Business of Information Technology  >   Business Processes  >   Product Development  >   PLM  >  

ALM

RSS Feed    Add to Google    Add to My Yahoo!
ALM Multimedia (View All Report Types)
 
Use Automation To Create Business Agility
sponsored by Cisco Systems, Inc.
VIDEO: This video features multiple customers who have deployed Cisco ACI to rapidly improve service delivery time and managed entire application lifecycles.
Posted: 17 Mar 2015 | Premiered: 04 Feb 2015

Cisco Systems, Inc.

Reality Checking your Security Testing Program
sponsored by Veracode, Inc.
VIDEO: How do you know if your security testing protocols are actually fully effective? This webcast demonstrates what you need to know to ensure that your security testing methods are running as they should.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015

Veracode, Inc.

PaaS Facts & Fictions - How to Succeed with the Next Generation of Middleware
sponsored by Fujitsu
WEBCAST: Although many organizations rely on PaaS for its core functions, it is emerging in the technology space for app development and lifecycle management. In this informative webcast, explore the more advanced functionalities of PaaS, and discover the requirements for aligning PaaS with various application types.
Posted: 18 Jul 2013 | Premiered: Dec 31, 2012

Fujitsu

Desert Research Institute analyzes scientific data faster than ever before
sponsored by IBM
VIDEO: In this brief video, learn how the Desert Research Institute tackled their big data challenge by implementing IBM PureSystems, an integrated system built on patterns of expertise. Discover how this technology enables DRI to analyze data 10 times faster and deliver that data in a variety of ways to their clients.
Posted: 13 Nov 2013 | Premiered: 11 Jul 2013

IBM

API Business Models: 20 Models in 30 Minutes
sponsored by Intel® Services
WEBCAST: John Musser, CEO of API Science, discusses the progression of API business models and offers examples of companies that have successfully matched their strategy with the appropriate model.
Posted: 18 Apr 2014 | Premiered: Oct 18, 2013

Intel® Services

The Agile Architect - Agile Development: Three pillars of success
sponsored by IBM
WEBCAST: With a goal of continuous software delivery, fast pace, and high quality, Agile developers need the right skills and tools to achieve their goals. In this informative webcast, discover the three pillars necessary for Agile success.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

IBM

Break the IT maintenance vs. innovation gridlock
sponsored by Hewlett-Packard Company
WEBCAST: Applications are at the center of today's information intense world. Tune into this video now to learn how to improve efficency, innovation and growth with the right applications. Learn why applications play a key role in the overall strategy of your organization by viewing this helpful webcast now.
Posted: 08 Oct 2013 | Premiered: Oct 8, 2013

Hewlett-Packard Company

Canary Deployments Lowers Application Release Risks
sponsored by CA Technologies.
WEBCAST: In this webinar, learn how you can use canary deployments to lower risks in your application releases, perform A/B testing and enable rollbacks to previous versions.
Posted: 23 Jun 2014 | Premiered: Sep 13, 2013

CA Technologies.

CA Service Virtualization Overview
sponsored by CA Technologies
WEBCAST: This video gives an introduction to service virtualization and explores how it can give you access to all your application's dependent systems at any time during the build and test process. Watch to learn how you can accelerate the entire application development lifecycle by implementing service virtualization in your enterprise.
Posted: 17 May 2013 | Premiered: Apr 30, 2012

CA Technologies

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
ALM White Papers | ALM Multimedia | ALM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement