Vertical Industries  >   Consumer Packaged Goods Industry  >   Consumer Electronics Industry  >  

Gaming Devices Industry

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Devices Industry Multimedia (View All Report Types)
 
Analyst Perspective: The Maturing MSP Market
sponsored by Commvault
VIDEO: In this brief webcast, analyst Tim Harmon discusses the maturing managed service provider (MSP) market and the need for advanced service capabilities that focus on specific vertical industries. Watch now to see how you can reap the benefits of trusting and dependent customers with a more specialized, valued service.
Posted: 19 Apr 2016 | Premiered: 08 Feb 2016

Commvault

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Ergon Energy Automates its Field-Based Operations with Rugged Tablets
sponsored by Panasonic
VIDEO: Leading electricity distributor and retailer Ergon Energy needed to launch a major field operations automation project. Learn how they rolled out 500 rugged tablets that support field-based electricity workers in harsh environments.
Posted: 25 May 2016 | Premiered: 20 May 2015

Panasonic

The Role of Storage and VDI in Healthcare
sponsored by Pure Storage
WEBCAST: Tune in to this webcast now to learn how to overcome the challenges of implementing desktop virtualization in your healthcare organization, providing your clinicians with faster, more secure access to stored patient information.
Posted: 25 Jun 2015 | Premiered: Jun 25, 2015

Pure Storage

Impact of Using Flash Storage in Your EHR Environment
sponsored by Pure Storage
WEBCAST: This webcast chronicles how all-flash storage was able to greatly improve the performance of one medical center's sluggish EHR and VDI environments. Access now to learn about different use cases for flash storage, and how to identify the technology that is right for your organization.
Posted: 25 Jun 2015 | Premiered: Jun 25, 2015

Pure Storage

Can Secure Text Messaging Improve Communications Efficiency in Healthcare?
sponsored by Imprivata
WEBCAST: Healthcare IT leaders discuss the value of secure text messaging as an alternative to pagers to improve communications efficiency and provider productivity. View now to learn how you can leverage texting to eliminate inefficiencies and accelerate patient care.
Posted: 28 Mar 2016 | Premiered: Jul 9, 2014

Imprivata

How the Next Generation of Flash Storage is Changing the Economics Of SaaS Businesses
sponsored by Kaminario
WEBCAST: In this webinar hear from two industry experts as they speak about how flash technology is enabling businesses to vastly improve their SaaS services.
Posted: 11 Mar 2016 | Premiered: Mar 8, 2016

Kaminario

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

IBM Spectrum Virtualize Encryption Capability: Part of a Larger SDS 'Whole'
sponsored by IBM
VIDEO: In this video, Mark Peters, an analyst at ESG, discusses a software-defined storage solution that places encryption in the storage management layer to provide maximum ease and value across an entire storage ecosystem. Watch now to learn how you can improve your data security capabilities.
Posted: 09 Mar 2016 | Premiered: 19 Oct 2015

IBM

Methodist Health System’s Success with e-Prescribing of Controlled Substances
sponsored by Imprivata
WEBCAST: In this brief webcast, explore how Methodist Health System of Omaha, Nebraska, leverages fingerprint biometric authentication to enable EPCS.
Posted: 08 Jun 2015 | Premiered: Jun 3, 2015

Imprivata

Augusta Health Streamlines Clinical Workflow with Increased Data Security
sponsored by Imprivata
VIDEO: This brief video explores how Augusta Health leveraged a single sign-on technology to make it easier for physicians to use technology in the clinical workflow, while also improving the protection of confidential patient information.
Posted: 10 Apr 2014 | Premiered: 24 Jun 2013

Imprivata

Healthcare turns to Big Data Projects
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: In this classroom, glean knowledge on applications bandwidth, security techniques and techniques for improving cellular networks.
Posted: 14 May 2014 | Premiered: 20 May 2014

SearchHealthIT.com

Healthcare Content Management: Eliminate Data Silos
sponsored by Lexmark Healthcare
VIDEO: Discover how to give your clinicians complete access to patient information within your EHR by eliminating silos and uniting content across the healthcare organization, delivering consistent viewing experience across devices, and more.
Posted: 16 Jun 2016 | Premiered: 16 Jun 2016

Lexmark Healthcare

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

Hybrid IT Framework Accelerates Data Center Performance with the Right Mix
sponsored by Hewlett Packard Enterprise
VIDEO: Watch this webcast as Craig Partridge, Director for Data Center Platform Consulting at HPE, demonstrates how to determine the right mix of IT provisioning in your enterprise, and handle today's digital device disruption.
Posted: 05 Jul 2016 | Premiered: 25 Apr 2016

Hewlett Packard Enterprise

How to Delivery Cutting Edge Productivity via Mobility
sponsored by Dimension Data
WEBCAST: Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

Dimension Data

Segmentation Beyond VLANs, Subnets, and Zones
sponsored by Illumio
WEBCAST: Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

2016 Prediction in Cybercrime
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to get a glimpse into what cybercrime will look like in the coming year.
Posted: 20 Jan 2016 | Premiered: 16 Dec 2015

WatchGuard Technologies, Inc.

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Securing Agile IT: Common Pitfalls, Best Practices and Surprises
sponsored by CloudPassage
WEBCAST: Discover not only what you need to know about the various incarnations of the cloud as it relates to security, but also how you should be looking at modern security in general such as security as a "secondary layer", removing layers from the bottom up, reducing attack surface, and more.
Posted: 18 Jul 2016 | Premiered: Jun 23, 2016

CloudPassage

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Customer Story: Implementing Mobility in the Workplace
sponsored by Citrix
VIDEO: Learn how one of the largest healthcare systems in the United States implemented an efficient, secure mobile strategy by choosing the right tools – and discover how you can apply these best practices to your own organization, regardless of industry.
Posted: 13 May 2016 | Premiered: 08 Oct 2013

Citrix

The Path to Becoming a Mobile Enterprise: API-Led Connectivity
sponsored by MuleSoft
WEBCAST: In this webcast, you'll gain access to an expert discussion on the opportunities that mobile can bring to your enterprise, as well as the biggest roadblocks that companies face on the journey to successful mobile delivery.
Posted: 03 Nov 2015 | Premiered: Feb 26, 2015

MuleSoft

Enabling Multi-speed IT Transformation and Moving Beyond Java EE7
sponsored by IBM
WEBCAST: In this webcast, representatives from WebSphere Application Server discuss ways you can keep up with innovation in this cloud- and mobile-driven economy. Learn how to provide additional front-line decision making, derive crucial insights from nontraditional data, and make the most of an API economy.
Posted: 07 Jul 2016 | Premiered: Dec 31, 2015

IBM

Strengthening Cybersecurity at the Tour de France
sponsored by Dimension Data
WEBCAST: Discover how Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Learn how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.
Posted: 05 Jul 2016 | Premiered: Feb 29, 2016

Dimension Data

The Truth About Cybersecurity: Attackers Exploit People, Not Just Systems
sponsored by Verizon
VIDEO: Cyber attackers don't just target your systems—they target your people, and the valuable data they have at their fingertips. Lift the lid on what's really happening in cybersecurity: Discover how to outsmart attackers who are bound to exploit not just your systems, but your people, too.
Posted: 06 Jul 2016 | Premiered: 29 Apr 2016

Verizon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement