dcsimg
eSeminars The Online Seminar Standard
eSeminars Live - We bring together an elite list of editors, industry luminaries, analysts and expert panel speakers on an interactive webcasting platform.

Upcoming Events >>>

  • May 11, 2015

    Register

    Developing Web-enabled Apps for Intel® RealSense™ Technology

    One of the languages that have always been supported with the Intel® RealSense™ SDK (Software Developer Kit) is JavaScript, specifically so that web-enabled apps could be created. Come hear from Intel Expert Bob Duffy as he reviews his own little “space shooting” game where the orientation of your face controls the aiming reticle to help teach developers how to write apps and games in JavaScript that can use facial & gesture recognition.

    Read More >>>

  • May 13, 2015

    Register

    Tackle Your Insider Threat — Protect Your Information and Organization

    Your data is a valuable asset that can quickly transform into a liability when breached. Organizations often become hung up on combating external breaches, while the insider threat doesn't get the attention it deserves. To manage both external and internal threats, new approaches to security are required, particularly in regards to authorized internal users who have legitimate access to sensitive information.

    Read More >>>

  • May 18, 2015

    Register

    The End-to-End Cloud Story: Eliminate Infrastructure to Ease the IT Burden

    The simple truth is that today’s flexible and scalable Cloud offerings enable businesses of all sizes to forego some of the most challenging parts of delivering IT, namely back-end server infrastructure and endless office and productivity software upgrades – and utilize Cloud-based Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) offerings to achieve the same – or better – functionality than traditional IT all with a predictable, reasonable monthly expense.

    Read More >>>

  • May 18, 2015

    Register

    Using Unity to Create Games Leveraging Intel® RealSense™ Technology

    While the idea of using facial and or gesture recognitions to create a modern, intuitive game seems attractive, some developers may want to leverage Unity 3D as a way to accelerate their development.

    Read More >>>

  • May 21, 2015

    Register

    Best Practices for Consolidating Multiple Enterprise Social Networks

    As organizations continue to jump into the realm of enterprise social networks (ESN) such as Microsoft Yammer, Jive, Salesforce Chatter and others, they realize just as quickly how expensive and time consuming it can be to support multiple redundant social networks. Many organizations would like to standardize on a single social platform that is integrated into their enterprise application environment. But ESNs are no longer simply for “social” interactions; they increasingly host valuable business conversations. Therefore, standardizing on one platform usually requires consolidating data from all the others — a content migration project.

    Read More >>>

  • May 26, 2015

    Register

    Our largest cloud survey ever! The Unitrends 2015 cloud survey results are in!

    Unitrends surveyed over 1600 respondents from the IT community on their usage of public, private and hybrid cloud solutions for computing, storage and business continuity including preferred vendors.

    Read More >>>

  • May 27, 2015

    Register

    Opportunistic Encryption - Opportunity or Threat?

    Having Always-On encryption is an idea that is gaining traction with many organizations, though there are still many sites that don't fully use encryption, even for form information.

    Read More >>>

  • May 28, 2015

    Register

    Mobile App Management Drives Next Wave of Enterprise Mobility

    Delivering mobile apps to 100% of their mobile workforce is how businesses are gaining a competitive advantage and achieving the highest return on their mobile investment. But with the evolving complexity of device environments, security concerns, and diverse user demands, it's important to determine the best way to manage enterprise mobile apps.

    Read More >>>

  • Jun 03, 2015

    Register

    Lowering Costs and Improving Performance with Server-Side Flash for MySQL

    IDC has been promoting the idea of the third platform of computing -- social, mobile, cloud, and big data – for lowering costs and improving performance using scale-out databases like MySQL. These new databases scale in parallel, unlike traditional monolithic systems. As such, they can deliver new capabilities. But with these new architectures, come new challenges that include server sprawl and inefficient use of storage resources. Check out this eSeminar to learn new ways to leverage server-side flash storage and software to reduce server sprawl, improve performance, and deliver maximum uptime.  

    Read More >>>

  • Jun 03, 2015

    Register

    TLS 1.2 and Beyond: It's Time to Leave SSL Behind

    The SSL protocol has been widely deployed and used to secure web data transport since the late 1990s. Today, the SSL protocol is no longer considered to be entirely safe, as it has multiple known security issues and cryptographic weaknesses.

    Read More >>>

  • Jun 04, 2015

    Register

    How to Recover Active Directory Files in Seconds

    Active Directory (AD) has been a key application in most environments by providing central user management and authentication. And because it's critical to business systems, it requires a delicate approach in terms of protection policy. Check out this upcoming eSeminar and join industry experts to learn about the main considerations for successful Active Directory backup and restore, and what should be done in advance once you take over Active Directory protection. Attend this eSeminar to learn how to create an application-aware Active Directory backup, automate backup verification, and much more!

    Read More >>>

Data Management

Lower RTOs™ with Veeam Explorers for Microsoft SQL Server, Active Directory and Exchange

Organizations are modernizing their data centers in order to provision IT services faster, strengthen security, and reduce costs. However, businesses are facing new demands from end users, including access to data and applications 24/7, no patience for downtime or data loss, and exponential data growth at 30-50% per year. This opens an availability gap between always-on user requirements and IT’s ability to effectively deliver availability.

Sponsored by Veeam

Storage

SQL Server 2014 High Availability & Disaster Recovery with Pure Storage

Microsoft SQL Server includes a high availability option called AlwaysOn Availability Groups (AGs). In this session we will see how AGs are implemented using a Windows Server Failover Cluster and SQL Server 2014 with the Pure Storage FlashArray.

Sponsored by Pure Storage

Security

CyberArk Introduces Privileged Account Security for SSH Keys

Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise.

Sponsored by CyberArk