Enterprise Data Management Multimedia

(View All Report Types)
IBM Solution Spotlight Classroom: All-flash
sponsored by IBM
VIRTUAL ENVIRONMENT: This classroom provides an in-depth overview of the latest flash developments, with a specific focus on all-flash environments.
Posted: 27 Feb 2015 | Premiered: 18 Jul 2013

IBM

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Integrated High-Performance Backup Solution for Oracle Environments
sponsored by Oracle and Intel®
VIDEO: This video explains the benefits of a new systems backup appliance that provides exceptional capabilities and performance to deal with increased storage demands.
Posted: 05 Jun 2014 | Premiered: 05 Jun 2014

Oracle and Intel®

Ontrack® PowerControls™ 6.0: Managing Data in Server Environments
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
TRIAL SOFTWARE: Ontrack® PowerControls™ saves time and costs to search, recover, restore and manage data in Microsoft® Exchange Server and Microsoft® Office SharePoint® Server environments. It’s easy and offers granular level management to produce quick, relevant results.
Posted: 26 Mar 2014 | Premiered: 15 Mar 2010

Ontrack® PowerControls™ by Kroll Ontrack

Social Analytics & Intelligence: Getting to Actionable Insights
sponsored by IBM
WEBCAST: Join Principal Analyst, Leslie Ament, in this on-demand webcast to gain a firsthand look at how to successfully manage social data. Uncover use cases of successful social intelligence and analytics, how to collaborate across multiple channels, and more.
Posted: 03 Jan 2014 | Premiered: Jan 3, 2014

IBM

Webcast: The Newest Information Management Innovation from IBM
sponsored by IBM
WEBCAST: This valuable webcast takes an inside look at an information management strategy that can help you improve business results in the age of big data.
Posted: 09 Sep 2013 | Premiered: Aug 23, 2013

IBM

DB2 for Linux, Unix, and Windows
sponsored by IBM
TRIAL SOFTWARE: Many organizations are leveraging IBM’s DB2 for its cost and security benefits, as well as its ease of use. This resource introduces its new enhancements that further reduce storage costs and can lead to significant performance improvements. See firsthand what it can offer your organization by downloading this trial.
Posted: 27 Apr 2012 | Premiered: 27 Apr 2012

IBM

Productionizing Hadoop: Seven Architectural Best Practices
sponsored by Cisco Systems, Inc.
WEBCAST: Check out this informative resource to learn what you should consider when choosing architecture for your big data project. Discover the seven top architectural qualities of big data production platforms, and one delivery platform that automates big data workflow for more efficient, effective processing.
Posted: 28 Aug 2013 | Premiered: Aug 28, 2013

Cisco Systems, Inc.

Facebook's leaked documents and tech in party manifestos
sponsored by TechTarget ComputerWeekly.com
PODCAST: In this week's episode we discuss the about 7,000 leaked facebook documentes. It reveals how Facebook used and abused developers, cut off data to competitors, gave privileged access to its friends and used a "pivot to privacy" as camouflage. The team also talks about party manifestos in wake of the upcoming election.
Posted: 13 Nov 2020 | Premiered: Nov 13, 2020

TOPICS:  Data Management
TechTarget ComputerWeekly.com

Security University: Data Loss Prevention
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT: The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.
Posted: 14 Jun 2013 | Premiered: 17 Jun 2013

TechTarget Security