Hardware

Servers, switches, and storage are still the foundation of your enterprise, and next-gen high-performance equipment is key for 21st century business. You can find expert guidance and thought leadership here.

  • The Anatomy of a Workstation

    Webcasts // Jun 2018 // provided by Intel & Lenovo

    What's inside that workstation? Here we break down the specification piece by piece and share how to find out the right solution to fix your organizations needs. Get to know more and figure out what works best for the 3D modeling workflow. Including the newest powerful processors, how much...

    Register Now
  • Happy, Secure, and Reliable

    Webcasts // Nov 2017 // provided by Dell & Intel®

    How to empower your workforce and IT. Access this short webcast to hear how new workforce trends have created a paradox between employees desire for greater flexibility and IT's need to control cost and data. Luckily, with a reliable partner like Dell, you can take advantage of our entire Lifecycle...

    Watch Now
  • On the Go--Mobilizing the Government Workforce (webcast)

    Webcasts // Aug 2017 // provided by Dell & Intel®

    As smartphones, tablets and other connected devices continue to dominate the daily lives of citizens, government agencies across the country are struggling how to bring their workforce to the same level of connectivity. While some agencies chart courses forward, some end up lagging behind because of security, privacy and productivity...

    Watch Now
  • Huawei OceaStor Dorado V3 Accelerates All-Flash Technical Video

    Webcasts // Jul 2017 // provided by Huawei

    In this overall technical video you can easily visualize the architecture and key features of the Huawei OceanStor Dorado V3 all-flash storage system. Huawei OceanStor Dorado V3 employs its own SSDs and controllers, as well as a unique FlashLink disk-controller collaboration technology, to guarantee the highest performance in...

    Watch Now
  • Securing Software's Future: Why API Design Matters

    Webcasts // Jun 2015 // provided by SecurityTube.net

    Writing secure software is far cheaper for society as a whole than fixing vulnerable software after it is released. Teaching developers how to write secure software can be very effective in the short term, but over time security knowledge becomes less relevant, some security-conscious developers move into management, and additional...

    Watch Now
  • Cloud IDS: Intrusion Detection for Shared Hosting

    Webcasts // Jun 2015 // provided by SecurityTube.net

    On one hand, the users pay almost nothing to get their site or server out there, but on the other hand, their network neighborhood probably sucks and there's no way to tell if anyone is trying to access their stuff in a way they didn't intend. There's got to be...

    Watch Now
  • Adventures in Mobile Telephone Security

    Webcasts // May 2015 // provided by SecurityTube.net

    In this webcast, the presenter will explain about the risks are described and will demonstrate just how far a motivated amateur can legally go with some basic equipment, a little imagination and some directed effort. This includes running the users own base station, fuzzing the handset's baseband processor, capturing traffic...

    Watch Now
  • Hardware Level Attacks

    Webcasts // Apr 2015 // provided by SecurityTube.net

    A running computer program is not a mathematical abstraction, but a physical process taking place somewhere in the real world. This makes all programs and the devices they run on vulnerable to a variety of physical attacks that are often overlooked or dismissed as impractical.

    Watch Now
  • The Inception Framework: An APT Campaign in the Cloud, Mobile, and Embedded Systems

    Webcasts // Apr 2015 // provided by SecurityTube.net

    Many of the indicators falsified by these attackers have been used as trusted information when attributing other know threats which should call into question the legitimacy of such claims. This webcast will walk through the discovery and processes they used to peel back the layers behind this sophisticated framework.

    Watch Now
  • Bad USB Weaponized

    Webcasts // Apr 2015 // provided by SecurityTube.net

    Explore the world of bad USB. How to build, deploy, and optimize the bad USB platform? Command and control structure. Hijinks with bad USB will include results achieved during deployment, systems owned, shells acquired, data acquired and coupling with social engineering and security awareness and training.

    Watch Now