Standards  >  

Communications Standards

RSS Feed    Add to Google    Add to My Yahoo!
Communications StandardsMultimedia (View All Report Types)
 
Application Discovery Tool
sponsored by Sophos, Inc.
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos, Inc.

Extreme Transaction Processing: Electronic trading at NYMEX
sponsored by Progress
WEBCAST: This Webcast explores a method for increasing the capacity of messaging infrastructure in order to support greater message throughput and future organizational growth.
Posted: 28 Sep 2007 | Premiered: Sep 28, 2007

Progress

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007

Symantec Corporation

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

The Network Evolution University: Next Generation Networks
sponsored by SearchNetworking.com
VIRTUAL SEMINAR: The convergence of storage and data center networks, the proliferation of mobile devices, the growing need for always on communications and access to data, and the emergence of cloud computing have all profoundly transformed the demand placed on the network and how it runs.
Posted: 22 Mar 2012 | Premiered: 22 Mar 2012

SearchNetworking.com

HIPAA Compliance Statement
sponsored by TigerText, Inc.
WEBCAST: This white paper presents a simple, secure mobile platform that enables your healthcare facility with text messaging capabilities that remain in compliance with HIPAA.
Posted: 14 Apr 2014 | Premiered: Apr 14, 2014

TigerText, Inc.

Why BridgeHead? Unique Capabilities for Protecting Data in Enterprise Hospital Environments
sponsored by BridgeHead Software
WEBCAST: This white paper explains 8 ways this data management solution exceeds other vendors' protection capabilities.
Posted: 10 Apr 2014 | Premiered: Dec 31, 2013

BridgeHead Software

Dell PowerEdge VRTX Stands Alone Addressing IT Demands of Remote and Small Offices
sponsored by Dell India
WEBCAST: Read through this exclusive white paper to find out how Dell is transforming IT for remote and small offices with this virtualization-ready, critical piece of hardware.
Posted: 14 Feb 2014 | Premiered: Jun 30, 2013

Dell India

Driving Collaboration Efficiency - H.264 High Profile
sponsored by Polycom, Inc.
WEBCAST: Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  View this webcast to learn how Less Delivers Much More!
Posted: 15 Sep 2010 | Premiered: Sep 15, 2010

Polycom, Inc.

Oracle Introduces Oracle Communications Data Model
sponsored by Oracle Corporation
PODCAST: Listen to this podcast to hear Tony Velcich, from Oracle’s Communications Product Management team, discuss the benefits of this solution.
Posted: 01 Oct 2010 | Premiered: Oct 1, 2010

Oracle Corporation

IPv6: The Next IP Standard
sponsored by AT&T Corp
PODCAST: With available IP addresses disappearing, the standard that supports most network traffic is coming to the end of its useful life. Listen to this podcast to learn how IPv6 provides both the space and security for your network servers.
Posted: 13 Oct 2010 | Premiered: Oct 13, 2010

AT&T Corp

Unified Communications and Lotus Sametime
sponsored by IBM Software Group
WEBCAST: Learn how Colgate-Palmolive has improved communications and increased the efficiency of their organization with IBM's Unified Communications platform, Lotus Sametime.
Posted: 13 Nov 2007 | Premiered: Jun 20, 2007

IBM Software Group

Mobile Unified Communications & Collaboration (UCC) on BlackBerry 10
sponsored by BlackBerry
WEBCAST: This webcast discusses the place of BlackBerry 10 in the move towards real-time enterprise collaboration and how they are working to definitively establish the right balance between personal workspace and the enterprise workspace on mobile desktops.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

BlackBerry

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO: IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009

Fluke Networks

Cisco Prime Collaboration Manager (CM) 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: Uncover the details of Cisco Prime Collaboration Manager to learn how you can gain deeper network visibility, all the way down to the granularity of video flow statistics, to ensure an optimal end-user experience for your users.
Posted: 02 Jul 2012 | Premiered: 04 Nov 2011

Cisco Systems, Inc.

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST: The threat of million dollar penalties from HIPAA regulations is making Healthcare Organizations re-evaluate their patient information security infrastructure. Watch this recorded webcast to see how your organization can reduce the risk.
Posted: 11 Nov 2013 | Premiered: Nov 11, 2013

Absolute Software

The Critical Security Controls – Moving Beyond the Checklist Mentality
sponsored by Lumension
PODCAST: The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
Posted: 13 Aug 2009 | Premiered: Aug 13, 2009

Lumension

Top Ten Considerations When Evaluating Unified Communications Solutions - Learn the top solution differentiators to look for before deciding
sponsored by Cisco Systems, Inc.
WEBCAST: This paper breaks down ten areas to consider when evaluating an upgrade of your unified communications solution.
Posted: 02 Aug 2011 | Premiered: Aug 2, 2011

Cisco Systems, Inc.

5 ways to improve WLAN reliability, performance and capacity
sponsored by Hewlett-Packard Company
WEBCAST: Learn best practices for wireless LAN design, deployment and management while discovering solutions to tackling WLAN network challenges.
Posted: 26 Aug 2011 | Premiered: Aug 26, 2011

Hewlett-Packard Company

Mobile Unified Communications and Collaboration (UCC) on BlackBerry 10
sponsored by BlackBerry
WEBCAST: This presentation will introduce you to the solutions that BlackBerry® 10 offers for unified communications and collaborations, and how they can help your organization stay more connected than ever before. Dive in to learn more.
Posted: 26 Apr 2013 | Premiered: Apr 26, 2013

BlackBerry

Internet Security and Acceleration Server 2006
sponsored by Microsoft
TRIAL SOFTWARE: ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.
Posted: 26 Sep 2006 | Premiered: 25 Sep 2006

Microsoft

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

InfoSphere MDM Solution for Product Information Management
sponsored by IBM
VIDEO: Watch this short video and learn how leading retailers, distributors and manufacturers leverage IBM InfoSphere Product Information Management solutions to boost supply chain productivity and deliver an optimal customer purchase experience.
Posted: 15 Nov 2011 | Premiered: 15 Nov 2011

IBM

Establish a Strategic Advantage in Managing Change
sponsored by IBM
WEBCAST: Join Sue Green, Market Manager for IBM Rational Systems at this webcast as she shows you a structured approach to seizing opportunity and managing change amid the fast pace world and complexity of smarter product development.
Posted: 17 Aug 2010 | Premiered: Aug 17, 2010

IBM

Accelerating Carrier Ethernet Revenue through Service Differentiation
sponsored by InfoVista Corporation
VIDEO: Watch this video to discover how to accelerate carrier Ethernet revenue through service differentiation.
Posted: 05 Dec 2011 | Premiered: 05 Dec 2011

InfoVista Corporation

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement