WEBCAST:
Attend this Webcast, and listen as IDC's Research Director, Laura DuBois, discusses the issues around identifying and classifying information.
Posted: 18 Oct 2006 | Premiered: Nov 1, 2006, 13:00 EST (18:00 GMT)
WEBCAST:
Backup and recovery of data is consistently rated as one of the top concerns of interviewed companies. Join Patrick Rogers, vice president of Partners and Product Marketing for NetApp, as he discusses unique approaches and vision for solving ba...
PODCAST:
Tiered Storage has been a storage industry buzz word for several years, its justification and value have been twisted and misconstrued by vendors and analysts alike. Listen to this Podcast and learn about three facts that probably don't coincide are.
Posted: 17 Oct 2006 | Premiered: Oct 18, 2006, 09:00 EDT (13:00 GMT)
VIDEO:
This four-part webcast demonstrates the necessity for a proper storage management solution, such as Northern Storage Suite, in an organization's storage infrastructure. They'll review how NSS can reclaim wasted capacity, control user behavior, getting your end-users on-board with saving capacity and how to properly plan for future storage needs.
VIDEO:
In this video, Computer Weekly's editor-in-chief, Bryan Glick, explains what is happening in storage and cloud according to our 2018 IT Priorities survey, taken by over 250 IT decision makers and managers.
VIDEO:
Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
TRIAL SOFTWARE:
Check out this download to see how the Orion Network Configuration Manager aids in managing network configuration files in multi-vendor network environments, monitoring changes to device configurations and ensuring compliance with federal and corporate policies.
SOFTWARE DEMO:
Complex microprocessors lie at the heart of every electronic device and embedded system in use today - from mobile phones to brain scanners. Such products demand sophisticated software to get the job done, and that's where operating systems come in.
WEBCAST:
Watch this webcast for expert tips on securing your SAN environment and meeting government regulations. Learn about a technique that transparently encrypts data inside the storage environment without slowing or disrupting business critical applications.
Posted: 14 Nov 2008 | Premiered: Dec 3, 2008, 11:00 EST (16:00 GMT)