IT Management  >   Systems Design and Development  >   Architectures  >   Network Architectures  >  

Two-Tier Architectures

RSS Feed    Add to Google    Add to My Yahoo!
Two-Tier Architectures Multimedia (View All Report Types)
 
What if your App Virtualization Solution Didn't Support Client Mics?
sponsored by Dell, Inc. and Intel®
VIDEO: Access this video to discover how the microphone impaired an employee's ability to be heard within a meeting – ultimately causing undesired results. Find out how this could have been avoided by using an application virtualization solution.
Posted: 20 Jan 2015 | Premiered: 20 Jan 2015

Dell, Inc. and Intel®

The Future of the Service Desk Management
sponsored by FrontRange Solutions Inc.
VIDEO: In this video, discover where we will be in 5 years in terms of modern service desk management. Watch now to learn why customers are going to demand an efficient solution in service desk management.
Posted: 22 Jul 2014 | Premiered: 30 Jan 2014

FrontRange Solutions Inc.

HP Client Virtualization at Citrix Synergy LA
sponsored by Citrix and HP
VIDEO: Watch this video for highlights from Citrix Synergy 2013 to learn about several key HP product updates.
Posted: 29 Aug 2013 | Premiered: 23 May 2013

Citrix and HP

Client Virtualization with XenClient: A Podcast with Brian Madden
sponsored by Citrix
PODCAST: In this episode of Brian & Gabe Live, Brian Madden and Gabe Knuth talk with Dan Cote and Pete Downing of Citrix about the latest developments with XenClient.
Posted: 08 Oct 2013 | Premiered: Sep 25, 2013

Citrix

IBM Virtual Client Solution
sponsored by IBM Software Group
SOFTWARE DEMO: Find out how by combining the power of server virtualization with the flexibility of thin client devices, the IBM Virtual Client Solution can help to match end user needs with the right computing resources.
Posted: 28 Nov 2007 | Premiered: 28 Nov 2007

IBM Software Group

Hospitals Deliver a Secure, Mobile Workspace to Their Staff with VDI
sponsored by Dell, Inc.
VIDEO: Inside this video, discover how they implemented a desktop virtualization solution to deliver secure virtual desktops to their clinicians. Find out how this technology enabled easy, rapid login while securing sessions so they could move around and switch to different workstations seamlessly.
Posted: 20 Mar 2015 | Premiered: 20 Feb 2015

Dell, Inc.

Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Transform Your Customer's Network Infrastructure and Amplify Your Profitability
sponsored by Hewlett-Packard Company
WEBCAST: Check out this video to see how HP's Networking Converged Campus offerings can work for your organization.
Posted: 21 Apr 2015 | Premiered: Apr 16, 2015

Hewlett-Packard Company

Governance, Risk, and Compliance for Critical Data Movement
sponsored by IBM
WEBCAST: Join this webinar with experts from Forrester Research to learn about the key trends in GRC. Find out how to develop your lines of defense, learn how to measure your organization's GRC maturity, and get three key tips for developing a successful strategy.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement