Hardware  >   Electronic Components  >  

Media Access Controllers

RSS Feed    Add to Google    Add to My Yahoo!
Media Access Controllers Multimedia (View All Report Types)
 
Video: A Closer Look at Next-Generation Microprocessing
sponsored by Oracle Corporation UK Ltd
VIDEO: Access this informative video to learn how Oracle is improving customer experience and analytics with a next-generation microprocessor. Watch now to learn about the features of this technology.
Posted: 20 Feb 2015 | Premiered: 05 Nov 2014

Oracle Corporation UK Ltd

Virtualization & Networking - What's New with Dell 12th Generation PowerEdge Servers?
sponsored by Dell, Inc. and Intel®
VIDEO: This brief video explores key server purchasing criteria for your virtual environment. Discover a recommended hardware offering that optimizes memory utilization, reduces latency, and eliminates I/O bottlenecks here.
Posted: 26 Jul 2012 | Premiered: 09 Mar 2012

Dell, Inc. and Intel®

Overview of SAP Solutions on the HP Windows Integrity Platform
sponsored by Hewlett-Packard Company
WEBCAST: Attend this Webcast to learn about the advantages of combining SAP and your Windows platform and the steps you can take to ensure a successful upgrade in your organization.
Posted: 06 Dec 2006 | Premiered: Dec 13, 2006, 14:00 EST (19:00 GMT)

Hewlett-Packard Company

Oracle TimesTen In-Memory Database
sponsored by Oracle Corporation
WEBCAST: In this 40 minute webcast, listen to Oracle's Marie-Anne Neimat introduce the Oracle TimesTen In-Memory Database. Learn why people use in-memory database (it's all about low latency) and how this technology can accelerate existing Oracle Database applications as well as new applications.
Posted: 04 Nov 2010 | Premiered: Nov 4, 2010

Oracle Corporation

Increase security and ROI: The benefits of Intel vPro technology
sponsored by Intel
PRODUCT DEMO: Significantly improve your company’s IT security and ROI with the all new 2010 Intel® Core™ vPro™ processor family.
Posted: 28 Apr 2010 | Premiered: 28 Apr 2010

Intel

Improve Datacenter Efficiency by Refreshing Sun SPARC/Solaris Servers
sponsored by Oracle Corporation
WEBCAST: Oracle's Tom Atwood, Senior Principal Product Director and Gary Combs, SPARC Specialist discuss how you can refresh legacy systems onto the latest server technology and take advantage of virtualization techniques to help you build an efficient, agile datacenter.
Posted: 11 Mar 2011 | Premiered: Mar 11, 2011

Oracle Corporation

Oracle's New Powerful and Integrated X86 Systems
sponsored by Oracle Corporation
WEBCAST: View our Launch Webcast to learn more about Oracle's new comprehensive line of powerful x86 systems ranging from blades and rackmount servers to networking systems based on Intel's Xeon 5600 and 7500 processors. 
Posted: 13 Apr 2011 | Premiered: Apr 12, 2011

Oracle Corporation

BP Turns to Fujitsu for Technology Upgrade
sponsored by Cisco & Fujitsu
VIDEO: Find which vendor BP selected to ensure a seamless transition to their new operating system.
Posted: 20 Oct 2014 | Premiered: 11 Feb 2014

Cisco & Fujitsu

Overcoming the Modern Challenges to Corporate Records Management
sponsored by Iron Mountain
PODCAST: In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends.
Posted: 20 Sep 2012 | Premiered: Aug 30, 2012

Iron Mountain

Network Evolution University: Cloud Networking - Designing the Hybrid Cloud
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom clarifies what it means to build a private cloud. Specifically, it discusses what it means for the network supporting a cloud environment -- the key characteristics of the cloud and of the network that powers it.
Posted: 20 May 2013 | Premiered: 22 May 2013

SearchNetworking.com

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

The 4 IAM Focal Points
sponsored by IBM
WEBCAST: In this webcast, you will uncover the four focal points of IAM.
Posted: 02 Mar 2015 | Premiered: May 23, 2014

IBM

Managing BYOD Endpoint Security Classroom
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School from SearchSecurity.com breaks down the challenges of enterprise mobility and provides guidance for developing an over-arching security strategy that mitigates the issues inherent to BYOD.
Posted: 22 May 2013 | Premiered: 22 May 2013

SearchSecurity.com

The Need for a New Approach to Provisioning
sponsored by RSA
VIDEO: This video explains the crucial need to handle risk appropriately when dealing with access control.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA

Dynamic User Authentication with SecureAuth Norse and IDC
sponsored by SecureAuth
WEBCAST: In this webcast, hear from several experts as they discuss how dynamic user authentication can prevent unwanted access.
Posted: 27 Oct 2014 | Premiered: Oct 27, 2014

SecureAuth

The Current State of Identity and Access Management
sponsored by RSA
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA

How ObserveIT Helped AIG to Pioneer a User-Centric Security Strategy
sponsored by ObserveIT
WEBCAST: This webcast describes how global insurance company AIG benefited from a user activity monitoring solution from Observe IT.
Posted: 28 Oct 2014 | Premiered: Oct 28, 2014

ObserveIT

Preventing Insider Threats in Real-Time
sponsored by IBM
WEBCAST: Access this webcast to learn about a security identity management platform to help you thwart insider threats by tracking the users.
Posted: 27 Feb 2015 | Premiered: Jun 16, 2014

IBM

Show Me Simpana--Protect Your Data with Simpana 10
sponsored by CommVault
WEBCAST: Watch this short video to learn how one data protection platform introduces unprecedented capabilities to address snapshot management, reportingAccess from mobile devices, and more.
Posted: 03 Sep 2014 | Premiered: Jul 25, 2013

CommVault

Cloudmark Security Platform for DNS
sponsored by Cloudmark
PRODUCT DEMO: If you suspect that your DNS has been compromised, use this DNS analysis page from Cloudmark to send them a traffic sample for complimentary analysis—the first step to take along the path to proven security success.
Posted: 16 Feb 2015 | Premiered: 16 Feb 2015

Cloudmark

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

Profiling an Enigma: What We Know About North Korea's Cyber Warfare Capabilities
sponsored by Hewlett-Packard Company
PODCAST: This podcast takes a look at what is known about North Korea's cyber warfare programs, and how the country maintains such secrecy in these matters.
Posted: 16 Feb 2015 | Premiered: Oct 29, 2014

Hewlett-Packard Company

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

Webcast -The Business Value of Creating Exceptional Digital Experiences-Findings from IDC
sponsored by IBM
WEBCAST: Tune into the following webcast to hear from Melissa Webster, Program Vice President of Content and Digital Media Technologies for IDC and Anthony Fiorot, WW Portals and Digital Experience Solution Sales Leader for IBM Software Group as they review the findings of IDC's recent analytical report on delivering exceptional customer experiences.
Posted: 16 Sep 2014 | Premiered: Sep 16, 2014

IBM

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WEBCAST: In this webcast, discover several top use cases for application virtualization, complete with real world customer examples. Additionally, learn about common business challenges facing the industry today.
Posted: 27 Mar 2015 | Premiered: Mar 27, 2015

Citrix

Seagate NAS and NAS Pro Video
sponsored by Seagate Technology
VIDEO: This video takes a close look at the NAS and NAS Pro solutions from Seagate, two NAS offerings that have been designed to be more intuitive, reliable and customizable.
Posted: 20 Mar 2015 | Premiered: 20 Mar 2015

Seagate Technology

The Major Differences Between Scale-up and Scale-out Storage
sponsored by SearchStorage.com
VIDEO: In this video, storage consultant and senior strategist Randy Kerns differentiates between scale-up and scale-out storage, focusing on how scale-out options like NAS can help organizations increase capacity while simultaneously scaling for performance.
Posted: 15 Aug 2014 | Premiered: 14 Aug 2014

SearchStorage.com

Video: Flash Storage Platform Introduction
sponsored by Violin Memory
VIDEO: Access this brief video to learn about a platform that allows you to manage complex flash solutions from a single place. Read on to discover the platform's many benefits.
Posted: 04 Mar 2015 | Premiered: 17 Feb 2015

Violin Memory

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Setting Security Policies for Enterprises With Diverse Endpoints
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Enterprise desktop admins have taken on the influx of new devices. In addition to bring your own desktop policies, other endpoint management practices and technologies have emerged to help IT keep control over sensitive data and corporate systems.
Posted: 25 Sep 2012 | Premiered: 26 Sep 2012


Create a Business Case for Better Security
sponsored by FireEye
VIRTUAL TRADESHOW: The white paper presents tips for creating a persuasive business case for better security investment.
Posted: 30 Mar 2015 | Premiered: Dec 31, 2014

FireEye

Do you have a DevOps Command Center?
sponsored by Vistara
VIDEO: Today's IT environment is continuously changing and it can be difficult for businesses to keep up. Watch this video for a demo of a DevOps Command Center that breaks down the barriers between Dev, Ops and business teams to deliver more measurable business results.
Posted: 17 Feb 2015 | Premiered: 02 Feb 2015

Vistara

MAC Spoofing Webinar: Learn to Protect Yourself from Data Breaches
sponsored by Great Bay
WEBCAST: In this webinar, you will learn the top 3 challenges to securing your network from MAC spoofing, a popular way for hackers to attack your data, and how to overcome them.
Posted: 27 Mar 2015 | Premiered: Mar 2, 2015

Great Bay

Price, Performance and Enterprise Features for Direct-Attached Storage Database Application
sponsored by Dell, Inc. and SanDisk®
PODCAST: Join Dell and SanDisk and go "under the hood" to learn how SanDisk DAS Cache on new Dell PowerEdge Servers can deliver an incredible combination of price, performance and enterprise features for your direct-attached storage database applications.
Posted: 14 Nov 2014 | Premiered: Nov 7, 2014

Dell, Inc. and SanDisk®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement