Hardware

Stay current with the components, peripherals and physical parts that constitute your IT department.

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • Webcasts // Jul 2014

    Citrix App Orchestration 2.5 Overview

    Citrix App Orchestration accelerates and automates the delivery of Desktops-as-a-Service (DaaS). It is built on proven Citrix best practices; App Orchestration helps service providers design and implement a secure, multi-tenant, multi-domain and multi-location based environment.

    Provided By Citrix Systems

  • Webcasts // Jul 2014

    Overview of the Citrix Client Virtualization Solution

    In this webcast, the presenter explains about how the Citrix client virtualization solution and Intel Core processors that helps the organization to manage and secure Windows and Mac devices. The client virtualization solution includes both XenClient and DesktopPlayer.

    Provided By Citrix Systems

  • Webcasts // Jun 2014

    Extend the Benefits of VMware Horizon 6 with Liquidware Labs

    VMware Horizon 6 provides more options than ever to deliver workspaces to the users tailored to their needs and requirements. In this webcast, the presenter will explain about the benefits of VMware Horizon 6. The presenter will also cover how the user can use their solutions and established methodology of...

    Provided By DABCC

  • Webcasts // Apr 2014

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Provided By CommVault Systems

  • Webcasts // Apr 2014

    XenDesktop Cloud Provisioning with CloudPlatform

    In this webcast, the presenter will explain about the Cloud Provisioning with CloudPlatform and integrated desktop cloud solution to streamline management, improve scalability and increase operational efficiency for the user XenDesktop or XenApp environments.

    Provided By Citrix Systems

  • Webcasts // Apr 2014

    The Collaboration System that Brings Teams Together

    Sharing knowledge, developing ideas, making better decisions – these move agencies and teams in the right direction. With Christie Brio, you can simultaneously contribute rich multimedia content from multiple wireless sources and engage easily with colleagues – in the same room or around the world, in real-time. Learn about Christie...

    Provided By AVI-SPL

  • Webcasts // Mar 2014

    Citrix - The Complete Solution for Service Providers in the Cloud Desktop Market

    Citrix offers the complete solution for service providers in the cloud desktop market. The user will learn why the Citrix believes \"DaaS\" is really about packaging a portfolio of end-user hosted services. Understand the experience of more than 2,600 Citrix Service Provider partners, from major telcos to small firms, who...

    Provided By DABCC

  • Webcasts // Mar 2014

    Citrix DaaS - A High-Growth Hosted Business Opportunity for Service Providers

    Citrix Service Provider (CSP) partners have four unique opportunities to create a high-value, high-growth DaaS business. The four unique opportunities are: the opportunity to develop a profitable hosted business with complete technical, business and marketing resources, the opportunity to differentiate and focus with vertical advice and specialized offerings, opportunities beyond...

    Provided By Citrix Systems

  • Webcasts // Feb 2014

    On-demand Webcast - ZDNet's Cloud Priorities 2014

    ZDNet’s Cloud Priorities 2014 webcast, sponsored by Windstream, will debut findings from a research study we conducted among our readers on cloud computing in North America. Our own Bill Detwiler, managing editor of Tech Pro Research, will share key findings from the study and discuss the most ground-breaking cloud trends....

    Provided By ZDNet

  • Webcasts // Feb 2014

    VMware & Google: Windows Desktops & Apps as a Cloud Service on Chromebooks

    Google and VMware are working together to modernize corporate desktops for the mobile cloud era by providing businesses with secure, cloud access to Windows applications, data and desktops on Google Chromebooks.

    Provided By DABCC

  • Webcasts // Jan 2014

    How to Secure Your Web Properties & Apps

    Cyber threats come at businesses from all directions. Whether it's through BYOD arrangements or the actions of hackers, companies face unprecedented risks in safeguarding data and managing compliance. Organizations must be equipped to deal with current and emerging cyber threats. This means securing the user's mission-critical web properties and applications,...

    Provided By DABCC

  • Webcasts // Jan 2014

    All Your Baseband Are Belong to Us

    In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to Firmware Analysis

    In this webcast, the presenter gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army or Gained in Translation

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    General Notes About Exploiting Windows X64

    During the last few years, x64 processors have been a growing technology adding performance and memory range to the old 32-bits cores. Now-a-days, most of the PCs make use of them, and Microsoft has ported its operating system, Windows, adding several changes and protection measures. Security measures have evolved since...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to ARM

    ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Introduction to Processor Design

    In this webcast, the presenter introduce processor design for the normal C/Assembler programmer. It is mostly interesting for people new to processor design and does not cover high performance pipelined structures. Small knowledge on VHDL programming would be great but is not essential. A very small processor core will described...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    A Syscall to ARMs

    ARM processors are growing more and more prevalent in the world; ARM itself claims that more than 20 billion chips have been shipped. Take a moment to appreciate that is about three chips for every man, woman, and child on earth. The three main topics, the presenter aim to cover...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Page Fault Liberation Army

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hardware Hacking with Microcontrollers: A Panel Discussion

    Microcontrollers and embedded systems come in many shapes, sizes and flavors. From tiny 6-pin devices with only a few bytes of RAM (ala the DEF CON 14 Badge) to 32- bit, eight core multiprocessor systems (ala DEF CON 20 Badge) each has their own strengths and weaknesses.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    The Exploration and Exploitation Of an SD Memory Card

    In this webcast, the presenter demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card. All \"Managed flash\" devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of reliable, contiguous...

    Provided By SecurityTube.net

  • Webcasts // Dec 2013

    Citrix XenDesktop: Concepts

    In this webcast, the presenter explains about the concepts inside the new Citrix XenDesktop architecture. The presenter also explains couple of important infrastructure concepts they are : machine catalog and delivery group.

    Provided By DABCC

  • Webcasts // Nov 2013

    The On Demand Workforce: Accelerating Performance with Tablet Solutions

    We live in an "on demand" world where customers have instant access to critical information on every product and service they consider purchasing. This ubiquitous "awareness" creates a highly educated market that expects quality, simplicity and convenience at all times. To effectively meet the needs of this highly dynamic...

    Provided By Dell & Microsoft

  • Webcasts // Nov 2013

    Ensuring Application Readiness Processes for Mobile Application Management

    In this webcast, the presenter discusses the rapid increase in mobile applications within the enterprise. The presenter also discusses some of the mobile application management challenges and explains how mature best practices in desktop application readiness should be leveraged to create similarly robust processes for managing mobile applications.

    Provided By DABCC

  • Webcasts // Sep 2013

    How to Evaluate Total Cost of Ownership for IP Telephony Deployments

    In this Webinar, we will evaluate key UC deployment models for SMBs – On-Premise, Cloud and Hybrid solutions. Each model will be evaluated for pros and cons, and ideal deployment scenarios will be outlined. Companies can achieve significant savings when selecting an IP Telephony and Unified Communications solution by...

    Provided By ShoreTel

  • Webcasts // May 2013

    What?s New with Dell DVS Enterprise

    In this webcast, the presenter explains about the Desktop Virtualization Solutions (DVS). DVS is a reliable, pre-configured enterprise-class solution that delivers Virtual Desktop Infrastructure (VDI) and application streaming solutions with Citrix XenDesktop.

    Provided By Citrix Systems

  • Webcasts // Apr 2013

    Webinar: PC Refresh in the Consumerized IT Environment

    Intel IT experts discuss the positive impact of PC refresh on security and manageability, user productivity, and TCO.

    Provided By Intel Corporation

  • Webcasts // Mar 2013

    Tackling Workplace Mobility and Bring Your Own Device Initiatives with the VMware View Mobile Secure Desktop

    Desktop virtualization provides IT with a way to address these concerns while supporting worker mobility and BYOD. Now VMware is advancing these goals with VMware View™ Mobile Secure Desktop, a fully validated architectural design that provides end users with quick and easy access to applications and data across devices, locations...

    Provided By VMware

  • Webcasts // Mar 2013

    Fellowes Desktop Virtualization Case Study with Citrix XenDesktop, IBM and Atlantis ILIO

    In this webcast, the presenter discusses about why the people transformed their desktop computing using desktop virtualization to avoid the cost of physical PCs, improve the user experience and increase productivity.

    Provided By DABCC

  • Webcasts // Feb 2013

    The new frontier. Securing mobile apps

    Smartphones, tablets, and other app-enabled devices are overtaking PCs as the dominant collaboration devices in enterprises. Many organizations are struggling with understanding the implications of developing and deploying apps to new mobile platforms such as iOS and Android. Which risks should app developers be concerned with? What are the new...

    Provided By IBM

  • Webcasts // Feb 2013

    VMware Horizon Suite Overview

    The VMware Horizon Suite platform for workforce mobility, it connects end users to their data and applications on any device without sacrificing IT security and control. IT can transform technology silos of desktops, data and applications into centralized IT services and improve operational efficiency, security and agility through policy-based management.

    Provided By DABCC

  • Webcasts // Nov 2012

    Linear Book Scanner

    In this webcast, the presenter talks about a hardware prototype of an automatic, non-destructive book scanner. The machine turns pages automatically, and captures high-resolution images of each page. It was developed in 20% time, and built in the Google Workshops.

    Provided By Oleksiy Kovyrin

  • Webcasts // Nov 2012

    X-Series Overview

    The X-series direct connect, desktop virtualization kits enable up to eleven users to simultaneously share a single PC at a fraction of the cost of a typical PC. Each user enjoys their own virtual workspace complete with their own applications, settings, files and preferences providing each user with a rich...

    Provided By DABCC

  • Webcasts // Oct 2012

    The NetApp Storage Foundation for Citrix Solutions

    NetApp provides a storage foundation to support Citrix as it transforms the way businesses and IT work and how people collaborate in the cloud era. NetApp storage helps customers to speed the adoption of desktop virtualization and achieve non-disruptive operations with an agile infrastructure that is efficient and scalable.

    Provided By Citrix Systems

  • Webcasts // Oct 2012

    Address Key Desktop Virtualization Use Cases with VMware View

    As desktop virtualization garners more momentum, IT organizations are looking for a solution that is cost-effective and easy to deploy, manage, and scale. VMware View meets these requirements with a proven desktop virtualization solution designed to optimize both end user freedom and IT management and control. View provides a comprehensive...

    Provided By VMware

  • Webcasts // Oct 2012

    Introduction to Virtual Desktop Infrastructure with VMware View

    Although the capital expenditures for traditional computers have decreased over time, the operational costs of managing these desktops have increased significantly because of the escalating complexity of tasks, labor costs and security concerns. End users are also tied to a single piece of hardware to access all their data and...

    Provided By VMware

  • Webcasts // Oct 2012

    Quantifying the Business Value of VMware View - Webcast

    Many enterprises have discovered that the use of virtualization to support desktop workloads creates a range of significant benefits. These benefits include price efficiencies, improved IT management and greater agility and choice for end users. This VMware sponsored webcast with IDC will provide both quantitative measurement of the business...

    Provided By VMware

  • Webcasts // Sep 2012

    Cable Modem Termination Systems (CMTS): Architecture, Configuration, and Troubleshooting

    In this webcast, the presenter going to provides an overview about the Cisco Cable Modem Termination System (CMTS) platforms and the uBR product family. The presenter also explains about the Cable Modem Termination Systems architecture and the system configuration.

    Provided By Cisco Systems

  • Webcasts // Aug 2012

    Google I/O 2012 - Writing Efficient Drive Apps for Android

    In this webcast, the presenter will explain about how to write Drive apps that synchronize files with Android devices. The presenter will also explains about how to open files on Android devices, or create new files from this environment.

    Provided By Oleksiy Kovyrin

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • Webcasts // May 2011

    The Invisible IPhone

    Over time, using a smart-phone touch screen becomes second nature, to the point where one can even do some tasks without looking. Researchers in Germany are now working on a system that would let one perform such actions without even holding the phone - instead one would tap one's palm,...

    Provided By MIT

  • Webcasts // Mar 2011

    App Turns Your Phone Into a 3-D Scanner

    Capturing an object in three dimensions needn't require the budget of Avatar. A new cell phone app developed by Microsoft researchers can be sufficient. The software uses overlapping snapshots to build a photo-realistic 3-D model that can be spun around and viewed from any angle.

    Provided By MIT

  • Webcasts // Feb 2011

    Growing Lasers on Computer Chips

    The first time, researchers have grown lasers from high-performance materials directly on silicon. Bringing together electrical and optical components on computer chips would speed data transfer within and between computers, but the incompatibility of the best laser materials with the silicon used to make today's chips has been a major...

    Provided By MIT

  • Webcasts // Apr 2014

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Provided By CommVault Systems

  • Webcasts // Apr 2013

    Webinar: PC Refresh in the Consumerized IT Environment

    Intel IT experts discuss the positive impact of PC refresh on security and manageability, user productivity, and TCO.

    Provided By Intel Corporation

  • Webcasts // Feb 2010

    The Trunkettes Rule

    "Don't be afraid to ask."- The Trunkettes Rule. Tired of stealing her husband's trunks, Hillary Genga took matters into her own hands creating a problem solving line of swimming trunks for women, she shared in an episode of Small Business Rules. Trunkettes are tailored to the women's body and include...

    Provided By American Express

  • Webcasts // Aug 2010

    American Business: Retail On The Road

    Two California-based designers are taking their products on the road this summer, mixing cosmos and custom-made clothes. They're bringing their creations to their customers with a series of trunk shows to make sure their new line is a huge success.

    Provided By American Express

  • Webcasts // May 2009

    Solving the Fax-to-Order Problem

    View this on-demand webinar and learn about a way to capture up to 100% of fax orders electronically, get those orders into your ERP system automatically and cut processing costs by as much as 70%. You'll see technology that enables businesses to: Make every customer an "e-customer" Consolidate point-to-point...

    Provided By Esker

  • Webcasts // Mar 2009

    Imaging The Human Striatum And Its Modulation By Dopamine

    Researchers have known for some time that the neurotransmitter dopamine is centrally involved in learning and working memory, the author tells us, and that dopamine-responsive circuits connect these parts of the human brain to other structures like the striatum, which also helps orchestrate motor control.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2010

    A Look at "Bring Your Own" (BYO) Devices in the Enterprise

    As new, alternative devices become more popular and Generation-Y enters the workforce, employees seek empowerment to use their personal computing devices for work and organizations are required to rethink the way they deliver employee desktops. Through this webcast one will learn about how: empowered workers are driving the desktop revolution,...

    Provided By Citrix Systems

  • Webcasts // Dec 2010

    Local Events and Webinars to Learn More and Get Started

    Through this webcast one will learn about: empowered workers are driving the desktop revolution, self-service is the new model IT is striving to deliver, tablets are accelerating BYO deployments and desktop virtualization plays a crucial role in enabling BYO.

    Provided By Citrix Systems

  • Webcasts // Jun 2010

    Dell Webinar: OEM Solutions

    For more than twelve years, Dell OEM Solutions has worked with global computing appliance vendors to help them speed their time to profit and decrease the total cost of ownership for their customers. View this webcast to learn how working with Dell's OEM Solutions team can help you save time...

    Provided By Dell

  • Webcasts // Sep 2009

    Dell Talks Microsoft Consulting Services

    Dell's Burk Buechler describes Dell's Consulting Services for Microsoft.

    Provided By Dell

  • Webcasts // Oct 2009

    The Growing Demand For Engineering Talent

    To keep up with the engineering demands of Moore's Law, Craig Barrett, former Intel Chairman of the Board, discusses how the education and labor requirements of talent have evolved with the industry. While developing the first semiconductors took a team of only three people, today's market requires several hundred engineers...

    Provided By Stanford University

  • Webcasts // Sep 2012

    Cable Modem Termination Systems (CMTS): Architecture, Configuration, and Troubleshooting

    In this webcast, the presenter going to provides an overview about the Cisco Cable Modem Termination System (CMTS) platforms and the uBR product family. The presenter also explains about the Cable Modem Termination Systems architecture and the system configuration.

    Provided By Cisco Systems

  • Webcasts // Mar 2009

    The Meaning of the "v" in Intel vPro Technology

    The presenter explains what the "v" in Intel vPro Technology means.

    Provided By Intel

  • Webcasts // Nov 2008

    Manage Desktop and Mobile PCs From the Same Console Webcast

    The presenter of this webcast discusses the latest enhancements for managing both desktop and mobile PCs from the same IT console. The presenter discusses three key trends for IT buyers, overcoming the challenges of PC manageability and the benefit of remote support without a working OS.

    Provided By Intel

  • Webcasts // Jul 2010

    Why ISIS? - Understanding the Value

    ISIS (Image and Scanner Interface Specification) is an industry standard that enables one to easily integrate document imaging into the solution offerings. This on-demand webcast gives an introduction to ISIS. Learn how ISIS can help a person quickly develop imaging applications and bring them to market - giving them a...

    Provided By EMC

  • Webcasts // Jul 2010

    Customer Showcase: Wentworth-Douglass Hospital Improves Operations

    Wentworth-Douglass Hospital (WDH) is the largest acute care hospital in the Seacoast region of New Hampshire and Southern Maine. Advances in digital imaging technologies and electronic patient records presented WDH with new challenges for storing, managing, securing, and protecting information. In this webcast the attendee will learn WDH's EMC and...

    Provided By EMC

  • Webcasts // Jun 2009

    Live Event: Activate Today! Realize ROI with Intel® vPro Technology and Symantec Altiris

    Join the team from the Intel vPro Expert Center for an informative Webcast on the ROI savings and activation process for PCs with Intel? vPro? technology and Symantec Altiris. This live TechRepublic Webcast, featuring Q&A, will be hosted by James Hilliard and feature special guest speakers from Intel Corporation,...

    Provided By Intel

  • Webcasts // Jun 2009

    Live Event: Activate Today! Realize ROI with Intel® vPro Technology and Microsoft System Configuration Manager

    Join the team from the Intel vPro Expert Center for an informative Webcast on the ROI savings and activation process for PCs with Intel? vPro? technology and Microsoft System Configuration Manager. This live TechRepublic Webcast, featuring Q&A, will be hosted by James Hilliard and feature special guest speakers from...

    Provided By Intel

  • Webcasts // Jun 2009

    Live Event: Activate Today! Realize ROI with Intel® vPro™ Technology and LANDesk

    Join the team from the Intel vPro Expert Center for an informative Webcast on the ROI savings and activation process for PCs with Intel? vPro? technology and LANDesk. This live TechRepublic Webcast, featuring Q&A, will be hosted by James Hilliard and feature special guest speakers from Intel Corporation, ...

    Provided By Intel

  • Webcasts // Jul 2010

    Optimizing Your Virtualized Data Center

    Intel? Xeon? processor 7500 series delivers Intel? Virtualization Technology (Intel? VT) for Connectivity (Intel? VT-c), optimizing your virtualized data center by offloading network overhead tasks from the processor. Reducing processor utilization and I/O latency, these processors offer improved application responsiveness and near line rate throughput for 10GB Ethernet deployments.

    Provided By Intel

  • Webcasts // Feb 2013

    The new frontier. Securing mobile apps

    Smartphones, tablets, and other app-enabled devices are overtaking PCs as the dominant collaboration devices in enterprises. Many organizations are struggling with understanding the implications of developing and deploying apps to new mobile platforms such as iOS and Android. Which risks should app developers be concerned with? What are the new...

    Provided By IBM

  • Webcasts // Jan 2010

    BMC + McAfee = Automated Policy Compliance

    Looking for a way to effectively bridge the gap between IT Operations and IT Security and to ensure total compliance to such industry and regulatory standards as PCI, HIPAA, DISA, FDCC and more? This webcast will discuss how BMC and McAfee have created an integrated solution to help break down...

    Provided By BMC Software

  • Webcasts // Jul 2009

    Built-In Manageability and Security With Intel vPro Technology

    The presents of this webcast provides their perspective on Intel vPro Technology in this webcast. Their insights provide proof that companies using Intel vPro Technology are experiencing efficiencies from power savings and off-hours patching, remote diagnosis and repair and isolation of infected PCs and remote remediation.

    Provided By Intel

  • Webcasts // Apr 2009

    Intel Security Use Cases

    The presenter discusses new enterprise security use cases that can be implemented using Intel vPro technology. The webcast is focused on three high-priority, high-value categories - e-Discovery and investigations, data protection and loss prevention, and system health and updates - and successfully performed lab tests to validate each use case.

    Provided By Intel

  • Webcasts // Jan 2010

    Moving to New Intel-Based PCs and Microsoft Windows 7

    The presenter of this webcast explains the benefits Intel IT sees in moving to new Intel - based PCs with Windows 7.

    Provided By Intel

  • Webcasts // Sep 2009

    Compucom and Intel vPro Technology - Out of the Box Innovation

    Compucom, provider of IT solutions to Fortune 1000 companies, describes how Compucom customers who have deployed PCs with Intel vPro technology lower support costs, improve user uptime, experience faster patch management, and have the building blocks for more-secure, remotely-managed client virtualization.

    Provided By Intel

  • Webcasts // Oct 2011

    Effective Energy Management in the Enterprise Demo

    Realize the value of green with IBM Tivoli Monitoring for Energy Management.

    Provided By IBM

  • Webcasts // Jan 2010

    TechNet Radio: Optimize Your Desktop Infrastructure With System Center Configuration Manager and Windows 7

    Sporton International, a leading testing, certification and electromagnetic compatibility consultant wanted to relieve its two-person IT staff of time-sapping desktop management chores, minimize employee disruptions, and shrink computer setup time to speed the testing process. Sporton deployed Microsoft System Center Configuration Manager 2007 Service Pack 2, which inter-operates with Microsoft...

    Provided By Microsoft

  • Webcasts // Mar 2010

    Breakthrough Performance for Business-Critical Apps With VMware and Intel

    VMware vSphereTM 4 and the latest Intel Xeon processors provide breakthrough performance and unparalleled flexibility for business-critical server applications such as Microsoft Exchange, Oracle Database and SAP ERP. This webcast will help you learn how to standardize on VMware and Intel with confidence to consolidate all your business-critical applications...

    Provided By VMware

  • Webcasts // Jan 2009

    Virtual Desktop Webcast

    Hosting desktop environments on servers in the datacenter provides a more secure, manageable and operationally efficient desktop model. Using VMware Infrastructure software, many desktops can be isolated, secured and hosted on a single server. Sun VDI Software provides secure access to these "Virtual desktops" securely over the LAN or WAN...

    Provided By Sun Microsystems

  • Webcasts // Oct 2012

    Address Key Desktop Virtualization Use Cases with VMware View

    As desktop virtualization garners more momentum, IT organizations are looking for a solution that is cost-effective and easy to deploy, manage, and scale. VMware View meets these requirements with a proven desktop virtualization solution designed to optimize both end user freedom and IT management and control. View provides a comprehensive...

    Provided By VMware

  • Webcasts // Oct 2012

    Introduction to Virtual Desktop Infrastructure with VMware View

    Although the capital expenditures for traditional computers have decreased over time, the operational costs of managing these desktops have increased significantly because of the escalating complexity of tasks, labor costs and security concerns. End users are also tied to a single piece of hardware to access all their data and...

    Provided By VMware

  • Webcasts // Oct 2012

    Quantifying the Business Value of VMware View - Webcast

    Many enterprises have discovered that the use of virtualization to support desktop workloads creates a range of significant benefits. These benefits include price efficiencies, improved IT management and greater agility and choice for end users. This VMware sponsored webcast with IDC will provide both quantitative measurement of the business...

    Provided By VMware

  • Webcasts // Mar 2013

    Tackling Workplace Mobility and Bring Your Own Device Initiatives with the VMware View Mobile Secure Desktop

    Desktop virtualization provides IT with a way to address these concerns while supporting worker mobility and BYOD. Now VMware is advancing these goals with VMware View™ Mobile Secure Desktop, a fully validated architectural design that provides end users with quick and easy access to applications and data across devices, locations...

    Provided By VMware

  • Webcasts // Jan 2010

    Protect Your Email With Symantec Brightmail Gateway 9.0

    This webcast covers information regarding, how to protect your email with the help of the latest release Symantec Bright mail Gateway 9.0. Symantec Bright mail Gateway is one of the latest effective as well as accurate real time antispams and antivirus protection application which delivers both inbound as well as...

    Provided By Symantec

  • Webcasts // Feb 2009

    Customer Spotlight: Optimizing SAP Solutions With SAP, Intel and VMware

    The combination of the latest generation VMware virtualization technologies and Intel microprocessor technologies can improve the service levels around SAP application availability and performance significantly, as well as accelerate SAP upgrade cycles. This webcast includes case studies to illustrate how SAP customers are using these advanced technologies in real-world situations....

    Provided By VMware