Vertical Industries  >   Information Industry  >   Telecommunications Industry  >  

Wireless Network Industry

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Network Industry Multimedia (View All Report Types)
 
Introducing MicroStrategy Mobile: Supporting the Data Needs of a Mobile Workforce
sponsored by MicroStrategy Incorporated
WEBCAST: Attend this Webcast to learn new ways you can interact with all of your business intelligence (BI) applications. Create an exciting new user interface that delivers BI information directly to your mobile devices.
Posted: 24 Oct 2007 | Premiered: Nov 15, 2007, 15:00 EST (20:00 GMT)

MicroStrategy Incorporated

Tablets, Touch Screen Technology Making Inroads in Health IT
sponsored by Intel
VIDEO: This 2-minute video highlights some of the more significant trends in health IT today. Within, learn how touch-screen technology and tablet devices are changing the face of health care, allowing caregivers and patients to encounter a much richer, more interactive – and, ultimately, better overall – experience.
Posted: 14 Jun 2012 | Premiered: 14 Jun 2012

Intel

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

IBM Information On Demand Virtual 2010
sponsored by IBM
WEBCAST: Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.
Posted: 22 Nov 2010 | Premiered: Dec 15, 2010, 13:00 EST (18:00 GMT)

IBM

Case Study: Turn Big Data and Analytics into Big Results
sponsored by IBM
VIDEO: In this video, C Spire's brand platforms and analytics manager Justin Croft illustrates his company's success with business analytics. Discover your own success with these tools when you learn how to be effective with customer insights.
Posted: 03 Aug 2015 | Premiered: 03 Aug 2015

IBM

Mobile Devices, Cloud Apps, and the Digital Workplace
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast explores the impact of mobile devices and cloud apps have on your organization, your network, and the security pros charged with safeguarding it all. There will be a special emphasis on vertical industries such as retail and education, plus a deep dive into healthcare.
Posted: 26 Aug 2016 | Premiered: Aug 19, 2016

Hewlett Packard Enterprise

Mobile Risks: What's Keeping CISOs up at Night
sponsored by Lookout
WEBCAST: With the rise of BYOD policies, malicious actors crave what unsecure mobile devices can unlock for them, making them a primary enterprise target. Learn what can be done to secure your employees' mobile devices and more.
Posted: 30 Mar 2017 | Premiered: Mar 30, 2017

Lookout

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Tech ONTAP Podcast: Technical Rundown of NetApp's HCI
sponsored by NetApp
PODCAST: By tuning into this podcast, you'll hear an in-depth discussion of the technical features of NetApp's hyper-converged infrastructure. Listen in now as Derek Leslie—Principal Product Manager for NetApp HCI—and Gabriel Chapman—Sr. Manager HCI GTM—discuss how HCI simplifies the provisioning of virtual assets, and which workloads it best suits.
Posted: 14 Aug 2017 | Premiered: Jun 5, 2017

NetApp

Choosing the Right Hyper-Converged Solution for Your Branch Offices
sponsored by StorMagic
WEBCAST: In this webinar, learn how the high flexibility and resiliency of hyper-converged infrastructure could help remediate the storage problems posed by branch offices. Then tune in to discover an offering that can give you a single neutral host for thousands of instances, and more.
Posted: 27 Sep 2017 | Premiered: Aug 21, 2017

StorMagic

Case Study: University of Kansas Hospital's Security Team Fights Ransomware
sponsored by Cisco Umbrella
VIDEO: In this video, Henry Duong, Infrastructure Security Manager at University of Kansas Hospital, explains how his team fights ransomware and keep patients and researchers secure.
Posted: 07 Feb 2017 | Premiered: 27 Oct 2016

Cisco Umbrella

The Move to All-Flash at the University of Kansas Health Systems
sponsored by Pure Storage + Cisco
WEBCAST: Discover how the University of Kansas Health System was able to meet and surpass the requirements for Epic's Honor Roll by eliminating storage as a performance bottleneck.
Posted: 05 Jul 2017 | Premiered: Jul 5, 2017

Pure Storage + Cisco

Mobility-as-a-Service, A way better way webinar
sponsored by Sprint
VIDEO: 'Mobility-as-a-Service' is an easier and more affordable way to give your people the tech they need. Hear from Nemertes Research and Sprint in this webinar.
Posted: 13 Jun 2017 | Premiered: 12 Jun 2017

Sprint

What's Driving Ransomware Attacks and How Should You Respond?
sponsored by Cisco Umbrella
WEBCAST: VP of Research at Gartner and leading authority on endpoint and server protection strategies, Peter Firstbrook, and Cisco Umbrella's CTO, Dan Hubbard, address the explosion of ransomware in the market and the simplest way for security practitioners to stay ahead of these attacks in this webcast.
Posted: 30 May 2017 | Premiered: Dec 30, 2016

Cisco Umbrella

Building and Instrumenting the Next Generation SOC
sponsored by LogRhythm, Inc.
WEBCAST: Chris Petersen, co-founder & CTO of LogRhythm, and Roselle Safran, co-founder & CEO of Uplevel Security, discuss best practices for building and staffing today's SOC for maximum effectiveness.
Posted: 13 Apr 2017 | Premiered: Apr 13, 2017

LogRhythm, Inc.

Interview: The Growing Security Concerns of Industrial IoT
sponsored by Bayshore Networks
WEBCAST: In this interview, industry experts Sid Snitkin and Francis Cianfrocca discuss the emerging importance of cybersecurity for industrial IoT.
Posted: 26 May 2017 | Premiered: Mar 8, 2017

Bayshore Networks

Mobile Identity Authentication: Today's Take on Trusted Identity
sponsored by HID Global
VIDEO: Organizations that rely on their mobile workforces need to rest easy knowing that the trusted identities their people are using are secure and accessible. Watch this webcast to gain insight into how mobile identity is evolving in the face of today's threat landscape.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017

Check Point Software Technologies Ltd.

How to Use Endpoint Analytics to Mitigate Ransomware Damage
sponsored by Splunk
WEBCAST: Watch this tutorial on how you can prevent and mitigate the effects of advanced malware like ransomware. See how endpoint analytics can detect anomalies hidden in command scripts, and stop ransomware attacks at their source.
Posted: 07 Sep 2017 | Premiered: Sep 14, 2017

Splunk

The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST: Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.
Posted: 16 Oct 2017 | Premiered: May 16, 2016, 01:03 EDT (05:03 GMT)

Check Point Software Technologies Ltd.

Going Beyond Basic IAM: Protecting Identities with a Risk-Based Approach
sponsored by HID Global
VIDEO: This brief video explores two-factor authentication(2FA) to enhance IAM strategies.
Posted: 12 Jun 2015 | Premiered: 31 May 2013

HID Global

Top Trends Impacting IAM
sponsored by Simeio
WEBCAST: Watch this webcast to learn how to 'win' in cybersecurity as well as prepare for the future of identity and access management.
Posted: 15 Sep 2017 | Premiered: Sep 14, 2017

Simeio

Webinar: Cost-Effectively Replacing F5 Load Balancers
sponsored by Array Networks
WEBCAST: Are your load balancers due for a refresh? If so, view this F5 replacement Webinar, which includes a demo of Array Networks ADC features and capabilities. Learn how to meet your load balancing (ADC) requirements for literally half what you would pay with F5.
Posted: 17 Jul 2017 | Premiered: Jul 21, 2016

Array Networks

Bring Your Organization Into The Digital Future
sponsored by Indeni
WEBCAST: To keep performance high, organizations need to proactively identify network issues before they occur. Learn how you can automate deep-level device inspection to enable productivity, supplement IT operations with knowledge from industry experts, and reduce human error and escalations with automated troubleshooting.
Posted: 24 Jul 2017 | Premiered: Jun 8, 2017


Mobility Purchasing: OpEx vs CapEx for Mobility
sponsored by Sprint
PODCAST: Zeus Kerravala discusses mobility budgets and how 'as-a-Service models' can better address these challenges now and in the future.
Posted: 12 Jun 2017 | Premiered: Jun 12, 2017

Sprint

3-Fold Approach and Best Practices to Cyber Security
sponsored by Citrix
WEBCAST: 71 percent of organizations say that there is risk from their inability to control employees' devices and apps. Download this webcast to discover a 3 fold approach to security that secures data and apps across any device, network and cloud.
Posted: 15 Nov 2017 | Premiered: Nov 15, 2017

Citrix

How UTHealth Medical Center Handles Data
sponsored by Virtual Instruments
WEBCAST: As the world's largest medical center, UTHealth needs to operate efficiently and effectively to meet very high standards. Take 5 minutes to find out how UTHealth's IT department ensures that its clients have access to the data they need without compromising sensitive patient data.
Posted: 19 Jul 2017 | Premiered: Jun 15, 2017

Virtual Instruments

5 Steps to the Perfect Storage Refresh: An Independent Process for Refreshing Storage
sponsored by Virtual Instruments
VIDEO: Today's rapid storage refresh cycle can lead to a myriad of problems, and skyrocketing costs. Inside, learn 5 steps to perfecting the refresh cycle, as well as explore the importance of workload analysis as a part of this cycle.
Posted: 05 Sep 2017 | Premiered: 10 Aug 2017

Virtual Instruments

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement