Tool Command Language Multimedia

(View All Report Types)
Target DevOps Bottlenecks with Connected Lifecycle Data
sponsored by Tasktop
WEBCAST: Many businesses are looking to implement a successful DevOps strategy. This webcast identifies and explores the bottlenecks in the product lifecycle that can impact your transformation. Find out how to understand and connect the value chain, identify high value business metrics, implement high level reporting, and more.
Posted: 27 Jul 2016 | Premiered: Jul 27, 2016

Tasktop

Download Unitrends Enterprise Backup, Free for 30 days
sponsored by Unitrends
SOFTWARE DOWNLOAD: This download delivers Unitrends Enterprise Backup software, which is designed to ensure IT asset recovery from any location, at any time. This solution is available as a virtual appliance for Microsoft Hyper-V.
Posted: 11 Jun 2014 | Premiered: 11 Jun 2014

Unitrends

SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

NCSU - IBM PowerLinux - Industry standard Linux systems, solutions tuned to the task
sponsored by IBM
WEBCAST: This video explores a leading solution delivering industry standard Linux systems services faster, with higher quality, and more economically than others. Learn how it combines a leading hardware, Linux software, and domain expertise of different industries resulting in higher quality operations that keep pace with modern business.
Posted: 20 Oct 2014 | Premiered: Apr 23, 2012

IBM

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

Rational Build Forge Demo Series
sponsored by IBM
SOFTWARE DEMO: Access IBM Rational Build Forge demos to see how it can be used to create a software assembly line to automate and accelerate software delivery. Learn how Rational Build Forge can help development teams automate repetitive tasks, uncover development bottlenecks, determine trends for specific projects and manage compliance mandates.
Posted: 04 Nov 2009 | Premiered: 15 Oct 2008

IBM

Reduce Costs and Stay Compliant With Next-Generation SAM
sponsored by CDW Corporation
WEBCAST: Watch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
Posted: 28 Feb 2014 | Premiered: May 31, 2013

CDW Corporation

SAN Monitor for EMC
sponsored by SolarWinds, Inc.
SOFTWARE DOWNLOAD: SolarWinds® SAN Monitor for EMC® is a free desktop tool that gives you the visibility into your physical storage to make sure it's in good health and lets you quickly and easily monitor EMC CLARiiON® arrays with at-a-glance insight into storage.
Posted: 03 Aug 2012 | Premiered: 03 Aug 2012

SolarWinds, Inc.

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork