IT Agents  >   Professional Organizations  >   Computer Industry Professional Organizations  >  

CSI

RSS Feed    Add to Google    Add to My Yahoo!
CSI Multimedia (View All Report Types)
 
How to Conquer IT Costs with Portable Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Tune into this video to learn how a transition to Red Hat Enterprise Linux can reduce costly downtime, migration time, and TCO in your organization. Take advantage of a platform that supports business-critical workloads with 99.999% uptime and creates scalable, high-performing IT for next-gen infrastructure.
Posted: 13 Jul 2016 | Premiered: 14 Apr 2014

Red Hat

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

Changing the Economics of Storage Consolidation
sponsored by EMC Corporation
WEBCAST: This Webcast explores ways to simplify IT through the use of IP storage consolidation solutions. View this presentation to learn how you can consolidate your storage without the cost and complexity of Fibre Channel.
Posted: 02 Apr 2008 | Premiered: Apr 2, 2008

EMC Corporation

Cloud Planning and Design: Your Road Map to Success, with Eric Blum
sponsored by BMC-Accenture
PODCAST: If you haven’t already moved to the cloud, it’s time to consider doing so. The global cloud computing market is predicted to increase dramatically. Yet while the pressure is on to join the massive rush to the cloud, doing so without thoughtful planning can create problems. Learn how cloud planning and design can lead to greater success.
Posted: 13 Jan 2012 | Premiered: Jan 13, 2012

BMC-Accenture

CA Compliance Manager for z/OS
sponsored by CA Technologies.
WEBCAST: Register today to see a flash demonstration of CA Compliance Manager for z/OS and find out for yourself how you can take the cost out of compliance, streamline processes, increase efficiencies and reduce business risk.
Posted: 12 May 2009 | Premiered: May 12, 2009

CA Technologies.

Video: The All New 2010 Intel Core Processor Family for Business PCs-- Deploy with Confidence
sponsored by Intel
VIDEO: Watch this brief video to learn how the 2010 Intel Core Processor family prepares your business for today's needs and for tomorrow.
Posted: 27 Sep 2010 | Premiered: 27 Sep 2010

Intel

Above Security Delivers Customer Value
sponsored by Above Security
WEBCAST: It's imperative your security vendor understands your organization's tools and services to best produce services catered to your needs. They must own your issues - take them on as their own to establish the strong relationship critical for strong security control. This short webinar shows you how to achieve these things and much more.
Posted: 23 Aug 2016 | Premiered: Jun 3, 2016

Above Security

Securing Access to On-Premise and SaaS Environments with Cloud-based IAM
sponsored by OneLogin
WEBCAST: Locking down your identity and access management (IAM) on the cloud can be a snap when you have the right knowledge. Listen in as Merritt Maxim, Security Analyst and IAM guru for Forrester, drops what you need to know about IAM technologies, IDaaS market trends, challenges of IAM approaches on the cloud, and more.
Posted: 14 Jun 2016 | Premiered: Feb 10, 2016

OneLogin

What If an Invisible Attacker Tried to Bring Down Your Business?
sponsored by Lenovo
PODCAST: In this podcast, Carl Woerndle of Distribute.IT talks about a series of cyberattacks that assailed his business. Listen to find out what key lessons he took away from the experience that serve as a sobering wake-up call for any CIO or IT professional concerned about cybersecurity.
Posted: 10 Aug 2016 | Premiered: Aug 10, 2016

Lenovo

New Malware Analysis Data in OpenDNS Investigate
sponsored by OpenDNS
WEBCAST: Learn how a threat intelligence tool can help you understand not only domain and IP data, but also file hashes. Using this expanded capacity, your security team can more thoroughly interrogate threats to your enterprise.
Posted: 26 Jul 2016 | Premiered: May 25, 2016

OpenDNS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
CSI White Papers | CSI Multimedia | CSI IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement