IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Biometry

RSS Feed    Add to Google    Add to My Yahoo!
Biometry Multimedia (View All Report Types)
 
DigitalPersona Pro
sponsored by DigitalPersona
SOFTWARE DEMO: This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
Posted: 15 May 2007 | Premiered: 01 Jan 2006

DigitalPersona

Developing for the Future - The New Trend for Hosted VXML
sponsored by West Interactive
WEBCAST: By taking advantage of the Voice XML platform (VXML) to manage infrastructure scale and support, companies are freeing up IT dollars and resources to focus on creating best-in-class customer experiences using IVR applications. This webinar will provide you with key information necessary to execute a comprehensive PaaS strategy using VXML.
Posted: 27 May 2010 | Premiered: Jun 8, 2010, 11:00 EDT (15:00 GMT)

West Interactive

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Segmentation Beyond VLANs, Subnets, and Zones
sponsored by Illumio
WEBCAST: Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Transforming Your Data-Driven IT Organization
sponsored by Windsor Group
VIDEO: Tune into this video to learn how to transform your data-driven organization and service delivery by leveraging the market insight and expertise of one ITSM provider. Learn how to determine the best ITSM sourcing strategy for you, and transform your IT operations with an alternative delivery and market pricing model evaluation.
Posted: 16 May 2016 | Premiered: 16 May 2016

Windsor Group

Everything as a Service: Improve Workflow in All Departments
sponsored by ServiceNow
VIDEO: In this brief video, learn how you can leverage Everything as a Service to enable automation and efficiency across your organization. Discover how to deliver everything from employee onboarding, to invoicing, to cloud provisioning as a service.
Posted: 23 Feb 2016 | Premiered: 29 Apr 2015

ServiceNow

HP helps United Airlines consolidate their IT infrastructure
sponsored by Hewlett-Packard Enterprise
WEBCAST: This brief video case study examines how United Airlines was able to consolidate its IT infrastructure and fuel customer experience success with the right service. Tune in to learn more now.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Enterprise

Linux Without Limits: An Introductory Video
sponsored by IBM
VIDEO: In this brief video, you will discover a suite of hardware, software, services, and solutions that will empower you to unleash the full potential of Linux for your business. Tune in to deliver the flexibility and agility your organization craves with this trusted enterprise system, and scale out to 8,000 virtual servers in a single system.
Posted: 24 Feb 2016 | Premiered: 17 Aug 2015

IBM

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement