virtual event

Results 1 - 25 of 62Sort Results By: Published Date | Title | Company Name
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization
    
ASG Software Solutions
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
    
Dell EMC & Intel
Published By: Kaon     Published Date: Feb 01, 2012
As complex product companies look to build sales opps they're using mobile platforms (iPads and Smartphones) to demo products anywhere, anytime. But the question is, who's developing the dynamic content that's exciting prospects and accelerating sales?As complex product companies look to build sales opps they're using mobile platforms (iPads and Smartphones) to demo products anywhere, anytime. But the question is, who's developing the dynamic content that's exciting prospects and accelerating sales?
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing
    
Kaon
Published By: Kaon     Published Date: Feb 01, 2012
Obtaining products for sales and marketing demonstrations can be tough, especially with large, complex and expensive. Learn how CMOs are overcoming such issues with virtual 3D product demonstration that look and behave like the actual product.
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing
    
Kaon
Published By: Kaon     Published Date: Feb 01, 2012
CMOs know that a consistent and concise product story is critical to maintaining a product's market position. Learn why they're turning to virtual product demonstrations to tell a convincing cross channel story that accelerate sales.
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing
    
Kaon
Published By: Kaon     Published Date: Feb 01, 2012
Savvy marketers are looking for ways to reuse interactive content across multiple platforms and venues to save money. Learn how virtual product demonstrations can be CREATED ONCE and reused ANYWHERE to reduce costs and accelerate sales.
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing
    
Kaon
Published By: Kaon     Published Date: Feb 01, 2012
Describing product pain points without a visual is hard, and having a product at every sales engagement is near impossible. Learn how marketing tools show amazing product stories using stunning interactive visual experiences that win deals.
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing
    
Kaon
Published By: Kaon     Published Date: Mar 24, 2012
CMOs are challenging trade show professionals to do more with less. That's why savvy marketers are using virtual product demonstrations to eliminate the cost of shipping products and create engaging interactive customer experiences within their booth.
Tags : 
cmo, ipad, 3d products, virtual products, interactive products, mobility, sales, marketing
    
Kaon
Published By: Citrix Online     Published Date: Feb 24, 2011
Last chance to register: learn how to get your desktop virtualization started at at a special eventonline broadcast.
Tags : 
citrix, live event, virtual desktop, desktop virtualization, mobile device, best practice
    
Citrix Online
Published By: Citrix Online     Published Date: Feb 24, 2011
Last chance to register: learn how to get your desktop virtualization started at at a special eventonline broadcast.
Tags : 
citrix, live event, virtual desktop, desktop virtualization, mobile device, best practice
    
Citrix Online
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Published By: Amazon Web Services EMEA     Published Date: Aug 02, 2019
Artifi cial intelligence is becoming a key component of business transformation. Virtually any business leader seeking to unlock value and develop new capabilities using technology is at some stage of the AI journey. For example, those at the leading edge have incorporated machine learning insights into business processes and are building functionality such as natural language processing and preventative maintenance diagnostics into their products. Others are experimenting with pilot projects or developing plans to get started.
Tags : 
data, technologies, learning, applications, technology, machine, cloud
    
Amazon Web Services EMEA
Published By: EMC Corporation     Published Date: Oct 01, 2014
Learn how by watching the RSA Security Analytics and RSA ECAT virtual on-demand event.
Tags : 
security, analytics, incidents, ecat, logs
    
EMC Corporation
Published By: Alteryx, Inc.     Published Date: Apr 21, 2017
Data Analytics has become critical for many business decision makers. However, many of these managers and data analysts still rely on spreadsheets and other legacy-era tools that fall far short of current needs. As a result, they also rely heavily on a virtual army of data specialists and scientists, working under the auspices of a centralized analytics group, to prepare, blend, analyze, and even report on the critical data they need for decision making. Download this new paper to get the details behind self-service data analytics, and how it lets business analysts: Take charge of the entire analytical process, instead of relying on other departments Overcome limitations of legacy tools to save time and prevent errors Make more comprehensive and insightful business decisions at speed
Tags : 
    
Alteryx, Inc.
Published By: Red Hat     Published Date: Dec 22, 2010
Join us live starting at 7 a.m. EST on Jan. 26, 2011. The event will be on-demand worldwide the months following. The Red Hat Virtual Experience is a complimentary global online forum of Red Hat experts, partners, customers, and the open source community.
Tags : 
red hat virtual experience, cloud computing, virtualization, collaboration
    
Red Hat
Published By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
    
PGi
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Teachers have always experimented with new technology and how it can be integrated to augment the lessons and content given to students. Classroom sets of books afforded teachers the opportunity to give homework, movie projectors and televisions offered an opportunity to display new content, and calculators transformed computational mathematics. Augmented and virtual reality are new tools that can transition pedagogy to include new materials and content. Students can travel to historical landmarks, world heritage sites, and past events from the safety of their classroom. Books can be scanned to reveal videos and three-dimensional content identified by the teacher to enhance the content available to the student. Download this whitepaper to learn more. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: Tripwire     Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics.
Tags : 
security, configuration, basics, security flaw, it assets, it infrastructure, security infrastructure, tripwire
    
Tripwire
Published By: CodeBaby     Published Date: Nov 27, 2012
This guide reviews market drivers which are spurring innovation in benefits self-service and enrollment as well as wellness engagement. In addition, it overviews the main capabilities of the leading virtual assistant solution, CIVA benefits advisor.
Tags : 
online self-service, self-service, patient engagement, patient experience, healthcare consumerism, ehealth, customer service, intelligent virtual assistants
    
CodeBaby
Published By: CodeBaby     Published Date: Nov 27, 2012
This guide reviews some market drivers which are spurring innovation in patient engagement and wellness participation. In addition, it overviews the main capabilities of the leading virtual assistant solution, CIVA health adviser.
Tags : 
online self-service, self-service, patient engagement, patient experience, healthcare consumerism, ehealth, customer service, intelligent virtual assistants
    
CodeBaby
Published By: Forcepoint     Published Date: Jun 06, 2019
As organizations become more distributed, directors of network security teams must provide connectivity to new locations, applications and systems at a moment’s notice. What’s more, protecting users and data from rising threats is changing the demands for network performance, manageability and security. In this session, we discuss how distributed organizations are enabling new locations, both physical and virtual, to be brought up quickly and managed consistently. We then examine how to take advantage of commodity broadband instead of traditional leased lines, implement business security processes seamlessly across all locations, and how to interactively monitor remote environments. Presenter: Michael Knapp, Director of Network Security Architects, Forcepoint This session is part of the Forcepoint-sponsored Network Security eSummit in partnership with the MIS Training Institute (MISTI). Watch the other event sessions: Digital Transformation and the Intersection of Networks, Securi
Tags : 
    
Forcepoint
Published By: BlueJeans Network     Published Date: Jun 10, 2016
This white paper, written by David Maldow, will explain why webcasts aren’t fully interactive, why you should care, and the potential benefits of full interactivity for large-scale business video events.
Tags : 
webinars, webcasts, virtual events, video conferencing, web conferencing, video events, townhalls, town halls
    
BlueJeans Network
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : 
database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection
    
McAfee
Start   Previous   1 2 3    Next    End
Search Resource Library