Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Eliminate the IoT Security Blind Spot with Armis Nadir Izrael - CTO Co-Founder Our current security architecture is broken. We need a new approach to address the evolving IoT endpoint. Join Armis CTO Nadir Izrael as he discusses:... 5 years ago | 39 mins The Dos and Don'ts of using retail business to enhance wholesale telecoms Ben Hirsch, CMO IDT Corporation, and Nick Ford, President IDT Telecom Find out about the success of IDT's retail side of the business -spearheaded under the brand of BOSS Revolution - and what it means to network operato... 6 years ago | 36 mins A Deep Dive Into PHY Architectures for Gen-Z Memory Fabrics James Regan, HPE; Dr. Karl Bois, HPE; Tim Symons, Microchip Hear from Gen-Z Consortium PHY Workgroup representatives as they provide a technical overview of Gen-Z's Physical Layer specification. Participants in... 3 years ago | 58 mins Understanding Gen-Z Technology: The Fabric of the New Data Center Valerie Padilla, Technology Strategist in the Server CTO, Dell EMC In this webinar, attendees will gain insight into Gen-Z technology applications and a deeper understanding of potential deployment options for their p... 4 years ago | 56 mins Gen-Z: Built-In Security for the Data Centric World Michael Krause, HPE VP/Fellow, Gen-Z Lead Architect In a data centric world, security is key. Gen-Z’s built-in security measures addresses potential threats at the component level. In this webinar, Gen-... 3 years ago | 59 mins Emerging High-Speed Interconnects & Gen-Z Fabric Greg Casey, Engineer, Dell EMC & John Norton, Distinguished Technologist, HPE Advancing modular and composable solutions in an open environment for data-centric, AI, and machine learning 3 years ago | 57 mins An ever-expanding IoT attack surface and what to do about it Misha Nossik, Co-founder and CEO, Haystack Magic Common understanding of Internet of Things (IoT) includes smart devices, such as mobile phones, smart appliances, CPE networking devices and industria... 3 years ago | 49 mins Voice fraud – Combating spoofing David Tran IDT Telecom's Tony Davidson discusses the intricacies of spoofing within voice fraud and why IRSF is one of the most common frauds in telco today. 3 years ago | 19 mins Fraud Summit Podcast - IRSF – Why it is the telco industry’s most menacing fraud David Tran David Tran and IDT Telecom's Tony Davidson discuss why IRSF is still the industry's most menacing fraud 3 years ago | 12 mins Protocol Based Abstraction of Fabric Attached Endpoints Greg Casey, Engineer, Office of the CTO, Dell EMC Second in our series of technical webinars, member company Dell EMC's Greg Casey will discuss protocol abstraction of fabric attached endpoints and Ge... 3 years ago | 46 mins