as they emerge.
    You will learn how to better protect your networks as well as yourself with solutions that reduce work for IT and security teams.
    In this webinar, you will:
    1. get up to speed on the current threat landscape

    2. discover ways to take advantage of modern-day network security tools and services for ongoing protection against new threats

    3. learn why it truly counts to have a nimble threat research and response team working for you

    4. and why it truly makes a big difference to have multiple layers of threat protection to bolster your security posture