Software

Software-as-a-service offers cost savings, scalability and mobile accessibility -- if you correctly manage the resulting SLAs, APIs and data structures.

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Feb 2015

    Understanding a New Memory Corruption Defense: Use-After-Free (UAF) Mitigation and Bypass

    Memory corruption has plagued computers for decades. These software bugs can often be transformed into working cyber-attacks. High-level protections, such as anti-virus, have done little to stop the tide. Recent low-level protections such as non-executable memory and module randomization have helped.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    NACL: A New Crypto Library

    NaCl (pronounced \"Salt\") is a new easy-to-use high-speed software library for encryption, decryption, signatures, etc. NaCl's goal is to provide the entire core operations needed to build higher-level cryptographic tools. Of course, other libraries already exist for these core operations, but NaCl improves security, improves usability, and improves speed.

    Provided By SecurityTube.net

  • Webcasts // Feb 2015

    The Windows Sandbox Paradox

    More user applications are relying on sandboxes to limit the damage remote code execution vulnerability can inflict. It started with Web browsers such as with Internet Explorer's protected mode and now covers many different applications. Unfortunately the Windows operating system isn't well matched to providing secure sandboxing.

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    An Open Hardware and Software Platform, Based on the (Nominally) Closed-Source MT6260 SoC

    In this webcast, the presenter will introduce Fernvale, a reverse-engineered, open hardware and software platform based upon Mediatek's MT6260 value phone SoC. The MT6260 is the chip that powers many of the $10 GSM feature phones produced by the Shanzhai. Fernvale is made available as open-licensed schematics, board layouts, and...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Attacks on UEFI Security, Inspired by Darth Venamis's Misery and Speed Racer

    On modern Intel based computers there exist two powerful and protected code regions: the UEFI firmware and System Management Mode (SMM). UEFI is the replacement for conventional BIOS and has the responsibility of initializing the platform. SMM is a powerful mode of execution on Intel CPUs that is even more...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Finding the Weak Crypto Needle in a Byte Haystack

    Using the same stream cipher key twice is known to be a very bad idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. In this webcast, the presenter will describe a heuristic algorithm which can detect...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Cyber Necromancy - Reverse Engineering Dead Protocols

    Reverse engineering is not all binaries and byte-code. The black art also extends to networks and unobtainable game servers. In this webcast, the presenters will go into the gruesome details of how they dug through the graveyards of console binaries and mausoleums of forgotten network protocols in order to stitch...

    Provided By SecurityTube.net

  • Webcasts // Jan 2015

    Reproducible Builds - Moving Beyond Single Points of Failure for Software Distribution

    Software build reproducibility is the ability to use independent build machines to compile bit-identical binaries from program source code. In this webcast, the presenters will discuss the motivation for and the technical details behind software build reproducibility. They will describe the technical mechanisms used by the Tor project to produce.

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abuse of Blind Automation in Security Tools

    It is impossibly overwhelming for security personnel to manually analyze all of the data that comes to them in a meaningful way. Intelligent scripting and automation is key. This webcast aims to be a humorous reminder of why the word \"Intelligent\" really matters; the user's security devices might start doing...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Abusing Software Defined Networks

    Software Defined Networking (SDN) transfers all forwarding decisions to a single controller and provides the network with the same degree of control and flexibility as the cloud. And with all the major vendors onboard, it will soon be supporting networks everywhere. But current implementations are full of weaknesses that could...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Android Hacker Protection Level 0

    Have no fear, after drinking all the cheap wine two Android hackers has attacked all the protectors currently available for everyone's enjoyment! Whether the user have never reversed Android before or are a hardened veteran there will be something for the user, along with all the glorious PoC tools and...

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Some Vulnerabilities are Different Than Others Studying Vulnerabilities and Attack Surfaces in the Wild

    The security of deployed and actively used systems is a moving target, influenced by factors not captured in the existing security metrics. For example, the count and severity of vulnerabilities in source code, as well as the corresponding attack surface, are commonly used as measures of a software product's security....

    Provided By SecurityTube.net

  • Webcasts // Dec 2014

    Test Driven Security Testing

    As more and more businesses are moving to rapid application development frameworks, and methodologies. The presenter find that testing within these constructs to become more difficult due to shorter cycles, incomplete applications, limited staff and resources. How do they test within these frameworks leveraging existing people, and infrastructure to provide...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Security Model Bedfellows

    The penetration test finds a bug in the code that was coded four months ago and could have been prevented a year ago during requirements gathering. The vendor says they will fix it shortly after the software launches - if a change order is issued and they're paid for their...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Automatically Detecting Vulnerable Websites Before They Turn Malicious

    Significant recent research advances have made it possible to design systems that can automatically determine with high accuracy the maliciousness of a target website. While highly useful, such systems are reactive by nature. In this webcast, the presenter will take a complementary approach, and attempt to design, implement, and evaluate...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Epidemiology of Software Vulnerabilities: A Study of Attack Surface Spread

    Many developers today are turning to well established third-party libraries to speed the development process and realize quality improvements over creating an in-house proprietary font parsing or image rendering library from the ground up. Efficiency comes at a cost though: a single application may have as many as 100 different...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Exploiting Unpatched iOS Vulnerabilities for Fun and Profit

    Patching all vulnerabilities for a modern, complex software system (i.e., Windows, iOS) is often difficult due to the volume of bugs and response time requirements. Instead, software vendors usually devise quick workarounds to mitigate the exploitation of a given vulnerability. However, those patches are sometimes incomplete, and attackers can utilize...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Hacking the Wireless World with Software Defined Radio-2.0

    Wireless systems, and their radio signals, are everywhere: consumer, corporate, government, amateur - widely deployed and often vulnerable. If the users have ever wondered what sort of information is buzzing around them, in this webcast, the presenter will introduce how the user can dominate the RF spectrum by 'Blindly' analyzing...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    Digging for IE11 Sandbox Escapes Part 2

    In this webcast, the presenter undertake to find these vulnerabilities, giving time to go in-depth on how to investigate the IE11 sandbox, run the users own code and analyze the attack surface. Sample source code for all issues will be provided for use to allow the users to test the...

    Provided By SecurityTube.net

  • Webcasts // Nov 2014

    What Goes Around Comes Back Around - Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

    Bot herders deploy Command and Control (C&C) panels for commanding and collecting exfiltrated data from the infected hosts on the Internet. To protect C&C panels, bot herders deploy several built-in (software-centric) protection mechanisms to restrict direct access to these C&C panels.

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Time Trial - Racing Towards Practical Remote Timing Attacks

    Attacks on software become increasingly sophisticated over time and while the community has a good understanding of many classes of vulnerabilities that are commonly exploited, the practical relevance of side-channel attacks is much less understood. One common side-channel vulnerability that is present in many web applications today are timing side-channels...

    Provided By SecurityTube.net

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Sep 2014

    So You Want to Murder a Software Patent

    Software patents are a huge source of controversy and discussion in the tech world. This semi-hilarious legal story will cover the experience of the case, the details, and how the entire process went down. Hopefully some combination of entertainment, education and insight will ensue.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    Node.JS as a Networking Tool

    Node.js is a library that provides non-blocking I/O for Google's V8 JavaScript engine. In this webcast, the presenter explores node's suitability for a diverse range of networking applications. Writing network applications with good concurrency and performance has been a very time consuming task in the past.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    BSIMM: A Decade of Software Security

    Now, at the end of a decade of great progress in software security, the way of measuring software security initiatives called the BSIMM. BSIMM is helping transform the field from an art into a measurable science. In this webcast, the presenter will provide an entertaining review of the software security...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    CISO Perspectives: Aligning Secure Software Application Development with Business Interests

    Software security is first, and foremost, a business problem. Attackers have learned that nearly all web applications can be exploited via application-level vulnerabilities. Using any one of a long list of common entry points, an attacker can make the software misbehave in a variety of ways, including granting access to...

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    C+11 Metaprogramming Technics Applied to Software Obduscation

    Obfuscation is the transformation of source or binary code into a form that is difficult to understand, but without affecting the functionality of the code. Goals of obfuscation are multiple: hide a secret or logic, make code harder to reverse engineer, protect intellectual property, prevent tampering, etc.

    Provided By SecurityTube.net

  • Webcasts // Sep 2014

    On-demand Webcast: Maccabi Healthcare Services Keeps Mobile Apps Healthy

    Keeping mobile applications performing well in the new bring your own device (BYOD) world is tough for IT. Your customers and employees bring their own devices and you cannot possibly test every combination of mobile OS, device type and network out there. Attend the webinar to see how Maccabi Healthcare...

    Provided By Hewlett-Packard

  • Webcasts // Aug 2014

    On-demand Webcast: Anatomy of an Attack: Know What to Defend Against

    Hackers are targeting businesses large and small while botnets spread malware indiscriminately as they propagate via email. But how can you tell whether you’ve caught the attention of international criminals or amateur script kiddies? And is there any difference? The fact is, you can’t secure your IT infrastructure if...

    Provided By Alert Logic

  • Webcasts // Aug 2014

    On the Feasibility of Large-Scale Infections of iOS Devices

    While Apple iOS has gained increasing attention from attackers due to its rising popularity, very few large scale infections of iOS devices have been discovered because of iOS' advanced security architecture. In this webcast, the presenter will show that infecting a large number of iOS devices through botnets is feasible.

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    On-demand Webcast: Solve Complex Revenue Management Challenges

    For business professionals today, revenue management is an increasingly complicated proposition. Accountants and administrators are now responsible for managing multiple revenue sources and models, which requires a different level of data and analysis, plus powerful tools to successfully manage the complexities of the market and business operations. So how...

    Provided By Intacct

  • Webcasts // Aug 2014

    The Open Crypto Audit Project: Our Story

    Join the presenters for the story of the origins and history of the Open Crypto Audit Project (OCAP). OCAP is a community-driven global initiative which grew out of the first comprehensive public audit and cryptanalysis of the widely used encryption software TrueCrypt. Their charter is to provide technical assistance to...

    Provided By SecurityTube.net

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Aug 2014

    Finding and Exploiting Access Control Vulnerabilities in Graphical User Interfaces

    Graphical User Interfaces (GUIs) contain a number of common visual elements or widgets such as labels, text fields, buttons, and lists. GUIs typically provide the ability to set attributes on these widgets to control their visibility, enabled status, and whether they are writable. While these attributes are extremely useful to...

    Provided By SecurityTube.net

  • Webcasts // Jul 2014

    The New Cloud Framework: Best Practices for Enterprise Data

    The cloud is becoming the standard for enterprises, making it easier to manage mobility, BYOA, and data sprawl. The cloud’s accessibility and scalability makes it a natural solution to meet the needs of employees and still maintain control of corporate data. Yet the cloud has also introduced performance and privacy...

    Provided By Druva Software

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Provided By Druva Software

  • Webcasts // Jul 2014

    Video: Cognizant delivers reliable, scalable knowledge management support

    This leading provider of IT consulting and business processes achieves an 80 percent reduction in client ticket volumes and a 40 percent improvement in mean-time-to-resolution rates with IBM SmartCloud Control Desk software.

    Provided By IBM

  • Webcasts // Jul 2014

    IBM Systems Magazine Webcast: What’s new for end-to-end workload automation to support new technologies

    Learn what’s new from IBM® that can help you automate workload scheduling across cloud, zEnterprise® and distributed environments.

    Provided By IBM

  • Webcasts // Feb 2015

    Securing SMEs in an evolving threat landscape - Webinar

    According to Symantec, SMEs represented 50% of the population attacked in 2012, whereas in 2013 they represented 61%. In today’s evolving threat landscape it has become important to ensure SMEs keep their data safe, as well as protecting their network from becoming a host for cybercriminals. Not only will an...

    Sponsored By Symantec

  • Webcasts // May 2014

    Webinar: SaaS vs. On-Premise: A Black and White Comparison

    Until recently, there's been a lot of hype surrounding SaaS and whether or not it is a viable option for application consumption. SaaS has quickly moved beyond the hype to become the preferred deployment model for enterprise software. Watch this webinar to get all your SaaS questions answered.

    Sponsored By Workday

  • Webcasts // Oct 2014

    Webcast: Maximize Database Performance

    Are you facing the pressure of not investing enough in database performance? In this on-demand webcast, see how poor performance negatively impacts your business, and how you can maximize database performance RIGHT NOW. Watch this webcast today.

    Provided By Dell Software

  • Webcasts // Aug 2014

    Consolidating Active Directory Domains and Forests

    Consolidating domains and forests is a big job. But, it’s worth it. View this webcast to learn how to merge or eliminate domains and forests without compromising security—quickly and safely. Led by Windows security expert, Randy Franklin Smith, you’ll learn about common consolidation issues and ways to manage your streamlined...

    Provided By Dell Software

  • Webcasts // Feb 2006

    TechNet Webcast: Using InfoPath With Lotus Notes and Lotus Domino (Level 200)

    Using Microsoft Office InfoPath, information workers can collect, present, edit, and publish data. XML is at the heart of InfoPath and gives it versatility. What some of them may not know is that many of the features of InfoPath enable it to work with IBM Lotus Notes and IBM Lotus...

    Provided By Microsoft

  • Webcasts // Sep 2013

    An Overview of VMware vCloud Suite

    VMware vCloud® suite delivers a complete, integrated cloud infrastructure that simplifies IT operations while also delivering the best SLAs for all applications. The suite delivers virtualized infrastructure services (storage, network, security and availability) with built-in intelligence to automate on-demand provisioning, placement, configuration and control based on application requirements and defined...

    Provided By VMware

  • Webcasts // Sep 2013

    An Overview of VMware vCloud® Networking and Security (vCNS)

    VMware vCloud® Networking and Security (vCNS) is the leading software-defined networking and security solution that enhances operational efficiency, unlocks agility and enables extensibility to rapidly respond to business needs. By abstracting networking and security from physical infrastructure and pooling resources, customers can create scalable logical networks. Integrated management of these...

    Provided By VMware

  • Webcasts // Oct 2012

    Address Key Desktop Virtualization Use Cases with VMware View

    As desktop virtualization garners more momentum, IT organizations are looking for a solution that is cost-effective and easy to deploy, manage, and scale. VMware View meets these requirements with a proven desktop virtualization solution designed to optimize both end user freedom and IT management and control. View provides a comprehensive...

    Provided By VMware

  • Webcasts // Oct 2011

    Virtualize Business-Critical Applications with Confidence

    Virtualizing business-critical applications has become a key focus for organizations as they move along their virtualization journey. With the launch of VMware vSphere? 5, VMware is helping customers accelerate the deployment of business-critical applications, including Exchange, SQL, SAP and Oracle. Attend this webcast to learn about: ...

    Provided By VMware

  • Webcasts // Feb 2010

    Automating Infrastructure and Operations Management with VMware vCenter Operations Management Suite

    IT management must change. Traditional tools and processes designed for siloed, static physical infrastructures don't provide the automation and control needed for inherently dynamic virtualized and cloud infrastructures. By building management directly into the VMware vSphere? platform, we've already transformed the way you manage your infrastructure. The next step is...

    Provided By VMware

  • Webcasts // Apr 2009

    Optimizing Microsoft Application Development Processes With VMware and CI Advantage

    Application development and QA teams who rely on the Microsoft development platform can benefit tremendously from virtualization and continuous integration processes by leveraging virtual lab automation and integration tools that plug right into the development environment. The presenter of this webcast gives demonstration of VMware vCenter Lab Manager and CI...

    Provided By VMware

  • Webcasts // Apr 2009

    Sneak Peek: VMware vCenter AppSpeed

    The presenter of this webcast will cover both how the technology can be used to perform an "Assured Migration" of an application from physical to virtual, as well as how VMware Infrastructure administrators can guarantee quality of services to an organization's application owners. The attendee of this webcast will learn...

    Provided By VMware

  • Webcasts // May 2009

    Virtualized SQL Server Performance With VMware

    VMware conducted a six-month intensive research project on the virtualization of Microsoft SQL Server. While a very large number of VMware customers were virtualizing demanding SQL instances, there remained many skeptics of the ability of VMware ESX to maintain performance of this critical application. The presenters detail the findings of...

    Provided By VMware

  • Webcasts // Mar 2009

    An Overview of Virtual Appliances

    Virtual appliances are fundamentally changing how enterprise software is developed, distributed, deployed and managed. The presenter of this webcast will provide an overview on solutions and programs around virtual appliances. The presenter will also highlight the key industry trends, benefits and use cases for ISVs and IHVs and various aspects...

    Provided By VMware

  • Webcasts // Sep 2009

    HP Operations Manager: Monitor heterogeneous IT environments, reduce management costs, and speed time to problem resolution

    This on-demand webinar discusses how to cut the costs of managing your heterogeneous IT infrastructure and reduce the time it takes to resolve problems. In this webinar, you will learn: Why consolidated event management is critical for meeting service level objectives The top three issues that facing IT Operations...

    Provided By Hewlett-Packard (HP)

  • Webcasts // Mar 2011

    Webinar: Powerful Control of Privileged Users

    In this webinar learn about Privileged User Management and why organizations need it. The challenges of Privileged User Management will be discussed as well as the CA Technologies solution for overcoming them. Please watch to learn more.

    Provided By CA

  • Webcasts // Nov 2006

    CA Harvest Change Manager Plug-In for Eclipse Webcast

    The CA Harvest Change Manager Plug-in for Eclipse webcast will show participants how they can make the most from the latest major enhancements provided by the enhanced Eclipse Plug-in interface, which offers best-in-class integration into change management for developers using Eclipse-based development tools.

    Provided By CA

  • Webcasts // Mar 2011

    Reporter Analyzer Webcast

    Traffic Analysis gives IT Professionals insight into how applications are impacting network performance. View this webcast to learn about Traffic Analysis as a vital component of service assurance.

    Provided By CA

  • Webcasts // Jun 2010

    Dell Webinar: OEM Solutions

    For more than twelve years, Dell OEM Solutions has worked with global computing appliance vendors to help them speed their time to profit and decrease the total cost of ownership for their customers. View this webcast to learn how working with Dell's OEM Solutions team can help you save time...

    Provided By Dell

  • Webcasts // Sep 2009

    Web Server Improvements with Microsoft Server 2008

    This is another in our series about Microsoft Longhorn, also known as Server 2008. In this series we break down the most important components of Longhorn and give listeners the benefit of some of the work Dell has been doing on this product over the past few years. Longhorn includes...

    Provided By Dell

  • Webcasts // Sep 2009

    Overview of New Security Features in Windows Server 2008

    Microsoft Longhorn, otherwise known as Microsoft Windows Server 2008 has a lot of new features, especially deployment and security features. Today we're talking about Bitlocker. No, it isn't a place where you keep all your bits. It is an important component Longhorn that adds two cool new features: Whole disk...

    Provided By Dell

  • Webcasts // Sep 2009

    How Ready Are You to Upgrade to Microsoft Windows Server 2008?

    There has been a lot of buzz about Server 2008, otherwise known as Longhorn. But the question on many IT peoples' minds is whether their infrastructure is ready for it. Wouldn't it great if there was a tool that would let you know? Fortunately a Readiness Advisory Utility is available...

    Provided By Dell

  • Webcasts // Sep 2009

    Dell Talks Microsoft Consulting Services

    Dell's Burk Buechler describes Dell's Consulting Services for Microsoft.

    Provided By Dell

  • Webcasts // May 2009

    Dell PowerEdge Servers: Energy Efficient and Powerful - The Best of Both Worlds

    Listen to Chad Fenner, product manager for Dell M Series blades, explain the new features of this series of servers.

    Provided By Dell

  • Webcasts // Jan 2010

    Hands-On: Configuring and Using a Virtualized System

    Though different software packages may have different approaches to setting up virtualized systems, many of the basic principles remain constant. The presenter of this webcast will outline the main steps that designers should expect when incorporating virtualization, including partitioning hardware resources, configuring interrupt assignments, booting into the hypervisor, and more....

    Provided By National Instruments

  • Webcasts // Feb 2010

    Webcast: The Business Case for Migrating from Solaris to SUSE Linux Enterprise Server

    Webcast: The Business Case for Migrating from Solaris to SUSE Linux Enterprise Server Topics Covered: UNIX Trends and Migration Prospects Why SUSE Linux Enterprise Server What Sesame Workshop Learned Next Steps

    Provided By Novell

  • Webcasts // Feb 2011

    Oracle Systems Strategy with John Fowler Webcast

    Hear John Fowler, Executive Vice President, Systems, provide an update on the strategy and roadmap for Oracle's Sun servers, storage and complete systems including Oracle Solaris. The webcast features how Oracle systems are optimized to run Oracle software, with systems built on open standards that work with your existing infrastructure...

    Provided By Oracle

  • Webcasts // Apr 2012

    Live Online Forum: Oracle Solaris 11 - What's New Since the Launch

    Join Oracle on April 25th at 9am PT, 12 pm ET for the Oracle Solaris 11 Online Forum. You'll hear both customers and Oracle experts, including Markus Flierl, Vice President of Oracle Solaris Engineering explain how the latest developments to Oracle Solaris 11, since its launch in November, can help...

    Provided By Oracle

  • Webcasts // Sep 2010

    ASE 15.5 In-Memory Databases

    Learn how you can use the new ASE 15.5 release to your advantage. Sybase Technology Evangelists Rob Verschoor presents the new ASE In-memory Databases Option and shows you how it uniquely delivers low latency and high concurrency throughput with no disk I/O...and how you can easily create in-memory databases that...

    Provided By Sybase

  • Webcasts // Sep 2009

    Veritas Storage Foundation for Sybase ASE Cluster Edition

    Sybase and Symantec are working together to optimize Sybase's Virtualized Resource Management? technology framework found in ASE Cluster Edition for Veritas Storage Foundation HA. The new solution delivers a truly integrated database and storage clustering solution providing administrative efficiency, higher availability and improved performance. Learn more in an on demand...

    Provided By Sybase

  • Webcasts // Mar 2010

    Analyst Webcast with Merv Adrian: Leverage your Data Assets Across the Global Enterprise

    We are pleased to have Merv Adrian, IT Market Strategy Analyst, join us in this Sybase sponsored webcast to explore the critical issue of data integration environments in the enterprise - many of which are fragmented and poorly managed. Mr. Adrian will address how heterogeneity is the new standard...

    Provided By Sybase

  • Webcasts // May 2010

    4 Advantages You Must Know About SaaS Archiving

    The current regulatory environment has created a dramatic increase in employee generated content that needs to be archived for all businesses. In the new "Save Everything" environment, email is the single largest source of data that needs to be stored in a compliant form. The demand is far outpacing available...

    Provided By Webroot Software

  • Webcasts // Nov 2012

    Automating Infrastructure and Operations Management with VMware vCenter Operations Management Suite

    IT management must change. Traditional tools and processes designed for siloed, static physical infrastructures don't provide the automation and control needed for inherently dynamic virtualized and cloud infrastructures. By building management directly into the VMware vSphere® platform, we've already transformed the way you manage your infrastructure. The next step is...

    Provided By VMware

  • Webcasts // Mar 2013

    Tackling Workplace Mobility and Bring Your Own Device Initiatives with the VMware View Mobile Secure Desktop

    Desktop virtualization provides IT with a way to address these concerns while supporting worker mobility and BYOD. Now VMware is advancing these goals with VMware View™ Mobile Secure Desktop, a fully validated architectural design that provides end users with quick and easy access to applications and data across devices, locations...

    Provided By VMware

  • Webcasts // Oct 2012

    Technical Deep Dive: Managing Infrastructure Health and Performance with VMware vCenter Operations Management Suite 5.0

    VMware has introduced new super metrics and self-learning analytics in the VMware vCenter™ Operations Management™ Suite to allow administrators to better assess infrastructure health, identify performance bottlenecks and intercept incidents before they create havoc on the end-user experience. Learn from technical experts what these metrics are and how you can...

    Provided By VMware

  • Webcasts // Oct 2012

    Technical Deep Dive: Capacity Management with VMware vCenter Operations Management Suite 5.0

    VMware has introduced new capabilities to allow VMware vSphere® administrators to proactively manage virtual infrastructure resources. When you right-size and optimize your infrastructure capacity you can increase virtual machine density and consolidation ratios by up to 30 percent, defer hardware and software purchases, and plan for upcoming virtualization projects more...

    Provided By VMware

  • Webcasts // Mar 2010

    Breakthrough Performance for Business-Critical Apps With VMware and Intel

    VMware vSphereTM 4 and the latest Intel Xeon processors provide breakthrough performance and unparalleled flexibility for business-critical server applications such as Microsoft Exchange, Oracle Database and SAP ERP. This webcast will help you learn how to standardize on VMware and Intel with confidence to consolidate all your business-critical applications...

    Provided By VMware

  • Webcasts // Dec 2009

    Applications Management Series Part 4: Accelerating Application Delivery From Development to Production

    Developers and application owners have long been using virtual machines for testing software on other operation systems. However, few are taking advantage of the latest virtual infrastructure and virtualization management tools to automate development and QA processes, improve collaboration between distributed development and release teams and reduce the risk of...

    Provided By VMware

  • Webcasts // Jul 2013

    Bethany Mayer on what SDN is and isn't

    HP Networking chief Bethany Mayer highlights definitions of what SDN is and isn’t, the impact it will have on the networking market, why SDN isn’t the end of networking hardware innovation and why applications are the key element in an SDN environment.

    Provided By Hewlett-Packard (HP)

  • Webcasts // Apr 2006

    OpenView Performance Insight V5

    Extend into network performance and generate useful reports on availability, resource utilizations, trending and plan for growth with OpenView Performance Insight. OVPI provides reporting on more than just network devices, users can now pull data from multiple sources. This webcast presents a short presentation that will include a brief overview...

    Provided By Hewlett-Packard (HP)