Vertical Industries  >   Information Industry  >   Telecommunications Industry  >  

Wireless Network Industry

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Network Industry Multimedia (View All Report Types)
 
Tablets, Touch Screen Technology Making Inroads in Health IT
sponsored by Intel
VIDEO: This 2-minute video highlights some of the more significant trends in health IT today. Within, learn how touch-screen technology and tablet devices are changing the face of health care, allowing caregivers and patients to encounter a much richer, more interactive – and, ultimately, better overall – experience.
Posted: 14 Jun 2012 | Premiered: 14 Jun 2012

Intel

Introducing MicroStrategy Mobile: Supporting the Data Needs of a Mobile Workforce
sponsored by MicroStrategy Incorporated
WEBCAST: Attend this Webcast to learn new ways you can interact with all of your business intelligence (BI) applications. Create an exciting new user interface that delivers BI information directly to your mobile devices.
Posted: 24 Oct 2007 | Premiered: Nov 15, 2007, 15:00 EST (20:00 GMT)

MicroStrategy Incorporated

BPM 101: What Is Business Performance Management and What Are the Benefits?
sponsored by SearchCRM
WEBCAST: This webcast will show you how to quantify BPM ROI and build the business case. It will also look at ways to leverage your existing systems to produce BPM benefits.
Posted: 20 Nov 2005 | Premiered: May 4, 2005

SearchCRM

IBM Information On Demand Virtual 2010
sponsored by IBM
WEBCAST: Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.
Posted: 22 Nov 2010 | Premiered: Dec 15, 2010, 13:00 EST (18:00 GMT)

IBM

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

How awareness computing is changing healthcare IT
sponsored by Aventura
VIDEO: Access this video to learn how custom desktops can improve speed of access and security at the point of care, and allow clinicians to spend more time with their patients.
Posted: 28 Aug 2015 | Premiered: 30 Apr 2015

Aventura

Point of Sale Insecurity: A Threat to Your Business
sponsored by SurfWatch Labs
WEBCAST: This webcast discusses the risks facing PoS machines and what you can do to make sure yours are secured.
Posted: 13 Jul 2015 | Premiered: Jun 9, 2015

SurfWatch Labs

Case Study: Klinikum Wels-Grieskirchen Improves their Storage
sponsored by Hitachi Data Systems
VIDEO: Tune in to this video and learn how CIO Elmar Flamme enabled one prominent Austrian healthcare organization with a highly accessible, secure and long-term archiving strategy.
Posted: 29 Sep 2015 | Premiered: 13 Oct 2010

Hitachi Data Systems

Data Storage Strategies that Work for Healthcare
sponsored by Hitachi Data Systems
VIDEO: This brief video describes how to consolidate access and share patient data with a single, centralized repository. Learn how this is possible while also reducing IT costs and minimizing risk.
Posted: 24 Sep 2015 | Premiered: 31 Dec 2014

Hitachi Data Systems

Network Evolution University: Unified Wired and Wireless
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: In this classroom, you'll learn how enterprise network managers can build a unified access layer for wired and wireless LANs, establish unified network infrastructure to meet the needs of both wired and wireless users, and deploy network discovery and troubleshooting capabilities that span both wired and wireless access networks.
Posted: 18 Jul 2013 | Premiered: 22 Jul 2013

SearchNetworking.com

Healthcare turns to Big Data Projects
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: In this classroom, glean knowledge on applications bandwidth, security techniques and techniques for improving cellular networks.
Posted: 14 May 2014 | Premiered: 20 May 2014

SearchHealthIT.com

How to Enhance Staff Safety with Location Awareness
sponsored by Ekahau, Inc.
VIDEO: This webinar examines how you can enhance staff and patient safety with data-location awareness strategies.
Posted: 27 Jan 2016 | Premiered: 05 Dec 2014

Ekahau, Inc.

Implement a Smarter RTLS to Ease Active-RFID System Management
sponsored by Ekahau, Inc.
VIDEO: In this brief video, you will learn how healthcare organizations can embrace real-time location systems (RTLS) for equipment and patient tracking, staff safety, temperature monitoring, and more.
Posted: 27 Jan 2016 | Premiered: 19 Oct 2015

Ekahau, Inc.

Analyzing WAN Congestion in UC & Converged Environments
sponsored by NetScout Systems, Inc.
WEBCAST: In this webcast, you will learn how to analyze and mitigate WAN congestion in your UC and converged communications environments via a service platform. View now to access a network application monitoring platform that will allow you to visualize link performance, identify service quality degradation, and more.
Posted: 04 Dec 2015 | Premiered: Dec 4, 2015

NetScout Systems, Inc.

Archive: The Real Killer App
sponsored by Commvault
WEBCAST: Businesses use many applications every day, but one is used most frequently – email. This expert webcast explains how to conquer these challenges using email archiving.
Posted: 31 Dec 2014 | Premiered: Oct 24, 2014

Commvault

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix
PODCAST: In this podcast, you will discover how to expand your business reach and mobilize your enterprise with Citrix mobility and Windows 10. Get the insider's look at how Windows 10 can transform your business, as well as 10 tips to ensure your W10 readiness.
Posted: 17 Nov 2015 | Premiered: Nov 6, 2015

Citrix

Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: Access this webcast to discover how a credit union found the SIEM that met all of its security needs, and to learn how you can follow the same process for your SIEM selection.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Enable Freedom for the Internet of Things with M2M Communications
sponsored by Interoute
WEBCAST: This webcast discusses the evolution of the M2M market and examines how one company was able to become an M2M and IoT services provider. Tune in now to learn how to enable mobile freedom with IoT, as well how to launch a mobile management platform within a cloud infrastructure.
Posted: 17 Nov 2015 | Premiered: Sep 26, 2014

Interoute

Ensuring Compliance and Security in the Enterprise
sponsored by LogRhythm, Inc.
VIRTUAL ENVIRONMENT: Tune into this video to find an in-depth, indexed demonstration of an award-winning security intelligence platform.
Posted: 31 Jul 2014 | Premiered: 29 Jul 2014

LogRhythm, Inc.

A Security Approach to Safeguard the Endpoint Explosion
sponsored by Fortinet, Inc.
VIDEO: 33 billion network connected devices are expected by 2020. Tune into this video to learn new ways to protect your organization against internal and external threats, and uncover a portfolio of strategies to ensure your network is protected.
Posted: 09 Dec 2015 | Premiered: 09 Dec 2015

Fortinet, Inc.

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. View now to learn how becoming a technology partner with Citrix can expand your business reach.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

Enterprise Mobility University: Enterprise BYOD Management
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: This classroom discusses security, application management, authentication, and best practices for developing and implementing a workable BYOD strategy.
Posted: 17 Mar 2014 | Premiered: 13 Mar 2014

SearchMobileComputing

Security University: New network security architecture
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn how to enhance network security by making the right architecture decisions, such as segmenting networks appropriately, limiting the number of unnecessary connections between servers and endpoints and identifying where to apply certain technologies to limit data exfiltration in the event of a breach.
Posted: 28 Feb 2014 | Premiered: 14 Mar 2014

SearchSecurity.com

Empower Your Business Communications with UC and Mobile Workers
sponsored by ShoreTel
WEBCAST: Discover how to unify your enterprise communication technologies—whether for voice, video, or IM—on one management platform for easy service deployment. Tune into this webcast now to learn how to leverage the power of pure IP and promote an accelerated collaborative enterprise environment.
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014

ShoreTel

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Unity EdgeConnect Zero-Touch Deployment
sponsored by Silver Peak
WEBCAST: Watch this brief video to learn how deployment and management of an SD-WAN can be incredibly simple. Learn how you can quickly connect a branch to a broadband, MLS, or a combination of the two in minutes.
Posted: 12 Feb 2016 | Premiered: Dec 31, 2015

Silver Peak

Managing Security Threats in Today's Mobile Enterprise
sponsored by BlackBerry
WEBCAST: This video tackles the issue of mobile security and discusses how, despite the multitude of threats facing mobile devices, you can ensure your enterprise remains secure.
Posted: 14 Jul 2015 | Premiered: Jul 14, 2015

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement