Hardware  >   Electronic Components  >   Discrete Component Interconnection  >   Buses  >  

Peripheral Component Interconnect

RSS Feed    Add to Google    Add to My Yahoo!
Peripheral Component InterconnectMultimedia (View All Report Types)
 
Best Practices for Database Security and Compliance
sponsored by Guardium, an IBM Company
WEBCAST: Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
Posted: 31 Jan 2008 | Premiered: Feb 13, 2008, 14:00 EST (19:00 GMT)

Guardium, an IBM Company

Podcast: Why SSL Security Matters
sponsored by Thawte Inc.
PODCAST: Download this podcast for an overview of Secure Sockets Layer, why you should use it, and what you need to do to defend yourself against common SSL attacks.
Posted: 04 Feb 2013 | Premiered: Feb 4, 2013

Thawte Inc.

M3800 vs Macbook Pro
sponsored by Dell, Inc.
VIDEO: This quick video pits the Dell Precision M3800 against the Apple MacBook pro, comparing the features such as boot times, screen resolution, video rendering speeds, interface capabilities, and more.
Posted: 09 Apr 2014 | Premiered: 19 Dec 2013

Dell, Inc.

The State of the i
sponsored by Connectria Hosting
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria Hosting

Increase security and ROI: The benefits of Intel vPro technology
sponsored by Intel
PRODUCT DEMO: Significantly improve your company’s IT security and ROI with the all new 2010 Intel® Core™ vPro™ processor family.
Posted: 28 Apr 2010 | Premiered: 28 Apr 2010

Intel

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
sponsored by Wave Systems Corp.
VIDEOCAST: Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.

VA vs. Watts; Demystifying Sizing and Ratings
sponsored by Eaton Corporation
WEBCAST: This brief on-demand webcast describes the difference between volt-amperes (VA) and watts, and explains how differentiating between the two is critical in helping you correctly size your UPS.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Eaton Corporation

What is Intel Core vPro Technology
sponsored by Intel
VIDEO: This short video examines a hardware-assisted approach to PC management. Find out more about this technique and how it can help you properly manage your desktop environment, regardless of system states.
Posted: 15 Jun 2012 | Premiered: 15 Jun 2012

Intel

Consolidate resources with IBM Virtualization
sponsored by IBM
VIDEO: This video describes how making the transition from physical to virtual resources with IBM Virtualization has the potential for significant savings.
Posted: 19 May 2011 | Premiered: 08 Apr 2010

IBM

The CIO Perspective on Intel vPro Technology
sponsored by Intel
VIDEO: Gerry Weaver, CIO of the State of Indiana, and Diane Bryant, CIO of Intel, talk about how Intel vPro technology helps address end-user and IT efficiencies in their environments. The CIOs discuss real ROI numbers from Intel vPro technology, including savings of $1 million or more.
Posted: 29 Apr 2010 | Premiered: 11 Jan 2010

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement