Vertical Industries  >   Consumer Packaged Goods Industry  >   Consumer Electronics Industry  >  

Gaming Devices Industry

RSS Feed    Add to Google    Add to My Yahoo!
Gaming Devices Industry Multimedia (View All Report Types)
 
Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Impact of Using Flash in Your EHR Environment
sponsored by Pure Storage
WEBCAST: Access this webcast to view the different stages of where flash storage was used in healthcare.
Posted: 25 Jun 2015 | Premiered: Jun 25, 2015

Pure Storage

Ron and Vaughn Healthcare
sponsored by Pure Storage
WEBCAST: Tune in to this webcast now to learn how you can solve your storage performance issues by implementing this all-flash storage array that provides consistent, seamless uptime and an incredible user experience.
Posted: 25 Jun 2015 | Premiered: Jun 25, 2015

Pure Storage

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

When Data Breaches Don't Have To Be Reported
sponsored by Absolute Software
WEBCAST: Join Jeff Pelot, CIO at Denver Health, for a QA&A session on data security in healthcare organizations, how to stay on top of regulations, remain compliant, and how to prove that patient data on mobile devices is not at risk.
Posted: 04 May 2015 | Premiered: Feb 18, 2015

Absolute Software

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Archive: The Real Killer App
sponsored by Commvault
WEBCAST: Businesses use many applications every day, but one is used most frequently – email. This expert webcast explains how to conquer these challenges using email archiving.
Posted: 31 Dec 2014 | Premiered: Oct 24, 2014

Commvault

Control Storage Costs, Mitigate Risks and Align Performance Requirements With Storage Performance Validation
sponsored by Load DynamiX
VIDEO: This video introduces storage performance validation, a combined software and hardware solution for storage workload modeling and load generation that empowers IT organizations to control storage costs, mitigate risks and align performance requirements to purchase decisions.
Posted: 28 May 2015 | Premiered: 28 May 2015

Load DynamiX

Healthcare turns to Big Data Projects
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: In this classroom, glean knowledge on applications bandwidth, security techniques and techniques for improving cellular networks.
Posted: 14 May 2014 | Premiered: 20 May 2014

SearchHealthIT.com

Hospital La Fe Uses Vworkspace to Improve Security and It Maintenance
sponsored by Dell, Inc.
VIDEO: Access this brief video to see one healthcare organization's journey through administering their virtual desktops with a software solution that deploys and manages desktop virtualization and VDI technologies. Find out how they were able to simplify and automate the management of their VDI while increasing security and easing mobility.
Posted: 20 Mar 2015 | Premiered: 09 Feb 2015

Dell, Inc.

Imprivata OneSign Streamlines Workflows at Augusta Health
sponsored by Imprivata
VIDEO: This brief video explores how Augusta Health leveraged a single sign on technology to increase care providers' efficiency while also improving the protection of patients' confidential information.
Posted: 10 Apr 2014 | Premiered: 24 Jun 2013

Imprivata

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

SIEM Optimization: Ensuring Compliance and Security
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: This video is an in-depth, indexed demonstration of LogRhythm's award-winning SIEM 2.0 Security Intelligence Platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

9 Ways to Secure Your Store Systems and Ensure PCI Compliance
sponsored by Bit9 + Carbon Black
WEBCAST: This brief whiteboard video presents 9 best practices to securing store systems to comply with PCI standards.
Posted: 18 Jun 2015 | Premiered: Nov 9, 2012

Bit9 + Carbon Black

MDM in Minutes
sponsored by IBM
VIDEO: Learn all the ins-and-outs of one industry-leading mobile device management platform.
Posted: 04 Sep 2014 | Premiered: 04 Sep 2014

IBM

How to Enable Mobile Productivity with Limited IT Resources
sponsored by BlackBerry
WEBCAST: Access this webcast now to learn how you can enjoy affordable mobile device management capable of providing easy app deployment, shared network storage, and security you can trust.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

BlackBerry

How to Delivery Cutting Edge Productivity via Mobility
sponsored by Dimension Data
WEBCAST: Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

Dimension Data

Dell Mobility Solutions Part 3
sponsored by Dell, Inc. and Intel®
VIRTUAL ENVIRONMENT: Watch to learn about these innovative offerings, including about the various members of the Dell Venue series family designed for use in educational settings.
Posted: 20 Apr 2015 | Premiered: 20 Apr 2015

Dell, Inc. and Intel®

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Matrix42 MyWorkspace: Easy for IT. Easy for Users.
sponsored by Matrix42
WEBCAST: Watch this webcast to learn about a unified workspace portal that makes it easy to integrate SaaS and web applications into your organization's existing IT infrastructure. It enables the management of access to apps, corporate documents, devices, and users IDs from a single, secure web-based environment.
Posted: 11 Jun 2015 | Premiered: Jun 11, 2015

Matrix42

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

The Importance of Integrating Printing/Imaging Into Your IT Security Strategy
sponsored by Hewlett-Packard Limited
WEBCAST: This exclusive webcast dives into some of the toughest challenges with print and imaging security.  Read on to learn more.
Posted: 27 Jan 2015 | Premiered: Jan 27, 2015

Hewlett-Packard Limited

The future of cloud backup and recovery with AWS and NetApp roundtable with LIVE Q&A
sponsored by NetApp
WEBCAST: In this panel discussion, George Crump, Lead Analyst at Storage Switzerland leads a team of industry experts from both NetApp and AWS in an open dialogue around leveraging cloud service providers, in tandem with local storage, as part of a comprehensive backup and archiving strategy.
Posted: 20 May 2015 | Premiered: May 27, 2015, 09:00 EDT (13:00 GMT)

NetApp

Crafting the Business Case for Better Security
sponsored by FireEye
VIRTUAL TRADESHOW: This paper provides step-by-step instructions on how to craft a clear and persuasive business case for advanced security.
Posted: 30 Mar 2015 | Premiered: Dec 31, 2014

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement