Business of Information Technology  >   Business Processes  >   Product Development  >   PLM  >  

Application Lifecycle Management

RSS Feed    Add to Google    Add to My Yahoo!
Application Lifecycle Management Multimedia (View All Report Types)
 
Building an Android App using MobileData Cloud
sponsored by IBM
WEBCAST: View this webcast now to see a demonstration of one development platform that focuses on Android applications, and how it integrates cloud services with your applications.
Posted: 17 Oct 2014 | Premiered: Oct 17, 2014

IBM

Database Archiving as a Key to Holistic IT Cost Savings
sponsored by Hewlett-Packard Company
WEBCAST: Access this webcast co-presented with Gartner for best practices for application retirement, application optimization and information governance.
Posted: 20 Sep 2014 | Premiered: Dec 31, 2013

Hewlett-Packard Company

Building Security into the Agile SDLC
sponsored by Veracode, Inc.
VIDEO: Tune into this webcasts to hear from Paul Roberts of the Security Ledger engage and Veracode's security and development experts Ryan O'Boyle and Pete Chestna as they share their best practices on integrating security into agile development- to rapidly deliver applications without exposing them to critical vulnerabilities.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015

Veracode, Inc.

Lighten your load with the silk portfolio
sponsored by Borland, Micro Focus
VIDEO: As computing platforms such as cloud, Web, and mobile gain traction, application delivery and testing becomes more complex. Watch this comprehensive video to discover a suite of versatile, automated testing tools that promises to ensure the performance of your applications, regardless of platform.
Posted: 15 Apr 2014 | Premiered: 15 Apr 2014

Borland, Micro Focus

How to Migrate 50 Apps to AWS in 50 Days
sponsored by Cloud Technology Partners
WEBCAST: A Fortune 50 enterprise needed to migrate 50 applications to a web service in 50 days. View this webinar now to see a web services system that helps streamline enterprise portfolios. Find out which applications can be adapted and how to evaluate your application portfolio to identify optimal candidates for the cloud.
Posted: 19 Aug 2014 | Premiered: Aug 19, 2014

Cloud Technology Partners

Future Proofing Mobile Application Development
sponsored by Progress
WEBCAST: Access this video to find key factors to consider when implementing a mobile development strategy that will remain relevant and successful in the future.
Posted: 24 Nov 2014 | Premiered: Nov 24, 2014

Progress

Tesco Uses CA Solutions to Monitor, Manage and Grow Their Business
sponsored by CA Technologies.
WEBCAST: Tesco, a global bank, was looking to implement an easy, customer-friendly authentication manager for their online customers. View this concise video now to find out what benefits Tesco is enjoying with this authentication system, and if a solution like this is right for your company.
Posted: 07 Nov 2014 | Premiered: Nov 7, 2014

CA Technologies.

How to Avoid Epic Web Failure...Lessons Learned from Healthcare.gov
sponsored by SOASTA, Inc
WEBCAST: Top-notch web and mobile performance are critical for modern applications. You can't afford website failures during peak usage times, and without quality user experience, you could lose revenue and customers. So how can you ensure your web and mobile apps don't fail you when you need them most?
Posted: 07 Jan 2014 | Premiered: Nov 20, 2013

SOASTA, Inc

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement