Resource Library

Network World has assembled a comprehensive reference collection of technical resources to help guide your decision making.

Filter the library by ...

The Expanding Attack Surface: 5 Tips to Manage Third-Party Risk

Today’s digital environmental offers tremendous opportunities for modern organizations. At the same time, there is more risk. Vulnerabilities and infections plague organizations around the globe — and their numbers continue to rise.

Video/Webcast | Presented by Open Text

Discover the new breakthrough in process automation with AI-Augmented Capture

If your organization is struggling to contextualize incoming business content, there is a solution to address that. Using AI and machine learning-enabled intelligent capture, you can streamline business processes and automatically initiate workflows. Join us live on May 22nd at 2PMEDT to hear more.

Video/Webcast | Presented by Avi Networks

Reconsider TCPdump and Move Forward with Modern Troubleshooting

Are you tired of troubleshooting with TCPdump? The Avi Vantage Platform is here to help.

Video/Webcast | Presented by IBM

DTE Product Tour IBM Watson Studio: Create and test a visual recognition model

While advanced machine-learning development, testing, and tuning remain specialties of senior data scientists, many data science teams are forming around collaborative and visual tools that offer fast time-to-value to handle more basic scenarios.

Video/Webcast | Presented by Microsoft

Step up your enterprise security: 5 strategies for advanced cloud security

As an IT decision maker, you’re at the forefront of the technology changes that drive digital transformation—especially the adoption of cloud technology. With the right approach, you can enable deeper knowledge of customers, access to new markets, fresh ways for employees to work in collaborative teams, increased efficiency, and dramatically faster innovation.

Video/Webcast | Presented by DataStax

5 Steps to an Awesome Apache Cassandra™ Data Model

Picking the right data model is the most critical step to ensuring you get the most out of your Apache Cassandra implementation.

HCI Powered vSAN – Why Should Customers Care

VMware vSAN powers hyperconverged infrastructure (HCI) solutions with vSphere-native, flash-optimized storage for private and public cloud deployments. A core building block for the Software-Defined Data Center, more than 17,000 organizations have deployed vSAN - from edge to core to cloud – on their hardware of choice. The real-world use cases in this presentation highlight the many varied ways customers are leveraging vSAN benefits.

Video/Webcast | Presented by Onapsis

Webcast: Into the Breach, The Hidden Secret Behind ERP Attacks

It seems like everyday there is another high profile breach in the news that details customer records lost, compliance failures and bad cybersecurity hygiene. Do you ever wonder where these records are maintained in the organization or what applications were exposed?

VMware End User Computing - Empower Users with a Digital Workspace

Learn how making the move to Workspace One, and employing proven best practices, will simplify desktop and app management, secure data, improve compliance, drive down costs, and empower your users.

Concepts and Best Practices for Managing Oracle License Compliance

With risk comes great reward. Oracle's "open" licensing gives you free reign of their software, but careful—you'll need to actively manage licensing for the features you use

Load More
Popular Resources