WEBCAST:
Join this webinar from GigaOM Research and WANdisco to learn how enterprises are hardening Hadoop across global data centers to ensure continuous availability, even during maintenance windows.
WEBCAST:
In this chat with VMware experts, learn about application performance considerations, best practices and use cases for deploying Tier 1 applications on VMware. Please join us during the live chat on October 26 from 11am-2pm ET
Posted: 14 Oct 2010 | Premiered: Oct 26, 2010, 11:00 EDT (15:00 GMT)
WEBCAST:
In this webcast a Senior Product Manager from the Windows Virtualization team discusses the Hyper-V virtualization capabilities built into Windows Server 2008. It offers an overview of system requirements, and best practices for successful depl...
WEBCAST:
IT Configuration Management, according to Gartner, is associated with discovering and managing the state of an element in an IT infrastructure. In this Webcast a team of experts discuss their perspective on IT configuration management.
WEBCAST:
View this Webcast to learn best practices for deploying remote replication of an Oracle database. Discover how to properly manage replication so it will positively affect database performance.
WEBCAST:
Attend this Webcast to learn the top five mistakes that database developers make and how to avoid them. Listen and learn from real world experiences to ensure a successful installation.
Posted: 29 Nov 2007 | Premiered: Dec 12, 2007, 09:00 EST (14:00 GMT)
WEBCAST:
The right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.
WEBCAST:
In this webcast you'll hear from Falconstor Software's Product Marketing Manager , Peter Eichers, as he discusses Falconstor storage virtualization solutions.
WEBCAST:
Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
Posted: 31 Jan 2008 | Premiered: Feb 13, 2008, 14:00 EST (19:00 GMT)