Vertical Industries  >  

Coal Products Industry

RSS Feed    Add to Google    Add to My Yahoo!
Coal Products Industry Multimedia (View All Report Types)
 
Best practices in managing requirements in Energy and Utilities industries
sponsored by IBM
WEBCAST: This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.
Posted: 27 Mar 2014 | Premiered: May 31, 2013

IBM

Mobile Devices, Cloud Apps, and the Digital Workplace
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast explores the impact of mobile devices and cloud apps have on your organization, your network, and the security pros charged with safeguarding it all. There will be a special emphasis on vertical industries such as retail and education, plus a deep dive into healthcare.
Posted: 26 Aug 2016 | Premiered: Aug 19, 2016

Hewlett Packard Enterprise

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Top 3 Ways Enterprise Asset Management Can Decrease Your Operating Costs
sponsored by Infor
WEBCAST: There are many business drivers for enterprise asset management (EAM), including reducing production downtime and increasing labor productivity. But do you know what kind of EAM technology is best for your business? Learn how the latest EAM technologies can help you manage and decrease operating costs, while increasing your return on assets.
Posted: 20 Jul 2016 | Premiered: Jul 20, 2016

Infor

Case Study: University of Kansas Hospital's Security Team Fights Ransomware
sponsored by Cisco Umbrella
VIDEO: In this video, Henry Duong, Infrastructure Security Manager at University of Kansas Hospital, explains how his team fights ransomware and keep patients and researchers secure.
Posted: 07 Feb 2017 | Premiered: 27 Oct 2016

Cisco Umbrella

HealthEdge Advice to Peers: Real-World Examples
sponsored by HealthEdge
VIDEO: Health plan leaders who implemented HealthEdge -- a core administration and care coordination system for transformative health plans – spoke about their experiences.
Posted: 08 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

New Roles and Opportunities for Payers
sponsored by HealthEdge
VIDEO: Learn about the opportunities that payers have with better technology and information systems, and how to bend the cost curve of healthcare while building a loyal relationship with patients along the way.
Posted: 08 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

Real- World Examples: ROI- Results
sponsored by HealthEdge
VIDEO: Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.
Posted: 09 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

The Move to All-Flash at the University of Kansas Health Systems
sponsored by Pure Storage + Cisco
WEBCAST: Discover how the University of Kansas Health System was able to meet and surpass the requirements for Epic's Honor Roll by eliminating storage as a performance bottleneck.
Posted: 05 Jul 2017 | Premiered: Jul 5, 2017

Pure Storage + Cisco

Chico's Battles with Explosive Growth in Central Distribution Warehouse
sponsored by Infor
VIDEO: Tune into this video to discover how Chico's leveraged an enterprise asset management (EAM) platform to control its inventory, expand its distribution campus, and streamline its work orders—keeping pace with demand and accelerating business growth.
Posted: 20 Jul 2016 | Premiered: 20 Jul 2016

Infor

Tech ONTAP Podcast: Technical Rundown of NetApp's HCI
sponsored by NetApp
PODCAST: By tuning into this podcast, you'll hear an in-depth discussion of the technical features of NetApp's hyper-converged infrastructure. Listen in now as Derek Leslie—Principal Product Manager for NetApp HCI—and Gabriel Chapman—Sr. Manager HCI GTM—discuss how HCI simplifies the provisioning of virtual assets, and which workloads it best suits.
Posted: 14 Aug 2017 | Premiered: Jun 5, 2017

NetApp

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.
Posted: 16 Oct 2017 | Premiered: May 16, 2016, 01:03 EDT (05:03 GMT)

Check Point Software Technologies Ltd.

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

5 Steps to the Perfect Storage Refresh: An Independent Process for Refreshing Storage
sponsored by Virtual Instruments
VIDEO: Today's rapid storage refresh cycle can lead to a myriad of problems, and skyrocketing costs. Inside, learn 5 steps to perfecting the refresh cycle, as well as explore the importance of workload analysis as a part of this cycle.
Posted: 05 Sep 2017 | Premiered: 10 Aug 2017

Virtual Instruments

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.
Posted: 09 Oct 2017 | Premiered: 09 Oct 2017

SearchSecurity.com

IoT Edge #2: Enhancing Productivity
sponsored by Atos
VIDEO: Experts predict that by 2018, 81% of organizations will use IoT to enhance their productivity. Take a minute to learn turn your data into actionable insights, performance enhancements, and more.
Posted: 02 Oct 2017 | Premiered: 03 Aug 2017

Atos

Cloud Apps: Innovating Around The Digital Core
sponsored by Atos
WEBCAST: Is it possible to embrace digital disruption? This webcast discusses how SAP is leveraging an open platform strategy that allows customers to build new applications and extensions, and all natively integrated to their back-end systems, whether in the cloud or on-premise.
Posted: 19 Jun 2017 | Premiered: Oct 7, 2016

Atos

Bring Your Organization Into The Digital Future
sponsored by Indeni
WEBCAST: To keep performance high, organizations need to proactively identify network issues before they occur. Learn how you can automate deep-level device inspection to enable productivity, supplement IT operations with knowledge from industry experts, and reduce human error and escalations with automated troubleshooting.
Posted: 24 Jul 2017 | Premiered: Jun 8, 2017


How the Internet of Things Is Transforming Industries and the Nature of Work
sponsored by Hewlett Packard Enterprise
WEBCAST: Jeff Kaplan, managing director and founder of THINKstrategies, provides his expert insight into what the IoT is all about, including the benefits and challenges you can expect. Learn how to create a digital workplace via IoT, how the IoT increases your security risks, and much more.
Posted: 13 Jul 2017 | Premiered: Jul 13, 2017

Hewlett Packard Enterprise

The Pitfalls and Promises of Authentication in the IoT
sponsored by iovation, Inc.
WEBCAST: Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.
Posted: 07 Aug 2017 | Premiered: Aug 7, 2017

iovation, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement