IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam Multimedia (View All Report Types)
 
Big Data Management: One Fast Query on All Your Data
sponsored by Oracle Corporation
VIDEO: Access this video to learn about a big data management strategy that can work seamlessly with Hadoop and NoSQL. Discover a way to gain access to a much bigger pool of data and maintain security, all for a lower TCO than building your own cluster.
Posted: 29 Jan 2016 | Premiered: 19 Nov 2014

Oracle Corporation

Building a Solid Foundation for Service Management
sponsored by ServiceNow
VIDEO: In this webcast, Andy Garrett, Head of IT Service Development at Travis Perkins Plc, explains how they modernized their ITSM strategy. Tune in to discover the key factors that set them up for success.
Posted: 01 Mar 2016 | Premiered: 24 Nov 2015

ServiceNow

Cloud Computing and Banking: Combatting ATM Fraud
sponsored by Splunk
VIDEO: In this brief video, learn how Orrstown Bank uses cloud computing to keep their services readily available, as well as easily detect patterns of fraud. Tune in to see this cloud computing strategy in action.
Posted: 06 Apr 2016 | Premiered: 06 Apr 2016

Splunk

Extending ITSM Value Beyond IT with PPM
sponsored by ServiceNow
VIDEO: In this brief video, Katie Irvine, Senior Operations Analyst at Standard Life, explains how they extended the value of their ITSM platform to support Project and Portfolio Management. Tune in to learn how you can achieve similar benefits.
Posted: 26 Feb 2016 | Premiered: 26 Nov 2015

ServiceNow

Speak SMB Security: How You Can Be a Security Thought Leader
sponsored by OpenDNS
WEBCAST: In this webcast, learn best practices for defending against the new crime ecosystem and what SMBs need to do to stay protected. Download now to discover why cybercrime is easier than ever and 3 steps for securing your customers.
Posted: 09 Feb 2016 | Premiered: Dec 18, 2015

OpenDNS

Accelerate Your Digital Business Through Cybersecurity
sponsored by Dimension Data
VIDEO: Tune into this video to discover how to leverage cybersecurity to accelerate your digital business. View now to unleash the power of your data with a secure, digital infrastructure and learn how to utilize actionable threat intelligence.
Posted: 19 Apr 2016 | Premiered: 01 Feb 2016

Dimension Data

3 Reasons Why Traditional Hyperconvergence Is a Risky Choice
sponsored by Riverbed Technology, Inc.
WEBCAST: Hyperconvergence is a hot trend, but many solutions don't measure up. Learn how the best solutions keep data safer.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

Microsoft Azure StorSimple Overview
sponsored by Microsoft
VIDEO: Learn the value StorSimple has brought to customers, with specific case studies on a range of businesses.
Posted: 14 Dec 2015 | Premiered: 14 Dec 2015

TOPICS:  IT Management
Microsoft

How to Slash RPO and RTO for Timely, Dependable Recovery
sponsored by Riverbed Technology, Inc.
WEBCAST: Backup and recovery is crucial for ROBOs. Find out why not all solutions are created equal, and how to maximize speed.
Posted: 08 Mar 2016 | Premiered: Mar 9, 2016

TOPICS:  IT Management
Riverbed Technology, Inc.

Butterfly Effect: HCI Has Even Bigger Benefits Than You See
sponsored by Riverbed Technology, Inc.
WEBCAST: Learn how ROBO hyperconvergence creates hidden productivity and cost benefits in ways that aren't obvious at first.
Posted: 02 Dec 2015 | Premiered: Dec 2, 2015

TOPICS:  IT Management
Riverbed Technology, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement