IT Agents  >   Information Technology End Users  >   User Groups  >  

Advanced Computing Systems Association

RSS Feed    Add to Google    Add to My Yahoo!
Advanced Computing Systems Association Multimedia (View All Report Types)
 
Network Evolution University: Cloud Networking - Designing the Hybrid Cloud
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it.
Posted: 20 May 2013 | Premiered: 22 May 2013

SearchNetworking.com

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Kick-Start Big Data Integration
sponsored by Oracle Corporation
WEBCAST: In this video, join data integration specialist Julien Testut as he explains how to jumpstart your big data integration initiatives. Find out how to develop big data without learning code using systems that generate and optimize code for big data.
Posted: 31 Jul 2015 | Premiered: Jun 17, 2015

Oracle Corporation

Unlocking the Potential of BYOD with a Mobile Device Management Service
sponsored by IBM
PRODUCT DEMO: This short video shows how one company can eliminate the stress of MDM and bring your company into the new age of mobility. View now to see how your BYOD strategy can become simple, secure, and cost-effective.
Posted: 06 Jul 2015 | Premiered: 23 Mar 2015

IBM

Security School: Building Advanced Endpoint Security
sponsored by IBM
VIRTUAL ENVIRONMENT: This Security School will provide you will all the information you need to build advanced, modern endpoint protection.
Posted: 11 Jul 2013 | Premiered: 15 Jul 2013

IBM

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 10 May 2013 | Premiered: 15 May 2013

SearchSecurity.com

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
PODCAST: In this Podcast, you'll find firsthand accounts of the tactics used by cybercriminals from none other than Don Smith, Technology Director for a leader in information security systems. Heighten your awareness of spear phishing and other common attacks that lead to security breaches.
Posted: 10 Jul 2015 | Premiered: Jul 10, 2015

Dell SecureWorks

Modern Cloud Storage Architectures: Local Storage vs. Cloud Storage
sponsored by NetApp
PODCAST: Tune into the following podcast to hear from storage expert George Crump, as he explores why businesses should move to the cloud to handle their backup and data protections needs. Access now and get started on the right path to an always-on, disaster-ready IT environment.
Posted: 30 Jun 2015 | Premiered: Jun 16, 2015

NetApp

Podcast: Modern Cloud Storage Architectures: Local Storage vs. Cloud Storage
sponsored by NetApp
PODCAST: Tune into the following podcast to hear from storage expert George Crump, as he explores why businesses should move to the cloud to handle their backup and data protections needs. Access now and get started on the right path to an always-on, disaster-ready IT environment.
Posted: 26 Jun 2015 | Premiered: Jun 16, 2015

NetApp

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks, and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Data Protection Today
sponsored by SearchDataBackup.com
VIRTUAL ENVIRONMENT: As data protection evolves, organizations are finding new ways to supplement and improve their backups. This classroom looks at archiving and file synchronization, creating a solid data protection strategy and how and why backup software is converging with DR.
Posted: 26 Mar 2015 | Premiered: 17 Mar 2015

SearchDataBackup.com

Storage and Networking for Desktop Virtualization Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: Virtual desktops are a key step between server and app virtualization, and rising mobile technologies and cloud computing. But virtual desktop infrastructure poses challenges in the form of demands on networks and storage. We examine the best practices, product features and risks associated with storage and networking for desktop virtualization.
Posted: 03 Sep 2014 | Premiered: 03 Sep 2014

IBM

The future of cloud backup and recovery with AWS and NetApp roundtable with LIVE Q&A
sponsored by NetApp
WEBCAST: In this panel discussion, George Crump, Lead Analyst at Storage Switzerland leads a team of industry experts from both NetApp and AWS in an open dialogue around leveraging cloud service providers, in tandem with local storage, as part of a comprehensive backup and archiving strategy.
Posted: 20 May 2015 | Premiered: May 27, 2015, 09:00 EDT (13:00 GMT)

NetApp

The future of cloud backup and recovery with AWS and NetApp roundtable with LIVE Q&A
sponsored by NetApp
WEBCAST: In this panel discussion, George Crump, Lead Analyst at Storage Switzerland facilitates a discussion with industry experts from both NetApp and Amazon Web Services (AWS) in an open dialogue around  leveraging cloud service providers, in tandem with local storage, as part of a comprehensive backup and archiving strategy.
Posted: 29 Jun 2015 | Premiered: May 27, 2015

NetApp

How-To Video: Creating Web Security Manager for Azure
sponsored by Alert Logic
VIDEO: This brief video analyzes the problem and discusses how you can implements a better web application firewall that will catch even the most advanced threats.
Posted: 20 Mar 2015 | Premiered: 22 Jul 2014

Alert Logic

Understanding Advanced Persistent Threats
sponsored by Dell SecureWorks
WEBCAST: This webcast explores the types of malware and advanced persistent threats that your company may be already be exposed to. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks

Understanding Cloud-Specific Security Technologies
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This security school will teach you how to cut through vendor hype and understand the differentiators between traditional and cloud-specific security products and how to prioritize your investments.
Posted: 03 Apr 2013 | Premiered: 01 Apr 2013

SearchSecurity.com

Security Analytics:Anomaly Detection for IT Security
sponsored by Prelert
VIDEO: Watch this video to learn how anomaly detection systems use advanced analytics to uncover even the subtlest cybercriminals.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Computer Equipment Reseller Enables High-Quality Access to Online Services From Any Device
sponsored by Carrington Associates
VIDEO: In this case study, you'll learn how Elmec, an Italian reseller of computer equipment, utilized a leading mobile development platform to build an application optimized to provide high quality access to their online services from any mobile device.
Posted: 12 Aug 2014 | Premiered: 05 Oct 2014

Carrington Associates

Rethinking the Paradigm of Advanced Threats
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Peter Sullivan explores why enterprises are failing to detect Regin-style advanced threats, and discusses how to realign people, processes and technology to reduce the risk by giving enterprises a fighting chance.
Posted: 20 Jan 2015 | Premiered: 23 Jan 2015

SearchSecurity.com

Information Security Decisions Security School: Evaluating Firewalls for Your Business
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.
Posted: 20 Jun 2013 | Premiered: 19 Jun 2013

SearchSecurity.com

Machine Learning Anomaly Detection for IT Ops
sponsored by Prelert
VIDEO: Watch this brief video to discover how you can more effectively monitor all your data and discover why a problem occurs before it can harm your network.
Posted: 25 Mar 2015 | Premiered: 25 Mar 2015

Prelert

Visualization: How it all comes together
sponsored by GE Healthcare
WEBCAST: Healthcare is evolving and becoming more patient-centric. Tools and software are being released to provide better visibility to data once stored in silos. Today, healthcare workers need a single workstation that provides access to advanced processing tools. Access this webcast for an introduction to an imaging application.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

GE Healthcare

UC Performance Management with Full Network Visibility
sponsored by IR
WEBCAST: View this short video to learn how you can gain true end-to-end network visibility that allows you to performance manage all associate network and UC devices in real-time, even when multiple vendors are involved.
Posted: 02 Jun 2015 | Premiered: Jun 2, 2015

IR

Universal Viewer: Integrated Registration
sponsored by GE Healthcare
WEBCAST: Access this webcast for a demo of the integrated registration tool used in an imaging application that connects advanced visualization, provides extensive breast imaging tools, image-enables EMR systems, and unlocks patient history from silos to better inform and streamline diagnosis.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

GE Healthcare

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement