IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Booch Modeling Technique

RSS Feed    Add to Google    Add to My Yahoo!
Booch Modeling Technique Multimedia (View All Report Types)
 
Get a Closer Look at Security Alerts
sponsored by Prelert
WEBCAST: Watch this webinar to discover how anomaly detection can update your IT for today's security environment.
Posted: 24 Mar 2015 | Premiered: Mar 24, 2015

Prelert

Why is Schneider Electric the Right Choice for Prefabricated Data Centers?
sponsored by Schneider Electric
VIDEO: So why is Schneider Electric the right choice for prefabricated data centers? This video examines the proven experience, broad offering of prefab modules, detailed designs, and industry-leading, integrated DCIM software that put Schneider Electric ahead when it comes to prefabricated data centers.
Posted: 30 Oct 2014 | Premiered: 13 Jan 2014

Schneider Electric

Efficient Office App Management
sponsored by IBM
VIDEO: One mobile management solution for Office 365 is presented in this exclusive webcast.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

IBM

Mobile App Development Essentials: Anticipating Future Trends and Needs
sponsored by IBM
WEBCAST: This webcast divulges the top indicators that your apps don't have what it takes to endure into the future. Read on to discover the vital components that bring value to enterprise mobile apps, and learn the top 5 signs that indicate that your apps need an overhaul to be relevant into the future.
Posted: 13 Jan 2015 | Premiered: Jan 13, 2015

IBM

Hospitals Deliver a Secure, Mobile Workspace to Their Staff with VDI
sponsored by Dell, Inc.
VIDEO: Inside this video, discover how they implemented a desktop virtualization solution to deliver secure virtual desktops to their clinicians. Find out how this technology enabled easy, rapid login while securing sessions so they could move around and switch to different workstations seamlessly.
Posted: 20 Mar 2015 | Premiered: 20 Feb 2015

Dell, Inc.

Applying the Top 20 Critical Security Controls to the Cloud
sponsored by CloudPassage
WEBCAST: This webcast discusses how enterprises can apply the 20 Critical Security Controls for Effective Cyber Defense, a list of best practices for IT security, to the new reality of cloud-based or virtualized infrastructures.
Posted: 06 Feb 2015 | Premiered: Feb 6, 2015

CloudPassage

Code Once: Easy Development for Multiple Mobile Platforms
sponsored by IBM
VIDEO: Watch this brief video to find out how one solution gives teams the ability to code once and implement that code on multiple devices using multiple platforms.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

IBM

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Manage IT like a Super Hero: Save time, Reduce cost and Innovate in the era of Cloud
sponsored by IBM
WEBCAST: Register for this exclusive event to explore some IBM solutions that can help you operations, performance, analytics, automation and delivery of IT services in today's complex on-premise and cloud environments.
Posted: 24 Oct 2014 | Premiered: Sep 30, 2014

IBM

Building an Android App using MobileData Cloud
sponsored by IBM
WEBCAST: Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.
Posted: 24 Nov 2014 | Premiered: Nov 24, 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement