Browse communities
Browse communities
Presenting a webinar?

Application Development

Community information
The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Lync 2013 (soon to be Skype for Business) is commonly known as an instant messaging client that includes voice and video capabilities within the enterprise. However, its ability to cross enterprise network boundaries and reach colleagues, partners, and customers across the globe via mobile phones or traditional telephony systems is often overlooked. The natural progression in collaboration may start with a quick instant messaging conversation but often leads to picking up the phone and calling someone to attain resolution.

    Join us on Wednesday, March 25th at 2pm EST to learn about the capabilities of Lync Enterprise Voice, ways to implement it as a cost savings to your business, the impact of the launch of Skype for business and how the progression of enterprise voice collaborative tools are changing the way we run our businesses today.

    Key Takeaways:
    •What is Lync Enterprise Voice
    •How can Lync Enterprise Voice be implemented
    •Is Skype for Business different than Lync Enterprise Voice
  • Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.

    Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.

    This webinar will include:
    •Deploying Magento through UI and pushing code
    •A look into the control panel
    •Demo of New Relic and Chef
    •Simulation of Rackspace customer experience
  • Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).

    SaaS has come a long way from “hype” to “norm”. The key to this change is the confidence that has been built by the cloud/SaaS community by providing enterprise class security. Since, SaaS model of delivery has become a defacto standard of delivering products it’s critical for software providers to ensure that their SaaS product meets the required industry security standards. In this webinar, we will address the security aspects related to architecture, deployment and management of SaaS solutions.

    Key Takeaways:
    • Security considerations in each of the architecture layers
    • Data isolation risks and mitigation plans
    • Overview of CWE/SANS and OWASP Security threats
    • Data retention and termination policies
    • Infrastructure and cloud related security risks and solutions
  • Modern software development practices dominated by component-based engineering and short development cycles have largely been a catalyst for rapid advancements in technology. These practices, however, have also resulted in an epidemic of known vulnerabilities baked into third-party software components of IoT applications and devices. These widespread security flaws, many of which are critical in nature, often remain unnoticed or unaddressed throughout the software or device lifecycle, posing significant risks to the people and organizations that rely on them.

    As software continues to permeate the ever-expanding Internet of Things, software vulnerabilities represent a greater and greater threat. IoT devices, like traditional computers, run on software that is susceptible to malicious attacks. As more devices become connected, understanding how to identify and manage security vulnerabilities within widely used third-party software components is critical for all stakeholders, including manufacturers and end-users.

    In this webinar, our diverse panel of security experts will:
    •Propose an expanded definition and understanding of IoT and the stakeholders at risk
    •Present research highlighting the pervasiveness of vulnerabilities in third-party software components of IoT devices
    •Draw some conclusions about the state of software security in IoT today
    •Discuss some simple approaches to addressing these problems
  • The Identity and Access Market (IAM) is undergoing exciting changes. Increased cloud adoption, cyber-threats and the speedy adoption of mobile computing is affecting how enterprises approach access security and authentication.

    Getting insight into these trends can help you prepare your organization for better and more effective Identity and Access policies during the coming year.

    Join us on for a webinar on “IAM and Authentication Trends in 2015”, on March 24, 2015, where you can hear all about Identity and Access trends and developments from an industry expert.
  • Businesses are under constant pressure to deliver apps faster and faster, without sacrificing quality. Application performance is a huge part of quality and mandatory for a great user experience. How do you achieve it? HP Performance Testing solutions bring new capabilities to accelerate application delivery while maintaining the required performance.


    In this webinar, the HP Product Management team and RnD will present the new features of version 12.20 and a demo of the new, innovative controller (Tech Preview). Join us to learn about:

    The new Performance Center user interface
    Noise generator feature
    New controller (tech preview)
    How StormRunner integrates with NewRelic
    StormRunner version for Developers – Integration with JMeter and webtest speed tools
  • L’objectif de ce webcast est de présenter comment la technologie permet d’atteindre les objectifs DevOps en éliminant les contraintes et les goulots d'étranglement qui perturbent la production de valeur pour les clients finaux

    Why DevOps is the answer to Digital Transformation
    The objective of this webcast is to show how technology allows to reach the DevOps objectives by eliminating constraints and bottlenecks that disrupt the production of value for end users
  • A lack of manpower and a dearth of resources are often major obstacles for organizations striving to achieve and maintain HIPAA and/or PCI compliance. Compliance guidelines are complex and difficult to decipher, even for the most experienced IT professionals. Recent headlines regarding unprecedented security and compliance breaches are causing companies to examine compliance-as-a-service (CaaS) solutions offered by cloud providers. But with the myriad of options available, it’s difficult for companies to discern which CaaS best fits their needs.

    Join Johan Hybinette, HOSTING Chief Information Security Officer (CISO), as he discusses the benefits and risks associated with CaaS. Drawing upon his 20+ years’ of experience in information security and compliance, Johan will also offer tips for selecting the right CaaS for your business. Bring your questions and leave with the information you need to confidently invest in a CaaS solution.
  • Greater than 80% of today’s breaches occur with application software, yet many companies continue to invest in ‘over the wire’ solutions that are not solving the problem. Runtime Application Self-Protection, or RASP, is an emerging market that promises to protect applications from the inside. Using the rich context of the application’s logic and associated core libraries, RASP identifies attacks in ‘real-time’ and stops them. Implementation is quick and requires no changes to your application’s code. Join us to learn more about what RASP can do for you.

    Learn:
    •Why context from inside the application matters
    •How easy it can be to use native capabilities of Java and .NET to protect your applications
    •Use cases to get you started.

    Help lead your enterprise to a stronger, more effective security program.
  • Security and Scalability in the Hybrid Cloud: How to get one without losing the other

    Traditionally, you had to design for a focus on scalability or security in the cloud, but not both. Now with services that connect virtual and real computers together, you can achieve cloud scale while satisfying the most stringent security requirements. Join Rackspace’s Matt Shover and Joseph Palumbo Thursday, March 19th to learn:

    •Top reasons why people choose the cloud
    •Top reason why people think the cloud isn’t the best fit for them
    •What is scaling?
    •How do you scale?
    •How does the hybrid cloud help scale your application?
    •How does the hybrid cloud help secure your application?
    •So how do you build a hybrid environment?


    About the Speakers

    Matt Shover:
    Matt Shover is the manager of RackConnect Operations at Rackspace, where he leads a passionate team of Rackers that work to seamlessly connect Rackspace's Dedicated and Cloud offerings -- turning customer challenges into awesome outcomes. He holds an MBA in finance from California State University, Hayward and has been a Racker for over eight years.

    Joseph Palumbo:
    As a founding member and architect of both the Rackspace Cloud’s Managed Operations service level and Launch Team, Joseph has spends half his time teaching customers about the cloud and the other half learning from his customers what the cloud can do. When he’s not writing blog posts, recording podcasts or making videos, he can be found discussing innovation with other Rackers and wishing paper documents had a built-in search function.
  • When a leading bank states that “in online mortgage sales, a simple change in the colour of a Website calculator resulted in a 10% increase in sales”, it is a reminder of the significant impact the smallest updates in a digital presence can have. However, DevOps adoption faces a major barrier in the enterprise in overcoming organisational debt – historical decisions that will constrain transformation and quick release cycles.
    This webinar explores:
    •the value of marginal gains made through incremental improvements
    •the pitfalls of marginal losses that can build into significant organisational debt
    •and highlights ways in which DevOps can overcome challenges to make a positive impact
  • Enterprises still don’t trust the cloud for their sensitive workloads. Are their concerns reasonable? Are they inevitable? In this briefing, Frost & Sullivan examines perceptions and realities associated with cloud security and recommends ways to mitigate risk.

    Why You Should Attend:
    • Understand the “risk premium” ascribed to the cloud versus the private data center.
    • Learn why the cloud requires new processes for governance and compliance.
    • Hear why traditional security approaches, such as asset protection, are not relevant to a cloud environment.
    • Understand how to build a holistic approach to cloud security.
  • Cloud computing is all about improving agility and efficiency for organisations but the focus is often on the speed to provision infrastructure and services. But what about all the ongoing management and maintenance processes that go with it? If you are going to improve the deployment of services using public or private cloud it is important to look at how you improve the efficiency of the processes around it.

    Learn how process automation technology can help you automate common tasks and processes to improve the speed of delivery, improve the quality of services and take out cost.
  • Many companies are looking to take advantage of the benefits of cloud computing, but have requirements that make public cloud options unusable. In this session we will discuss the top reasons we have seen for customers to select a private cloud solution. Join us for this interactive and insightful session.
  • The rise of enterprise trends such as bring your own device (BYOD), increased use of cloud and network based services and the need to ensure optimum performance, makes added user authentication measures vital.

    Two-factor authentication provides an extra layer of safekeeping that is imperative when adopting a holistic security infrastructure while keeping the cost of implementation down.

    Join us for an interactive webinar to gain insights on:

    • Why and how is Two-factor authentication one of the easiest ways of accomplishing a higher level of security for your enterprise systems?
    • How does Two-factor authentication ensure identity protection?
    • How to deploy a Cloud-based Two-factor authentication platform?
  • The drive to agile development, faster delivery and DevOps has resulted in a major reduction in the scope and frequency of performance testing, primarily due to the need to reduce cycle times, and the difficulty of executing large scale tests earlier in the process. This has also led to a proliferation of test technologies selected by individual projects to cover only their specific needs, causing reduced test case reuse and inconsistency in results.

    Reduced delivery times, instant and ubiquitous user feedback and reduced testing is a potentially toxic combination for organizations.

    Performance Engineering is the new discipline of smarter, more flexible testing executed earlier in the process, delivering actionable and repeatable results including accurate performance data enabling issues to be addressed faster and at lower cost. Performance Engineering is not about a specific technology or product, but it is about reducing rework, maximizing automation and increasing feedback.

    Join this webinar to learn more about Performance Engineering and how HP’s Performance Engineering solutions can help you on the path towards continuous business feedback and improvement, built-in and automated performance, optimized applications for business and customer value, and collaborative and interactive teams focused on quality.
  • Instructional video that illustrates steps to configure a common mobile use case, employee leave requests, in 60 Seconds using Sitrion ONE. More info on www/sitrion.com/one
  • The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step further to become tamper resistant. Trusted applications that handle sensitive data, control valuable IP and perform critical processes can be isolated and protected within secure execution environments. Mobile phones, embedded devices and data center servers all adopt physical hardening to secure the applications they host. This webinar focuses on protecting business applications that support high-tech manufacturing, content distribution, online authentication – in fact any situation where you need to know for sure that your application is doing precisely what the developer intended – nothing more, nothing less.
  • In the past, most traditional test automation focused on the UI and not the back-end. This was a leftover mindset from the days of "just throw it over the wall”. With the current shift in how teams are organized, the skillset for testing is evolving. Dev/Ops, continuous delivery, mobile, cloud and the Internet of Things is forcing a rapid pace of development. Now, QA professionals and business analysts are more ingrained in the overall development process from start to finish. Now that software development for different platforms are using a “shift-left” approach (which involves moving testing to earlier in the software development lifecycle), it is requiring test automation engineers to enhance their technical skills.

    Join Clint Sprauve, Senior Product Marketing Manager for HP Functional Testing, and learn about:

    • API and web services testing early in the development lifecycle
    • How to shift-left with non-technical testers
    • Best practices for proper test automation in Agile and continuous testing processes
  • As Reactive application development goes mainstream, Operations has become painfully aware that the demands of Reactive applications are simply not met by yesterday’s software architectures and technologies.

    Typesafe is proud to announce the upcoming release of ConductR, a management tool for Operations to conveniently deploy and control Reactive, microservice-based applications running in a cluster.

    Supplementing existing tools that focus on more traditional, monolithic application architectures, ConductR is built specifically for distributed Reactive applications, reflecting that Operations requires a different approach to both the tools and methodologies they use. Through proxying, load-balancing and integration with Typesafe Reactive Platform, ConductR helps Operations maintain system responsiveness, resiliency and elasticity at scale in the face of bursty traffic or service failures

    Join us for a webinar with the Technical Lead of ConductR, Christopher Hunt, wherein we’ll discuss the changes in enterprise development of Reactive Applications, new demands on Operations, and how ConductR can help
  • Viele Entwicklerteams mit SAP-Systemen leiden unter Einschränkungen beim Testen durch veraltete oder falsche Testdaten, verursacht durch lange und schwierige System-Refreshs.

    SAP-Systemumgebungen stehen aufgrund ihrer hohen Kosten nur limitiert zur Verfügung, eine kurzfristige Bereitstellung von Zusatzsystemen ist nur erschwert möglich.
    Darunter leidet die Software-Qualität und das IT-Budget.
    Unsere Kunden können mit CA-SV diese Systeme simulieren und damit für Integrationstests mit anderen SAP oder Nicht-SAP Umgebungen zur Verfügung stellen. Die Daten sind dadurch aktuell und für alle Testanforderungen konsistent. Bisherige Wartezeiten entfallen und Fehler durch schlechte Testdaten in der Produktion werden vermieden.
  • This video explores a solution to common enterprise mobility headaches such as legacy infrastructure, security, budgets, skill shortages, and time to market. It presents a strategy that uses a rapid, cloud-based, end-to-end solution with pre-built use cases and connectors to SAP, SharePoint and Salesforce in order to solve 80% of common use cases in the enterprise
  • This video explores a solution to common enterprise mobility headaches such as legacy infrastructure, security, budgets, skill shortages, and time to market. It presents a strategy that uses a rapid, cloud-based, end-to-end solution with pre-built use cases and connectors to SAP, SharePoint and Salesforce in order to solve 80% of common use cases in the enterprise
  • L’objectif du webinar sera d’expliquer comment le déploiement continu des applications facilite la transformation digitale. La discussion sera agrémentée d’exemples concrets de clients qui ont commencé cette transformation dans divers secteurs d’activité : bancaire, distribution.

    Translated:
    Application continuous deployment allows digital transformation
    The objective of the webinar will be to explain how continuous application deployment facilitates digital transformation. The discussion will provide examples of clients who have started this transformation in various domains of activities such as banking and distribution.
  • GitLab provides streamlined social coding and collaboration for Git development teams. But under the hood it's a powerful enterprise Git management platform. In this webinar we'll present best practices for managing permissions and users with LDAP and Active Directory, working with large binary files, code reviews and workflows, and clustering and replication. From security to performance and disaster recovery planning, this webinar will guide you to a rock-solid GitLab deployment.
  • Join Ntirety, a division of HOSTING and the leading data services organization in the country, in this discussion of the impact that database administration can have on individuals, organizations and — most importantly — bottom line revenue. This interactive webinar will cover:
    •DBA Burnout and Retention
    •The DBA’s Role in Major Platform Shifts and Regulatory Compliance
    •The Accidental DBA Due to Staff and Skills Shortages
    •The “Half a DBA” Problem -- When You Don’t Need a Full-time DBA
    •The IT Budget Crunch
    •Q & A
  • HP Software Customer Spotlight Webinar Series 2015
    The Big Data service desk: HEMIT talks HP Service Manager & Smart Analytics

    Join us to discover the power of Big Data at the service desk as HP customer HEMIT presents their success story. Using modern data analysis adds tremendous insight and value to the service desk by leveraging so called unstructured data, which makes about 90% of all data. HEMIT is the IT service provider for hospitals in central Norway. By using HP Service Manager Big Data Edition and Smart Analytics, HEMIT is making its service desk more intelligent and providing Smart Ticket and Hot Topic Analytics capabilities. HEMIT’s projected results are 50% time saved on completing self-service tickets and a short 12 month ROI.

    Why attend?
    • Leverage HP IDOL technology and Big Data for the cutting edge service desk
    • Improve your service desk productivity and increase service quality
    • Do more with less and still improve the overall business value of IT
    • Simplify user experience and improve service desk agent productivity
    • Get answers to your own questions during the live Q&A session

    ‘‘It is probably the most interesting piece of software I’ve seen in the last 10 years. The IDOL engine behind all this - it is really, really cool.’’

    -Thore Senneset, Incident Manager IT-Service, HEMIT (featured webinar presenter)
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • From flirting (download) to happily ever after (constant re-engagement), dating apps use gamification & messaging tactics very effectively to form an essential engagement habit. If someone has downloaded your app, chances are they have an awareness and the start of an affinity for your brand.

    How do you keep your place on their device and keep the mobile relationship going strong? We'll share brand examples that helped create loyal customers.
  • Are you challenged by delays in releasing new application code within your enterprise? If your answer is “yes,” you can accelerate the release process through automation across the various stages of the software development and release lifecycle. Bridge gaps and learn the practice of collaboration between business, development, and operations teams with Agile development, continuous integration (CI), continuous testing (CT), continuous delivery, and continuous deployment.

    Join us and learn about HP’s approach to the DevOps Lifecycle by examining DevOps problems and potential solutions from three points of view: people, process, and tools—from planning to operation. Find out how the integration of HP and third-party development and deployment toolsets provides a seamless, end-to-end implementation of the DevOps lifecycle to increase your release velocity. You will learn about CODAR, Agile Manager, ALM, Unified Functional Testing, Performance Center and Change Impact Testing during this session.
  • Sometimes one cloud isn’t enough. In a recent study by IDC, more than 65% of enterprise IT organizations will commit to hybrid cloud technologies before 2016. In this webinar we will walk you through a case study on a large enterprise customer who optimized their cloud strategy for performance, capabilities, and costs by using a multi-cloud approach. The results were outstanding - $1.5 million in annual savings from examining only 15 apps out of 500 app portfolio. Join Ilyas Iyoob, Director of Advanced Analytics and Lani Dame, Sr. Product Marketing Manager as they walk through this customer success.
  • The borders of the data center has become blurred or eliminated with virtualization, cloud solutions, and mobile devices. With increased complexity comes less visibility coupled with heightened user expectations. In this session, we’ll discuss the impacts of the new ‘borderless enterprise’ on network management practices and provide guidance on how to adapt to this new frontier.
  • For many organizations MS-SQL is the backend to many of their mission critical applications. The environment provides a cost effective foundation for an organization to develop custom designed solutions that drive the business forward. As MS-SQL has risen in importance, the demands on the storage infrastructure have also increased. MS-SQL needs a high performance, well-protected storage system that is also cost effective. To meet these requirements many organizations are now looking at flash storage.

    Join experts from Storage Switzerland and Tegile Systems as we discuss the various options that storage and MS-SQL administrators have as they begin to look for new ways to meet the MS-SQL challenge.
  • The way Business Users consume services is changing, “Central IT” has an opportunity to increase the value provided to their Business Users. New trends in brokering services are surfacing along with a great diversification in Service Providers across IaaS, PaaS and SaaS solutions, managed and un-managed, that can be leveraged. Come join us in reviewing the steps involved in becoming a Service Provider to your Business through IT-as-a-Service enablement from a Managed Cloud Service Provider perspective.
  • Mike Jude, Research Manager of Consumer Communications Services, Connected Home, and Big Data Analytics, will host a panel discussion on Security and Privacy in Big Data. Our panel of experts will include Michael Suby, vice president of Stratecast and Sandy Borthick, Big Data Analytics Industry Analyst. The panel will lead a short teleconference about new findings that affect the market, followed by a live question-and-answer session.
  • Over the past five years, cloud computing has become an essential element in an organization’s IT mix. At the same time, savvy IT decision-makers want to manage potential security risks involved when migrating their organization’s business-critical data to the cloud. Join Johan Hybinette, HOSTING’s Chief Information Security Officer (CISO), and Cliff Turner, Alert Logic’s Solution Architect for this interactive webinar.
    Johan and Cliff will answer your cloud security questions including:
    •What are key challenges that IT leaders face when planning for a cloud migration?
    •What security factors should you consider when considering a hosted vs. on-premises solution?
    •As your business moves to a cloud-based infrastructure, how do you adapt your IT security strategy?
    •How do you make sure that your security policies are robust and implemented correctly by your teams and partners?
    Bring your cloud questions and be prepared to walk away with key insights from two of the industry’s top thought leaders!
  • Impact Sourcing (IS) is a business process service delivery model that provides quality and cost at parity with traditional Business Process Outsourcing (BPO), but with optimized enhancements. IS employs individuals with limited opportunity for sustainable employment as principal workers in BPO centers to provide high-quality, information-based services to domestic and international public and private-sector clients.

    You will learn about:

    ·A qualified, trained talent pool with skillsets aligned to match client needs
    ·Lower attrition rates and higher corresponding levels of employee engagement
    ·Opportunities to fulfil corporate social responsibility and diversity objectives
  • Next Generation Authentication from SafeNet offers frictionless authentication delivered from the cloud, combined with transparency, trust and control, allowing you to secure access to diverse applications and meet security regulations in a shifting IT landscape.

    Featuring fully automated processes and support for a broad IT eco-system, frictionless authentication empowers organizations to protect numerous applications with strong authentication. A broad range of authentication methods and form factors ensures optimal risk mitigation and end user satisfaction.

    Join us to find out how Next Generation Authentication from SafeNet let’s you more easily secure more applications, protect more identities - and adapt to changing IT environments – while achieving the right balance for your business and security needs.