IT Management  >   Systems Operations  >   Storage Management  >  

Defrag

RSS Feed    Add to Google    Add to My Yahoo!
Defrag Multimedia (View All Report Types)
 
Evaluating Red Hat Virtualization
sponsored by Red Hat
SOFTWARE DEMO: Is your enterprise ready to securely and confidently virtualize mission-critical applications, while gaining unparalleled performance and scalability? Take advantage of this free trial of Red Hat Virtualization now to evaluate its compatibility with your organization.
Posted: 24 Jan 2017 | Premiered: 24 Jan 2017

Red Hat

Amelco Case Study: Continuous Delivery Using Ansible Automation
sponsored by Red Hat
VIDEO: Tune in as Amelco illustrates how one IT automation engine empowered effective multi-environment management for its diverse application infrastructure—with no downtime. Learn here how to unify management and provide continuous delivery of Linux-based apps, and more.
Posted: 16 Jan 2017 | Premiered: 01 Sep 2016

Red Hat

Making the Case for Automation
sponsored by Embotics
WEBCAST: As the virtualization infrastructures' scale increases, so too does the difficulty of management. Traditional management techniques can be rendered completely ineffective by virtual data center growth, leading to uncontrolled virtual machine sprawl and wasted hardware resources. Automation may be able to solve these issues. Tune in to learn more.
Posted: 23 Aug 2016 | Premiered: Jun 8, 2016

Embotics

State-of-the-art Technology Exceeds Customer Expectations
sponsored by NetApp
WEBCAST: Discover how NetApp All Flash FAS enables businesses to enrich the end-user experience and operate more competitively.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

TOPICS:  IT Management
NetApp

Ten Questions to Ask Your File Gateway Vendor
sponsored by IBM
WEBCAST: Determine if a vendor will increase reliability, reduce security risk, and support rapid growth with these 10 questions.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Data Exfiltration in Depth
sponsored by Intel Security
VIDEO: Deepen your understanding of data exfiltration with a presentation from two industry experts.
Posted: 21 Sep 2016 | Premiered: 21 Sep 2016

TOPICS:  IT Management
Intel Security

Designing an Adaptive Security Architecture
sponsored by Intel Security
WEBCAST: Advanced attacks bypass blocking and prevention strategies. Implement an adaptive security architecture for protection.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Road to Modernization
sponsored by IBM
WEBCAST: Over 50% of LOB execs list better strategic relationships and reduced costs as B2B integration benefits. Modernize now.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Magic Quadrant for Security Information and Event Management
sponsored by Intel Security
WEBCAST: Find out the strengths and cautions for the vendors in Gartner's SIEM Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST: Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement