IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

SASD

RSS Feed    Add to Google    Add to My Yahoo!
SASD Multimedia (View All Report Types)
 
Be as Agile as you can be
sponsored by IBM
WEBCAST: Join Elizabeth Woodward, IBM Agile Practice Expert, as she discusses how software development leaders and agile teams can identify the impact of choices in organizing their team structure to optimize a distributed Agile methodology. 
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

IBM

Three Core Principles for Automating Cloud Deployments
sponsored by Dell, Inc. and Intel
WEBCAST: Cloud computing has significantly reduced the cost of trying new applications or experimenting with your existing apps. Learn how deployment automation can benefit your organization.
Posted: 29 Sep 2014 | Premiered: Sep 18, 2014

Dell, Inc. and Intel

Move Your Enterprise Java Development to the Cloud
sponsored by Red Hat
VIDEO: In this brief video, discover how cloud-based application development platforms provide tools for building, deploying, and testing applications without investing in costly new resources.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

Red Hat

Launch Better Mobile Apps, Faster: Introducing Continuous Quality
sponsored by Perfecto Mobile
VIDEOCAST: Access this webcast to discover how to launch mobile apps faster, using continuous quality for every stage of the development process.
Posted: 10 Feb 2015 | Premiered: Feb 10, 2015

Perfecto Mobile

Case Study: Healthcare Company Goes 100% Cloud
sponsored by Dimension Data
VIDEO: In this brief video, learn how an integrated healthcare company completely migrated to a hybrid cloud environment for a more flexible, dynamic, efficient data center.
Posted: 03 Mar 2015 | Premiered: 17 Dec 2014

Dimension Data

Avoiding the Headlines: 5 Critical Security Practices to Implement Now
sponsored by CloudPassage
VIDEO: Inside this webinar, join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage to learn five best practices to put in place in order to avoid a security breach within your organization.
Posted: 24 Apr 2015 | Premiered: 24 Apr 2015

CloudPassage

Reinventing the Yellow Pages Directory: How YellowAPI Became an Engine for Digital Transformation
sponsored by Mashery
WEBCAST: This webcast tells the story of how Yellow Pages found digital success by using the right API.
Posted: 20 Apr 2015 | Premiered: Apr 20, 2015

Mashery

Build an Android app using the MobileData cloud service
sponsored by IBM
WEBCAST: Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.
Posted: 21 Nov 2014 | Premiered: Nov 21, 2014

IBM

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Mobile App Performance: Learn Usage Patterns and Track Abandonment
sponsored by Hewlett-Packard Company
VIDEO: Watch this brief video to find out how one system could help you learn usage patterns and find trends in abandonment points. Functional on both iOS and Android, click now to find out if a system like this can work for you company.
Posted: 12 Dec 2014 | Premiered: 12 Dec 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement