IT Agents  >   Research Institutes and Consortia  >  

FIRST

RSS Feed    Add to Google    Add to My Yahoo!
FIRST Multimedia (View All Report Types)
 
Cloud First Mobile First – Introducing Enterprise Mobility as a Service
sponsored by Dimension Data
VIDEO: This exclusive video details a way to enable your organization to adopt a more user-centric approach in addressing the needs of today's mobile workforce. View now to learn more.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

Dimension Data

Inside Look: First 100% VMware Powered Hyperconverged Infrastructure Appliance
sponsored by VMware
VIDEO: This video reveals the first 100% VMware powered hyperconverged infrastructure appliance (HCIA)—offering you a transformational end-to-end user experience.
Posted: 01 Jul 2015 | Premiered: 01 Jul 2015

VMware

End-to-end demonstration of Mobile Quality Assurance for Bluemix & MobileFirst Quality Assurance
sponsored by IBM
WEBCAST: Access this video to see how easy it is to set up Mobile Quality Assurance on Bluemix, IBM's premiere open-standards, cloud based platform.
Posted: 28 May 2015 | Premiered: May 28, 2015

IBM

The Mobile Collaborator’s Guide to Wasting Time and Sapping Productivity
sponsored by BlackBerry
WEBCAST: In this webcast, you'll learn how to bypass the headaches of mobile meeting solutions to start taking advantage of a simple, intuitive approach that is built for mobile first.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

BlackBerry

JBoss Platform vs. WebSphere Liberty Profile Comparison
sponsored by Red Hat
WEBCAST: At first glance, many developers may see a strong similarity between the IBM WebSphere Liberty Profile and the Red Hat® JBoss® Enterprise Application Platform. But should you really be making that parallel? Find out in this informative webcast, where you'll get a side-by-side comparison of the two tools.
Posted: 03 Dec 2013 | Premiered: Apr 12, 2013

Red Hat

The Day after Tomorrow: Cyber-Crisis Management at the Speed of Twitter
sponsored by Hewlett-Packard Limited
WEBCAST: In this video, security expert Andrzej Kawalec explores how to create an efficient cybercrime response plan for fast threat mitigation and for protection of your company's reputation.
Posted: 01 Jul 2015 | Premiered: Jun 4, 2015

Hewlett-Packard Limited

Podcast: BI Roundtable Part 1: Cloud BI
sponsored by IBM
PODCAST: In this podcast, discover the pros, cons, and strategies of three trending BI technologies. Press "play" and discover what's new for emerging BI capabilities, such as self-service and the cloud.
Posted: 24 Jun 2015 | Premiered: Jun 11, 2015

IBM

Dimension Data and Department of PM&C G20 Case Study
sponsored by Dimension Data
VIDEO: In this case study, find out how the cloud was used to deliver a secure networking and virtual desktop to keep world leaders and media seamlessly connected, as well as ensure significant cost savings from the event.
Posted: 10 Jun 2015 | Premiered: 25 May 2015

Dimension Data

CMIO and CEO Views on Healthcare Transformation
sponsored by InterSystems Corporation
VIDEO: This brief video provides CMIO and CEO perspectives on various challenges within the healthcare sector. Join Wayne Fellmeth of Hunterdon Healthcare, and others, to gain insights and strategies into patient engagement, population health, and more.
Posted: 02 Jul 2015 | Premiered: 30 Apr 2015

InterSystems Corporation

EVO:RAIL General Overview
sponsored by VMware
VIDEO: Watch this video to learn how EVORAIL can help transform your growing business by making your software defined infrastructure simple, predictable, scalable and reliable.
Posted: 30 Jun 2015 | Premiered: 30 Jun 2015

VMware

Compare features: JBoss App Platform and Oracle Weblogic
sponsored by Red Hat
WEBCAST: The Red Hat® JBoss® Enterprise Application Platform and the Oracle Weblogic Enterprise Application Server have many things in common. So if you're finding it difficult to choose between JBoss and Oracle Weblogic, access this informative webcast to learn key differences between the two tools, especially when it comes to individual features.
Posted: 02 Dec 2013 | Premiered: Apr 9, 2013

Red Hat

Master the Mobile User Experience Classroom
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This classroom will detail methods for understanding what needs to be created to meet demand of your target mobile audience , how to continuously improve your mobile application to improve the customer experience (CX) and how to approach the mobile application development process.
Posted: 23 Feb 2015 | Premiered: 11 Feb 2015

SearchCIO.com

Top 5 Strategies for Building a Successful Cloud
sponsored by IBM
WEBCAST: This 58-minute webcast outlines 5 considerations you need to know in order to build your cloud.
Posted: 13 Jul 2015 | Premiered: Jul 13, 2015

IBM

Targeted Attacks: 6 Keys for Fighting Back
sponsored by Hewlett-Packard Company
WEBCAST: Target, Sony, Anthem - the biggest recent breaches have taught us that no one is safe from advanced or targeted malware attacks, and that traditional security solutions have become ineffective. In this webinar, discover the 6 key steps to fighting advanced malware and make sure your organization isn't the next big breach.
Posted: 13 May 2015 | Premiered: Mar 31, 2015

Hewlett-Packard Company

ING DIRECT Zero Touch Case Study
sponsored by Dimension Data
VIDEO: In this video, learn how banking giant ING Direct - a wholly online bank - was able to speed up the automation of services rollout without affecting the customer experience.
Posted: 02 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Unseen Challenges in Protecting Corporate Credentials
sponsored by IBM
WEBCAST: Tune in to this critical webinar to hear Eve Maler, Principal Analyst at Forrester Research, Inc., and Trusteer's Christopher Beier expose the common mistakes that cause corporate credential breaches, and explain how you can better fortify your employee's credentials against these attacks.
Posted: 01 Aug 2014 | Premiered: Mar 13, 2014

IBM

Load & Performance Testing at the Speed of Agile: Best Practices & Automation Tips
sponsored by Neotys
WEBCAST: View this webinar to hear about best practices and key steps for testing the performance of your applications in an Agile environment.
Posted: 05 May 2015 | Premiered: May 5, 2015

Neotys

From business process management to business outcomes classroom
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: This Classroom will outline the forces, such as digitization, cloud and mobile, that are changing core customer-facing business processes and how CIOs are optimizing BPM for better customer interaction and business outcomes.
Posted: 08 Jun 2015 | Premiered: 08 Jun 2015

SearchCIO.com

Harmonize File Sharing in Your Mac/Windows Environment
sponsored by Acronis
TRIAL SOFTWARE: Start your trial download for a file-and-print sharing tool today and mitigate protocol issues, performance, and compatibility problems. Discover three main benefits for Mac users in a Windows environment.
Posted: 29 May 2015 | Premiered: 29 May 2015

Acronis

Testing Mobile Applications in the Wild featuring Scott Barber
sponsored by Neotys
WEBCAST: Watch this webinar to hear about best practices and key steps for testing the performance of your mobile applications "in the wild."
Posted: 06 May 2015 | Premiered: May 6, 2015

Neotys

Storage and Networking for Desktop Virtualization Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: Virtual desktops are a key step between server and app virtualization, and rising mobile technologies and cloud computing. But virtual desktop infrastructure poses challenges in the form of demands on networks and storage. We examine the best practices, product features and risks associated with storage and networking for desktop virtualization.
Posted: 03 Sep 2014 | Premiered: 03 Sep 2014

IBM

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Software Development University: App Modernization and transformation
sponsored by SearchSOA.com
VIRTUAL ENVIRONMENT: Software architects, CTOs and business leaders see their legacy systems failing to meet the connectivity and integration demands of mobile, cloud and other Web applications. This university provides insight on connecting app modernization to business transformation.
Posted: 19 Mar 2014 | Premiered: 19 Mar 2014

SearchSOA.com

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement