Application Life Cycle Management Multimedia

(View All Report Types)
Release Management: Solution to Maximize Agile Timeframes and Performance
sponsored by Hewlett-Packard Enterprise
VIDEO: Most development teams implement Agile to streamline projects and reduce cycle times, but how can you ensure the quality of your software exceeds client expectations while maintaining quick development? This video overviews a release management system that provides valuable insights into that status of projects.
Posted: 12 Aug 2014 | Premiered: 22 May 2014

Hewlett-Packard Enterprise

PaaS Facts & Fictions - How to Succeed with the Next Generation of Middleware
sponsored by Fujitsu
WEBCAST: Although many organizations rely on PaaS for its core functions, it is emerging in the technology space for app development and lifecycle management. In this informative webcast, explore the more advanced functionalities of PaaS, and discover the requirements for aligning PaaS with various application types.
Posted: 18 Jul 2013 | Premiered: Dec 31, 2012

Fujitsu

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Agile Release Planning and Monitoring
sponsored by CollabNet
WEBCAST: Attend this fast-paced presentation and hear from Dan Rawsthorne, as he introduces Agile Release Planning, which is actually the development of a release strategy that must be implemented in an agile way.  Dan shows you how a Release Plan is generated, and then shows how the Release Plan is monitored and managed with metrics from sprint to sprint.
Posted: 10 May 2010 | Premiered: May 10, 2010

CollabNet

Cisco Prime Assurance Manager 1.1
sponsored by Cisco Systems, Inc.
TRIAL SOFTWARE: Download your 60-day trial of Cisco Prime Assurance Manager 1.1, which allows network managers to gain visibility into application performance and end-user experience while utilizing embedded instrumentation, resolving problems faster, and much more.
Posted: 02 Jul 2012 | Premiered: 09 Feb 2012

Cisco Systems, Inc.

Applications Get Smart: Hands On Demo of Artificial Intelligence Capabilities
sponsored by IBM
WEBCAST: Access this webcast to discover how to create an application with cognitive abilities with a hands-on demonstration. See how to implement AI successfully, and avoid disappointing your end-users.
Posted: 02 Feb 2015 | Premiered: Feb 2, 2015

IBM

Integrating Cognitive Abilities Into Your Applications
sponsored by IBM
WEBCAST: Access this webcast to find out more about applications that take advantage of the cognitive abilities trend, and if such a solution is right for your products.
Posted: 03 Feb 2015 | Premiered: Feb 3, 2015

IBM

Rational Requirements Composer: Efficient, Collaborative Requirements Management
sponsored by IBM
SOFTWARE DOWNLOAD: In this resource, explore the features and capabilities of IBM Rational Requirements Composer, and learn how you can get 100% traceability across requirements for your entire development team, improving collaboration, analysis, and change management.
Posted: 06 Sep 2013 | Premiered: 06 Sep 2013

IBM

Driving Customer Value in an increasingly competitive landscape for mobile applications
sponsored by IBM
WEBCAST: Today, 75% of the world's population owns a mobile phone, making effective mobile application development a top priority. But the process for developing mobile applications varies drastically from traditional app dev processes. Watch this webcast to gain insight into the top mobile app dev challenges, tips for mitigating them, and much more.
Posted: 30 Aug 2012 | Premiered: Aug 1, 2012

IBM

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork