Designing Software Multimedia

(View All Report Types)
3 Essentials to Mobile Application Success
sponsored by IBM
VIDEO: Access this brief video for a look into the capabilities of mobile, and what new challenges companies will need to facilitate. Find out 3 essentials to a successful mobile application.
Posted: 09 Dec 2014 | Premiered: 09 Dec 2014

IBM

Target DevOps Bottlenecks with Connected Lifecycle Data
sponsored by Tasktop
WEBCAST: Many businesses are looking to implement a successful DevOps strategy. This webcast identifies and explores the bottlenecks in the product lifecycle that can impact your transformation. Find out how to understand and connect the value chain, identify high value business metrics, implement high level reporting, and more.
Posted: 27 Jul 2016 | Premiered: Jul 27, 2016

Tasktop

Case Study: Modernize Your Requirements Management Practice
sponsored by HP Software
WEBCAST: View this webcast to how Novartis, a global health care company, improved requirements management in their SAP environment to provide more complete traceability, ensuring that they developed against their requirements and successfully tested them.
Posted: 16 Jun 2011 | Premiered: Jul 19, 2011, 13:00 EDT (17:00 GMT)

HP Software

Release Management: Solution to Maximize Agile Timeframes and Performance
sponsored by Hewlett-Packard Enterprise
VIDEO: Most development teams implement Agile to streamline projects and reduce cycle times, but how can you ensure the quality of your software exceeds client expectations while maintaining quick development? This video overviews a release management system that provides valuable insights into that status of projects.
Posted: 12 Aug 2014 | Premiered: 22 May 2014

Hewlett-Packard Enterprise

Best practices: Deliver next-gen automotive infotainment systems
sponsored by IBM
WEBCAST: In the realm of next-generation automotive infotainment systems, innovation continues to grow exponentially, with new system features creating both trends and challenges. In this informative webcast, discover a fundamental approach for success in E/E engineering and learn how the ever-increasing complexities can be simplified.
Posted: 26 Mar 2014 | Premiered: Mar 26, 2014

IBM

Agile Development Powered by Jazz
sponsored by IBM
WEBCAST: In this webcast, experts from IBM Global Business Services discuss their implementation of Rational Team Concert and their Smarter Application Development and Maintenance solution and how it has changed the way in which they approach software development.
Posted: 29 Aug 2012 | Premiered: Aug 29, 2012

IBM

Mobile App Development Essentials: Anticipating Future Trends and Needs
sponsored by IBM
WEBCAST: This webcast divulges the top indicators that your apps don't have what it takes to endure into the future. Read on to discover the vital components that bring value to enterprise mobile apps, and learn the top 5 signs that indicate that your apps need an overhaul to be relevant into the future.
Posted: 13 Jan 2015 | Premiered: Jan 13, 2015

IBM

Beyond the Scrum Team: Delivering "Done" at Scale
sponsored by Tasktop
WEBCAST: Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.
Posted: 27 Jul 2016 | Premiered: Jul 26, 2016

Tasktop

Test and simulate rules using WebSphere ILOG Business Rules Management System
sponsored by IBM
PRODUCT DEMO: Learn how WebSphere ILOG BRMS allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key KPIs. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Posted: 12 Dec 2010 | Premiered: 12 Dec 2010

IBM

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork