Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Podcasts // Apr 2014

    Basics of Hardware Snapshots

    CommVault’s Phil Philip Curran (@PhilJPhilip Curran) discusses how integrated snapshots and data replication technologies can quickly create multiple recovery-ready copies of production data without impacting server performance. In addition, CommVault’s deep integration with VMware vStorage APIs for data protection (VADP) helps customers protect their virtual machines as they come online.Learn...

    Provided By CommVault Systems

  • Podcasts // Feb 2014

    T-Mobile Podcast

    Learn how wireless services provider T-Mobile US, Inc. improved cloud- and data-access services delivery to its enterprise customers. Listen to the podcast featuring Daniel Spurling, Director of IT Infrastructure at T-Mobile US, Inc and understand now T-Mobile moved from manual cloud provisioning services to a centralized service portal to better...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    The Manager of Managers Approach to Running Your IT Environment Virtual Event

    Do you have a single console to view, control, and manage your IT environment? Is automation built into your monitoring strategy? As IT environments become more dynamic, your operations teams need a unified view for management and monitoring. Automatic detection, and automated monitoring setup and configuration are two ways to...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    Thinking ahead: Pragmatic steps for successful cloud transformations virtual event

    Public, private, or hybrid, the cloud is creating an array of opportunities for business and IT. And it’s reshaping IT as we know it. But incorporating cloud technology and services into the data center can entail multi-year transformations. The key to successful cloud transformations is developing a pragmatic strategy and...

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jan 2014

    BYOEF Video

    Learn how build your own a highly resilient, high-performance Brocade Ethernet fabric.

    Provided By Brocade

  • Podcasts // Jan 2014

    Messaging Architects: Upgrading to GroupWise 8, 'TOP' Grading to Compliance

    Risk free e-mail infrastructure products to provide 100 percent up time and compliance. Includes policy enforcement and management. In this podcast, the presenter explains about how to utilize Messaging Architects products with GroupWise 8.

    Provided By Novell

  • Podcasts // Jan 2014

    NetBackup 7.5 for VMware

    In this podcast, the speaker will explain about NetBackup 7.5 for VMware. Get a deep dive look into how the NetBackup Platform provides a superior solution for protecting virtual servers which includes a technology overview.

    Provided By SYMA S.C.

  • Podcasts // Jan 2014

    SSH Gymnastics Using Proxychains

    Proxychains is a Linux dynamically loadable library that will intercept any TCP and UDP traffic from a specific process and tunnel it over HTTP, SOCKS4 or SOCKS5 proxy. In this podcast, the speaker will explain how to Use Proxychains to pivot through SSH servers to reach internal systems.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Proxy Server

    Proxy server works as intermediate server to send the requests to main servers on internet on behalf of other computers, so that can hide the identity of actual requester or user using internet. It is like a middleone that works between the user's computer and the server.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    TDL4 Rootkit - Being Used as a Proxy

    In this podcast, the speaker will explain the TDL4 Rootkit. It helps the user to learn how the new TDL4 Rootkit uses an infected PC as a proxy server. The TDL4 Rootkit claimed to support all versions of Microsoft Windows, since XP including Windows 7 sp1, inclusive, and supports both...

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Using Security Tools - Paros Proxy

    Paros is a program for people who need to evaluate the security of their web applications. It is free of charge and completely written in Java. Through Paros's proxy nature, all HTTP and HTTPS data between server and client, including cookies and form fields, can be intercepted and modified.

    Provided By SecurityTube.net

  • Podcasts // Jan 2014

    Load Balancing Apache Server

    In this podcast, the listener can learn how to setup Load Balancing on Apache server. The speaker will explain how this load balancing works on two apache server and why load balancing is important for security.

    Provided By SecurityTube.net

  • Podcasts // Dec 2013

    Excluding an IP Address from Video Caching on a Citrix CloudBridge Appliance

    The CloudBridge appliance proxies every HTTP connection as a result the user may want certain source or destination IP address from the proxy behavior. This may be needed to access application that are configured for 1:1 access.

    Provided By DABCC

  • Podcasts // Dec 2013

    Configuring Domain Append on a CloudBridge Appliance

    Internal servers in an enterprise are part of a domain and are resolved using the domain. The CloudBridge appliance proxy's users on the network, but does not resolve the domain suffix.

    Provided By DABCC

  • Podcasts // Nov 2013

    Why care about managed services? Transformational benefits, that's why

    This mini paper and podcast features Lynn Koch discussing the benefits of managed services.

    Provided By IBM

  • Podcasts // Nov 2013

    Enabling the journey to IT-as-a-Service

    Watch video to see how Citrix is helping customers enable their journey towards IT-as-a-Service with Citrix CloudPortal Business Manager and Citrix CloudPlatform.

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Different workloads, different architectures, one solution

    A live white-boarding session where the Citrix cloud team talks about the different types of application workloads that run in the cloud, how they are architected and how Citrix CloudPlatform can deliver any type of workload. Watch now!

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Open and flexible cloud orchestration

    Based on open source Apache CloudStack, Citrix CloudPlatform is the industry’s most flexible and open cloud orchestration platform. Leverage industry standard Amazon Web Service APIs and the rich partner ecosystem to expand and integrate value added solutions and services.

    Provided By Citrix Online

  • Podcasts // Oct 2013

    Collaborating for the Internet of Things

    When it comes to developing solutions for the Internet of Things (IoT), they need to be connected, managed and secure. Learn from Tom Moore of McAfee, Jim Douglas of Wind River, and Kumar Balasubramanian of Intel how they are collaborating to streamline IoT integration by delivering consistent, reliable, integrated, end-to-end...

    Provided By Wind River

  • Podcasts // Sep 2013

    Drive Your Transformation

    Drive your transformation to cloud computing.

    Provided By Technologent

  • Podcasts // Sep 2013

    EMC VSPEX

    EMC VSPEX - World's fastest-growing reference architecture. EMC VSPEX, now delivers 2X more virtual machines at the same price, and an even broader spectrum of choice for workloads that matter.

    Provided By Technologent

  • Podcasts // Aug 2013

    Trends in Video Collaboration and Unified Communications

    Unified communication solutions can help organizations improve their productivity, stay competitive and be more agile. But knowing what type of communication solutions your organization solutions your organization needs can be difficult and time-consuming. In this on-demand webinar, AVI-SPL's vice president of Collaboration Solutions, Shai Moshe, shares insights and advice...

    Provided By AVI-SPL

  • Podcasts // Aug 2013

    Cloud Networking: What It Means for App Development

    In this podcast, the speaker will look at the application delivery controller's effect on the development, deployment and maintenance of applications, and web applications in particular. Starting with an overview of the evolution of load balancers into Application Delivery Controllers (ADCs), the speaker will then dive deeper into how the...

    Provided By oreilly

  • Podcasts // Jul 2013

    How To Avoid IP Address Conflicts

    An IP address conflict occurs when two computers on the same network have been assigned the same IP address. This conflict causes malfunction of communication from/to "shared" IP Address and can spiral into a frantic troubleshooting event. In this video we will discuss how to identify, resolve and prevent static...

    Provided By SolarWinds

  • Podcasts // Jul 2013

    Cape Cod Academy meets the BYOD challenge with HP Networking solutions

    How did the Cape Cod Academy triple wireless bandwidth, expand coverage by 20% and personalize the education experience among its students, faculty and staff? This case study outlines how they met their BYOD challenge during the mobile device boom with HP Networking Solutions.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Unified wired-WLAN solution for enterprises

    This fact sheet outlines the features and benefits of HP’s new unified wired and wireless enterprise solution that delivers industry-leading scalability, reliability and throughput for large enterprise campuses.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Unify communications quickly: HP AppSystem for Microsoft® Lync®

    This solution brief outlines how HP AppSystem for Microsoft® Lync® provides a solid base for Lync deployment to significantly shorten time to value and reap the benefits of unified communications.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Video: HP Networking Value Proposition

    Craig Hinkley, Vice President and General Manager of HP Networking Americas, shares why HP Networking offers a simplified network solution for better performance, scalability and reliability—and lower TCO.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Video: HP Virtual Application Networks

    In this brief video, see how businesses can use HP Virtual Application Networks to focus on connecting users to business applications and on the quality of experience—rather than on the details of configuring the network, device by device.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Jul 2013

    Video: Underwriters Laboratories future-proofs their network

    See how HP helped Underwriters Laboratories future-proof their network with solutions to fulfill their goals with a reliable, centrally managed network built on modular, scalable HP technologies that support their projected growth over the next ten years.

    Provided By Hewlett-Packard (HP)

  • Podcasts // Apr 2013

    Big Ideas; Big Tech- Continuous Availability for VMware

    This animated video discusses how the transition to a virtualized infrastructure introduces new gaps that traditional solutions are unable to resolve. Watch this video to learn how VPLEX enables users to transform their increasingly complex IT environments into a unified availability approach.

    Provided By EMC

  • Podcasts // Mar 2013

    CareFusion Video

    Medical technology leader CareFusion has an ambitious mission: to improve the safety and lower the cost of health care for generations to come. With such iconic clinical brands as Pyxis® dispensing and Alaris® infusion products, the company is well positioned and already doing just that.

    Provided By Workday

  • Podcasts // Feb 2013

    Mobility Product Demo

    Redesigned and reimagined for the mobile world, Workday Mobile offers all the same insight, information, and intelligence you get on your desktop. And it's delightfully easy to use—Workday’s touch-optimized interface offers easy access to tasks, real-time analytics, and worker information.

    Provided By Workday

  • Podcasts // Feb 2013

    Australian Building Products Leader Easily Achieves Disaster Recovery Objectives with Silver Peak

    See how Australia’s largest independent locally-owned manufacturer and distributor of wood-based building products, Gunnersen, has implemented Silver Peak Systems to ensure its recovery point objectives (RPO) are achieved. In the end Gunnersen was amazed by Silver Peak’s data mobility performance, price and deployment ease.

    Provided By Silver Peak Systems, Inc.

  • Podcasts // Feb 2013

    Forrester Video: The Next Generation Cloud and Your Network

    The wide area network, or WAN, is essential to next-generation cloud computing. This video featuring Forrester Research analyst Vanessa Alvarez looks at what is required for next-generation cloud implementations and the critical role the wide area network plays in the success of cloud deployments. Forrester's Vanessa Alvarez highlights the importance...

    Provided By Silver Peak Systems, Inc.

  • Podcasts // Jan 2013

    Symantec Certificate Intelligence Center - Overview

    In this podcast, the speaker going to discuss about the Symantec Certificate Intelligence Center who discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec File Share Encryption

    Learn how Symantec File Share Encryption encrypts files and folders based on policy and enables end users to continue normal business operations with zero disruptions. All while contributing to a more secure and effective work environment.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Wi-Fi Security - White List Access Points by SSID

    In this podcast, the speaker going to explain about the Wi-Fi security policy of endpoint security management. The speaker will also explain the how to allow access to a specific SSID and block other APs and enforce minimum wireless security.

    Provided By Novell

  • Podcasts // Jan 2013

    Application Control

    In this podcast, the speaker going to explain about the application control policies at ZENworks endpoint security management. The speaker will also explain the how to block the execution of files and network access of files.

    Provided By Novell

  • Podcasts // Jan 2013

    Hardware Control-Disable Wi-Fi When Wired

    In this podcast, the speaker going to explain communication hardware policy of how to disable Wi-Fi when wired, disable modems, disable modems when wired, manage 1394 (Firewire), IDA, Bluetooth, serial/parallel, and adapter bridging.

    Provided By Novell

  • Podcasts // Jun 2011

    TR10: Cloud Streaming

    In the Silicon Valley conference room of OnLive, Steve Perlman touches the lifelike 3-D face of a computer-generated woman displayed on his iPad. Swiping the screen with his fingers, Perlman rotates her head; her eyes move to compensate, so that she continues to stare at one spot. None of this...

    Provided By MIT

  • Podcasts // Feb 2013

    Mobility Product Demo

    Redesigned and reimagined for the mobile world, Workday Mobile offers all the same insight, information, and intelligence you get on your desktop. And it's delightfully easy to use—Workday’s touch-optimized interface offers easy access to tasks, real-time analytics, and worker information.

    Provided By Workday

  • Podcasts // Mar 2013

    CareFusion Video

    Medical technology leader CareFusion has an ambitious mission: to improve the safety and lower the cost of health care for generations to come. With such iconic clinical brands as Pyxis® dispensing and Alaris® infusion products, the company is well positioned and already doing just that.

    Provided By Workday

  • Podcasts // Jan 2013

    Symantec Certificate Intelligence Center - Overview

    In this podcast, the speaker going to discuss about the Symantec Certificate Intelligence Center who discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.

    Provided By Symantec Corp.

  • Podcasts // Jan 2013

    Symantec File Share Encryption

    Learn how Symantec File Share Encryption encrypts files and folders based on policy and enables end users to continue normal business operations with zero disruptions. All while contributing to a more secure and effective work environment.

    Provided By Symantec Corp.

  • Podcasts // Apr 2014

    Basics of Hardware Snapshots

    CommVault’s Phil Philip Curran (@PhilJPhilip Curran) discusses how integrated snapshots and data replication technologies can quickly create multiple recovery-ready copies of production data without impacting server performance. In addition, CommVault’s deep integration with VMware vStorage APIs for data protection (VADP) helps customers protect their virtual machines as they come online.Learn...

    Provided By CommVault Systems

  • Podcasts // Aug 2012

    McAfee Deep Defender video

    An in-depth look of how McAfee Deep Defender and DeepSAFE works with the Intel hardware features to run beyond the operating system to detect covert stealth attacks in real-time.

    Provided By Intel Corporation

  • Podcasts // Jul 2013

    How To Avoid IP Address Conflicts

    An IP address conflict occurs when two computers on the same network have been assigned the same IP address. This conflict causes malfunction of communication from/to "shared" IP Address and can spiral into a frantic troubleshooting event. In this video we will discuss how to identify, resolve and prevent static...

    Provided By SolarWinds

  • Podcasts // Nov 2013

    Enabling the journey to IT-as-a-Service

    Watch video to see how Citrix is helping customers enable their journey towards IT-as-a-Service with Citrix CloudPortal Business Manager and Citrix CloudPlatform.

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Different workloads, different architectures, one solution

    A live white-boarding session where the Citrix cloud team talks about the different types of application workloads that run in the cloud, how they are architected and how Citrix CloudPlatform can deliver any type of workload. Watch now!

    Provided By Citrix Online

  • Podcasts // Nov 2013

    Open and flexible cloud orchestration

    Based on open source Apache CloudStack, Citrix CloudPlatform is the industry’s most flexible and open cloud orchestration platform. Leverage industry standard Amazon Web Service APIs and the rich partner ecosystem to expand and integrate value added solutions and services.

    Provided By Citrix Online

  • Podcasts // Aug 2009

    Military & The Notre Dame MBA

    Andy Dermanoski, Notre Dame MBA student and military recruiting assistant, discusses his choice to join the Notre Dame MBA community and how the program was a good fit with his military background.

    Provided By University of Notre Dame (Mendoza)

  • Podcasts // Sep 2009

    The Smart Grid: Managing Electrical Power Distribution and Use

    In this podcast, the speaker discusses the growing digitization of electrical power distribution (referred to as the smart grid) and some of the related security and privacy issues. He also introduces new work at the SEI on a smart grid maturity model that will be discussed in more detail in...

    Provided By Carnegie Mellon University

  • Podcasts // Dec 2011

    Oracle BPM Suite Overview: Social BPM (mp3)

    While social technologies have exploded in the personal sphere, and Business Process Management is an inherently social and collaborative effort and is the logical target for convergence with social technologies, this convergence, popularly referred as Social BPM provides process lifecycle participants in the business and IT with expanded tools for...

    Provided By Oracle

  • Podcasts // Dec 2011

    Introducing Oracle SOA Governance 11g

    Service-oriented architecture (SOA) governance is critical for the success of organizations' SOA initiatives. SOA promises to deliver business agility at a lower total cost of ownership. This is primarily driven by its ability to reuse services. SOA governance enables this in three specific ways: asset visibility, the ability to control...

    Provided By Oracle

  • Podcasts // Dec 2011

    Video: Introduction to the Oracle Database Appliance

    Introducing the Oracle Database Appliance, a fully integrated system of software, servers, storage and networking in a single box. It's a complete, engineered high availability database solution capable of supporting a wide range of home grown and packaged OLTP and Data Warehousing applications. It's simple to implement, maintain, support and...

    Provided By Oracle

  • Podcasts // Dec 2011

    Oracle launches SPARC SuperCluster T4-4 and Next Generation SPARC T4 Servers

    The optimized processor system design provides support for a wide range of IT services and application types. Uniformity of management interfaces and standards adoption also help reduce administrative costs, while an innovative chassis design provides density, efficiency, and economy for modern data centers. Watch this webcast with Oracle CEO Larry...

    Provided By Oracle

  • Podcasts // Oct 2010

    Why Upgrade to PeopleSoft HCM 9.1 (PODCAST)

    PeopleSoft HCM 9.1 is the most robust release in years with over 9,000 enhanced pages, 270 new features, 83 new Web services and 8 new solutions. Tune into this conversation with Jay Richey, Director, Product Marketing for Oracle PeopleSoft Enterprise Human Capital Management Solutions to understand how this solution can...

    Provided By Oracle

  • Podcasts // Dec 2010

    Podcast: How Oracle GRC Applications Improve the Bottom Line

    By spotting anomalies before they incur large losses and limiting exposure to fraud and wastage, organizations save on time and cost spent on errors and remediation, prevent the escalation of risk, and optimize business performance. The session will unveil the latest capabilities offered by Oracle's GRC Applications that help companies...

    Provided By Oracle

  • Podcasts // Jan 2012

    Disaster Recovery and Data Assurance

    In this podcast, the speakers discuss about the disaster recovery and data assurance. The speakers will also discuss the affects and ways how to overcome those kind of disaster recovery.

    Provided By Sybase

  • Podcasts // Jan 2012

    Part 2 - Managing DBMS Workloads With ASE

    In this podcast, the speakers discuss about how to manage the workloads of DBMS along with ASE. The speakers also discuss about the operating systems and virtualization and its benefits.

    Provided By Sybase

  • Podcasts // Jan 2012

    Part 3 - Managing DBMS Workloads With ASE

    In this podcast, the speakers discuss about how to manage the workloads of DBMS along with ASE. The speakers also discuss about the hardware and data storage in DBMS and its benefits.

    Provided By Sybase

  • Podcasts // Jan 2012

    Accanto Systems Identify and Predict Phone Network Problems Using Oracle Database 11g

    In this podcast, the speaker explains how to use Oracle Database 11g to identify and even predict network issues. This helps service providers deliver improved quality of service while reducing costs.

    Provided By Oracle

  • Podcasts // Feb 2012

    Why Oracle Developed Network Virtualization

    In this podcast, the speaker explains how figuring out the engineering to manage network traffic for multiple Oracle zones across a single Network Interface Card (NIC) naturally led to the development of virtual NICs.

    Provided By Oracle

  • Podcasts // Jan 2012

    MorphoTrak Improves Quality of Service With Oracle Active Data Guard

    In this podcast, the speaker discusses how Oracle Active Data Guard lowers costs and enhances quality of service for their customers' IT Systems by offloading resource-intensive activities from their production database to standby databases.

    Provided By Oracle

  • Podcasts // Jan 2014

    Messaging Architects: Upgrading to GroupWise 8, 'TOP' Grading to Compliance

    Risk free e-mail infrastructure products to provide 100 percent up time and compliance. Includes policy enforcement and management. In this podcast, the presenter explains about how to utilize Messaging Architects products with GroupWise 8.

    Provided By Novell

  • Podcasts // Jan 2013

    Wi-Fi Security - White List Access Points by SSID

    In this podcast, the speaker going to explain about the Wi-Fi security policy of endpoint security management. The speaker will also explain the how to allow access to a specific SSID and block other APs and enforce minimum wireless security.

    Provided By Novell

  • Podcasts // Jan 2013

    Application Control

    In this podcast, the speaker going to explain about the application control policies at ZENworks endpoint security management. The speaker will also explain the how to block the execution of files and network access of files.

    Provided By Novell

  • Podcasts // Jan 2013

    Hardware Control-Disable Wi-Fi When Wired

    In this podcast, the speaker going to explain communication hardware policy of how to disable Wi-Fi when wired, disable modems, disable modems when wired, manage 1394 (Firewire), IDA, Bluetooth, serial/parallel, and adapter bridging.

    Provided By Novell

  • Podcasts // Jan 2013

    VPN Enforcement

    In this podcast, learn how to configure the VPN enforcement, locations and network environments, firewalls for office and VPN enforcement, VPN enforcement setup, trigger location, switch to location, and invoke VPN.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Endpoints With Novell Endpoint Security Management

    In this podcast, the speaker explains the need for ZENworks endpoint security management and how ZESM addresses those needs. ZENworks endpoint security is agent based solution for enforcing information security policies.

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Security Best Practices From IDC and Novell

    To ensure that the users' infrastructure is protected against external threats, it's critical to not only secure the infrastructure at the perimeter, but also at the endpoint. In this podcast, the speakers will discusses about the business endpoint security issues, business at the endpoint and endpoint case studies.

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Infrastructure Using ZENworks Endpoint Security Management and ZENworks Network Access Control

    Organizations everywhere are providing users with more mobile devices - with the ability to connect to more networks - than ever before. Why? Because mobility equals productivity, and organizations benefit from every additional degree of mobile enablement they provide to their people. In this podcast, the speaker will help the...

    Provided By Novell

  • Podcasts // Jan 2013

    Tips for Managing and Securing Endpoints in the Enterprise

    In today's economy, organizations are becoming more complex everyday and devices are exploding in the enterprise. This growth creates IT challenges. In this podcast, the speakers offer tips to help organizations manage, optimize and secure their endpoints.

    Provided By Novell

  • Podcasts // Jan 2013

    Endpoint Management: Challenges and Observations

    This podcast reveals why the users' need to manage endpoints, and what's at stake if they don't. End users can accidentally or intentionally compromise the information on their Blackberries, thumb drives, and laptops. And malware, direct attacks, and phishing scams, can actually threaten their ability to run their business. The...

    Provided By Novell

  • Podcasts // Jan 2013

    Securing Your Environment Using Novell ZENworks Endpoint Security Management and Novell ZENworks Network Access Control

    In this podcast, learn how the users' can leverage the power of ZENworks endpoint security management. The speaker will also examines ZENworks network access control across their enterprise, so their users can stay productive.

    Provided By Novell

  • Podcasts // Jan 2013

    What's New in ZENworks Endpoint Security Management 11

    In this podcast, the speaker going to explain about the latest features of ZESM 11 endpoint security management. The speaker will also explain how to deploy and configure integrated ZESM, UI for ZESM policies, location assignment policy and conflict resolution.

    Provided By Novell

  • Podcasts // Mar 2012

    Oracle Business Intelligence Enterprise Edition 11g - New Features Overview

    In this podcast, you'll hear from Matt Bedin, Director for BI Product Management for Oracle, about the many new, features and enhancements in Oracle Business Intelligence Enterprise Edition 11g (OBIEE 11g)?that will excite both end-users and IT managers.? OBIEE 11g delivers an innovative, task-oriented user environment, next-generation visualization, advanced multi-dimensional...

    Provided By Oracle

  • Podcasts // Mar 2012

    Oracle HR Analytics: Driving Return on Human Capital Investment

    In this podcast, you'll hear from Lexy Martin, the director of Research and Analytics for CedarCrestone, and the author of a recent, in-depth Oracle white paper on HR Analytics, as she talks about current trends in HR and how firms are using analytics to gain insights on their HR operations...

    Provided By Oracle

  • Podcasts // Mar 2012

    Latest Servers and Solaris Podcasts

    Oracle's complete portfolio of Sun servers, storage, networking, Oracle Solaris and other software are engineered to work together to deliver record-breaking performance, simplified management, and cost-saving efficiencies. Tune in to our featured podcasts and find out why we offer the ideal infrastructure for your business, from applications to disk.

    Provided By Oracle