Vertical Industries  >   Consumer Packaged Goods Industry  >   Consumer Electronics Industry  >  

Gaming Devices Industry

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Devices Industry Multimedia (View All Report Types)
Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010


Success in the Digital Banking Revolution: How to Securely Go Mobile
sponsored by HID
WEBCAST: In the first part of this two-part webcast, Christy Serrato, in Solutions Marketing at HID Global, addresses the challenges organizations face in the new era of digital banking, as well as discusses the barriers to mobile banking adoption, including coping with outdated legacy software integration.
Posted: 24 Aug 2015 | Premiered: Aug 24, 2015


Next-Level Authentication: Intelligent Location-Based Strategies
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014


Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

How awareness computing is changing healthcare IT
sponsored by Aventura
VIDEO: Access this video to learn how custom desktops can improve speed of access and security at the point of care, and allow clinicians to spend more time with their patients.
Posted: 28 Aug 2015 | Premiered: 30 Apr 2015


Multifactor Authentication Security School
sponsored by
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015


Archive: The Real Killer App
sponsored by Commvault
WEBCAST: Businesses use many applications every day, but one is used most frequently – email. This expert webcast explains how to conquer these challenges using email archiving.
Posted: 31 Dec 2014 | Premiered: Oct 24, 2014


Healthcare turns to Big Data Projects
sponsored by
VIRTUAL ENVIRONMENT: In this classroom, glean knowledge on applications bandwidth, security techniques and techniques for improving cellular networks.
Posted: 14 May 2014 | Premiered: 20 May 2014

Case Study: Klinikum Wels-Grieskirchen Improves their Storage
sponsored by Hitachi Data Systems
VIDEO: Tune in to this video and learn how CIO Elmar Flamme enabled one prominent Austrian healthcare organization with a highly accessible, secure and long-term archiving strategy.
Posted: 29 Sep 2015 | Premiered: 13 Oct 2010

Hitachi Data Systems

Imprivata OneSign Streamlines Workflows at Augusta Health
sponsored by Imprivata
VIDEO: This brief video explores how Augusta Health leveraged a single sign on technology to increase care providers' efficiency while also improving the protection of patients' confidential information.
Posted: 10 Apr 2014 | Premiered: 24 Jun 2013


Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Game of Phones: Which Device Will Rule EMM for All?
sponsored by IBM
WEBCAST: This webcast shows how the top EMM operating system contenders stack up: iOS, Android, and Windows. Click here to see which OS overcomes its competitors in the battle for EMM supremacy.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015


How to Enable Mobile Productivity with Limited IT Resources
sponsored by BlackBerry
WEBCAST: Access this webcast now to learn how you can enjoy affordable mobile device management capable of providing easy app deployment, shared network storage, and security you can trust.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015


How to Delivery Cutting Edge Productivity via Mobility
sponsored by Dimension Data
WEBCAST: Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

Dimension Data

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Security University: New network security architecture
sponsored by
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

Using Big Data and Behavioral Analytics to Enhance Cybersecurity
sponsored by Splunk
WEBCAST: Demetrios Lazarikos, IT security strategist and thought leader, addresses the growing importance of data security in enterprise, financial and healthcare industries. Demetrios also highlights how behavioral analytics, in combination with big data tools, can be used by IT security personnel to establish alerts and enhance security.
Posted: 01 Sep 2015 | Premiered: Jan 18, 2014


Search Security University: Cyber Security
sponsored by
VIRTUAL ENVIRONMENT: Join this University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

How Beth Israel Ensures That Information Is Where It's Needed, When It's Needed
sponsored by Commvault
VIDEO: Access this video to learn how a storage solution enables a hospital to manage the entire lifecycle of their data, making it secure, compliant, and accessible as needed.
Posted: 10 Nov 2014 | Premiered: 22 Feb 2013


The future of cloud backup and recovery with AWS and NetApp roundtable with LIVE Q&A
sponsored by NetApp
WEBCAST: In this panel discussion, George Crump, Lead Analyst at Storage Switzerland leads a team of industry experts from both NetApp and AWS in an open dialogue around leveraging cloud service providers, in tandem with local storage, as part of a comprehensive backup and archiving strategy.
Posted: 20 May 2015 | Premiered: May 27, 2015, 09:00 EDT (13:00 GMT)


Q&A: The Future of Cloud Backup and Recovery with AWS and NetApp
sponsored by NetApp
WEBCAST: In this panel discussion, George Crump, Lead Analyst at Storage Switzerland facilitates a discussion with industry experts from both NetApp and Amazon Web Services (AWS) in an open dialogue around  leveraging cloud service providers, in tandem with local storage, as part of a comprehensive backup and archiving strategy.
Posted: 29 Jun 2015 | Premiered: May 27, 2015


Exploring the Power of Hybrid Storage Technology
sponsored by Nimble Storage
VIDEO: This video discusses a game-changing storage technology that combines flash technology, high-capacity disks, and multi-core, multi-threaded computing in order to deliver efficient and affordable storage. Watch to see how this technology can improve your backup and recovery systems as well as your enterprise's overall storage performance.
Posted: 06 Apr 2015 | Premiered: 08 Aug 2012

Nimble Storage

Application Solutions for Hybrid Cloud: Vendor Overview
sponsored by IBM
WEBCAST: This webcast highlights a new method of running traditional enterprise applications using a hybrid cloud, and enables users to quickly and securely complete development tasks off- and on-premises. View now to learn how reusable patterns are making it possible to easily extend enterprise applications to the cloud.
Posted: 15 Sep 2015 | Premiered: Jul 2, 2014


Commvault Edge™ Mobile App Demo: Sharing on the Go
sponsored by Commvault
VIDEO: Check out this brief webcast to find out how this mobile app can help you take your work anywhere.
Posted: 06 Feb 2014 | Premiered: 29 Jul 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement