Software  >   Systems Software  >   Programming Languages  >   Scripting Languages  >  

REstructured eXtended eXecutor

RSS Feed    Add to Google    Add to My Yahoo!
REstructured eXtended eXecutor Multimedia (View All Report Types)
 
Low-Code Mobile Apps: Enabling Digital Transformation
sponsored by K2
WEBCAST: Discover how low-code apps enable you to simplify mobile development and reduce the amount of time-consuming, skills-heavy custom coding you have to do to create secure mobile apps with support for key things like offline use and native devices.
Posted: 12 Oct 2017 | Premiered: Oct 6, 2017

K2

Integrate Your Business Apps with Dynamics CRM to Deliver Enterprise Spanning Solutions
sponsored by K2
WEBCAST: Discover how to extend the use of CRM data across your organization by creating flexible, easy-to-integrate apps with visual, low-code development tools that reduce the need for custom coding.
Posted: 11 Oct 2017 | Premiered: Oct 6, 2017

K2

Best Practices for Microservices
sponsored by MuleSoft
WEBCAST: This webcast explores the concept of microservices, defining what they are, how to implement them, and how to optimize their value. Uncover microservices best practices and learn from a series of experts how to leverage APIs, enable continuous delivery, optimize automation, implement a hybrid integration platform, and more.
Posted: 02 Mar 2017 | Premiered: Feb 10, 2017

MuleSoft

Build, Run, and Analyze Native Mobile Apps Easily
sponsored by PowWow
VIDEO: Web, Windows, Java – whatever kind of apps you have, your organization may be looking to implement a streamlined modernization and development strategy for extending these apps to mobile. Watch this brief video to explore how to leverage software containers, APIs, and machine learning in order to build, run, and analyze native mobile apps.
Posted: 21 Feb 2017 | Premiered: 15 Feb 2017

PowWow

Take Command of Vendor Audits with Accurate IT Data
sponsored by BDNA
WEBCAST: This webcast offers information on why audits can turn into timely, costly, and complex processes, and how the amount, relevancy, and accuracy of the data can affect the audits.
Posted: 01 Nov 2016 | Premiered: Oct 12, 2016

BDNA

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

SV 2 min chalk ‘n’ Talk on HP Service Virtualization
sponsored by Hewlett-Packard Enterprise
WEBCAST: This brief webcast looks at how service virtualization can help software development every step of the way.
Posted: 04 Nov 2013 | Premiered: Nov 4, 2013

Hewlett-Packard Enterprise

Adobe Flash Builder 4
sponsored by Adobe Systems, Inc.
SOFTWARE DOWNLOAD: Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more.
Posted: 04 Jan 2011 | Premiered: 04 Jan 2011

Adobe Systems, Inc.

Rational Requirements Composer
sponsored by IBM
TRIAL SOFTWARE: Download a free trial of IBM Rational Requirements Composer V1.0.0.1, a requirements definition tool for organizations seeking easy to use elicitation and definition tools that enhance their ability to create the right requirements for their projects and drive improved quality, speed, and alignment across the IT lifecycle.
Posted: 11 Sep 2009 | Premiered: 11 Sep 2009

IBM

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement