IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed    Add to Google    Add to My Yahoo!
Secure Programming Multimedia (View All Report Types)
 
Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. Plus you learn why becoming a technology partner with Citrix will expand your business reach and bottom line.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

Podcast: End-to-End Secure Client to Cloud Access
sponsored by Intel
PODCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Podcast: How Security is well suited for Agile development
sponsored by IBM
PODCAST: Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)

IBM

Evaluate: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE: With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

Nova Southeastern University College of Dental Medicine Uses Virtualization Tools to Boost Simulation Labs
sponsored by Dell, Microsoft and Citrix
PODCAST: Find out how turning to desktop virtualization allowed Nova Southeast College of Dental Medicine in Ft Lauderdale, FL to provide students with the simulation lab technology needed to better prepare and train for their dental careers.
Posted: 12 Sep 2016 | Premiered: Apr 1, 2016

Dell, Microsoft and Citrix

Achieve the Benefits of DevOps, Containers and the Cloud for your Java Apps
sponsored by Red Hat
VIDEO: Businesses everywhere are vying to achieve high quality, fast deployment, and easy maintenance for their applications. Explore ways to get these benefits for your apps with DevOps-enabling technologies, containers, cloud platforms, and more.
Posted: 12 Aug 2016 | Premiered: 03 Feb 2016

Red Hat

Henry Mayo Newhall Hospital Implements a Converged IT Infrastructure
sponsored by IBM
VIDEO: This brief video examines how Henry Mayo Newhall Hospital improved their infrastructure with an integrated, converged platform. Find out how they decreased latency for apps, increased their flexibility as an IT organization, and implemented hardware encryption.
Posted: 01 Sep 2016 | Premiered: 01 Sep 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement