Infrastructure Software Multimedia

(View All Report Types)
Citrix AppDNA Product-overview
sponsored by Citrix
PRODUCT DEMO: This webcast details a software solution that enables faster migrations and streamlines your desktop application management. Discover how this solution simplifies the evaluation of application performance, and resolves compatibility issues through automation, remediation and modeling analysis. View a short demo and learn about the key benefits.
Posted: 02 Oct 2012 | Premiered: 02 Oct 2012

Citrix

Measuring Software Quality: Why Your Metrics Don't Make the Grade
sponsored by IBM
WEBCAST: What keeps your customers happy when it comes to software? Tune into this video to learn more about what you can do to improve your software  testing and quality assurance. It outlines the pros and cons of satisfied customers and what the means for your business. View this resource now to learn more about improving your software.
Posted: 23 Apr 2013 | Premiered: Apr 23, 2013

IBM

Webcast: IBM Information Management in the New Era of Computing
sponsored by IBM
WEBCAST: Depending on the approach that your organization takes, big data can be either a golden opportunity or a significant business obstacle. This webcast explores information management in the new era of computing, and outlines a strategy that will enable you to reduce costs, improve decision-making, and more.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

IBM Lotus Notes and Domino
sponsored by IBM
TRIAL SOFTWARE: IBM Lotus Notes and Domino Administrator clients form the backbone of a simplified, security-rich, and real-time work environment designed to foster an increase in knowledge sharing, business insight and productivity. Download the trial for an evaluation period of 90 days.
Posted: 16 Dec 2011 | Premiered: 16 Dec 2011

IBM

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity

Modernize Your Data Center with Ease
sponsored by IBM
WEBCAST: In the following webcast, gain executive advice on how PureSystems is enabling Tieto and many other organizations to accelerate the delivery of new application while at the same time modernize their datacenters with ease.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

IBM

HP ProLiant Gen8: Automated Energy Optimization
sponsored by HP & Intel®
VIDEOCAST: This brief video introduces cutting-edge smart servers that give you insight into your IT infrastructure so you can prevent common issues before they lead to data loss or downtime. Discover how they can enable you to optimize application performance and reduce energy consumption, in addition to many other significant benefits.
Posted: 18 May 2012 | Premiered: Apr 11, 2012

HP & Intel®

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork