Hybrid Cloud Deployment Demo

NuoDB

In the next 'NuoDB Unplugged', watch CTO Seth Proctor demonstrate the capabilities of NuoDB's peer-to-peer architecture. He will begin by scaling a single, logical database across three AWS instances in three separate geographical locations.
Watch Now

Spotlight

SECURE REMOTE USERS WITHOUT COMPROMISE Remote access VPN has been an enterprise network staple for years. However, as enterprises rapidly adopt more cloud applications, their security and networking needs are changing fundamentally. With the continued growth of mobile workforces and cloud-based applications, organizations are q


OTHER ON-DEMAND WEBINARS

Privacy and the Cloud – Cross-Atlantic Legal Perspectives

CipherCloud

he Cloud is here to stay, but businesses are increasingly worried about how to manage privacy,security, regulatory compliance and cross-border sovereignty issues. What do you need to do to solve the privacy challenges and varying legal requirements across borders?
Watch Now

NoSQL & Big Data - The No “BS” Edition

cloudant

There’s a lot of hype out there on NOSQL databases, but not enough honest talk and concrete use cases to know when and how to do it right.
Watch Now

Risks and Rewards of Project Management in the Cloud

Leaders of growing construction companies are drawn to the speed, reliability and extensibility of hosting enterprise project management systems in the cloud. But the prospect of transitioning ongoing operations to an entirely new platform breeds understandable hesitation. ENR will convene a panel of construction industry experts who have made the move and ask them to tell us how they minimized the risk during the transition, and what they have learned - and gained - by moving project management to the cloud.
Watch Now

Cloud Attacks, Threats, and Defenses

csiac

As organizations migrate critical services to the cloud, adversaries gain increasing incentive to gain access to these environments. Attacks against cloud environments can range from traditional exploits against an instance to complex, low-level attacks against the underlying infrastructure.
Watch Now

Spotlight

SECURE REMOTE USERS WITHOUT COMPROMISE Remote access VPN has been an enterprise network staple for years. However, as enterprises rapidly adopt more cloud applications, their security and networking needs are changing fundamentally. With the continued growth of mobile workforces and cloud-based applications, organizations are q

resources