Vertical Industries  >  

Internet Travel Industry

RSS Feed    Add to Google    Add to My Yahoo!
Internet Travel Industry Multimedia (View All Report Types)
 
Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Case Study: The Yield Transforms Australian Agriculture with IoT
sponsored by Microsoft
VIDEO: Tune into this case study as The Yield demonstrates how they transform agriculture decision-making by delivering the data they garner with IoT strategies to industry regulators for fast and informed decisions. Discover how to leverage IoT in the field to turn usable information into real-time actionable insight.
Posted: 05 Dec 2016 | Premiered: 15 Nov 2016

Microsoft

Enabling Industry 4.0 Through Intel and Advantech IoT Solutions
sponsored by Intel
VIDEO: Tune into this webinar to enable industry 4.0 with a three-layer IoT architecture that will collect and analyze massive volumes of raw data to enable manufacturers to reach new levels of factory automation and streamline development.
Posted: 07 Nov 2016 | Premiered: 12 Oct 2016

Intel

Gatwick Airport Drives Security Efficiency with SIM Cloud Platform
sponsored by Splunk
WEBCAST: Discover how Gatwick Airport utilized the cloud to drive secure operational efficiency and gain a real-time view of the performance of terminals and the airfield. Learn how to utilize the cloud to soar to success with superior and secure business performance.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Splunk

Rapid Deployment of T-Systems’ Strategic Modular Data Center
sponsored by Emerson
VIDEO: In this concise time-lapse video, see first-hand, the modular solution for rapidly deploying a new strategic data center for cloud services. Raúl Saura, head of Dynamic Platform Services at T-Systems Iberia, tells you more about the process and his partnership with the construction of the new data center.
Posted: 14 Sep 2016 | Premiered: 27 Jan 2015

Emerson

Top 3 Cybersecurity Challenges Facing Healthcare Organizations
sponsored by Arctic Wolf Networks, Inc.
VIDEO: Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation.
Posted: 23 Nov 2016 | Premiered: 30 Jun 2016

Arctic Wolf Networks, Inc.

Report: The 5 Use Cases and 14 Critical Capabilities of a BI and Analytics Platform
sponsored by Intel
WEBCAST: Future-proof your IoT strategy. Learn how to simplify IoT device management with a set of platforms which will provide seamless security and performance for intelligence at the edge—as well as point of sale (POS) devices for retail—enabling real-time analysis and tighter, more efficient process controls.
Posted: 05 Oct 2016 | Premiered: Jul 13, 2016

Intel

How the HC380 is Changing the Hyper-Converged Market
sponsored by NTT ICT
VIDEO: This video dives into one particular hyper-converged system and examines how it's changing the market unlike any other system in the field. View now and learn what the hyper-converged market holds in the future.
Posted: 06 Sep 2016 | Premiered: 16 Mar 2016

NTT ICT

Building Engaging Content Experiences: A CIO Webinar
sponsored by Box
WEBCAST: Discover in this webinar how to build engaging content experiences in your custom apps, as Mike Schwartz, Platform Product Marketing at Box, will help you reimagine your enterprise content sharing. Tune in now to learn about content PaaS, and boost user experience engagement while overcoming compliance obstacles.
Posted: 25 Apr 2016 | Premiered: Apr 25, 2016

Box

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

EMC DSSD Rack-Scale Flash Overview
sponsored by Dell EMC
VIDEO: Next-gen applications that take advantage of today's data growth are often too intensive for existing storage architectures. This video details a new storage platform that overcomes the limitations of direct-attached PCIe flash and all flash arrays by connecting ultra-fast, shared flash to rack-servers using the lowest latency protocols.
Posted: 21 Sep 2016 | Premiered: 29 Feb 2016

Dell EMC

Microsoft Case Study - Webjet
sponsored by Microsoft
VIDEO: This video focuses on the successful partnership Webjet has had with Microsoft, and how it has helped Webjet help deal with reconciliation of transactions across multiple partners in order to reduce the chances of a negative customer experience. The solution allows the IT staff to focus on the customer experience rather than account disputes.
Posted: 05 Dec 2016 | Premiered: 15 Nov 2016

Microsoft

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault

How Multi-Vendor DNS Can Protect Your Internet Presence
sponsored by Dyn
WEBCAST: This webinar discusses the October 2016 DDoS Attack and the value of a secondary DNS strategy for resilience within your infrastructure.
Posted: 07 Dec 2016 | Premiered: Oct 26, 2016

Dyn

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks

Threat Summary: Top 2016 Cyber Risks
sponsored by Proofpoint, Inc.
WEBCAST: Discover more about the top cyber risks we faced in 2016. Uncover threats, trends and transformations we saw in the security marketplace and receive future recommendations based on actionable intelligence.
Posted: 11 Nov 2016 | Premiered: Oct 31, 2016

Proofpoint, Inc.

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Maximize the Benefits of Containers and Meet Cloud Challenges Head-on
sponsored by Red Hat
VIDEO: In this webcast, industry analyst Dave Bartoletti discusses how enterprises are using containers today and examines a broad range of relevant app use cases. Tune in now to learn more about the challenges of container adoption and discover for which workloads containers are best used.
Posted: 13 Jul 2016 | Premiered: 24 Apr 2015

Red Hat

See How the Miami Marlins Protects Sensitive Scouting and Operation Documents
sponsored by Citrix
WEBCAST: Watch this webcast to find out how the Miami Marlins benefit from data management technology. Learn how the Marlins easily and securely share data on any device, anywhere.
Posted: 30 Aug 2016 | Premiered: Jul 22, 2016

Citrix

Sharing Enterprise Content Beyond the Firewall
sponsored by IntraLinks, Inc
WEBCAST: Regardless of industry or business process, nearly everything now involves the sharing of content with external business partners. Access this webinar to learn how to ensure secure inter-enterprise collaboration, explore the security and cost challenges of sharing beyond your firewall, and more.
Posted: 06 Oct 2016 | Premiered: Oct 6, 2016

IntraLinks, Inc

Achieving the Highest Compute Potential from IoT Devices
sponsored by Intel
VIDEO: Watch this on-demand webinar to learn how to enhance traditional thin client platforms to meet cross-industry market demands for highly available IoT device performance. Additionally, discover how to improve IT operational efficiencies and create a richer customer experience by leveraging advanced remote IoT management.
Posted: 06 Oct 2016 | Premiered: 10 Aug 2016

Intel

Optimize Your IT Infrastructure with Hyper-Convergence
sponsored by Pivot3
VIDEO: Outdated, legacy architectures simply can't deliver the performance necessary to run the high-demand apps your business relies on. Learn how you can use hyper-convergence to achieve better capacity utilization, higher compute efficiency, lower IT costs, and more.
Posted: 17 Jun 2016 | Premiered: 17 Jun 2016

Pivot3

Leveraging Network Building Blocks and Industrial Ethernet Architectures
sponsored by Panduit
VIDEO: This webcast reveals the advantages of using network building blocks based on industrial Ethernet architectures to simplify and secure industrial Ethernet deployment, a trend driven by the Industrial Internet of Things.
Posted: 05 Oct 2016 | Premiered: 28 Sep 2016

Panduit
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement