Standards  >   Data Link Protocols  >  

Point-to-Point Protocol

RSS Feed   
Point-to-Point Protocol Multimedia (View All Report Types)
 
Why you Need DV
sponsored by TIBCO
VIDEO: Tune into this video to learn about TIBCO’s data virtualization and how it can empower your team and users to access data across the network and query it as if it was centrally located.
Posted: 27 Aug 2020 | Premiered: 27 Aug 2020

TIBCO

IBM Rational Build Forge Demos
sponsored by IBM
PRODUCT DEMO: Learn more about Rational Build Forge and how it can help you to automate, streamline and standardize your software assembly processes.
Posted: 17 Mar 2010 | Premiered: 17 Mar 2010

IBM

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Move Beyond Point Solutions to Complete EMM
sponsored by Citrix
WEBCAST: This informative webcast discusses the problems associated with point solutions and examines how and why your organization should move past these tools to a complete enterprise mobility management (EMM) solution.
Posted: 13 May 2014 | Premiered: May 13, 2014

Citrix

Exploring Opportunities in CBRS & Private Wireless Services
sponsored by Equinix
WEBCAST: In this episode of Equinix’s Tech Talk series, get insider knowledge on the opportunities private wireless and Citizen Broadband Radio Service (CBRS) enable for service providers and enterprises. Download the webcast to hear Jim Poole, VP of Business Development at Equinix, explain the perks of private LTE and what CBRS is.
Posted: 31 Aug 2020 | Premiered: Aug 19, 2020

Equinix

Podcast: Applying Client-aware Technologies for Desktop Virtualization and Cloud Services
sponsored by Intel
PODCAST: We envision a private cloud that can recognize and determine device attributes and user preferences, and deliver the service or information accordingly.  Our testing demonstrates that client-aware technologies can offer several benefits to both users and IT.
Posted: 01 Nov 2011 | Premiered: Oct 31, 2011

Intel

MicroScope Seminar: How to Succeed in Managed Services
sponsored by Kaseya International Limited
VIDEO: Access this essential resource to discover the top reasons why managed service providers (MSPs) should embrace end-point management and learn how to achieve breakthrough success in the IT managed services business
Posted: 22 Nov 2011 | Premiered: 22 Nov 2011

Kaseya International Limited

Control Compliance Suite Trialware
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: Control Compliance Suite Trialware provides end-to-end coverage for the IT compliance lifecycle, including policy management, technical and procedural controls assessment, reporting and remediation. Download this free trial.
Posted: 01 Apr 2009 | Premiered: 01 Apr 2009

Symantec Corporation

3 Reasons Why Office 365 is Getting You Down
sponsored by Apcela
WEBCAST: While there are many benefits to moving to the Office 365 cloud, there are also many pain points that enterprises still face regarding application performance. Learn about the 3 major pain points and what you can do to fix them in this webcast.
Posted: 26 Jun 2019 | Premiered: Jun 26, 2019

Apcela

How To Get The Best Out of DevSecOps: Developer Perspective
sponsored by Veracode, Inc.
WEBCAST: Learn the challenges and benefits of a DevSecOps approach from a developer's point of view.
Posted: 24 May 2017 | Premiered: May 24, 2017

Veracode, Inc.

Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST: Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Cisco Systems, Inc.

Learn with our M&E Expert Panel about optimizing workflows for distributed creative teams
sponsored by Qumulo
WEBCAST: Access this webcast to learn how your organization can overcome 3 common storage pain points to accelerate VFX workflows.
Posted: 16 Jun 2021 | Premiered: Jun 16, 2021

TOPICS:  Cloud Computing
Qumulo

Stop Living in the Past: A New Approach to Application Security
sponsored by Veracode, Inc.
WEBCAST: This webcast will discuss how organizations should evolve their security strategies as users and apps become the risk focal point. Watch to learn how.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

TOPICS:  IT Management
Veracode, Inc.

You Can Get There From Here: The Road to Secure DevOps
sponsored by Veracode, Inc.
WEBCAST: In this webcast, learn a basic understanding of Waterfall, Agile and DevOps from a people, process and technology point of view, how Security can best be integrated into DevOps and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

TOPICS:  IT Management
Veracode, Inc.

Getting Started with SAP Workload Automation
sponsored by Redwood Software Inc.
WEBCAST: Discover how your organization can benefit from real-time, event-driven process automation and job scheduling, with a single point of control and central monitoring of business processes for SAP systems.
Posted: 07 Sep 2007 | Premiered: Sep 1, 2007

Redwood Software Inc.

Speech Recognition for EHR Meaningful Use
sponsored by Nuance
VIDEO: This brief video shows how one medical organization was able to utilize a solution that blends point-and-click together with a review of systems, physical exams, reason for visit, and more to get the most out of their electronic health records.
Posted: 10 Mar 2014 | Premiered: 10 Mar 2014

Nuance

FFL Zero Trust But Verify
sponsored by Forward Networks
WEBCAST: Is your organization seeking greater visibility over network operations? A zero-trust architecture may be the answer. Watch this webinar for a demonstration of how customers use the Forward Networks platform to enhance and prove their zero-trust posture and get improved insight into network activity.
Posted: 17 Sep 2021 | Premiered: Sep 17, 2021

TOPICS:  .NET
Forward Networks

Simple Turn-Key Cloud Orchestration
sponsored by Citrix
WEBCAST: This webcast looks at what businesses want when building their cloud—use of existing infrastructure, single point of command, out-of-the-box ease—and discusses open cloud solutions.
Posted: 06 Nov 2013 | Premiered: Sep 19, 2013

Citrix

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

VeraTalks: Mitigating Open Source Risk in Your Organization
sponsored by Veracode, Inc.
VIDEO: Open source technology has been asaving grace for many organizations—and a weak point for others. In this video, explore key strategies to mitigate open source risk in your organization in just 8 minutes. Click here to watch.
Posted: 12 May 2021 | Premiered: 12 May 2021

TOPICS:  .NET
Veracode, Inc.

Webinar: Protecting Critical SaaS Data Before It’s Too Late
sponsored by Spanning Cloud Apps
WEBCAST: This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
Posted: 05 May 2014 | Premiered: Apr 1, 2014

Spanning Cloud Apps

_beta access: General Use Cases
sponsored by Beta Systems
VIDEO: In this short video, take a closer look at some of the common challenges organizations face when using Resource Access Control Facility (RACF) and discover how Beta Systems can help to address these pain points – watch now to get started.
Posted: 14 Apr 2021 | Premiered: 26 Mar 2021

TOPICS:  Cybersecurity
Beta Systems

Mobile App Performance: Learn Usage Patterns and Track Abandonment
sponsored by Hewlett Packard Enterprise
VIDEO: Watch this brief video to find out how one system could help you learn usage patterns and find trends in abandonment points. Functional on both iOS and Android, click now to find out if a system like this can work for you company.
Posted: 12 Dec 2014 | Premiered: 12 Dec 2014

Hewlett Packard Enterprise

Security University: Data Loss Prevention
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.
Posted: 14 Jun 2013 | Premiered: 17 Jun 2013

SearchSecurity.com

Storage Economics with David Merrill
sponsored by Hitachi Vantara
VIDEO: In this video, David Merrill, Chief Economist of Hitachi Data Systems describes the principles of storage economics, the 33 point calculation used to show you how make your storage infrastructure more efficient and increase your ROI.
Posted: 02 Feb 2010 | Premiered: 02 Feb 2010

Hitachi Vantara

Expert Panel Webinar: Today’s Market Realities Require New Demand Gen Strategies
sponsored by TechTarget
WEBCAST: This interactive panel webinar addresses three major pivot points for optimizing your demand capture capabilities moving forward – actions you should be considering to protect revenue in the short term and achieve breakthrough success in the future. Watch it here to learn more.
Posted: 07 Jul 2020 | Premiered: Jul 7, 2020

TechTarget

Cisco Prime Network Control System 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees.
Posted: 02 Jul 2012 | Premiered: 22 Jun 2012

Cisco Systems, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences