Hardware  >   Electronic Components  >  

Media Access Controllers

RSS Feed    Add to Google    Add to My Yahoo!
Media Access Controllers Multimedia (View All Report Types)
 
Announcing a Breakthrough Processor: Software in Silicon
sponsored by Oracle Corporation
VIDEO: In this webinar, John Fowler, Executive Vice President of Systems at Oracle, will introduce to you the all-new family of M7 Systems built on the new 32-core, 256-thread SPARC M7 microprocessor. View this video now to understand how to use a broad set of ciphers for all your apps, complete with end-to-end security.
Posted: 12 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Overview of SAP Solutions on the HP Windows Integrity Platform
sponsored by Hewlett Packard Enterprise
WEBCAST: Attend this Webcast to learn about the advantages of combining SAP and your Windows platform and the steps you can take to ensure a successful upgrade in your organization.
Posted: 06 Dec 2006 | Premiered: Dec 13, 2006, 14:00 EST (19:00 GMT)

Hewlett Packard Enterprise

Oracle's New Powerful and Integrated X86 Systems
sponsored by Oracle Corporation
WEBCAST: View our Launch Webcast to learn more about Oracle's new comprehensive line of powerful x86 systems ranging from blades and rackmount servers to networking systems based on Intel's Xeon 5600 and 7500 processors. 
Posted: 13 Apr 2011 | Premiered: Apr 12, 2011

Oracle Corporation

Increase security and ROI: The benefits of Intel vPro technology
sponsored by Intel
PRODUCT DEMO: Significantly improve your company’s IT security and ROI with the all new 2010 Intel® Core™ vPro™ processor family.
Posted: 28 Apr 2010 | Premiered: 28 Apr 2010

Intel

Virtualization & Networking - What's New with Dell 12th Generation PowerEdge Servers?
sponsored by Dell, Inc. and Intel®
VIDEO: This brief video explores key server purchasing criteria for your virtual environment. Discover a recommended hardware offering that optimizes memory utilization, reduces latency, and eliminates I/O bottlenecks here.
Posted: 26 Jul 2012 | Premiered: 09 Mar 2012

Dell, Inc. and Intel®

Oracle TimesTen In-Memory Database
sponsored by Oracle Corporation
WEBCAST: In this 40 minute webcast, listen to Oracle's Marie-Anne Neimat introduce the Oracle TimesTen In-Memory Database. Learn why people use in-memory database (it's all about low latency) and how this technology can accelerate existing Oracle Database applications as well as new applications.
Posted: 04 Nov 2010 | Premiered: Nov 4, 2010

Oracle Corporation

Improve Datacenter Efficiency by Refreshing Sun SPARC/Solaris Servers
sponsored by Oracle Corporation
WEBCAST: Oracle's Tom Atwood, Senior Principal Product Director and Gary Combs, SPARC Specialist discuss how you can refresh legacy systems onto the latest server technology and take advantage of virtualization techniques to help you build an efficient, agile datacenter.
Posted: 11 Mar 2011 | Premiered: Mar 11, 2011

Oracle Corporation

Jason Nolet Details New Solutions for Enterprise
sponsored by Brocade
VIDEO: This brief video uncovers two new network products that will help you adapt to the demands of new applications and ever-changing business requirements.
Posted: 29 Feb 2012 | Premiered: 21 Oct 2011

Brocade

What is Intel Core vPro Technology
sponsored by Intel
VIDEO: This short video examines a hardware-assisted approach to PC management. Find out more about this technique and how it can help you properly manage your desktop environment, regardless of system states.
Posted: 15 Jun 2012 | Premiered: 15 Jun 2012

Intel

How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015

Mimecast

Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

Secure Centralized Identity and Password Management
sponsored by Dashlane Inc.
WEBCAST: In this webcast, learn how to safely centralize all login credentials for users on their own desktops and mobile devices.
Posted: 07 Dec 2015 | Premiered: Nov 11, 2015

Dashlane Inc.

Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

What to Expect in 2016: Top 5 Predictions for Security and Access Control
sponsored by SecureAuth
WEBCAST: This informative webinar outlines the top 5 identity and access management trends for 2016. Tune in to learn what's on the horizon for IAM and take a closer look at next generation adaptive authentication so that you can stay a step ahead of the bad guys.
Posted: 24 Jan 2016 | Premiered: Jan 24, 2016

SecureAuth

Unisys Case Study
sponsored by SecureAuth
VIDEO: In this video, you will learn about a simple solution to secure your cloud access. Eliminate soft and hard FOB usage and strengthen your security process.
Posted: 21 Jan 2016 | Premiered: 13 Nov 2015

SecureAuth

Security Breaks DevOps: Here's How Fix It
sponsored by CloudPassage
WEBCAST: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 18 Jan 2016 | Premiered: Dec 30, 2015

CloudPassage

Keep Data Safe, No Matter Who Tries to Look at It
sponsored by OptioLabs
VIDEO: This video explores the challenge of keeping prying eyes away from your sensitive data. Take a look and learn how face-recognition software can keep your data safe anywhere your end users work.
Posted: 07 Jan 2016 | Premiered: 07 Jan 2016

OptioLabs

Network Evolution University: Unified Wired and Wireless
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: In this classroom, you'll learn how enterprise network managers can build a unified access layer for wired and wireless LANs, establish unified network infrastructure to meet the needs of both wired and wireless users, and deploy network discovery and troubleshooting capabilities that span both wired and wireless access networks.
Posted: 18 Jul 2013 | Premiered: 22 Jul 2013

SearchNetworking.com

How Face-Recognition Software Can Secure Sensitive Data
sponsored by OptioLabs
VIDEO: Access this brief video to discover how face recognition software can help you ensure that only the end users you trust can view your sensitive data, regardless of who else is in the room.
Posted: 07 Jan 2016 | Premiered: 07 Jan 2016

OptioLabs

Security and Performance in One Cloud Infrastructure
sponsored by Oracle Corporation
VIDEO: This brief video explains how you can build a highly secure cloud infrastructure that offers equally effective performance.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Podcast: Cloud Access Security Brokers: Critical Capabilities
sponsored by BitGlass
PODCAST: This podcast will help you protect your network by providing prospective on the brokers specialized in guarding data over the cloud.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Top Use Cases for App Virtualization
sponsored by Citrix
WEBCAST: In this webcast, discover several top use cases for application virtualization, complete with real world customer examples. Additionally, learn about common business challenges facing the industry today.
Posted: 27 Mar 2015 | Premiered: Mar 27, 2015

Citrix

Kelsey Seybold Clinic Case Study
sponsored by SecureAuth
VIDEO: This case study details how one healthcare company was able to make their ID and access management simpler for on-premise as well as remote users. Tune in to learn how you can make password changes easier for your users, and protect sensitive data from an easy to use, mobile friendly program.
Posted: 22 Jan 2016 | Premiered: 22 Jan 2016

SecureAuth

Speak SMB Security: How You Can Be a Security Thought Leader
sponsored by OpenDNS
WEBCAST: In this webcast, learn best practices for defending against the new crime ecosystem and what SMBs need to do to stay protected. Download now to discover why cybercrime is easier than ever and 3 steps for securing your customers.
Posted: 09 Feb 2016 | Premiered: Dec 18, 2015

OpenDNS

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Reimagining Security: A New Way to Think
sponsored by IBM
VIDEO: Access this brief video to learn about one security platform that offers a multi-layered approach to security. Discover how you can optimize your current investment in IT security, stop advanced threats, protect your critical assets, and safeguard cloud and mobile technology.
Posted: 01 Dec 2015 | Premiered: 07 Apr 2015

IBM

Episode 1: Deploying GRID vGPU on VMWare Horizon
sponsored by NVIDIA/VMware
WEBCAST: Access this webcast to learn how desktop virtualization combined with vGPU improves the delivery of 3D graphics to deliver high-performance graphics workloads to any device, at any time. Explore use cases that require high-performance graphics workloads and discover the differences between three graphics-accelerators.
Posted: 08 Jun 2015 | Premiered: Jun 8, 2015


Episode 2: Vmware Horizon with NVIDIA GRID™ vGPU Deployment & Best Practices
sponsored by NVIDIA/VMware
WEBCAST: Access this webcast to discover the NVIDIA GRID vGPU on VMware Horizon step-by-step deployment guide, best practices, and important tips when deploying this architecture.
Posted: 08 Jun 2015 | Premiered: Jun 8, 2015


Cloud Access Security Brokers: Critical Capabilities
sponsored by BitGlass
WEBCAST: This video will help you protect your network by providing prospective on the brokers specialized in guarding data over the cloud.
Posted: 12 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Cloud Access Security Brokers: Securing Office 365
sponsored by BitGlass
WEBCAST: This webcast contains a description of how you can ensure that your information in Office 365 applications remains secure.
Posted: 12 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

SD-WAN Dynamic Path Control Demo
sponsored by Silver Peak
WEBCAST: Access this short video to learn how you can manage different forms of traffic to balance your networking with an SD-WAN solution.
Posted: 08 Jul 2015 | Premiered: Jun 15, 2015

Silver Peak

Security on the Edge Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom looks at enterprise strategies for network perimeter defense and next-gen models such as network access control, single sign-on, encryption certificates and more.
Posted: 05 May 2015 | Premiered: 04 May 2015

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement