IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Booch Modeling Technique

RSS Feed    Add to Google    Add to My Yahoo!
Booch Modeling Technique Multimedia (View All Report Types)
 
Using SCCD to Resolve an Issue
sponsored by IBM
VIDEO: This video examines how a held desk agent can use SmartCloud Control Desk to resolve an incident. View now to get a step-by-step breakdown of this process.
Posted: 23 Feb 2015 | Premiered: 07 May 2014

IBM

MaaSter Office 365 Management with MaaS360
sponsored by IBM
VIDEO: Tune into this webcast to hear from 2 mobile experts, Chuck Brown and Jimmy Tsang as they reveal their tips and strategies on how to master the Microsoft Office 365 Management environment by leveraging MaaS360.
Posted: 26 Feb 2015 | Premiered: 26 Feb 2015

IBM

Mobile App Security: All You Need to Know
sponsored by Maas360 by IBM
WEBCAST: This webcast helps mobile application developers embed enterprise-grade security in their applications.
Posted: 25 Feb 2015 | Premiered: Feb 25, 2015

Maas360 by IBM

Building an Android App using MobileData Cloud
sponsored by IBM
WEBCAST: View this webcast now to see a demonstration of one development platform that focuses on Android applications, and how it integrates cloud services with your applications.
Posted: 17 Oct 2014 | Premiered: Oct 17, 2014

IBM

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Case Study: Improve Customer Experience with Managed Services
sponsored by Cisco & Fujitsu
VIDEO: Watch this brief video to learn about the managed services provider Mitchells & Butlers, a leading managed pub and pub restaurant operator, owning around 2,000 businesses offering food, drink and entertainment across the UK, partnered with to bring innovation to their business and help support a better guest experience.
Posted: 22 Oct 2014 | Premiered: 22 Aug 2013

Cisco & Fujitsu

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

The Value (and Challenges) of Internal API Programs
sponsored by Intel® Services
WEBCAST: View this webcast now to discover the differences in implementing an internal API system and choosing a public API interface. Also learn about the technical and cultural challenges that face enterprise architects, and best practices aroudn implementing an internal API program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

Intel® Services

Build an Android app using the IBM Mobile Data for Bluemix cloud service
sponsored by IBM
WEBCAST: Discover how the IBM Mobile Data for Bluemix service can store, delete, update and query objects stored in the cloud.
Posted: 21 Nov 2014 | Premiered: Nov 21, 2014

IBM

Applied Analytics — Turning Data into Answers
sponsored by Virtual Instruments
VIDEO: Watch this informative video now to find out how one industry-leading tool utilizes analytics to turn data into answers – all in real-time.
Posted: 10 Jun 2014 | Premiered: 10 Jun 2014

Virtual Instruments
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement