Business of Information Technology  >   Business Processes  >   Product Development  >   PLM  >  

Software Lifecycle Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Lifecycle ManagementMultimedia (View All Report Types)
 
Challenges around web 2.0 apps and how performance tools can help
sponsored by Borland, Micro Focus
PODCAST: Tune in to this podcast to explore challenges specific to web 2.0 applications and learn how to meet the performance testing needs of these apps with an enterprise-class performance testing tool.
Posted: 21 Apr 2014 | Premiered: Apr 30, 2013

Borland, Micro Focus

It's all about customer satisfaction
sponsored by Hewlett-Packard Company
WEBCAST: Top fashion brand Valentino was looking for innovative ways to serve their customers better. In this webcast, discover how Valentino made it drastically easier for customers to select and buy their products with fully integrated mobile applications.
Posted: 24 Feb 2014 | Premiered: Feb 24, 2014

Hewlett-Packard Company

Don't Acquire and Abandon - Ensure You're Using Those Licenses
sponsored by Hewlett-Packard Company
WEBCAST: In this on-demand webcast, hear from Julien Kuijper, Director of Asset and License Management at SAP, as he dives into what makes a successful SAM strategy, including tools, processes, workflow, and business knowledge.
Posted: 12 Jun 2014 | Premiered: Jun 12, 2014

Hewlett-Packard Company

NetScaler deployment on AWS tech video
sponsored by Citrix
WEBCAST: Tune into this webcast to learn about the technical procedure of launching a NetScaler instance in an AWS environment. Discover how doing this will help optimize, secure and control the delivery of all enterprise and cloud services.
Posted: 23 Jun 2014 | Premiered: Apr 9, 2013

Citrix

Predict inefficiencies that affect your bottom line
sponsored by IBM
VIDEO: Tune into the following video to see how predictive maintenance can virtually eliminate the conventional reactive way of dealing with broken appliances and applications. See how you can avoid spending countless hours on fixing problems that don't necessarily need it, how you can improve overall efficiency, productivity, and more.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014

IBM

PaaS Facts & Fictions - How to Succeed with the Next Generation of Middleware
sponsored by Fujitsu
WEBCAST: Although many organizations rely on PaaS for its core functions, it is emerging in the technology space for app development and lifecycle management. In this informative webcast, explore the more advanced functionalities of PaaS, and discover the requirements for aligning PaaS with various application types.
Posted: 18 Jul 2013 | Premiered: Dec 31, 2012

Fujitsu

IBM Integrated Solution for System z Development and Worklight demo: Bridge Mainframe and Mobile Application Development
sponsored by IBM
SOFTWARE DEMO: With IBM's Integrated Solution for System z Development and Worklight Studio, you can quickly create mobile applications, built upon System z apps, for smartphones and tablets. View the product demo and access downloads now, so you can discover what these development tools can do for your organization.
Posted: 06 Nov 2013 | Premiered: 22 Apr 2013

IBM

Worklight Integration with RTC for Mobile Application Development
sponsored by IBM
PRODUCT DEMO: View this demo to get a brief overview of How IBM's Worklight mobile development platform tools and its Rational Team Concert collaborative lifecycle management tools integrate to enable successful mobile application development.
Posted: 31 Aug 2012 | Premiered: 31 Aug 2012

IBM

Application Performance for Business Efficiency
sponsored by IPANEMA TECHNOLOGIES
VIDEO: This quick video reveals how you can regain control of your network and the applications using it with an innovative application performance management solution.
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

IPANEMA TECHNOLOGIES

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement