Outside Plant Systems and Infrastructure

For today’s most critical communications systems, as well as emerging applications that will come to fruition on the horizon, the outside-plant cabling infrastructure is of paramount importance. Across a campus and around the globe, rock-solid connectivity is essential for promising technologies to reach their full potential. This webcast, produced by Cabling Installation & Maintenance, focuses on cabling-infrastructure components and systems deployed in outside-plant environments. It provides detail on the physical characteristics and user-experience attributes required for these systems to ensure the extremely high level of performance required in the outside plant. Join us for this webcast sponsored by Corning Optical Communications and Fluke Networks.
Watch Now

Spotlight

The DORA report helps tech companies and startups understand DevOps practices that drive successful software delivery and operational performance, how their organization compares to others based on key metrics, how cultural changes can improve supply chain security, and why high-trust and low-blame cultures have higher organizat

OTHER ON-DEMAND WEBINARS

Unlocking the Power of On-Demand Hyperconverged Infrastructure: Cyxtera CXD Compute Nodes Powered by Nutanix

Cyxtera

Join industry experts from Cyxtera and Nutanix as they discuss how the Cyxtera Extensible Data Center (CXD) platform and CXD Compute Nodes bring the power and scalability of Nutanix’s hyperconverged infrastructure to enterprises in an on-demand consumption model. Ideal for IT Infrastructure Managers, IT Solution Architects, Network Architects, and IT Operations, this webinar will address how this new approach to data center colocation enables you to.
Watch Now

CATCHING LIVE PHISHING ATTACKS

slashnext

According to Verizon’s 2018 Data Breach Investigations Report, phishing attacks are at the start of over 90% of data breaches and financial losses. Today's phishing attacks employ short-lived sites, most lasting just 4-8 hours. And attack vectors are expanding beyond email to social media, IM, ads, pop-ups, rogue browser extensions, and more. New attack methods exploit the human attack surface within targeted organizations and evade existing security defenses by design.
Watch Now

Time to Roll In New Storage Hardware? Think Again

You’re generating more data than ever, but who has the budget to roll in new hardware to store all of it? With Cloud Tiering, there’s an easy way to instantly increase capacity and avoid costly CAPEX spending for new machines.
Watch Now

Monitoring Experience of Modern IT Infrastructures

CA Technologies

Application experience is determined by the performance of the IT infrastructure that powers it. But the underlying infrastructures are getting increasingly dynamic and hybrid in nature. Managing performance across cloud, dynamic, hyper-converged and on-premises infrastructures can be challenging. Traditional approaches for monitoring usually are inefficient and reactive in nature. In this series, industry experts and yours peers will share best practices for monitoring experience of modern infrastructures designed for today’s digital businesses.
Watch Now

Spotlight

The DORA report helps tech companies and startups understand DevOps practices that drive successful software delivery and operational performance, how their organization compares to others based on key metrics, how cultural changes can improve supply chain security, and why high-trust and low-blame cultures have higher organizat

resources