Live from VMworld - an independent look at this week's announcements

Jason Campagna, Cloud Practice Director
Join Jason Campagna as he discusses various product and solution announcements made during the VMworld keynotes this week, and how WWT is working with VMware to provide a comprehensive software-defined datacenter approach with our Cloud-in-a-Box methodology.   Jason is WWT’s Cloud Practice Director, working with a team of top tier solutions architects in the largest enterprise, service provider, and federal marketplaces.   Jason has been a long term member of the Citrix and VMware Partner Technical Advisory Boards, and an author of several whitepapers for organizations such as VMware and Microsoft including the original Stateless VMware whitepaper design.
Aug 28 2012
30 mins
Live from VMworld - an independent look at this week's announcements
Join us for this summit:
More from this community:

Cloud Computing

Webinars and videos

  • Live and recorded (3276)
  • Upcoming (104)
  • Date
  • Rating
  • Views
  • McAfee is unique among secure web gateway solution providers with its hybrid delivery model, which provides the flexibility to deploy a web gateway on-premises, in the cloud, or in combination. In this session, McAfee will discuss details of the hybrid web protection deployment model and the various elements that comprise it, along with provide guidance on to choose the deployment scenario that best addresses your organization’s specific business needs.
  • Mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices creates risk of business data loss and introduction of malware. What are the risks and what technologies can businesses deploy to enable productivity while protecting from these threats ?

    •Learn about the risks introduced when personal and business data and apps co-mingle on mobile devices
    •Learn about available technologies and technology trends to address these risks.

    Join Dell to understand the risks introduced when personal and business data co-mingle on mobile devices and technologies to consider to protect corporate data.
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Forty-four states, DC and four territories have adopted the Common Core State Standards (CCSS). This means that school districts across the country are planning for 100% online assessments during the 2014-2015 school year. One of the most important conditions needed for being able to administer online assessments is network infrastructure readiness.
    Attend this 30-minute webinar and join Gavin Lee, Senior K-12 Business Development Manager at Juniper Networks, to discuss the critical network must-haves that all school districts should consider when looking to deploy a robust and supportable network. You will also receive practical guidance on how to get the most out of your network infrastructure and how to best prepare for the CCCSS assessments:
    • Consortia network infrastructure
    • Wired and wireless network capabilities
    • Robust network security
    • Network support readiness
    • Juniper Networks network infrastructure readiness resources
  • Trend Micro sponsored an extensive security survey of businesses in North America and Europe. Conducted by Cyber-Edge Group, LLC, a premier research and marketing firm, the survey examines the current and planned deployment countermeasures for establishing effective cyber defenses. This webinar will reveal the significant findings from the survey and accompanying report and is intended to provide IT security decision makers with a better understanding of how their perceptions, concerns, priorities – and most importantly – current defensive postures stack up against those of other IT security professionals and organizations. Key highlights from the report include:
    • One in four security professionals doubt whether their organization has invested adequately in cyber threat defenses.
    • Over 60% of respondents were affected by a successful cyber-attack in 2013, but less than 40% expect to fall victim again in 2014.
    • Mobile devices (smartphones and tablets) are perceived as IT security’s “weakest link”, followed by laptops and social media applications.
    • One in four organizations lack the tools necessary to properly investigate the root cause and material impact of network security breaches.

    Join Mark Bouchard, Vice President with Cyber-Edge Group and Jon Clay, Director of Global Threat Research with Trend Micro, for this webinar to learn more about the state of cyber threat defenses among today’s businesses and gain a better understanding of what you can do to improve your defenses going forward.
  • Décrouvrez les solutions Networking Dell, Convergence, 10Gb et administration centralisée
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • Dell Présente lors du CRIP une approche concrète des PRA/PCA en 90 secondes
  • 397% de ROI , c‘est ce que vous offre l’architecture Fluid Data de Dell. C’est prouvé mais comment est-ce possible ?
  • Channel
  • Channel profile
Up Down
  • IMPACT: Virtualization’s Effect on the Network Recorded: Feb 14 2013 36 mins
    As the adoption of virtualized clouds changes the landscape of our data centers, many organizations are beginning to take a fresh look at the way they approach networking.

    In this webinar we will address some of the challenges that face networking teams today as they interact with the new virtual world, such as:

    - There’s more to networking than just hooking things up
    - Where Network Services Reside
    - Ownership of Services
    - Advanced Cloud Networking : Where is my Layer-2?
    - How does this play into orchestration and automation
    - A Pragmatic Approach to Cloud
    - The Next Generation Network Engineer
  • Five Pillars of VDI Success Recorded: Nov 15 2012 35 mins
    According to industry researchers nearly 75 percent of the organizations who have deployed a virtual desktop environment have stalled their deployment before completion leaving frustrated employees in departments ranging from IT, to the business units, to the executive suite. It isn’t a lack of good intentions causing these deployments to fail, but rather a lack of understanding of the holistic approach needed to successfully deploy a virtual desktop environment. Join WWT’s Dave Kinsman, National Technical Solutions Architect, as he discusses the 5 Pillars to VDI success.
  • Architecture, Sizing and Deployment Considerations for a Citrix Desktop Enviro Recorded: Nov 13 2012 47 mins
    Join WWT's Dr. John Nguyen as he discusses the arcitectural best practices, sizing and deployment considerations for environments leveraging Citrix in their virtual desktop installations.
  • WWT is Master Certified in Security and Unified Communications Recorded: Oct 24 2012 5 mins
    Jim Kavanaugh, Don Seiler and Ladi Adefala talk about what it means to our customers that WWT is Cisco Master certified in Security and Unified Communications.
  • Live from VMworld - an independent look at this week's announcements Recorded: Aug 28 2012 30 mins
    Join Jason Campagna as he discusses various product and solution announcements made during the VMworld keynotes this week, and how WWT is working with VMware to provide a comprehensive software-defined datacenter approach with our Cloud-in-a-Box methodology.   Jason is WWT’s Cloud Practice Director, working with a team of top tier solutions architects in the largest enterprise, service provider, and federal marketplaces.   Jason has been a long term member of the Citrix and VMware Partner Technical Advisory Boards, and an author of several whitepapers for organizations such as VMware and Microsoft including the original Stateless VMware whitepaper design.
  • Cisco Labs @ Geek Day 2012 Recorded: Mar 30 2012 3 mins
    At this year’s Geek Day, Cisco is sponsoring 6 technical labs: VXI, UCS, Security Gateway/Secure Mobility, Prime for Enterprise, WAAS and Cisco’s Intelligent Automation for Cloud (CIAC). Please come by to discuss these solutions with the Cisco team.
  • Utility Metered Cloud Recorded: Mar 30 2012 3 mins
    There is a fundamental shift taking place in the way technology resources are delivered and supported. Virtualization and consolidation have forever changed the face of computing and server utilization by promising resource efficiency and reducing the hardware footprint. Meanwhile, technology-as-a-service and cloud based delivery models are emerging as the computing trend of the future, where users pay service providers only for exactly the amount of technology they use in a pay-as-you-go utility model, instead of buying and managing sprawling environments of software, hardware, and support services.
    6fusion is an innovative Utility Metered Cloud company that has emerged in this new era of utility computing with a refreshing vision for the future, cutting-edge technologies and a unique commercial business model.
  • FireScope: Unify for the NetApp Cloud Recorded: Mar 29 2012 5 mins
    FireScope: Unify for the NetApp Cloud
  • Software Security Goes Mobile Recorded: Mar 8 2012 42 mins
    Mobile devices and the risk posed by vulnerabilities in the software that runs them are proliferating. This talk scrutinizes challenges faced in securing mobile apps and contrasts them with legacy software security initiatives. We discuss how outsourcing confounds security efforts, how the mobile app lifecycle can make risk a hot potato, and a variety of other challenges organizations face as users demand ever increasing mobile capabilities.
  • Bridging the gap of virtualization and physical infrastructure Recorded: Mar 1 2012 28 mins
    Bridging the gap of virtualization and physical infrastructure - integrating APC by Schneider Electric's Data Center Infrastructure Management with Microsoft & VMware

    This interactive presentation introduces the virtual integration between APC by Schneider Electric's data center infrastructure management solution StruxureWare Central, and systems for managing virtualized environments. StruxureWare Central allows end to end data center infrastructure management software for monitoring and control of power, cooling, security and energy usage from the building through IT systems. In he latest release of StrxureWare Central, virtual machine management and physical infrastructure management are now talking to each other so as to maximize the benefit of virtualization by answering the questions:

    Which VMs are on a host server with compromised physical health?
    Power
    Cooling

    Where should I move a VM, or add a new one?
    What is the best "healthy" host server?
    How do I find this place?
    How do my VMs migrate?
    When a physical event occurs, who/what will move the VMs?
    Is this an automated or a manual process?
    Effect on business process?
    In a physical event, what business process(es) could be
    impacted?
  • Taking Advantage of Open Cloud Computing Recorded: Jan 25 2012 60 mins
    Join Intel Cloud Infrastructure Group GM Jason Waxman and Forrester VP and Principle Analyst James Staten discuss the trends, key players, opportunities and how to specifically take advantage of an open cloud computing approach to address key challenges today. They will explore how to build upon IP that others are sharing, advances in open source cloud, open standards development, the Open Compute Project, and much more followed by a question and answer session!
  • Our Pragmatic Approach to IT Transformation Recorded: Dec 13 2011 37 mins
    WWT's pragmatic approach toward IT Transformation that not only considers the technology involved but the people and processes that must be considered as well to enable your organization to continue to evolve toward cloud.
  • BYOD + Enterprise Security = Opportunity Recorded: Dec 13 2011 46 mins
    Research Highlights
  • Cloud Adoption - The Pragmatic Approach Recorded: Dec 6 2011 24 mins
    One size doesn't fit all. Scott Miller helps organizations understand how to determine where they are today in cloud adoption and how far they should go to achieve the most beneficial attributes of a cloud for their organization.
  • The Optimized Desktop Vision Recorded: Dec 1 2011 57 mins
    How can an organization migrate from 25 years of desktop and application management habits to the more optimized virtual environment available today? Scott Webb talks about why organizations should think about a broader vision of "VDI" that can encompass application, user, and desktop virtualization.
  • Context Aware Desktops: The Key to Secure User Experience Recorded: Nov 10 2011 60 mins
    The boundaries between work and life have blurred and users expect consistent access to corporate services from wherever they are, on any device and at any time. This is driving IT to look at new technologies to better support the business, users and their own organizations. The result is often a combination of multiple devices and a mix of delivery platforms, and it creates a growing challenge for IT to deliver and support a consistent and secure user experience.

    Join guest analyst Rachel Chalmers of The 451 Group in an interactive session led by Jeff Wettlaufer, RES Software Sr. Global Director of Product Marketing. They will discuss desktop trends faced by IT and solutions available to address these new demands and enable context aware hybrid desktops and automated service portfolios. Rachel will provide findings and recommendations based on the latest 451 research surrounding desktop virtualization technologies.

    Attendees will learn:

    * How IT can better navigate today's hybrid desktop environments by introducing centrally controlled and flexible workspaces to provide users consistency across devices and delivery platforms.

    * The importance of understanding context beyond user name and enabling their workspace to react to that context with dynamic services.

    * The benefits of simplified and centralized automation portfolios to help implement, administer and support new desktop technologies.

    * How workspace and automation management solutions can improve future OS migrations and infrastructure changes with minimal disruption to users.
  • Introducing Geek Day Recorded: Oct 19 2011 41 mins
    Founded 7 years ago as a regional event offering hands-on functioning demos and breakouts on virtualization technology, this event has expanded to be a national show featuring collaboration, wireless, mobility, security, datacenter and virtualization technologies. All with fully functioning, hands-on demos. Attend to learn why this free event should be on your list of to-do's for 2012.
  • CITEIS – A Cisco on Cisco Private Cloud Case Study Recorded: Oct 11 2011 47 mins
    Join us to learn about Cisco’s CITEIS – Cisco IT Elastic Infrastructure Services – project. Find out firsthand how Cisco deployed an agile, cost effective, flexible and secure private cloud using Cisco Intelligent Automation, Cisco UCS, and VMware technologies. Gain insights from Cisco IT for the planning and development of your own private cloud.
  • The Security Onion - A Layered Approach To Security Recorded: Sep 15 2011 48 mins
    Despite investing heavily in their security defenses many organizations are still finding their systems regularly compromised. The problem these organizations face is they are focusing too much on the defensive controls at their network perimeter in the false belief that this makes it difficult for their systems to be compromised. However, time and time again we see that once the perimeter controls fail attackers have easy access to the organization's sensitive assets.

    This presentation will provide attendees with a practical guide on how to secure their corporate assets by implementing a multi-layered approach to security incorporating the key cornerstones of people, process and technology. With this multi-layered approach should one security layer fail the other layers can compensate and continue to secure key organizational assets.

    Today's threat landscape and attacks are constantly evolving and it is essential that organizations ensure their security controls evolve to counter these threats. The attendee will be shown how to take a risk based approach to develop multiple security layers to deal with the current threat landscape and how to ensure each layer can compensate for another should there be a compromise.

    Relying on one layer of security at the perimeter is no longer an option, developing adaptive security controls at various layers is essential to securing systems in today's environment.
Guiding you to a public, private or hybrid cloud
In conjunction with one of the nation's leading technical tradeshows, the Geek Day Virtualization Channel features compelling technology thought leadership on the industry's best-of-breed cloud and virtualization solutions providers.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live from VMworld - an independent look at this week's announcements
  • Live at: Aug 28 2012 8:30 pm
  • Presented by: Jason Campagna, Cloud Practice Director
  • From:
Your email has been sent.
or close
You must be logged in to email this