Hardware  >   Peripheral Hardware  >  

SCSI Adapters

RSS Feed    Add to Google    Add to My Yahoo!
SCSI Adapters Multimedia (View All Report Types)
 
Enhance Security with Hardware Based Memory Protection
sponsored by Oracle Corporation
VIDEO: This video discusses a hardware based memory protection system that improves security and reliability and can fit a multitude of different data center designs. Watch now to learn how this memory protection can improve your data center security, reliability, and efficiency.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Announcing a Breakthrough Processor: Software in Silicon
sponsored by Oracle Corporation
VIDEO: In this webinar, John Fowler, Executive Vice President of Systems at Oracle, will introduce to you the all-new family of M7 Systems built on the new 32-core, 256-thread SPARC M7 microprocessor. View this video now to understand how to use a broad set of ciphers for all your apps, complete with end-to-end security.
Posted: 12 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Join Brian Madden as he explores the Dell vWorkspace Clients & User Experience
sponsored by Dell, Inc.
WEBCAST: Access this video to listen to Brian Madden and Gabe Knuth, experts on all things virtualization, talk with Dell representative Kelly Craig about what can be done with vWorkspace in regards to client devices and client configuration. Find out how you can set up vWorkspace on different client devices.
Posted: 03 Jun 2015 | Premiered: Jun 3, 2015

Dell, Inc.

Stop Running Around for IT
sponsored by Dell, Inc. and Intel®
VIDEO: This humorous video shows how one IT guy made his job more efficient with cloud client solutions from Dell, Citrix, and Intel technologies. Watch now and you'll learn how this combination of technologies allowed him to simplify desktop management and improve security capabilities.
Posted: 20 Jan 2016 | Premiered: 20 Jan 2016

Dell, Inc. and Intel®

Consolidate resources with IBM Virtualization
sponsored by IBM
VIDEO: This video describes how making the transition from physical to virtual resources with IBM Virtualization has the potential for significant savings.
Posted: 19 May 2011 | Premiered: 08 Apr 2010

IBM

NCSU - IBM PowerLinux - Industry standard Linux systems, solutions tuned to the task
sponsored by IBM
WEBCAST: This video explores a leading solution delivering industry standard Linux systems services faster, with higher quality, and more economically than others. Learn how it combines a leading hardware, Linux software, and domain expertise of different industries resulting in higher quality operations that keep pace with modern business.
Posted: 20 Oct 2014 | Premiered: Apr 23, 2012

IBM

Introducing Dell 12th Generation PowerEdge Servers
sponsored by Dell, Inc. and Intel®
VIDEO: This short video examines the importance of remote server management, especially as organizations expand globally. Discover new design features that enable you to quickly detect issues, regardless of the physical location of your data center.
Posted: 26 Jul 2012 | Premiered: 05 Mar 2012

Dell, Inc. and Intel®

Take Back Control: OEM Maintenance and Life Cycle Myths Exposed
sponsored by Curvature
VIDEO: Watch this video to learn about upgrade myths and how your organization can take advantage of support and equipment alternatives.
Posted: 28 Apr 2015 | Premiered: 04 Dec 2014

Curvature

Forrester Webinar: Taming the Performance Beast
sponsored by Embarcadero Technologies, Inc.
WEBCAST: Smart strategies and tools for database optimization is critical to reduce costs in complex infrastructures and can help organizations defer hardware upgrades, get more out of existing systems, and improve developer and DBA productivity.
Posted: 26 Apr 2010 | Premiered: Apr 26, 2010

Embarcadero Technologies, Inc.

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
sponsored by Wave Systems Corp.
VIDEOCAST: Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement