ComputerWeekly.com Research Library

Powered by Bitpipe.com

Laws Multimedia

  • Free broadband for all, big data, taxes and the CW500 IT leaders club

    Sponsored by: TechTarget ComputerWeekly.com

    This episode is kicked off by discussing the Labour Party's pre-election pledge to offer free full-fibre broadband to the whole of the UK. Brian talks the rest of the team through his various conference visits, from the Open Data Institute (ODI) Summit and Caroline has more updates on IT contractor tax issues.

  • Free broadband for all, big data, taxes and the CW500 IT leaders club

    Sponsored by: TechTarget ComputerWeekly.com

    This episode is kicked off by discussing the Labour Party's pre-election pledge to offer free full-fibre broadband to the whole of the UK. Brian talks the rest of the team through his various conference visits, from the Open Data Institute (ODI) Summit and Caroline has more updates on IT contractor tax issues.

  • 6 Steps to SIEM Success

    Sponsored by: AT&T Cybersecurity

    In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.

  • AppManager 6.0.2 Trial

    Sponsored by: SUSE

    The NetIQ AppManager Suite product (AppManager Suite) enables IT organizations to meet their service level commitments while maximizing staff efficiency, with deep real-time diagnostics.

  • Automated Compliance: Making the Case and Reaping the Rewards

    Sponsored by: Tripwire, Inc.

    Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

  • Best Practices for Database Security and Compliance

    Sponsored by: Guardium, an IBM Company

    Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.

  • Best practices in managing requirements in Energy and Utilities industries

    Sponsored by: IBM

    This webcast highlights some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space.

  • Canadian Blood Services Leverages VMware ACE to Provide Complete and Secure Computing to Mobile Medical Staff

    Sponsored by: VMware, Inc.

    Learn how a large enterprise utilized a new solution to employ a scalable, efficient laptop deployment and management solution within their mobile vehicles. View this webcast now.

  • Creating an Enterprise Mobile Management Regulated Solution for BlackBerry Enterprise Service 10

    Sponsored by: BlackBerry

    This exclusive resource examines the enhancements that have been made in to BlackBerry ® Enterprise Service 10 and how it can support your organization's mobile needs in the regulated market in terms of security, mobile auditing, archiving and forensics.

  • Detecting Security Breaches and APTs with Big Data Security Analytics

    Sponsored by: LogRhythm, Inc.

    This webcast details what to expect with a security breach, and how to detect and prevent them by analyzing big data to gather more INTEL on your business' IT system.

  • DeveloperWorks Interview

    Sponsored by: IBM Software Group

    How can Governance not be seen as a hindrance - but as an enabler, and provide the freedom to operate without worrying about those issues. This podcast reviews governing development as the next step in development organization transformation.

  • Directory and Resource Administrator 7.5 Trial

    Sponsored by: SUSE

    NetIQ's Directory and Resource Administrator provides advanced delegation and robust, policy-based administration capabilities that improve the security and efficiency of your Microsoft Windows environment.

  • Disk-Based Backup & Recovery

    Sponsored by: Datalink Corp

    Whether you're integrating disk into your existing tape-only environment or augmenting your current disk-based backup infrastructure, disk-based technologies should be utilized for the RIGHT reasons. This Webcast will explain what those reasons are.

  • Efficient SAN Based Tape Encryption with Curtis Preston

    Sponsored by: Cisco Systems, Inc.

    Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.

  • Email management suite

    Sponsored by: Iron Mountain

    Email management solutions are designed to simplify your email management complexities. In this brief Videocast, legendary British comic, John Cleese, explains why you should want a total email management suite.

  • Ensure Data Protection with Sun StorageTek T10000B Tape Drives

    Sponsored by: Sun StorageTek

    Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.

  • Ensuring VoIP Quality of Service

    Sponsored by: SUSE

    Companies are managing VoIP to ensure high availability and call quality, so the ability to ensure Quality of Service (QoS) is extremely important for users.

  • Enterprise Vault Archiving Overview

    Sponsored by: Symantec Corporation

    This video highlights an approach that is trusted by over 19,000 organizations worldwide to provide optimal data storage and archiving by delivering defensible deletion, faster eDiscovery times and more.

  • Exchange Server 2007 Replication Strategies

    Sponsored by: Dell | EMC

    Please join your hosts from Dell/EMC for a discussion of Exchange 2007 benefits and see which replication method and system design best suits your organization.

  • Flash: Maximo Asset Management for Healthcare Organizations

    Sponsored by: IBM

    This brief video describes an asset management tool that can help you meet the challenges of an evolving healthcare landscape. Tune in to learn how you can increase productivity and asset utilization, manage compliance, lower costs, and more.

  • Free broadband for all, big data, taxes and the CW500 IT leaders club

    Sponsored by: TechTarget ComputerWeekly.com

    This episode is kicked off by discussing the Labour Party's pre-election pledge to offer free full-fibre broadband to the whole of the UK. Brian talks the rest of the team through his various conference visits, from the Open Data Institute (ODI) Summit and Caroline has more updates on IT contractor tax issues.

  • Getting Started with Online Storage for Backup Exec

    Sponsored by: Symantec Corporation

    In this podcast, Symantec Product Manager Darren Niller provides a step by step overview of the process on getting started with Symantec Online Storage.

  • Getting Started with SAP Workload Automation

    Sponsored by: Redwood Software Inc.

    Discover how your organization can benefit from real-time, event-driven process automation and job scheduling, with a single point of control and central monitoring of business processes for SAP systems.

  • GFI FAXmaker for Exchange/SMTP/Lotus

    Sponsored by: GFI Software

    Download this free trial of GFI Faxmaker to improve efficiency of business processes, provide backup for fax documents to increase compliance and help reduce time IT admins spend on fax errors.

  • Healthcare Networking Classroom

    Sponsored by: TechTarget Health IT

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.