IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed    Add to Google    Add to My Yahoo!
Security-related Design Multimedia (View All Report Types)
Simplify and Mobilize Any Business Workflow Securely by Next Week
sponsored by Citrix and Capriza
WEBCAST: In this webinar, you'll learn what it takes to rapidly design and securely deploy apps for your critical business workflows. View now to gain the opportunity to watch as a customized app is designed and deployed in 10 minutes, without the need for complex APIs or writing code.
Posted: 20 Aug 2015 | Premiered: Sep 22, 2015

Citrix and Capriza

Game of Phones: Which Device Will Rule EMM for All?
sponsored by IBM
WEBCAST: This webcast shows how the top EMM operating system contenders stack up: iOS, Android, and Windows. Click here to see which OS overcomes its competitors in the battle for EMM supremacy.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015


Deliver the Power of Patterns Across a Dynamic Cloud Environment
sponsored by IBM
WEBCAST: In this video, Jason McGee, IBM Fellow and CTO at PureApplication System, explains how businesses can harness the power of patterns and deploy applications on- and off- premise within the cloud, by way of an automated blueprint. View this webcast now to simplify and speed up your dynamic cloud deployment.
Posted: 15 Sep 2015 | Premiered: Feb 21, 2014


Success in the Digital Banking Revolution: How to Securely Go Mobile
sponsored by HID
WEBCAST: In the first part of this two-part webcast, Christy Serrato, in Solutions Marketing at HID Global, addresses the challenges organizations face in the new era of digital banking, as well as discusses the barriers to mobile banking adoption, including coping with outdated legacy software integration.
Posted: 24 Aug 2015 | Premiered: Aug 24, 2015


"Appifying" the Enterprise Mobility Landscape
sponsored by StarMobile
WEBCAST: In this webcast, Brian Katz talks with Todd Fryburger, CEO of StarMobile, about "Appifying" your enterprise with a codeless, cloud-based solution, which transforms existing enterprise sources and legacy systems into mobile apps with a native user experience.
Posted: 10 Aug 2015 | Premiered: Aug 3, 2015


Integrating Testing and Service Virtualization in a WebSphere Environment
sponsored by IBM
WEBCAST: In this webinar, Nick Portalski and Stephen Rowles of Integration Testing at IBM explain how to integrate testing and server virtualization in a WebSphere environment. View now to see the four types of testing performed on load and virtualization servers as well as discover how to test apps built on WebSphere.
Posted: 22 Sep 2015 | Premiered: Sep 22, 2015


Does the Cloud Fit into Hybrid Data Environments?
sponsored by Dell, Inc.
WEBCAST: In this webcast, Shawn Rogers, Chief Research Officer in the Information Management Group at Dell, examines an advanced data analytics solution that enterprises can leverage in the cloud for enhanced data learning. View now to see how you can merge your enterprise cloud with others.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

Dell, Inc.

Ray Wang's 6 Requirements for Today's HR Applications
sponsored by Workday
WEBCAST: HR teams want applications to be simple, scalable, and stimulating. IT needs applications to be safe, secure, and sustainable. Access this webcast to hear Ray Wang of Constellation Research point the way to the best of both worlds.
Posted: 10 Jul 2015 | Premiered: Aug 19, 2014


Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement