Vertical Industries  >   Information Industry  >   Telecommunications Industry  >  

Wireless Network Industry

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Network Industry Multimedia (View All Report Types)
 
Introducing MicroStrategy Mobile: Supporting the Data Needs of a Mobile Workforce
sponsored by MicroStrategy Incorporated
WEBCAST: Attend this Webcast to learn new ways you can interact with all of your business intelligence (BI) applications. Create an exciting new user interface that delivers BI information directly to your mobile devices.
Posted: 24 Oct 2007 | Premiered: Nov 15, 2007, 15:00 EST (20:00 GMT)

MicroStrategy Incorporated

Tablets, Touch Screen Technology Making Inroads in Health IT
sponsored by Intel
VIDEO: This 2-minute video highlights some of the more significant trends in health IT today. Within, learn how touch-screen technology and tablet devices are changing the face of health care, allowing caregivers and patients to encounter a much richer, more interactive – and, ultimately, better overall – experience.
Posted: 14 Jun 2012 | Premiered: 14 Jun 2012

Intel

BPM 101: What Is Business Performance Management and What Are the Benefits?
sponsored by SearchCRM
WEBCAST: This webcast will show you how to quantify BPM ROI and build the business case. It will also look at ways to leverage your existing systems to produce BPM benefits.
Posted: 20 Nov 2005 | Premiered: May 4, 2005

SearchCRM

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

IBM Information On Demand Virtual 2010
sponsored by IBM
WEBCAST: Curious about IBM Information On Demand (IOD) Global Conference 2010 in Las Vegas? Explore the best of the conference, virtually. Learn how to deliver trusted information for greater insight and smarter decisions, and align information and related projects to business goals.
Posted: 22 Nov 2010 | Premiered: Dec 15, 2010, 13:00 EST (18:00 GMT)

IBM

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

The Opportunities and Challenges to Healthcare Innovation
sponsored by Mashery
WEBCAST: Julie Ask, author of The Mobile Mindshift, addresses how healthcare companies can extend their platform via Application Program Interface (APIs) in this webinar. Discover what can be accomplished if the healthcare industry optimizes mobile services.
Posted: 22 Apr 2015 | Premiered: Jun 12, 2014

Mashery

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Protecting Your Organization from DNS Security Threats
sponsored by Cloudmark
WEBCAST: This webinar provides a detailed look at common threats to DNS infrastructure, and how your enterprise can mitigate these threats.
Posted: 26 Jan 2015 | Premiered: Nov 13, 2014

Cloudmark

A New Approach to DNS Security
sponsored by Cloudmark
VIDEO: This short video introduces a security platform that provides comprehensive protection of DNS networks, infrastructure, and traffic without the rigidity and cost of most network security solutions.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Cloudmark

At the Heart of Cardiovascular Care: Leveraging IT to Help Enhance Patient Care
sponsored by GE Healthcare
WEBCAST: In this video, medical experts discuss the role of IT in cardiovascular care as an enabler of medicine in terms of patient management, cost containment, workflow, best practices, and reporting. They address the challenges IT faces as well as their future goals.
Posted: 06 Apr 2015 | Premiered: Feb 25, 2015

GE Healthcare

What You Should Do Today to Protect Endpoint Devices in Healthcare
sponsored by Absolute Software
WEBCAST: With only roughly 50% of healthcare endpoints being secure with encryption, it's obvious that healthcare security pros need to revamp strategies.  View this webcast to take an in-depth look at the current threat landscape for healthcare organizations how to protect endpoint devices using five design principles. Watch now to learn more.
Posted: 04 May 2015 | Premiered: Feb 2, 2015

Absolute Software

When Data Breaches Don't Have To Be Reported
sponsored by Absolute Software
WEBCAST: Join Jeff Pelot, CIO at Denver Health, for a QA&A session on data security in healthcare organizations, how to stay on top of regulations, remain compliant, and how to prove that patient data on mobile devices is not at risk.
Posted: 04 May 2015 | Premiered: Feb 18, 2015

Absolute Software

Dell Mobility Solutions Part 3
sponsored by Dell, Inc. and Intel®
VIRTUAL ENVIRONMENT: Watch to learn about these innovative offerings, including about the various members of the Dell Venue series family designed for use in educational settings.
Posted: 20 Apr 2015 | Premiered: 20 Apr 2015

Dell, Inc. and Intel®

Dell Higher Education Solutions Guide
sponsored by Dell, Inc. and Intel®
VIDEO: Accessing network data from remote locations anywhere is no longer a luxury, but an expectation. End-users expect to not only have the same experience from the network in a mobile setting, but also expect a fast and secure connection.
Posted: 14 Oct 2014 | Premiered: 22 Sep 2014

Dell, Inc. and Intel®

Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
WEBCAST: Find out about data breach trends and statistics, including the cost of a breach and common attack strategies, in this webcast. View now to learn the steps to take to mitigate and respond to a breach.
Posted: 04 May 2015 | Premiered: Jan 22, 2015

Absolute Software

Taking control of the customer experience in retail banking
sponsored by Hewlett-Packard Limited
WEBCAST: This on-demand webcast examines the value of customer-centricity in retail banking, and offers key insights to help you take control of the customer experience.
Posted: 17 Dec 2013 | Premiered: Nov 12, 2013

Hewlett-Packard Limited

Simplify Your HIT Needs
sponsored by Commvault
VIDEO: Learn about a leading data management solution that will enable you to protect, access and manage healthcare data simply.
Posted: 10 Sep 2014 | Premiered: 19 Dec 2013

Commvault

Temple University Health System Customer Testimonial
sponsored by Commvault
VIDEO: This video details how Temple Univeristy Health improved its storage and backup methods.
Posted: 10 Dec 2014 | Premiered: 23 Jun 2013

Commvault

How to Delivery Cutting Edge Productivity via Mobility
sponsored by Dimension Data
WEBCAST: Wanting to provide the best possible learning and university experience for its students and teachers, UWS turned to Dimension Data to help find the right mobility strategy. Teachers and students are now able to engage in learning and teaching anytime, anywhere. View this exclusive webcast to learn more.
Posted: 06 Mar 2015 | Premiered: Mar 6, 2015

Dimension Data

Network Evolution University: Unified Wired and Wireless
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: In this classroom, you'll learn how enterprise network managers can build a unified access layer for wired and wireless LANs, establish unified network infrastructure to meet the needs of both wired and wireless users, and deploy network discovery and troubleshooting capabilities that span both wired and wireless access networks.
Posted: 18 Jul 2013 | Premiered: 22 Jul 2013

SearchNetworking.com

Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST: This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015

Absolute Software

Using Technology to Address the High Velocity of Change in Healthcare
sponsored by Compressus
WEBCAST: High velocity change within healthcare brought on by consolidation, need to contain costs, demand for high quality care, and the desire for more personalized care has driven healthcare executives to embrace innovative technology solutions. Find out what they are and how to use them in the following webcast.
Posted: 23 Feb 2015 | Premiered: Feb 23, 2015

Compressus

Healthcare turns to Big Data Projects
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: In this classroom, glean knowledge on applications bandwidth, security techniques and techniques for improving cellular networks.
Posted: 14 May 2014 | Premiered: 20 May 2014

SearchHealthIT.com

Oklahoma State University Medical Center: CVIS Enhnaces Image Quality & Productivity
sponsored by GE Healthcare
WEBCAST: In this webcast, learn how a medical center improved their CVIS as well as IT trends in cardiology across the country.
Posted: 26 Mar 2015 | Premiered: Apr 30, 2014

GE Healthcare

Archive: The Real Killer App
sponsored by Commvault
WEBCAST: Businesses use many applications every day, but one is used most frequently – email. This expert webcast explains how to conquer these challenges using email archiving.
Posted: 31 Dec 2014 | Premiered: Oct 24, 2014

Commvault

WiFi Do's and Don’t's with Expert Tony Fortuanto
sponsored by Fluke Networks
WEBCAST: In this part of a Wi-Fi video series, Wi-Fi expert with 25 years of experience Tony Fortunato walks you through the major do's and don'ts of Wi-Fi.
Posted: 02 Apr 2015 | Premiered: Apr 2, 2015

Fluke Networks

How to Select the Right SIEM for Better Security and Fraud Detection
sponsored by LogRhythm, Inc.
WEBCAST: This Credit Union Use Case Study Webinar provides insight into selecting the right SIEM solution for your business.
Posted: 31 Jul 2014 | Premiered: Jun 5, 2014

LogRhythm, Inc.

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement