RSS feed Get our RSS feed

News by Topic

virtual event

Results 1 - 25 of 59Sort Results By: Published Date | Title | Company Name
By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Teachers have always experimented with new technology and how it can be integrated to augment the lessons and content given to students. Classroom sets of books afforded teachers the opportunity to give homework, movie projectors and televisions offered an opportunity to display new content, and calculators transformed computational mathematics. Augmented and virtual reality are new tools that can transition pedagogy to include new materials and content. Students can travel to historical landmarks, world heritage sites, and past events from the safety of their classroom. Books can be scanned to reveal videos and three-dimensional content identified by the teacher to enhance the content available to the student. Download this whitepaper to learn more. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
     Fujitsu America, Inc.
By: PGi     Published Date: Oct 01, 2018
You wouldn’t hold a critical investor call, customer event or shareholder’s meeting in your office bullpen. So why would you host an important virtual event on a platform intended to support small-group collaboration and teamwork? Frost & Sullivan research shows that two-thirds of companies use web conferencing on a regular basis for project collaboration. We also know that more and more of them are turning to the same solutions to host webinars for critical internal and external events. While web conferencing solutions can be used to support large-group or strategically important meetings, webinar technology is designed specifically for that purpose and will almost always deliver a better experience and a higher return on investment. Webinar tools deliver a wealth of features to help companies gain better insights into attendee sentiment for better investor relations, employee and customer experience, and lead generation and qualification: • Integrated video draws higher levels of int
Tags : 
     PGi
By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
     Dell EMC & Intel
By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : cloud, security, guide, privacy, architectures, organizations, compliance, protection
     McAfee EMEA
By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: • Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. • First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. • A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features.
Tags : mimecast, virtual event, email archiving, email solutions, cloud archiving
     Mimecast
By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features. View on-demand now
Tags : mimecast, virtual event, email archiving, email solutions, cloud archiving
     Mimecast
By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
     Oracle
By: Alteryx, Inc.     Published Date: Apr 21, 2017
Data Analytics has become critical for many business decision makers. However, many of these managers and data analysts still rely on spreadsheets and other legacy-era tools that fall far short of current needs. As a result, they also rely heavily on a virtual army of data specialists and scientists, working under the auspices of a centralized analytics group, to prepare, blend, analyze, and even report on the critical data they need for decision making. Download this new paper to get the details behind self-service data analytics, and how it lets business analysts: Take charge of the entire analytical process, instead of relying on other departments Overcome limitations of legacy tools to save time and prevent errors Make more comprehensive and insightful business decisions at speed
Tags : 
     Alteryx, Inc.
By: BlueJeans Network     Published Date: Jun 10, 2016
This white paper, written by David Maldow, will explain why webcasts aren’t fully interactive, why you should care, and the potential benefits of full interactivity for large-scale business video events.
Tags : webinars, webcasts, virtual events, video conferencing, web conferencing, video events, townhalls, town halls
     BlueJeans Network
By: Intel Security     Published Date: Oct 20, 2015
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : data loss prevention, dlp, office 365, security
     Intel Security
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : cloud, date security, cloud security, virtualization, security
     CDW-Trend Micro
By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : continuity requirements, vmturbo, virtualization, workload portability, data replication
     VMTurbo
By: EMC Corporation     Published Date: Oct 01, 2014
Learn how by watching the RSA Security Analytics and RSA ECAT virtual on-demand event.
Tags : security, analytics, incidents, ecat, logs
     EMC Corporation
By: EMC Corporation     Published Date: Sep 09, 2014
Hear senior principal analyst at ESG, Jon Oltsik, at RSA Security Analytics 10.4 and RSA ECAT Virtual Launch Event on September 9.
Tags : esg, security, analytics, architecture
     EMC Corporation
By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
     Kaspersky
By: HP     Published Date: May 14, 2014
Your data is everywhere. It’s in the cloud, in virtual environments, in remote offices, and on mobile devices. Plus, there’s more of it, and much of it is business-critical, meaning you need to back up larger volumes of data than ever before without adding costs or bandwidth. Even more importantly, you need the ability to restore data quickly in the event of a disaster, failure, outage. The cost of data protection is higher now more than ever.
Tags : hewlett packard, cloud, mobile, remote, data recovery, disaster, failure
     HP
By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : data research, big data, virtualization, applications, networks
     HP - Enterprise
By: IBM     Published Date: May 08, 2013
Read this whitepaper to learn how Big analytics can improve your business decision making and enhance business innovation. Most of all what does it provide in terms of business value for big data. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : big data, value, analytics, improve, business, innovation
     IBM
By: IBM     Published Date: May 08, 2013
Download this whitepaper to learn how organizations can extend their productivity gains provided by disclosure management solutions to their budgeting, planning and forecasting processes as well. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : management, budgeting, planning, forecasting, organizations, productivity, solutions
     IBM
By: IBM     Published Date: May 08, 2013
Read this whitepaper from FSN's Gary Simon to learn how disclosure management solutions from IBM can extend the value of your existing Business Intelligence tools. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : value, business intelligence, disclosure management, solutions
     IBM
By: IBM     Published Date: May 08, 2013
Learn what CFO Research found when they surveyed finance executives from U.S. companies about their reporting processes and the tools they use to prepare financial statements. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : cfo, finance, tools, financial statements
     IBM
By: IBM     Published Date: May 07, 2013
This book brings a practitioner’s view to Big Data Analytics. Download this ebook to read a practical viewpoint into leveraging analytics for Big Data. This book also draws material from a large number of workshops and interviews with business and IT leaders. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : practical viewpoint, analytics, big data, interviews, business
     IBM
By: IBM     Published Date: May 07, 2013
Read this whitepaper to learn how businesses take advantage of the power of the cloud to build strong analytically oriented teams, adopt new ways to use information and jump ahead of their competition. Learn more about ‘Big Data and Business Analytics’ through IBM’s latest market leading solutions. Register and attend this complimentary virtual event on June 11 by IBM Business Analytics
Tags : analytics, cloud, business, innovation, computing, information, advantage, power
     IBM
By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection
     McAfee
By: CodeBaby     Published Date: Nov 27, 2012
This guide reviews some market drivers which are spurring innovation in patient engagement and wellness participation. In addition, it overviews the main capabilities of the leading virtual assistant solution, CIVA health adviser.
Tags : online self-service, self-service, patient engagement, patient experience, healthcare consumerism, ehealth, customer service, intelligent virtual assistants
     CodeBaby
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics