IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

SASD

RSS Feed    Add to Google    Add to My Yahoo!
SASD Reports
 
Be as Agile as you can be
sponsored by IBM
WEBCAST: Join Elizabeth Woodward, IBM Agile Practice Expert, as she discusses how software development leaders and agile teams can identify the impact of choices in organizing their team structure to optimize a distributed Agile methodology. 
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

IBM

Kaseya Streamlines Mirus IT’s Managed Services Business
sponsored by Kaseya
WHITE PAPER: Access this case study to learn how one IT organization was able to leverage an IT services management platform that provided a single integrated dashboard to manage the entirety of a customer's IT estates while still providing the high level of service to its clients had become accustomed to.
Posted: 28 Jan 2015 | Published: 31 Dec 2014

Kaseya

Developing for Tomorrow: Mobile Application Essentials
sponsored by IBM
WEBCAST: This webcast provides top signs your apps are built for today – and not for tomorrow. Find out the essential aspects that give enterprise mobile apps a high value, and see the top 5 signs your apps need an overhaul to be relevant in the future
Posted: 13 Jan 2015 | Premiered: Jan 13, 2015

IBM

Why You Need a Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the reasons why enterprises benefit from implementing next-generation firewalls (NGFWs) and lays out a path to success.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Hewlett-Packard Company

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
BOOK: This eBook will teach you how to secure your POS systems, minimize your risk, achieve PCI DSS compliance, protect cardholder data, and more.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

Bit9 + Carbon Black

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

IBM Cloudant: The Do-More NoSQL Data Layer
sponsored by IBM
WHITE PAPER: Access this resource to learn about a fully managed database-as-a-service approach that enables applications and their developers to be more agile. You'll learn how this approach provides a NoSQL data layer, delivered as a fully managed service, liberating developers from the cost, complexity, and risk of do-it-yourself data later solutions.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

IBM

Governance, Risk, and Compliance for Critical Data Movement
sponsored by IBM
WEBCAST: Join this webinar with experts from Forrester Research to learn about the key trends in GRC. Find out how to develop your lines of defense, learn how to measure your organization's GRC maturity, and get three key tips for developing a successful strategy.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

IBM

Six Essential Elements of Web Application Security
sponsored by Qualys
WHITE PAPER: This white paper discusses the most common classes of web application vulnerabilities, and how hackers most often take advantage of these weaknesses. Read on to learn the 6 essential elements of web application security that are the most valuable places for IT teams to invest their time and resources.
Posted: 26 Jan 2015 | Published: 31 Oct 2013

Qualys

Grow Business Consumer Trust
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn to establish a strong online relationship with your customer that is built on trust by bolstering security and authenticating your site.
Posted: 12 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement