Vertical Industries  >  

Transportation Equipment Industry

RSS Feed    Add to Google    Add to My Yahoo!
Transportation Equipment Industry Multimedia (View All Report Types)
 
Helping United Soar to New Heights
sponsored by Hewlett Packard Enterprise
WEBCAST: View this short webcast to see how United Airlines benefited from a flexible data center solution that ensured constant availability, as well as the scalability to meet their ever-changing environment needs.
Posted: 02 Jan 2014 | Premiered: Jan 2, 2014

Hewlett Packard Enterprise

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Mobile Devices, Cloud Apps, and the Digital Workplace
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast explores the impact of mobile devices and cloud apps have on your organization, your network, and the security pros charged with safeguarding it all. There will be a special emphasis on vertical industries such as retail and education, plus a deep dive into healthcare.
Posted: 26 Aug 2016 | Premiered: Aug 19, 2016

Hewlett Packard Enterprise

Top 3 Ways Enterprise Asset Management Can Decrease Your Operating Costs
sponsored by Infor
WEBCAST: There are many business drivers for enterprise asset management (EAM), including reducing production downtime and increasing labor productivity. But do you know what kind of EAM technology is best for your business? Learn how the latest EAM technologies can help you manage and decrease operating costs, while increasing your return on assets.
Posted: 20 Jul 2016 | Premiered: Jul 20, 2016

Infor

Case Study: University of Kansas Hospital's Security Team Fights Ransomware
sponsored by Cisco Umbrella
VIDEO: In this video, Henry Duong, Infrastructure Security Manager at University of Kansas Hospital, explains how his team fights ransomware and keep patients and researchers secure.
Posted: 07 Feb 2017 | Premiered: 27 Oct 2016

Cisco Umbrella

Real- World Examples: ROI- Results
sponsored by HealthEdge
VIDEO: Hear real-world examples of how health insurance companies reduced call center representative training, increased auto-adjudication rates and more.
Posted: 09 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

HealthEdge Advice to Peers: Real-World Examples
sponsored by HealthEdge
VIDEO: Health plan leaders who implemented HealthEdge -- a core administration and care coordination system for transformative health plans – spoke about their experiences.
Posted: 08 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

New Roles and Opportunities for Payers
sponsored by HealthEdge
VIDEO: Learn about the opportunities that payers have with better technology and information systems, and how to bend the cost curve of healthcare while building a loyal relationship with patients along the way.
Posted: 08 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

The Move to All-Flash at the University of Kansas Health Systems
sponsored by Pure Storage + Cisco
WEBCAST: Discover how the University of Kansas Health System was able to meet and surpass the requirements for Epic's Honor Roll by eliminating storage as a performance bottleneck.
Posted: 05 Jul 2017 | Premiered: Jul 5, 2017

Pure Storage + Cisco

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.
Posted: 16 Oct 2017 | Premiered: May 16, 2016, 01:03 EDT (05:03 GMT)

Check Point Software Technologies Ltd.

Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

Data Wars: A New Hope for IT & Security Insights
sponsored by Splunk
WEBCAST: In this webcast, learn how to use Splunk for security investigations and IT troubleshooting. Discover how you can leverage the same data for different use cases, how to share IT and security insights across a simple to use single pane of glass, and more.
Posted: 13 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Security Resilience: Incident Management beyond Ransomware, Zero-Days and even GDPR
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: In this virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com our experts will examine using a more analytic and informed security posture to deal with top-of-mind issues: the growing threat of ransomware and the soon-to-arrive burden of GDPR compliance.
Posted: 09 Oct 2017 | Premiered: 09 Oct 2017

SearchSecurity.com

Proactive Failure Identification
sponsored by Atos
VIDEO: Equipment failure is a major concern for every company, but especially when lives may be on the line. Learn how a major oilfield services company leveraged IoT-enabled devices to proactively identify areas of potential equipment failure and to increase asset reliability and performance, while greatly reducing downtime.
Posted: 03 Nov 2017 | Premiered: 21 Sep 2017

Atos

CW+: Analyst's take: Alfabet PlanningIT reaps rewards for decision makers
sponsored by ComputerWeekly.com
WEBCAST: When organizations adopt Alfabet’s planningIT, decision makers have more knowledge about their operating environments and use this information to leverage existing assets and avoid unnecessary investments in software or development.
Posted: 26 Oct 2011 | Premiered: Jan 10, 2011

ComputerWeekly.com

Is JD Edwards EnterpriseOne Right for Your Business?
sponsored by Oracle Corporation
WEBCAST: View this Webcast to learn why the new transformation of JD Edwards applications can integrate your manufacturing strategies to improve your competitiveness and overall performance.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 12:00 EST (17:00 GMT)

Oracle Corporation

ipMonitor
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Searchnetworking.com 2008 Product Leadership Award Winner, ipMonitor, delivers out-of-the-box availability monitoring ideal for environments with less than 500 network devices.
Posted: 12 Mar 2009 | Premiered: 09 May 2008

SolarWinds, Inc.

IBM PowerExecutive
sponsored by IBM
SOFTWARE DEMO: View this video for a brief presentation on taking charge of power consumption and management in your data center.
Posted: 03 Aug 2007 | Premiered: 01 Aug 2007

IBM

Customer Spotlight: The Journey to Fast EMR Access via VMware View “Follow me” Desktops and Walk-Away Security
sponsored by Imprivata
WEBCAST: Learn about Memorial Healthcare’s latest approach to ensure that its clinicians have fast and secure access to critical patient information. You will learn about secure “follow me” desktops to provide doctors and nurses with patient information at their fingertips - from any workstation or personal device.
Posted: 19 Jan 2011 | Premiered: Jan 27, 2011, 13:00 EST (18:00 GMT)

Imprivata
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement