virtual event

Results 1 - 25 of 59Sort Results By: Published Date | Title | Company Name
Published By: Kaon     Published Date: Feb 01, 2012
Obtaining products for sales and marketing demonstrations can be tough, especially with large, complex and expensive. Learn how CMOs are overcoming such issues with virtual 3D product demonstration that look and behave like the actual product.
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing, demonstrations, meeting, tablets, smartphone, products, interactive, trade shows, remote meeting, laptop, touch-screen, iphone, events
    
Kaon
Published By: Red Hat     Published Date: Dec 22, 2010
Join us live starting at 7 a.m. EST on Jan. 26, 2011. The event will be on-demand worldwide the months following. The Red Hat Virtual Experience is a complimentary global online forum of Red Hat experts, partners, customers, and the open source community.
Tags : 
red hat virtual experience, cloud computing, virtualization, collaboration
    
Red Hat
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security, trust zones, new access layer, high value targets, inspection offload, virtual ips, security management, threat coverage, ips platfrom, r&d servers, virtualized data centers, denial of service (dos), intrusion prevention system
    
HP
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, security, guide, privacy, architectures, organizations, compliance, protection
    
McAfee EMEA
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
    
Dell EMC & Intel
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: IBM     Published Date: May 07, 2013
This book brings a practitioner’s view to Big Data Analytics. Download this ebook to read a practical viewpoint into leveraging analytics for Big Data. This book also draws material from a large number of workshops and interviews with business and IT leaders. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
practical viewpoint, analytics, big data, interviews, business
    
IBM
Published By: IBM     Published Date: May 07, 2013
Read this whitepaper to learn how businesses take advantage of the power of the cloud to build strong analytically oriented teams, adopt new ways to use information and jump ahead of their competition. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
analytics, cloud, business, innovation, computing, information, advantage, power
    
IBM
Published By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : 
continuity requirements, vmturbo, virtualization, workload portability, data replication
    
VMTurbo
Published By: IBM     Published Date: May 08, 2013
Learn what CFO Research found when they surveyed finance executives from U.S. companies about their reporting processes and the tools they use to prepare financial statements. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
cfo, finance, tools, financial statements
    
IBM
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
data loss prevention, dlp, office 365
    
Intel Security
Published By: IBM     Published Date: May 08, 2013
Read this whitepaper to learn how Big analytics can improve your business decision making and enhance business innovation. Most of all what does it provide in terms of business value for big data. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
big data, value, analytics, improve, business, innovation
    
IBM
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: VMware     Published Date: May 10, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : 
capital, operational costs, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, sqlfire, applications, app development, scalability, databases
    
VMware
Published By: IBM     Published Date: May 08, 2013
Download this whitepaper to learn how organizations can extend their productivity gains provided by disclosure management solutions to their budgeting, planning and forecasting processes as well. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
management, budgeting, planning, forecasting, organizations, productivity, solutions
    
IBM
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : 
database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection
    
McAfee
Published By: VMware     Published Date: Mar 08, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : 
wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery, data growth
    
VMware
Published By: EMC Corporation     Published Date: Sep 09, 2014
Hear senior principal analyst at ESG, Jon Oltsik, at RSA Security Analytics 10.4 and RSA ECAT Virtual Launch Event on September 9.
Tags : 
esg, security, analytics, architecture
    
EMC Corporation
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
    
Mentor Graphics
Published By: IBM     Published Date: May 08, 2013
Read this whitepaper from FSN's Gary Simon to learn how disclosure management solutions from IBM can extend the value of your existing Business Intelligence tools. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : 
value, business intelligence, disclosure management, solutions
    
IBM
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Late comers to the market, talk the talk, but can’t walk the walk for critical workloads.  Stratus Director of Product Management Denny Lane resets the definitions of fault tolerance and high availability.
Tags : 
stratus, fault tolerance, critical workloads, mission critical business solution, server virtualization, lexicon, high availability, continuous availability, disaster prevention
    
Stratus Technologies
Published By: CodeBaby     Published Date: Nov 27, 2012
This guide reviews some market drivers which are spurring innovation in patient engagement and wellness participation. In addition, it overviews the main capabilities of the leading virtual assistant solution, CIVA health adviser.
Tags : 
online self-service, self-service, patient engagement, patient experience, healthcare consumerism, ehealth, customer service, intelligent virtual assistants, web self-service, healthcare providers, virtual agent, hospital marketing, healthcare, wellness, disease management, epatient, disease prevention, healthcare marketing, mhealth, crm & customer care
    
CodeBaby
Published By: CodeBaby     Published Date: Nov 27, 2012
This guide reviews market drivers which are spurring innovation in benefits self-service and enrollment as well as wellness engagement. In addition, it overviews the main capabilities of the leading virtual assistant solution, CIVA benefits advisor.
Tags : 
online self-service, self-service, patient engagement, patient experience, healthcare consumerism, ehealth, customer service, intelligent virtual assistants, web self-service, healthcare providers, virtual agent, hospital marketing, healthcare, wellness, disease management, epatient, disease prevention, healthcare marketing, mhealth, crm & customer care
    
CodeBaby
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.