IT Agents  >   Information Technology End Users  >   User Groups  >  

Advanced Computing Systems Association

RSS Feed    Add to Google    Add to My Yahoo!
Advanced Computing Systems Association Multimedia (View All Report Types)
 
Network Evolution University: Cloud Networking - Designing the Hybrid Cloud
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it.
Posted: 20 May 2013 | Premiered: 22 May 2013

SearchNetworking.com

IT Transformation Case Study: Leveraging Cloud Suites for Enterprise
sponsored by VMware
WEBCAST: This webcast serves as a case study for Columbia Sportswear, and examines how they were able to scale their IT infrastructure to meet the needs of their retail company using a hybrid cloud model with mature, stable cloud architecture.
Posted: 25 Aug 2015 | Premiered: Nov 6, 2013

VMware

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Kick-Start Big Data Integration
sponsored by Oracle Corporation
WEBCAST: In this video, join data integration specialist Julien Testut as he explains how to jumpstart your big data integration initiatives. Find out how to develop big data without learning code using systems that generate and optimize code for big data.
Posted: 31 Jul 2015 | Premiered: Jun 17, 2015

Oracle Corporation

Unlocking the Potential of BYOD with a Mobile Device Management Service
sponsored by IBM
PRODUCT DEMO: This short video shows how one company can eliminate the stress of MDM and bring your company into the new age of mobility. View now to see how your BYOD strategy can become simple, secure, and cost-effective.
Posted: 06 Jul 2015 | Premiered: 23 Mar 2015

IBM

How to Protect Your Data in Virtual Environments
sponsored by IBM
VIDEO: This video discusses how you can implement data backup that is designed for a virtual environment.
Posted: 09 Jul 2015 | Premiered: 08 Sep 2014

IBM

Security School: Building Advanced Endpoint Security
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School will provide you will all the information you need to build advanced, modern endpoint protection.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013

IBM

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
PODCAST: In this Podcast, you'll find firsthand accounts of the tactics used by cybercriminals from none other than Don Smith, Technology Director for a leader in information security systems. Heighten your awareness of spear phishing and other common attacks that lead to security breaches.
Posted: 10 Jul 2015 | Premiered: Jul 10, 2015

Dell SecureWorks

Modern Cloud Storage Architectures: Local Storage vs. Cloud Storage
sponsored by NetApp
PODCAST: Tune into the following podcast to hear from storage expert George Crump, as he explores why businesses should move to the cloud to handle their backup and data protections needs. Access now and get started on the right path to an always-on, disaster-ready IT environment.
Posted: 30 Jun 2015 | Premiered: Jun 16, 2015

NetApp

Podcast: Modern Cloud Storage Architectures: Local Storage vs. Cloud Storage
sponsored by NetApp
PODCAST: Tune into the following podcast to hear from storage expert George Crump, as he explores why businesses should move to the cloud to handle their backup and data protections needs. Access now and get started on the right path to an always-on, disaster-ready IT environment.
Posted: 26 Jun 2015 | Premiered: Jun 16, 2015

NetApp

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks, and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Understanding Zero-Day Attacks and Gaining Control
sponsored by Malwarebytes Corporation
WEBCAST: This webcast discusses specific ways to address zero-day risks and fight exploit attempts.
Posted: 17 Aug 2015 | Premiered: Jul 31, 2015


The future of cloud backup and recovery with AWS and NetApp roundtable with LIVE Q&A
sponsored by NetApp
WEBCAST: In this panel discussion, George Crump, Lead Analyst at Storage Switzerland leads a team of industry experts from both NetApp and AWS in an open dialogue around leveraging cloud service providers, in tandem with local storage, as part of a comprehensive backup and archiving strategy.
Posted: 20 May 2015 | Premiered: May 27, 2015, 09:00 EDT (13:00 GMT)

NetApp

Q&A: The Future of Cloud Backup and Recovery with AWS and NetApp
sponsored by NetApp
WEBCAST: In this panel discussion, George Crump, Lead Analyst at Storage Switzerland facilitates a discussion with industry experts from both NetApp and Amazon Web Services (AWS) in an open dialogue around  leveraging cloud service providers, in tandem with local storage, as part of a comprehensive backup and archiving strategy.
Posted: 29 Jun 2015 | Premiered: May 27, 2015

NetApp

Storage and Networking for Desktop Virtualization Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: Virtual desktops are a key step between server and app virtualization, and rising mobile technologies and cloud computing. But virtual desktop infrastructure poses challenges in the form of demands on networks and storage. We examine the best practices, product features and risks associated with storage and networking for desktop virtualization.
Posted: 03 Sep 2014 | Premiered: 03 Sep 2014

IBM

Data Protection Today
sponsored by SearchDataBackup.com
VIRTUAL ENVIRONMENT: As data protection evolves, organizations are finding new ways to supplement and improve their backups. This classroom looks at archiving and file synchronization, creating a solid data protection strategy and how and why backup software is converging with DR.
Posted: 26 Mar 2015 | Premiered: 17 Mar 2015

SearchDataBackup.com

Understanding Advanced Persistent Threats
sponsored by Dell SecureWorks
WEBCAST: This webcast explores the types of malware and advanced persistent threats that your company may be already be exposed to. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks

4 Anti-Malware Platforms Put Through an Anti-Exploit Test
sponsored by Malwarebytes Corporation
VIDEO: In this video, a series of anti-malware platforms are tested with an exploit simulator test to determine which product has the early detection capabilities required for effective security.
Posted: 06 May 2015 | Premiered: 14 Oct 2013


3 Guidelines to Establishing Your Code Confidence
sponsored by Rogue Wave Software
WEBCAST: Navigating the day-to-day issues of automotive software development can be overwhelming, but with little effort it can be easily managed. This webinar will explore how to deliver secure, compliant, and defect-free software.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

Rogue Wave Software

Test-Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This trial software allows you to sample a security platform that gives you all the tools you need to secure yourself against today's advanced threats.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015

AlienVault

Security Analytics:Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Holistic Security for the Modern Threat
sponsored by Splunk
VIDEO: This video discusses the capabilities of a security platform that incorporates big data analytics, security investigating, and reporting, all of which can give you a holistic view of your network security.
Posted: 19 Aug 2015 | Premiered: 24 Jan 2014

Splunk

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Computer Equipment Reseller Enables High-Quality Access to Online Services From Any Device
sponsored by Carrington Associates
VIDEO: In this case study, you'll learn how Elmec, an Italian reseller of computer equipment, utilized a leading mobile development platform to build an application optimized to provide high quality access to their online services from any mobile device.
Posted: 12 Aug 2014 | Premiered: 05 Oct 2014

Carrington Associates

All Flash Arrays: Performance Without Compromise
sponsored by Hewlett-Packard Limited
VIDEO: This video discusses how technological advancements have produced flash storage technology that's practical and efficient enough for widespread adoption.
Posted: 24 Aug 2015 | Premiered: 24 Aug 2015

Hewlett-Packard Limited

Information Security Decisions Security School: Evaluating Firewalls for Your Business
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.
Posted: 20 Jun 2013 | Premiered: 19 Jun 2013

SearchSecurity.com

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Watch this brief video to discover how you can more effectively monitor all your data and discover why a problem occurs before it can harm your network.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement