Software  >   Systems Software  >   Programming Languages  >   Markup Languages  >   XML  >  

Security Access Markup Language

RSS Feed    Add to Google    Add to My Yahoo!
Security Access Markup Language Multimedia (View All Report Types)
 
Product Review: Business Process Framework & Calculated Fields
sponsored by Workday
WEBCAST: This demo looks at two features of a human capital management and financial management software vendor. With Configurable Business Processes and Calculated fields, processes can be configured to ensure adherence to your company's policies and needs. Watch now to learn more.
Posted: 16 Mar 2015 | Premiered: Aug 13, 2013

Workday

7 Steps to Leverage DevOps for Tangible Business Benefits
sponsored by CA Technologies.
VIDEO: Tune into the following video to uncover the 7 secrets to DevOps success and learn how leading organizations are leveraging their DevOps strategies to improve overall software quality, decrease time to market, and more.
Posted: 11 Nov 2014 | Premiered: 11 Nov 2014

CA Technologies.

Visualization: How it all comes together
sponsored by GE Healthcare
WEBCAST: Healthcare is evolving and becoming more patient-centric. Tools and software are being released to provide better visibility to data once stored in silos. Today, healthcare workers need a single workstation that provides access to advanced processing tools. Access this webcast for an introduction to an imaging application.
Posted: 16 Mar 2015 | Premiered: Mar 16, 2015

GE Healthcare

Hybrid Service Management From a Single Platform
sponsored by FrontRange Solutions Inc.
VIDEO: Access this brief video to learn how you can manage your transactions from a single platform, on-premise or in the cloud. Tune in to discover how this program helps thousands of organizations in fields like IT, finance, HR and more efficiently manage their businesses processes.
Posted: 17 Apr 2015 | Premiered: 13 Jan 2015

FrontRange Solutions Inc.

How user experience is a business differentiator
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief on-demand video, John McCarthy – Vice President and Principal Analyst at Forrester Research – explains how organizations can increase their value by delivering a great user experience.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Limited

Leveraging Virtual Iron and Quad-Core Intel® Based Server Virtualization in Production Environments
sponsored by Virtual Iron Software, Inc.
WEBCAST: This webcast, featuring Intel and Virtual Iron, explores the key drivers and enabling technologies behind server virtualization. Best practices for supporting virtualized workloads in production environments will also be discussed.
Posted: 10 Mar 2008 | Premiered: Mar 1, 2008

Virtual Iron Software, Inc.

7 Habits of Highly Effective Teams
sponsored by IBM
WEBCAST: Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.
Posted: 22 Apr 2013 | Premiered: Apr 22, 2013

IBM

Reduce Costs and Stay Compliant With Next-Generation SAM
sponsored by CDW Corporation
WEBCAST: Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
Posted: 28 Feb 2014 | Premiered: May 31, 2013

CDW Corporation

SAN Monitor for EMC
sponsored by SolarWinds, Inc.
SOFTWARE DOWNLOAD: SolarWinds® SAN Monitor for EMC® is a free desktop tool that gives you the visibility into your physical storage to make sure it's in good health and lets you quickly and easily monitor EMC CLARiiON® arrays with at-a-glance insight into storage.
Posted: 03 Aug 2012 | Premiered: 03 Aug 2012

SolarWinds, Inc.

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement