Hardware

Stay current with the components, peripherals and physical parts that constitute your IT department.

  • Webcasts // Jun 2015

    Securing Software's Future: Why API Design Matters

    Writing secure software is far cheaper for society as a whole than fixing vulnerable software after it is released. Teaching developers how to write secure software can be very effective in the short term, but over time security knowledge becomes less relevant, some security-conscious developers move into management, and additional...

    Provided By SecurityTube.net

  • Webcasts // Jun 2015

    Cloud IDS: Intrusion Detection for Shared Hosting

    On one hand, the users pay almost nothing to get their site or server out there, but on the other hand, their network neighborhood probably sucks and there's no way to tell if anyone is trying to access their stuff in a way they didn't intend. There's got to be...

    Provided By SecurityTube.net

  • Webcasts // May 2015

    Adventures in Mobile Telephone Security

    In this webcast, the presenter will explain about the risks are described and will demonstrate just how far a motivated amateur can legally go with some basic equipment, a little imagination and some directed effort. This includes running the users own base station, fuzzing the handset's baseband processor, capturing traffic...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hardware Level Attacks

    A running computer program is not a mathematical abstraction, but a physical process taking place somewhere in the real world. This makes all programs and the devices they run on vulnerable to a variety of physical attacks that are often overlooked or dismissed as impractical.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    The Inception Framework: An APT Campaign in the Cloud, Mobile, and Embedded Systems

    Many of the indicators falsified by these attackers have been used as trusted information when attributing other know threats which should call into question the legitimacy of such claims. This webcast will walk through the discovery and processes they used to peel back the layers behind this sophisticated framework.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Bad USB Weaponized

    Explore the world of bad USB. How to build, deploy, and optimize the bad USB platform? Command and control structure. Hijinks with bad USB will include results achieved during deployment, systems owned, shells acquired, data acquired and coupling with social engineering and security awareness and training.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    My 4G WiFi Modem Sucks

    In this webcast, the presenter will essentially cover the techniques and tools used to find and exploit a number of vulnerabilities on the Telstra ZTE MF91 4G WiFi modem. Exploits include authentication bypass, recovery of credentials, and modification of core functionality, unexpected (and insecure) device behavior and unauthenticated factory reset.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Breaking Mobile Social Networks for Automated User Location Tracking

    Location-Based Social Networks (LBSNs) feature location-based friend discovery services attracting hundreds of millions of active users world-wide. While leading LBSN providers claim the well-protection of their users' location privacy, in this webcast, the presenter will show for the first time through real world attacks that these claims do not hold...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Network Attached Shell: N.A.S.ty Systems That Store Network Accessible Shells

    In this webcast, the presenter focus on "How to", and the implications of compromising network based storage systems, but will conclude that the absence of security in not only storage hardware, but networking hardware in general, has left data unprotected and millions of networks vulnerable to exploitation.

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Don't Trust Your USB! How to Find Bugs in USB Device Drivers

    The Universal Serial Bus (USB) has become the standard interface for interconnecting computers with peripheral hardware today. USB is used to access Human Interface Devices (HIDs) like keyboards and mice, storage devices like USB flash sticks or external harddrives but also webcams, soundcards, Network Interface Cards (NICs), wireless cards, Bluetooth...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Gyrophone: Recognizing Speech From Gyroscope Signals

    In this webcast, the presenters will show that the gyroscopes found on most Smartphones are sensitive to measure acoustic signals in the vicinity of the phone. Since iOS and Android require no special permissions to access the gyro, their research shows that apps and active websites that cannot access the...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Hack Your ATM With Friend's Raspberry.py

    At all times there have been bad guys, who tried to steal money. ATM machines containing vast amounts of money have always been attractive targets. Until recently, criminals were only using physical weaknesses. Skimmers and shimmers for stealing magstripe-tracking data, fake pin pads and cameras for stealing pin codes, and...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    Iron Crow: Android Kernel and OS Security Assessment

    Android is a pliable environment bent into different shapes by different OEMs. While Android offers several security mechanisms at the framework and at the application levels, there's little it offers to an OEM that customizes Android. The presenters have seen vulnerabilities in Android stemming out of excess file permissions, processes...

    Provided By SecurityTube.net

  • Webcasts // Apr 2015

    A Large Scale Analysis of the Security of Embedded Firmware

    As embedded systems are more than ever present in the society, their security is becoming an increasingly important issue. However, with many recent analyses of individual firmware images, embedded systems acquired a reputation of being very insecure. However, the presenters still lack a global understanding of embedded systems security as...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Hacking Before Computers

    Before integrated circuits, digital circuits have been made with discrete transistors and the presenter "Invented" a flip-flop, not knowing that he is already exist. The first project with the Z80 (which the presenter still keeping and can show it), when the presenter did not have a computer so assembled a...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Scada Deep Inside: Protocols and Security Mechanisms

    In this webcast, the presenter will share the experience in analysis of most popular open and vendor's specific proprietary industrial protocols. For each protocol will be presented packet structure, real examples, in-secure features and possible hacks, at the end of the topic the presenter will share the practical approach, methodology...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Webcast: You Don't Know What You Don't Know! New Insights for Driving Cloud Strategy Through Analyzing Existing Behavior

    You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how good we are at managing our existing technologies. In this webinar we’ll explore the world of cloud...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Mar 2015

    Mobile Forensics: MPE+ Android Malware Detection

    Malware on computers can infect, transmit and "Sell" personal data. Malware can also be used to "Blame" and cast doubt on collected evidence in a computer examination. If this is the case, why aren't these items being scanned when conducting a mobile device exam? In this webcast, the presenter will...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Trashing USB Layers Using the Facedancer Board

    A bottle of Laphroaig 18 later, they came to the conclusion that while libUSB and python-USB make it easy to prototype USB host-side applications, there wasn't really anything handy for prototyping device-side applications. So the next afternoon, they wired a MAX3421 EVK into the GoodFET41.

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    iPhone Raw NAND Forensics and Recovery

    With the introduction of the 3Gs and iOS4 Apple introduced a highly advanced data protection scheme based on state of the art encryption and tight integration with the crypto-enabled hardware in the iPhone. The Apple data protection scheme introduced with iOS4 has effectively shut the door for data recovery on...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Active Disk Antiforensics and Hard Disk Backdoors

    In this webcast, the presenter discovered methods for extracting keys and firmware remotely from a few ZigBee chips, locally from nearly all of them and has the skill to inject packet into packets on layer 0. In spare time, the presenter maintains an open JTAG debugger, fiddles with pink pagers...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Memory Forensics and Security Analytics : Detecting Unknown Malware

    In this webcast, the presenter will show how open source tools can be used to detect 'Unknown' malware using memory forensics and security analytics. It will showcase how to build a security analytics engine that can automated perform memory forensics on thousands on hosts in near real time, to identify...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Introducing Weakness Into Security Device: Tuning to a Different Key

    When security devices such as NIDS/NIPS (Network Intrusion Detection/Prevention Systems) are developing their rules/signatures, exploit PoC's tend to be used to develop and test those rules. Sometimes there is lots of PoC code around for a single exploit. Not too much of leap of faith to suggest that those people...

    Provided By SecurityTube.net

  • Webcasts // Mar 2015

    Java's SSLSocket: How Bad APIs Compromise Security

    In this webcast, the presenter will explain about the implementation of SSL sockets in Java: internet security is hard, TLS is almost impossible and implementing TLS correctly in Java is "Nightmare!". This webcast will show how a badly designed security API introduced over 15 years ago, combined with misleading documentation...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Hard Drive Punch: Destroying Data as a Performative Act

    In general data is stored on technically sensitive systems and can easily be lost. At the same time files today appear often as indestructible once uploaded to the Internet. In this webcast, the presenter will explain about a variety of approaches on data destruction and how these connect to current...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Uncaging Microchips - Techniques for Chip Preparation

    An entertaining, thrilling and educational journey through the world of chip preparation. Deep insight into amateur-as well as professional methods and equipment is given, for the first, most important steps for analysis and attacks on dedicated hardware.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Towards General Purpose Reconfigurable Computing on Novena - FPGAs for Everybody with Novena

    The Novena open source laptop contains a FPGA, but free software support for FPGAs is lacking and requires root access to the hardware. The presenters' work is on providing a framework and a demonstration application for general purpose accelerator cores for Novena's FPGA.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Hardware Reverse-Engineering Tools New Threats - New Opportunities

    More recently, such forms of analysis have been obsoleted by advanced invasive analysis techniques that utilize capital-intensive failure analysis equipment and require extensive technical skills. One such technique, laser glitching, has recently been included into common criteria evaluations. The transient faults produced by laser glitching are similar in nature to...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Teridian SoC Exploitation: Exploration of Harvard Architecture Smart Grid Systems

    The Teridian system-on-a-chip platform wraps a complete system around a modified 8051 core, with additional features for chip security to block debug functionality and external access to memory. Additionally, the Harvard architecture design sets relatively rigid barriers between code and data (as opposed to x86/64), which presents an unintentional security...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Synthetic Data Generation and Defense in Depth Measurement of Web Applications

    In this webcast, the presenter will explain quickly cover architecture and system overviews, then dive into exploitation scenarios with techniques to attack Harvard architecture systems and code security implementations. End state results include pathways to gain coveted binary images of firmware and resident code execution.

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Mobile: Unwrapping the Truth Analysis of Mobile Application Wrapping Solutions

    One of the latest trends of BYOD solutions is to employ "Mobile Application Management (MAM)", which allows organizations to wrap existing applications to perform policy enforcement and data/transport security at the application layer rather than at the device level.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    More Shadow Walker the Progression of TLB Splitting on X86

    In this webcast, the presenter will cover the concept of Translation Lookaside Buffer (TLB) splitting for code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-splitting on modern hardware.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    2FF: Two Factor Failure

    Two Factor Authentication (2FA) systems are required by security standards and help to solve the many weaknesses of password authentication, and are increasingly found both in enterprise systems and in general web applications. Unfortunately, many 2FA systems have vulnerabilities - some glaring, some more subtle - and 2FA systems have...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Single Chip Microcontrollers: Beyond Arduino

    The world of Arduino has introduced many to the world of embedded controls. What does the world of commercial single chip microcontroller development look like? Are the users ready to move beyond Arduino? Come learn how the "Pros" do single chip embedded development and easy ways they can take their...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Hide Android Applications in Images

    In this webcast, the presenter has discovered a technique which enables them to hide whatever payload they wish in an Android PacKage (APK). The malicious payload is encrypted with AES, thus its reverse engineering does not give in any element.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Embedded Linux Device Drivers

    Purpose-built operating systems based on the Linux kernel are widely used in embedded system applications such as consumer electronics, networking equipment and industrial automation. Hardware for embedded systems is different from hardware for classical PC systems. While the general rules for Linux device drivers programming still apply, the hardware specifics...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Absolute Backdoor Revisited

    In this webcast, the presenter will includes a live demonstration of security flaws in modern anti-theft technologies that reside in firmware and PC BIOS of most popular laptops and some desktop computers. While the general idea behind anti-theft technology is good, improper implementation can render it useless as well as...

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    Citrix App Orchestration 2.5 Overview

    Citrix App Orchestration accelerates and automates the delivery of Desktops-as-a-Service (DaaS). It is built on proven Citrix best practices; App Orchestration helps service providers design and implement a secure, multi-tenant, multi-domain and multi-location based environment.

    Provided By Citrix Systems

  • Webcasts // Jul 2014

    Overview of the Citrix Client Virtualization Solution

    In this webcast, the presenter explains about how the Citrix client virtualization solution and Intel Core processors that helps the organization to manage and secure Windows and Mac devices. The client virtualization solution includes both XenClient and DesktopPlayer.

    Provided By Citrix Systems

  • Webcasts // Jun 2014

    Extend the Benefits of VMware Horizon 6 with Liquidware Labs

    VMware Horizon 6 provides more options than ever to deliver workspaces to the users tailored to their needs and requirements. In this webcast, the presenter will explain about the benefits of VMware Horizon 6. The presenter will also cover how the user can use their solutions and established methodology of...

    Provided By DABCC

  • Webcasts // Mar 2015

    Webcast: You Don't Know What You Don't Know! New Insights for Driving Cloud Strategy Through Analyzing Existing Behavior

    You can’t manage what you can’t measure and most of us find it difficult to formulate a strong cloud policy to complement what we’ve been doing in-house because it’s difficult to understand how good we are at managing our existing technologies. In this webinar we’ll explore the world of cloud...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Dec 2010

    A Look at "Bring Your Own" (BYO) Devices in the Enterprise

    As new, alternative devices become more popular and Generation-Y enters the workforce, employees seek empowerment to use their personal computing devices for work and organizations are required to rethink the way they deliver employee desktops. Through this webcast one will learn about how: empowered workers are driving the desktop revolution,...

    Provided By Citrix Systems

  • Webcasts // Dec 2010

    Local Events and Webinars to Learn More and Get Started

    Through this webcast one will learn about: empowered workers are driving the desktop revolution, self-service is the new model IT is striving to deliver, tablets are accelerating BYO deployments and desktop virtualization plays a crucial role in enabling BYO.

    Provided By Citrix Systems

  • Webcasts // Mar 2011

    Introducing VMware Zimbra Collaboration Suite 7.0

    Learn about the latest features in VMware Zimbra® Collaboration Suite 7.0. Zimbra boosts the productivity of users on any desktop and dramatically reduces total cost of ownership (TCO). View new features in a live product demonstration where you will see the following enhancements: Redesigned calendar screens to make...

    Provided By VMware

  • Webcasts // Feb 2010

    The Future of UI

    Minority Report science adviser and inventor John Underkoffler demos g-speak the real-life version of the film's eye-popping, tai chi-meets-cyberspace computer interface. Is this how tomorrow's computers will be able to control.

    Provided By TED Conferences

  • Webcasts // May 2011

    Client Virtualization. Solved.

    Hear how CDW helped one customer create a virtual desktop infrastructure to centrally manage desktops, reduce costs and maintenance time and improve recovery time.

    Provided By CDW & VMware

  • Webcasts // Apr 2010

    Accelerate Applications Deployment to Desktops with Virtualization

    VMware? ThinApp? agentless architecture delivers complete application-to-application and application-to-OS isolation for desktop software. It helps to deploy applications more quickly to end points without requiring costly server hardware or software infrastructure to be installed. In this webcast, you will learn: How the unique architecture of ThinApp reduces deployment...

    Provided By VMware

  • Webcasts // Oct 2009

    The Growing Demand For Engineering Talent

    To keep up with the engineering demands of Moore's Law, Craig Barrett, former Intel Chairman of the Board, discusses how the education and labor requirements of talent have evolved with the industry. While developing the first semiconductors took a team of only three people, today's market requires several hundred engineers...

    Provided By Stanford University

  • Webcasts // Jul 2011

    Webinar: The Real Story Behind Virtualization: How to Avoid the Hype and Reap the Benefits

    You hear a lot these days about virtualization and the benefits that come along with it. The enormous success that organizations have had with their server virtualization projects have led others to attempt to identify additional initiatives with which to reap these benefits. The positive experiences have even lead organizations...

    Provided By Riverbed

  • Webcasts // May 2011

    The Invisible IPhone

    Over time, using a smart-phone touch screen becomes second nature, to the point where one can even do some tasks without looking. Researchers in Germany are now working on a system that would let one perform such actions without even holding the phone - instead one would tap one's palm,...

    Provided By MIT

  • Webcasts // Mar 2011

    App Turns Your Phone Into a 3-D Scanner

    Capturing an object in three dimensions needn't require the budget of Avatar. A new cell phone app developed by Microsoft researchers can be sufficient. The software uses overlapping snapshots to build a photo-realistic 3-D model that can be spun around and viewed from any angle.

    Provided By MIT

  • Webcasts // Feb 2011

    Growing Lasers on Computer Chips

    The first time, researchers have grown lasers from high-performance materials directly on silicon. Bringing together electrical and optical components on computer chips would speed data transfer within and between computers, but the incompatibility of the best laser materials with the silicon used to make today's chips has been a major...

    Provided By MIT

  • Webcasts // Jan 2011

    ProcessorPM Power Management Video

    Take the first step to integrate multiple processor power management devices and improve system reliability by watching this 5 minutes webcast. ProcessorPM devices are the perfect companion for any processor, DSP, ASSP, or ASIC.

    Provided By Lattice Semiconductor

  • Webcasts // Jan 2011

    Lattice Diamond Key Concepts Video

    Lattice Diamond software includes several new key concepts. This video discusses the structure of Diamond projects and the use of implementations, strategies, and folders within projects. Additionally the video discusses shared design memory use, and context sensitive views.

    Provided By Lattice Semiconductor

  • Webcasts // Jan 2011

    Lattice 7:1 LVDS Interface Video

    This video demonstrates the quick and easy process of setting up the Lattice 7:1 LVDS Video Demo Kit with the LatticeECP2M Advanced Evaluation Board in a matter of minutes, and then illustrates two useful and powerful demos.

    Provided By Lattice Semiconductor

  • Webcasts // Jan 2011

    MachXO2: The Do-it-All PLD

    In this webcast, the presenters take a look at some of the typical system and consumer application requirements, and see how MachXO2 devices address these requirements. They also talk about the MachXO2 PLD feature set and discuss some of the available tools that enable one to evaluate and start designing...

    Provided By Lattice Semiconductor

  • Webcasts // Jan 2011

    Video: Lattice LCD-Pro Advanced Video Graphics Controller

    Take the first step to integrate advanced video graphics control into a LCD driver application by watching this 5 minute video. Lattice LCD-Pro Advanced Video Graphics Controller is the perfect vehicle to enable advanced Human Machine Interfaces (HMI) in Industrial, Automotive, Marine, Building Automation, Household Appliances, Medical and Consumer applications.

    Provided By Lattice Semiconductor

  • Webcasts // Jan 2011

    Platform Management Using MachXO & ProcessorPM PLDs

    The presenters begin this webcast with a quick overview of Lattice, followed by discussions on platform management and MachXO applications. They then follow that with a look at Lattice's design software suite.

    Provided By Lattice Semiconductor

  • Webcasts // Jan 2011

    Platform Management Using Low-Cost PLDs

    n this webcast, the speaker take a look at some of the demands of PLD's in the context of board management, power up control and housekeeping. They will also talk about the Lattice MachXO PLD feature set in this board management scenario. They will also discuss some of the tools...

    Provided By Lattice Semiconductor

  • Webcasts // Jan 2011

    MachXO2 Overview Video

    The MachXO2 family offers designers of low density PLDs an unprecedented mix of low cost, low power and high system integration in a single device. Compared to its popular predecessor, the MachXO family, the MachXO2 family delivers a 3X increase in logic density, 10X increase in memory, over 100X reduction...

    Provided By Lattice Semiconductor

  • Webcasts // Jan 2011

    Lattice Diamond Overview Video

    Lattice Diamond software includes many new features. This video overview briefly covers several new features and abilities such as the new user interface, design flow, and several tool views that are available. Other video are available that provide more information on specific aspects of the new Lattice Diamond software.

    Provided By Lattice Semiconductor

  • Webcasts // Jan 2011

    MachXO Mini Development Kit Video

    MachXO devices are the most versatile, non-volatile PLDs for low-density applications. Watch this 5-minute video to discover how to: test I2C, SPI, UART, SRAM interfaces and the 8-bit LatticeMico8 within minutes and build a own designs using the free downloadable source codes and implement these features in less than an...

    Provided By Lattice Semiconductor

  • Webcasts // May 2009

    Successful Virtual Desktop Deployments With VMware: Where to Start and Proven Best Practices

    Architecture and product selection are critical elements of successful virtual desktop deployments that directly impact the virtual desktop infrastructure's ability to realize a Return On Investment (ROI) and ensure user acceptance. The presenter of this webcast focuses on the necessary virtual infrastructure, server, storage, network and security architectural decisions that...

    Provided By VMware

  • Webcasts // Jun 2009

    Live Event: Activate Today! Realize ROI with Intel® vPro™ Technology and LANDesk

    Join the team from the Intel vPro Expert Center for an informative Webcast on the ROI savings and activation process for PCs with Intel? vPro? technology and LANDesk. This live TechRepublic Webcast, featuring Q&A, will be hosted by James Hilliard and feature special guest speakers from Intel Corporation, ...

    Provided By Intel

  • Webcasts // Jan 2009

    MSDN Webcast: BenkoTips Live and on Demand: Working With Expression and XAML (Level 100)

    XAML is a powerful platform for building the next generation of useable applications and Microsoft Expression takes the creative possibilities to a new level. The professional design tools and innovative technologies in Expression gives the flexibility and freedom to bring the vision to reality whether one is designing creative and...

    Provided By Microsoft

  • Webcasts // Mar 2009

    The Meaning of the "v" in Intel vPro Technology

    The presenter explains what the "v" in Intel vPro Technology means.

    Provided By Intel

  • Webcasts // Oct 2008

    MSDN Webcast: Windows XP Professional for Embedded Systems (Level 100)

    Available through 2016, the Windows XP Professional for Embedded Systems operating system is a great solution for embedded systems including kiosks, Automated Teller Machines (ATMs), industrial controllers, and large medical devices. The attendee of this webcast will learn how to take advantage of the full power of the Windows XP...

    Provided By Microsoft

  • Webcasts // Jan 2010

    Burton Group - Successful Virtual Desktop Deployments with VMware: Where to Start & Proven Best Practices

    This session focuses on the necessary virtual infrastructure, server, storage, network and security architectural decisions that can make or break desktop virtualization projects.

    Provided By VMware

  • Webcasts // Jan 2010

    Moving to New Intel-Based PCs and Microsoft Windows 7

    The presenter of this webcast explains the benefits Intel IT sees in moving to new Intel - based PCs with Windows 7.

    Provided By Intel

  • Webcasts // Sep 2009

    Compucom and Intel vPro Technology - Out of the Box Innovation

    Compucom, provider of IT solutions to Fortune 1000 companies, describes how Compucom customers who have deployed PCs with Intel vPro technology lower support costs, improve user uptime, experience faster patch management, and have the building blocks for more-secure, remotely-managed client virtualization.

    Provided By Intel

  • Webcasts // Aug 2009

    Momentum Webcast: Windows 7 and Hyper-V Deep Dive (Level 100)

    Are you interested in boosting your business by combining the power of the Windows 7 operating system with Hyper-V virtualization? The attendee of this webcast will learn how the Windows 7 and Windows Server 2008 R2 operating systems work together to: Employ state-of-the-art disaster recovery techniques utilizing distributed branch...

    Provided By Microsoft

  • Webcasts // Sep 2009

    Dell Talks Microsoft Consulting Services

    Dell's Burk Buechler describes Dell's Consulting Services for Microsoft.

    Provided By Dell

  • Webcasts // Nov 2009

    Learn Why VMware View Is the Most Widely Deployed Platform for Desktop Virtualization

    Considering deploying a virtual desktop infrastructure? It is important to understand the benefits of VMware View versus alternative solutions. The attendee of this webcast will learn the key decision criteria when evaluating a virtual desktop session and how VMware View can help to create a dynamic desktop environment.

    Provided By VMware

  • Webcasts // Nov 2009

    E-Business Suite Spotlight Video

    3 Minutes with Free Tool Can Save Thousands! The EBS ROI Tool quickly points out the benefits of upgrading to EBS R12 on IBM hardware. Uncover improved productivity and better value. See how you can improve decision-making while reducing your total cost of ownership through process efficiencies and technology simplification.

    Provided By IBM

  • Webcasts // Nov 2009

    Fundamentals of Volume Activation

    Volume Activation is a set of activation methods applicable to systems under the Volume Licensing program or using Volume Licensing media obtained thru MSPP/MAPS/MSDN. Activation is required and Windows Activation Technology from Microsoft will make it simple to manage you organization's activation. This video will get you started understanding...

    Provided By Microsoft

  • Webcasts // Mar 2010

    Breakthrough Performance for Business-Critical Apps With VMware and Intel

    VMware vSphereTM 4 and the latest Intel Xeon processors provide breakthrough performance and unparalleled flexibility for business-critical server applications such as Microsoft Exchange, Oracle Database and SAP ERP. This webcast will help you learn how to standardize on VMware and Intel with confidence to consolidate all your business-critical applications...

    Provided By VMware

  • Webcasts // May 2010

    Working smarter by moving to IBM/RedHat based desktop alternatives

    CIOs and IT professionals typically understand the potential cost savings and benefits of Linux-based desktop alternatives versus Microsoft. One alternative is an IBM/Red Hat desktop solution. IBM and Red Hat recently announced a joint initiative to help enterprise clients migrate from Microsoft-based desktops to economical, security-rich Linux-based desktops. The initiative...

    Provided By IBM

  • Webcasts // Jan 2010

    TechNet Radio: Optimize Your Desktop Infrastructure With System Center Configuration Manager and Windows 7

    Sporton International, a leading testing, certification and electromagnetic compatibility consultant wanted to relieve its two-person IT staff of time-sapping desktop management chores, minimize employee disruptions, and shrink computer setup time to speed the testing process. Sporton deployed Microsoft System Center Configuration Manager 2007 Service Pack 2, which inter-operates with Microsoft...

    Provided By Microsoft

  • Webcasts // Jun 2010

    Dell Webinar: OEM Solutions

    For more than twelve years, Dell OEM Solutions has worked with global computing appliance vendors to help them speed their time to profit and decrease the total cost of ownership for their customers. View this webcast to learn how working with Dell's OEM Solutions team can help you save time...

    Provided By Dell

  • Webcasts // Aug 2010

    American Business: Retail On The Road

    Two California-based designers are taking their products on the road this summer, mixing cosmos and custom-made clothes. They're bringing their creations to their customers with a series of trunk shows to make sure their new line is a huge success.

    Provided By American Express