IT Management  >   Systems Design and Development  >   Architectures  >  

Dynamic Logical Partitioning

RSS Feed    Add to Google    Add to My Yahoo!
Dynamic Logical Partitioning Multimedia (View All Report Types)
 
Webcast: Moving Beyond the "Hype" in Hyperconvergence
sponsored by VeriStor
WEBCAST: Before getting swept up in hyperconverged's promises, you must look beyond the hype to determine if it's a suitable fit – and, more importantly, where and when HCI is appropriate by offering workload analysis of ROBOs, VDI, green field environments, and app development, and more.
Posted: 01 May 2017 | Premiered: May 1, 2017

VeriStor

Designing an Adaptive Security Architecture
sponsored by Intel Security
WEBCAST: Advanced attacks bypass blocking and prevention strategies. Implement an adaptive security architecture for protection.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Ten Questions to Ask Your File Gateway Vendor
sponsored by IBM
WEBCAST: Determine if a vendor will increase reliability, reduce security risk, and support rapid growth with these 10 questions.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Rapidly Turn Innovation Into Value With Digitalisation
sponsored by Hewlett-Packard Enterprise
VIDEO: Learn how digitalisation allows AkzoNobel to accelerate innovation and work smarter.
Posted: 30 Jan 2017 | Premiered: 30 Jan 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise

Explore SIEM in the Cloud
sponsored by Splunk
WEBCAST: Explore SIEM in the Cloud
Posted: 08 Nov 2016 | Premiered: Nov 8, 2016

TOPICS:  IT Management
Splunk

Magic Quadrant for Security Information and Event Management
sponsored by Intel Security
WEBCAST: Find out the strengths and cautions for the vendors in Gartner's SIEM Magic Quadrant.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Discover a Cost-Effective Alternative to Traditional Storage
sponsored by IBM
WEBCAST: Are you challenged by storing large volumes of unstructured data? Look past traditional solutions for a new approach.
Posted: 06 Sep 2016 | Premiered: Sep 6, 2016

TOPICS:  IT Management
IBM

Minimize Risk and Strengthen Compliance in Data Exchange
sponsored by IBM
WEBCAST: Are your files secured and reliable? Overcome security and compliance concerns with managed file transfer technology.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM

Staying Out of the Next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn how to build an effective data protection solution to reduce leakage risk and comply with regulatory demands.
Posted: 25 Oct 2016 | Premiered: 25 Oct 2016

TOPICS:  IT Management
Intel Security

Scalable and Sustainable Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to evolve your endpoint security to outsmart attackers, respond faster and drive efficiency.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement