VIDEO:
Watch this demonstration for an explanation of the CA ARCserve Backup r12.5 agent for virtual machines. This video offers detailed instructions on how to use the agent for virtual machines, including VMware ESX and Hyper-V technology.
WEBCAST:
Watch now to learn about the latest VMware-based technology that allows you to write, deploy and manage infrastructures and applications the same way as you do in your onsite data center.
WEBCAST:
VMware View™ 5 simplifies IT management while increasing end user freedom by delivering desktop services from your cloud. Building upon VMware's leadership in desktop virtualization, VMware View 5 delivers a high-performance user experience while giving IT greater policy control. View this webcast to learn more about VMware view 5.
Posted: 21 Aug 2012 | Premiered: Aug 21, 2012, 01:40 EDT (05:40 GMT)
WEBCAST:
This brief webcast demonstrates how you can optimize and simplify your virtual desktop implementations using Dell EqualLogic unified IP storage.
WEBCAST:
In this webcast, AbitibiBowater, the eighth largest publicly traded pulp and paper manufacturer in the world, shares how they successfully virtualized mission-critical Oracle solutions such as JD Enterprise One, Oracle Databases and Oracle Business Intelligence data warehouses.
WEBCAST:
Learn about Memorial Healthcare’s latest approach to ensure that its clinicians have fast and secure access to critical patient information. You will learn about secure “follow me” desktops to provide doctors and nurses with patient information at their fingertips - from any workstation or personal device.
Posted: 19 Jan 2011 | Premiered: Jan 27, 2011, 13:00 EST (18:00 GMT)
TRIAL SOFTWARE:
Download your 15-day automatic trial for PHD Virtual Backup for VMware 6.5.2 with a new, innovative backup archiving feature. Now, automate the ability to replicate backup copies to a different location.
WEBCAST:
This expert resource explores best practices and common mistakes to avoid when securing your VMware environment. Learn how to leverage the proper settings, permissions and third-party tools to secure your systems.