Vertical Industries  >   Information Industry  >  

Optical Networking Industry

RSS Feed    Add to Google    Add to My Yahoo!
Optical Networking Industry Multimedia (View All Report Types)
 
BPM 101: What Is Business Performance Management and What Are the Benefits?
sponsored by SearchCRM
WEBCAST: This webcast will show you how to quantify BPM ROI and build the business case. It will also look at ways to leverage your existing systems to produce BPM benefits.
Posted: 20 Nov 2005 | Premiered: May 4, 2005

SearchCRM

Introducing MicroStrategy Mobile: Supporting the Data Needs of a Mobile Workforce
sponsored by MicroStrategy Incorporated
WEBCAST: Attend this Webcast to learn new ways you can interact with all of your business intelligence (BI) applications. Create an exciting new user interface that delivers BI information directly to your mobile devices.
Posted: 24 Oct 2007 | Premiered: Nov 15, 2007, 15:00 EST (20:00 GMT)

MicroStrategy Incorporated

Tablets, Touch Screen Technology Making Inroads in Health IT
sponsored by Intel
VIDEO: This 2-minute video highlights some of the more significant trends in health IT today. Within, learn how touch-screen technology and tablet devices are changing the face of health care, allowing caregivers and patients to encounter a much richer, more interactive – and, ultimately, better overall – experience.
Posted: 14 Jun 2012 | Premiered: 14 Jun 2012

Intel

Seize the power of connected intelligence
sponsored by Hewlett-Packard Limited
WEBCAST: This brief webcast demonstrates how with connected intelligence, IT leaders will be able to proactively manage information related risk, enhance customer experiences, optimize business performance, and discover new market opportunities.
Posted: 07 Sep 2012 | Premiered: Sep 7, 2012

Hewlett-Packard Limited

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

IBM Information On Demand Virtual 2010
sponsored by IBM
WEBCAST: Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.
Posted: 22 Nov 2010 | Premiered: Dec 15, 2010, 13:00 EST (18:00 GMT)

IBM

Ron and Vaughn Healthcare
sponsored by Pure Storage
WEBCAST: Tune in to this webcast now to learn how you can solve your storage performance issues by implementing this all-flash storage array that provides consistent, seamless uptime and an incredible user experience.
Posted: 25 Jun 2015 | Premiered: Jun 25, 2015

Pure Storage

Impact of Using Flash in Your EHR Environment
sponsored by Pure Storage
WEBCAST: Access this webcast to view the different stages of where flash storage was used in healthcare.
Posted: 25 Jun 2015 | Premiered: Jun 25, 2015

Pure Storage

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Secure Access to Sensitive Data on the Move
sponsored by HID
VIDEO: This short video introduces HID Global's ActivID® authentication solutions, which incorporate integrated device identification technology to make location- and risk-based decisions.
Posted: 21 Oct 2014 | Premiered: 21 Oct 2014

HID

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Simplify Your HIT Needs
sponsored by Commvault
VIDEO: Learn about a leading data management solution that will enable you to protect, access and manage healthcare data simply.
Posted: 10 Sep 2014 | Premiered: 19 Dec 2013

Commvault

Temple University Health System Customer Testimonial
sponsored by Commvault
VIDEO: This video details how Temple Univeristy Health improved its storage and backup methods.
Posted: 10 Dec 2014 | Premiered: 23 Jun 2013

Commvault

Control Storage Costs, Mitigate Risks and Align Performance Requirements With Storage Performance Validation
sponsored by Load DynamiX
VIDEO: This video introduces storage performance validation, a combined software and hardware solution for storage workload modeling and load generation that empowers IT organizations to control storage costs, mitigate risks and align performance requirements to purchase decisions.
Posted: 28 May 2015 | Premiered: 28 May 2015

Load DynamiX

Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST: This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015

Absolute Software

Healthcare turns to Big Data Projects
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: In this classroom, glean knowledge on applications bandwidth, security techniques and techniques for improving cellular networks.
Posted: 14 May 2014 | Premiered: 20 May 2014

SearchHealthIT.com

Using Technology to Address the High Velocity of Change in Healthcare
sponsored by Compressus
WEBCAST: High velocity change within healthcare brought on by consolidation, need to contain costs, demand for high quality care, and the desire for more personalized care has driven healthcare executives to embrace innovative technology solutions. Find out what they are and how to use them in the following webcast.
Posted: 23 Feb 2015 | Premiered: Feb 23, 2015

Compressus

Archive: The Real Killer App
sponsored by Commvault
WEBCAST: Businesses use many applications every day, but one is used most frequently – email. This expert webcast explains how to conquer these challenges using email archiving.
Posted: 31 Dec 2014 | Premiered: Oct 24, 2014

Commvault

The 5 Levels of IT Service Optimization Maturity
sponsored by TeamQuest Corporation
WEBCAST: This webcast explores the 5 levels of IT service optimization maturity and how that affects business outcomes.
Posted: 16 Jun 2015 | Premiered: Jun 16, 2015

TeamQuest Corporation

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

The Importance of Integrating Printing/Imaging Into Your IT Security Strategy
sponsored by Hewlett-Packard Limited
WEBCAST: This exclusive webcast dives into some of the toughest challenges with print and imaging security.  Read on to learn more.
Posted: 27 Jan 2015 | Premiered: Jan 27, 2015

Hewlett-Packard Limited

Security Operations Center (SOC) Essentials for the SME
sponsored by AlienVault
WEBCAST: Watch this webcast to develop a greater understanding about SOC and the benefits small and medium enterprises can gain from it.
Posted: 16 Jun 2014 | Premiered: Jun 16, 2014

AlienVault

Dell Mobility Solutions Part 3
sponsored by Dell, Inc. and Intel®
VIRTUAL ENVIRONMENT: Watch to learn about these innovative offerings, including about the various members of the Dell Venue series family designed for use in educational settings.
Posted: 20 Apr 2015 | Premiered: 20 Apr 2015

Dell, Inc. and Intel®

Helping United Soar to New Heights
sponsored by Hewlett-Packard Company
WEBCAST: View this short webcast to see how United Airlines benefited from a flexible data center solution that ensured constant availability, as well as the scalability to meet their ever-changing environment needs.
Posted: 02 Jan 2014 | Premiered: Jan 2, 2014

Hewlett-Packard Company

Explore Security Solutions in a Virtual Environment
sponsored by Hewlett-Packard Limited
VIRTUAL ENVIRONMENT: This informative virtual environment addresses how your organization can approach security with the same agility you apply to business. Videos, case studies, data sheets and more will help you understand how to best stay ahead of the breach.
Posted: 12 Feb 2014 | Premiered: 12 Feb 2014

Hewlett-Packard Limited

Security Predictions for 2015
sponsored by SilverSky
WEBCAST: This webcast takes a look at the top security incidents and breaches over the past year and predicts how the cybersecurity landscape will develop for 2015.
Posted: 30 Jun 2015 | Premiered: Dec 11, 2014

SilverSky

Case Study: Nestle Nespresso Values Real-Time Security Intelligence from HP
sponsored by Hewlett-Packard Limited
VIDEO: This quick video explores who one of your peers turns to for security and threat intelligence which enables them to better protect their organization's and clients' most valuable assets.
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Limited

Search Security University: Cyber Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Join this SearchSecurity.com University for best practices on what do to about cyber threats against your business and how to be proactive in the face of creative and evolving adversaries.
Posted: 14 Aug 2013 | Premiered: 15 Aug 2013

SearchSecurity.com

Cost effective cloud backup and recovery model
sponsored by Asigra
WEBCAST: There's been a lot of talk about the recently launched Recovery License Model (RLM), but how does it work?  What does it mean to someone in the backup and recovery industry?
Posted: 11 Aug 2014 | Premiered: Dec 2, 2013

Asigra
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement