Programming WebcastWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Programming Webcast returned the following results.
RSS What is RSS?
Related Categories

 •   Application Management and Maintenance
 •   Data Security
 •   Desktop Management
 •   Programming Languages
 •   Storage Management
 •   Customer Relationship Management (CRM)
 •   Wireless Technologies and Mobile Computing
 •   Application Lifecycle Management(ALM)
 •   Endpoint Security
 •   Virtualization

Related Searches
 •   Network Programming
 •   Programming Webcast Coding
 •   Programming Webcast Downloads
 •   Programming Webcast Finds
 •   Programming Webcast Organizational
 •   Programming Webcast Secure
 •   Programming Webcast Seminars
 •   Programming Webcast Version
 •   Schema Programming
 •   Web Casts Programming
Advertisement

ALL RESULTS
1 - 25 of 464 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..

An Introduction to HP's Site Visit Program by Hewlett-Packard Limited

October 25, 2013 - (Free Research)
Site visit programs play a critical role in any successful outsourcing initiative. This on-demand webcast describes key features of an effective site visit program. 
(WEBCAST) READ ABSTRACT |

HP's Get Virtual Guarantee by Hewlett-Packard Company

May 01, 2012 - (Free Research)
HP is putting its money where its mouth is with its new Get Virtual Guarantee program for VMware, and guaranteeing you'll get twice your VM density. Check out this short webcast to learn more. 
(WEBCAST) READ ABSTRACT |

Cyber Defense Managed Service - A Force Multiplier Webinar by Verdasys (E-mail this company)

June 27, 2013 - (Free Research)
Join security expert and CISO of In-Q-Tel Dan Geer and Verdasys in this upcoming webcast as they discuss a new deployment model and next-gen technology that can provide rapid deployment, immediate detection and comprehensive prevention operations for companies of any size. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Tips from the Trade - Competing on Web Analytics by SAS

May 05, 2010 - (Free Research)
How can your company take away more than just sales numbers from online customers? That was one of the topics of a webcast that brought thought leaders together to discuss challenges and best practices in the industry. Continue reading to explore the insights and highlights from that webcast and learn more about how to compete on web analytics. 
(WHITE PAPER) READ ABSTRACT |

6 Key Metrics for Measuring Lean Success by Infor

September 2008 - (Free Research)
This webcast by IndustryWeek discusses the key metrics your company can use to help ensure you accomplish you lean goals. It brings together members of the manufacturing community to discuss strategic and operational initiatives. 
(WEBCAST) READ ABSTRACT |

Leveraging Dell | EMC CX4 with Enterprise Flash Drives for Oracle Deployments by Dell | EMC

July 2009 - (Free Research)
This webcast discusses how Enterprise Flash Drives on Dell | EMC CX4 storage arrays can help tackle these challenges in the context of Oracle database deployments. 
(WEBCAST) READ ABSTRACT |

8 Common Mistakes of Windows 7 Migration by Dell, Inc.

April 2011 - (Free Research)
Join this interactive webcast to learn more about:• Common mistakes that people make during the OS migration project • How Dell overcame mistakes we made during our migration • How Dell helped other companies overcome common mistakes • Goodness that came out of the migration program 
(WEBCAST) READ ABSTRACT |

SQL Server 2012 Security by Microsoft

January 2012 - (Free Research)
Check out this essential webcast to learn all about the security & compliance features for SQL Server from Il-Sung Lee, Senior Program Manager from SQL Server Engine Security team. 
(WEBCAST) READ ABSTRACT |

Service-Oriented Messaging by LEGACY DO NOT USE - IBM Corporation

December 2007 - (Free Research)
This Webcast explores the key elements necessary for improved SOA messaging. In this Webcast, you will examine the messaging benefits associated with JMS, HTTP, REST, SOAP, WS-Addressing, WS-ReliableMessaging, traditional message queues and intermediaries. You will how to leverage various messaging constructs during the services design process. 
(WEBCAST)

How to Consolidate Identities for Office 365 and Cloud Access by Radiant Logic, Inc.

April 2014 - (Free Research)
This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud. 
(WEBCAST) READ ABSTRACT |

Third Party Applications: A Chink in Your Armour by Lumension

April 2014 - (Free Research)
This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management. 
(WEBCAST) READ ABSTRACT |

Bridging Telecom and the web by Alcatel-Lucent

October 2013 - (Free Research)
This informative webcast examines an application solution that leverages the full power of the IMS to deliver telecom capabilities as a web service. Tune in and find out how this can help your organization significantly improve productivity and efficiency. 
(WEBCAST) READ ABSTRACT |

It's all about customer satisfaction by Hewlett-Packard Company

February 2014 - (Free Research)
Top fashion brand Valentino was looking for innovative ways to serve their customers better. In this webcast, discover how Valentino made it drastically easier for customers to select and buy their products with fully integrated mobile applications. 
(WEBCAST)

Enhancing Workplace Mobility and BYOD with the VMware Horizon Mobile Secure Workplace by VMware, Inc.

September 2013 - (Free Research)
This informative webcast examines how desktop virtualization is emerging as the go-to solution for these BYOD issues, and takes a look at a tool that can secure your mobile environment while streamlining management. 
(WEBCAST) READ ABSTRACT |

Tackling Workplace Mobility and Bring Your Own Device Initiatives with the VMware View Mobile Secure Desktop by VMware, Inc.

August 2012 - (Free Research)
This webcast explores the issues with enabling BYOD in the workplace and provides details of a desktop virtualization-based solution that will help you securely support device diversity, mobile workers, and BYOD initiatives. 
(WEBCAST) READ ABSTRACT |

Come visualize the future with Many Eyes by IBM

November 2013 - (Free Research)
Access the following webcast to see visual analytics firsthand. Discover how easily patterns can be discovered and how this technology can give you and your organization the sharpest competitive edge possible. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Taming the Data Demons: Leveraging Information in the Age of Risk by IBM

January 2011 - (Free Research)
Check out this presentation transcript from IBM as it discusses the advantages of implementing a holistic approach to data risk management, and provides both the “why” and “how” to begin putting a holistic data risk management program to work in businesses of all sizes. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

New Research: How to Improve Your B2B Email Marketing Results in 2007 PDF Slides by KnowledgeStorm Webinars (E-mail this company)

February 2007 - (Free Research)
View the slides presented in the "New Research: How to Improve Your B2B Email Marketing Results in 2007" Webcast and find out how 3,637 marketers responded to tough questions about their open, click and conversion rates. Also, find out which tests work best, what's not working, list growth strategies and how email budgets are changing for 2007. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: Has Your QSA Thrown You Under a Bus? by Dell SecureWorks UK

August 2011 - (Free Research)
After working with hundreds of organizations striving to achieve PCI compliance, we understand that one of the biggest challenges is finding and maximizing the use of a quality QSA. This presentation transcript will give you examples of how a bad QSA can derail your PCI program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: Surviving the Tidal Wave of Data with a Holistic Approach to Data Reduction by IBM Rational

January 2011 - (Free Research)
This presentation transcript reviews the options and trends for controlling data growth by reducing your data storage footprint. Milan K. Patel, Sr. Marketing Manager for Tivoli Storage contributes thoughts on how IBM can help you achieve your data reduction goals. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Avoiding the SANS Top 25 Most Dangerous Programming Errors by Veracode, Inc.

February 2010 - (Free Research)
The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors. 
(WEBCAST) READ ABSTRACT |

Gain Control Over Your Mobile Environment by Dell Software

April 2014 - (Free Research)
Is your environment inundated with iOS and Android devices? Learn how mobile device management and mobile app management can solve your top pain points. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Automating Access Certification in Just 17 Days by Aveksa

August 2012 - (Free Research)
This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Solving Scripting Problems with Technology by Network Automation, Inc

November 2010 - (Free Research)
Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges by Panaya, Inc.

April 2010 - (Free Research)
This presentation transcript of the webcast “Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges” explores the top challenges of an SAP ERP 6.0 upgrade and provides must-know advice, real-world examples, technical tips and other tricks to help you solve them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 464 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts