Hardware  >   Electronic Components  >   Integrated Circuits  >   Memory  >   Volatile Memory  >  

Rambus Dynamic Random Access Memory

RSS Feed    Add to Google    Add to My Yahoo!
Rambus Dynamic Random Access MemoryMultimedia (View All Report Types)
 
The Path to HANA
sponsored by Violin Memory
WEBCAST: Watch this webcast to learn how to gain access to all your data from one data base in real time every time. This video provides many reasons why this platform is the most beneficial: easy setup and maintenance, dramatic decrease in total cost of ownership, consistently optimized, and more.
Posted: 07 Jul 2014 | Premiered: Jun 4, 2014

Violin Memory

Unlock possibilities with IBM MessageSight
sponsored by IBM
WEBCAST: Check out this brief video to learn about a way to connect sensors and mobile devices safely, securely, and conveniently to the cloud. You'll learn about a new full-featured messaging appliance that connects customer apps and front office systems with back office systems, delivering the performance and simplicity needed for the mobile world.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

IBM

Webcast: OGL improves desktop performance with a little help from HP
sponsored by Citrix and HP
WEBCAST: Watch this brief webcast to discover the key features of HP's newest converged infrastructure, which has enabled OGL to lower TCO, speed up the return on investment and more.
Posted: 11 Apr 2014 | Premiered: Dec 9, 2013

Citrix and HP

Expert Integrated Systems: Can you put expertise in a box?
sponsored by IBM
PODCAST: Can you package expertise? More and more IT executives are adopting a new approach that makes it easier, faster and less expensive to deploy infrastructure and applications by integrating hardware, software and field-tested "patterns of expertise" in the form of expert integrated systems. Find out more.
Posted: 19 Mar 2013 | Premiered: Mar 18, 2013

IBM

Overcoming the Modern Challenges to Corporate Records Management
sponsored by Iron Mountain
PODCAST: In this podcast, Forrester's principle analyst Brian Hill provides advice to overcome records management obstacles and discusses the latest solution trends.
Posted: 20 Sep 2012 | Premiered: Aug 30, 2012

Iron Mountain

Virtualization & Networking - What's New with Dell 12th Generation PowerEdge Servers?
sponsored by Dell, Inc. and IntelĀ®
VIDEO: This brief video explores key server purchasing criteria for your virtual environment. Discover a recommended hardware offering that optimizes memory utilization, reduces latency, and eliminates I/O bottlenecks here.
Posted: 26 Jul 2012 | Premiered: 09 Mar 2012

Dell, Inc. and IntelĀ®

VA vs. Watts; Demystifying Sizing and Ratings
sponsored by Eaton Corporation
WEBCAST: This brief on-demand webcast describes the difference between volt-amperes (VA) and watts, and explains how differentiating between the two is critical in helping you correctly size your UPS.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Eaton Corporation

The CIO Perspective on Intel vPro Technology
sponsored by Intel
VIDEO: Gerry Weaver, CIO of the State of Indiana, and Diane Bryant, CIO of Intel, talk about how Intel vPro technology helps address end-user and IT efficiencies in their environments. The CIOs discuss real ROI numbers from Intel vPro technology, including savings of $1 million or more.
Posted: 29 Apr 2010 | Premiered: 11 Jan 2010

Intel

Optimizing for the Cloud with Data Center Virtualization
sponsored by Brocade
WEBCAST: Is your data center ready for cloud computing? Access this resource to learn how you can optimize your infrastructure for the cloud with data center virtualization. Inside, discover how virtualization can make cloud computing a reality, learn how to solve the network bottleneck with more than just hardware, and more.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Brocade

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
sponsored by Wave Systems Corp.
VIDEOCAST: Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement