Software

Software-as-a-service offers cost savings, scalability and mobile accessibility -- if you correctly manage the resulting SLAs, APIs and data structures.

  • Podcasts // May 2015

    Methods of Malware Persistence on OS X Mavericks

    As Mac OS X continues to increase in popularity, OS X malware, once a rare phenomenon, is now more common than ever. Due to this, it is essential for forensic and malware analysts to possess an in-depth understanding of OS X and how it may be attacked by malicious code.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Building Your Application Security Data Hub: The Imperative for Structured Vulnerability Information

    One of the reasons application security is so challenging to address is that it spans multiple teams within an organization. Development teams build software, security testing teams find vulnerabilities, security operations staff manage applications in production and IT audit organizations make sure that the resulting software meets compliance and governance...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    IEEE Computer Society's Center for Secure Design: Helping You Design More Secure Software

    The IEEE computer society's CSD (Center for Secure Design) was formed in 2014 with the goal of identifying common design flaws and creating tools or design patterns so architects and developers can avoid introducing those design flaws into software. The CSD aims to create artifacts to aid in the analysis...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Hacking the Oracle Application Framework: A Case Study in Deep-Dive Pen Testing

    The Oracle Application Framework (OAF) is the base of dozens of Oracle's web-based business applications (the e-business suite) and is used by many other organizations to develop their own in-house applications. Last year, the speaker published a major vulnerability (CVE-2013-xxxx) in the framework that allowed inspect inspection of run-time data.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Warning Ahead: Security Storms are Brewing in Your JavaScript

    JavaScript controls the peoples' lives - they use it to zoom in and out of a map, to automatically schedule doctor appointments and to play online games. But have they ever properly considered the security state of this scripting language? Before dismissing the (in) security posture of JavaScript on the...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Stop Chasing Vulnerabilities - Introducing Continuous Application Security

    For too long, application security has been \"Experts-only\" and practiced one-app-at-a-time. But modern software development, both technology and process, is mostly incompatible with this old approach and legacy appsec tools. Software development has been transformed by practices like continuous integration and continuous integration, and the time has come to bring...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Reversing Engineering a Web Application - For Fun, Behavior and WAF Detection

    Screening HTTP traffic can be something really tricky and attacks to applications are becoming increasingly complex day-by-day. By analyzing thousands upon thousands of infections, the speaker noticed that regular blacklisting is increasingly failing and started research on a new approach to mitigate the problem. Initially reverse engineering the most popular...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    From the Ground Up

    In this podcast, the speaker will explain about the continuation of that proof and is aimed at developers to help them detect security vulnerabilities using live source-sink analysis. It is dependent on the code coverage and not aimed to be used in a production environment.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Ground Truths of a Rugged DevOps Practitioner

    In this podcast, the speaker will explain about the rugged DevOps practitioner. DevOps is an emerging set of principles, methods and practices for communication, collaboration and integration between software development (application/software engineering) and IT operations (system administration/infrastructure) professionals.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    The DevOps of Everything

    Although the movement started out as a problem statement to solve developer and operations collaboration, it quickly moved into other disciplines such as security, networking and storage. In this podcast, the speaker will take a look at the DevOps affect on things like converged infrastructure, software defined networking, software defined...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Where the Security Rubber Meets the DevOps Road

    DevOps is a natural evolution of agile, lean, continuous integration and other patterns common amongst high performers and continuous process improvement. As someone who has helped dozens of organizations get started with DevOps patterns and tool chains, in this podcast, the speaker will explain where people get started - and...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Runtime Manipulation of Android and iOS Applications

    With over 1.6 million applications in the Apple AppStore and Google Play store, and around 7 billion mobile subscribers in the world, mobile application security has been shoved into the forefront of many organizations. Mobile application security encompasses many facets of security. Device security, application security, and network security all...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Use After Free Exploitation

    Use after free vulnerabilities is the cause of a large number of web browser and client-side compromises. Software bugs residing on the heap can be difficult to detect through standard debugging and QA. In this podcast, the speaker will first define the use after free vulnerability class, and then dive...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    HP 3PAR StoreServ Chalk Talk (HP Discover EMEA December 2013 update)

    Learn about the December 2013 updates to the HP 3PAR StoreServ portfolio in this lastest HP Storage ChalkTalk from HPStorageGuy Calvin Zito. Sponsored by HP and Intel® Xeon® Processor : Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered...

    Provided By HP & Intel® Xeon® Processor

  • Podcasts // May 2015

    TechViews - Deconstructing DevOps

    The TechViews programs will help to cut through the noise of the market and bring you real insights from thought leaders across the industry. 15 minute podcast on DevOps - What is it? Why use it? Listen now.

    Provided By CA Technologies

  • Podcasts // May 2015

    T-Mobile Podcast

    Learn how wireless services provider T-Mobile US, Inc. improved cloud- and data-access services delivery to its enterprise customers. Listen to the podcast featuring Daniel Spurling, Director of IT Infrastructure at T-Mobile US, Inc and understand now T-Mobile moved from manual cloud provisioning services to a centralized service portal to better...

    Provided By Hewlett-Packard (HP)

  • Podcasts // May 2015

    AIG Podcast

    Learn how AIG's Global Performance Architecture Group improved the performance of their services to deliver better experiences and payoffs for businesses and end-users alike. HP is the sponsor of this material. By submitting your information you agree to be contacted by HP on topics of interest. Before deciding please...

    Provided By Hewlett-Packard (HP)

  • Podcasts // May 2015

    Stepping Into the Cloud: A Practical Guide to Launching a Successful Cloud Strategy

    Frost & Sullivan’s video “Stepping into the Cloud: A Practical Guide to Creating and Implementing a Successful Cloud Strategy” offers practical guidance for migrating your company to the cloud -- at your own pace and on your own schedule. Take the first step today.

    Provided By IBM

  • Podcasts // May 2015

    Building A Successful Roadmap to Cloud

    To get the most from your cloud experience, you need a roadmap. Watch the video “Building a Successful Roadmap to the Cloud” to learn how a cloud roadmap can: Ensure that your cloud decisions work together to maximize the overall value to your business Give you greater...

    Provided By IBM

  • Podcasts // May 2015

    McKesson Cloud Automation Podcast

    Download the podcast on how McKesson accomplished a multi-year, pan-IT management transformation. Learn how McKesson's performance journey, from 2005 to the present, has enabled it to better leverage an agile, hybrid cloud model. How McKesson gained a standardized services orientation to achieve agility in deploying its many active applications is...

    Provided By Hewlett-Packard (HP)

  • Podcasts // May 2015

    Thinking ahead: Pragmatic steps for successful cloud transformations virtual event

    Public, private, or hybrid, the cloud is creating an array of opportunities for business and IT. And it’s reshaping IT as we know it. But incorporating cloud technology and services into the data center can entail multi-year transformations. The key to successful cloud transformations is developing a pragmatic strategy and...

    Provided By Hewlett-Packard (HP)

  • Podcasts // May 2015

    Unum Group DevOps Podcast

    Listen to the podcast on how employee benefits provider Unum Group has been building a DevOps continuum, and is further exploring the benefits of a better process around cloud-assisted applications development and deployment. Featured on the podcast are Tim Durgan, an Enterprise Application Architect at Unum Group, and Petri Maanonen,...

    Provided By Hewlett-Packard (HP)

  • Podcasts // May 2015

    There's Gold in Them Thar Package Management Database

    There is a lot of useful file metadata stored in package management databases for popular Linux distributions. The RedHat Package Manager (RPM) and Debian's dpkg are two examples. In this podcast, the speaker focus on how to leverage RPM in forensic investigations, as it can provide a quick and effective...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Use Cobalt Strike's Payloads with Veil's Evasion

    The Veil framework is a collection of red team tools, focused on evading detection. In this podcast, the speaker shows how to use Veil Evasion to generate an anti-virus safe payload that delivers Cobalt Strike's Beacon payload. The method allows Veil to take advantage of Cobalt Strike's custom shellcode to...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Android AddJavaScript Exploit

    In this podcast, the speaker demonstrates the vulnerability that can be exploited due to a cross site scripting in web views JavaScript bridges. This vulnerability allows an attacker to run system commands using Java's reflection mechanism. The vulnerability lies in the fact that JavaScript can access Java objects using the...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Hacking with Python 3 - Zip Password Cracker

    In this podcast, the speaker explains about how to crack ZIP password using python script. This speaker also teaches the user how to create their own tool using python programming language.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    OWASP PHP Security

    OWASP PHP security project is an effort by a group of PHP developers in securing PHP web applications, using a collection of decoupled flexible secure PHP libraries, as well as a collection of PHP tools.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Reverse Engg and Identifying Buffer Overflows

    In this podcast, the speaker will show a reverse engg an executable, identifying an insecure function and identifying if that can be reached by a user input. The speaker also explains the use of static and dynamic reverse engg tricks to identify memory corruptions issues.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Application Security at DevOps Speed and Portfolio Scale

    Software development is moving much faster than application security with new platforms, languages, frameworks, paradigms, and methodologies like agile and Devops. Unfortunately, software assurance hasn't kept up with the times. Although the people making progress in application security, the gains are much slower than the stunning advances in software development.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Network World: Productivity Software - The Next Generation

    In this podcast, the speaker explains about the network world productivity software. The speaker also explains about the new batch of wikis, blogs, and other collaborative software that helps companies become more productive and deliver value.

    Provided By Novell

  • Podcasts // May 2015

    Enabling the journey to IT-as-a-Service

    Watch video to see how Citrix is helping customers enable their journey towards IT-as-a-Service with Citrix CloudPortal Business Manager and Citrix CloudPlatform.

    Provided By Citrix Online

  • Podcasts // May 2015

    Open and flexible cloud orchestration

    Based on open source Apache CloudStack, Citrix CloudPlatform is the industry’s most flexible and open cloud orchestration platform. Leverage industry standard Amazon Web Service APIs and the rich partner ecosystem to expand and integrate value added solutions and services.

    Provided By Citrix Online

  • Podcasts // May 2015

    Come visualize the future with Many Eyes

    Learn how you can join IBM Many Eyes – a thriving, growing community to generate and share visualizations.

    Provided By IBM

  • Podcasts // May 2015

    IBM business analytics: One solution that covers the entire analysis spectrum

    In this online demo, learn how IBM Business Analytics software includes capabilities that meet a broad range of analysis needs - from analytical reporting to predictive analytics.

    Provided By IBM

  • Podcasts // May 2015

    Sales Cloud Overview

    Animated Video: Smarter Selling with Oracle Sales Cloud Oracle Sales Cloud is Smarter Selling that will help reps sell more, managers know more, and companies grow more.

    Provided By Oracle

  • Podcasts // May 2015

    Companies Grow More with Oracle Sales Cloud

    Animated Video: Oracle Sales Cloud is Smarter SFA that helps Companies Grow More. Maximize revenue and optimize sales performance. Know what to sell your customers. And get more help from your marketers and partners.

    Provided By Oracle

  • Podcasts // May 2015

    Reps Sell More with Oracle Sales Cloud

    Animated Video: Oracle Sales Cloud is smarter selling that will help reps sell more. Oracle Sales Cloud enables sales reps to sell more anytime, anywhere and on any device and empowers them to grow their own pipeline without waiting for marketing.

    Provided By Oracle

  • Podcasts // May 2015

    Collaborating for the Internet of Things

    When it comes to developing solutions for the Internet of Things (IoT), they need to be connected, managed and secure. Learn from Tom Moore of McAfee, Jim Douglas of Wind River, and Kumar Balasubramanian of Intel how they are collaborating to streamline IoT integration by delivering consistent, reliable, integrated, end-to-end...

    Provided By WindRiver

  • Podcasts // May 2015

    Speed to Lead

    Speed to Lead with mid-range solutions to accelerate your business transformation.

    Provided By Technologent

  • Podcasts // May 2015

    Drive Your Transformation

    Drive your transformation to cloud computing.

    Provided By Technologent

  • Podcasts // May 2015

    There's Gold in Them Thar Package Management Database

    There is a lot of useful file metadata stored in package management databases for popular Linux distributions. The RedHat Package Manager (RPM) and Debian's dpkg are two examples. In this podcast, the speaker focus on how to leverage RPM in forensic investigations, as it can provide a quick and effective...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Use Cobalt Strike's Payloads with Veil's Evasion

    The Veil framework is a collection of red team tools, focused on evading detection. In this podcast, the speaker shows how to use Veil Evasion to generate an anti-virus safe payload that delivers Cobalt Strike's Beacon payload. The method allows Veil to take advantage of Cobalt Strike's custom shellcode to...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Android AddJavaScript Exploit

    In this podcast, the speaker demonstrates the vulnerability that can be exploited due to a cross site scripting in web views JavaScript bridges. This vulnerability allows an attacker to run system commands using Java's reflection mechanism. The vulnerability lies in the fact that JavaScript can access Java objects using the...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Hacking with Python 3 - Zip Password Cracker

    In this podcast, the speaker explains about how to crack ZIP password using python script. This speaker also teaches the user how to create their own tool using python programming language.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    OWASP PHP Security

    OWASP PHP security project is an effort by a group of PHP developers in securing PHP web applications, using a collection of decoupled flexible secure PHP libraries, as well as a collection of PHP tools.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Reverse Engg and Identifying Buffer Overflows

    In this podcast, the speaker will show a reverse engg an executable, identifying an insecure function and identifying if that can be reached by a user input. The speaker also explains the use of static and dynamic reverse engg tricks to identify memory corruptions issues.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    A Look at \"Bring Your Own\" Devices in the Enterprise

    In this podcast, the speaker explains about how empowered workers are driving the desktop revolution and how new, alternative devices are accelerating the need for BYO deployments. Learn how desktop virtualization plays a critical role in enabling BYO and gain insight into considerations and best practices for successfully implementing a...

    Provided By Citrix Systems

  • Podcasts // May 2015

    Building Your Application Security Data Hub: The Imperative for Structured Vulnerability Information

    One of the reasons application security is so challenging to address is that it spans multiple teams within an organization. Development teams build software, security testing teams find vulnerabilities, security operations staff manage applications in production and IT audit organizations make sure that the resulting software meets compliance and governance...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    IEEE Computer Society's Center for Secure Design: Helping You Design More Secure Software

    The IEEE computer society's CSD (Center for Secure Design) was formed in 2014 with the goal of identifying common design flaws and creating tools or design patterns so architects and developers can avoid introducing those design flaws into software. The CSD aims to create artifacts to aid in the analysis...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Hacking the Oracle Application Framework: A Case Study in Deep-Dive Pen Testing

    The Oracle Application Framework (OAF) is the base of dozens of Oracle's web-based business applications (the e-business suite) and is used by many other organizations to develop their own in-house applications. Last year, the speaker published a major vulnerability (CVE-2013-xxxx) in the framework that allowed inspect inspection of run-time data.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Warning Ahead: Security Storms are Brewing in Your JavaScript

    JavaScript controls the peoples' lives - they use it to zoom in and out of a map, to automatically schedule doctor appointments and to play online games. But have they ever properly considered the security state of this scripting language? Before dismissing the (in) security posture of JavaScript on the...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Stop Chasing Vulnerabilities - Introducing Continuous Application Security

    For too long, application security has been \"Experts-only\" and practiced one-app-at-a-time. But modern software development, both technology and process, is mostly incompatible with this old approach and legacy appsec tools. Software development has been transformed by practices like continuous integration and continuous integration, and the time has come to bring...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Reversing Engineering a Web Application - For Fun, Behavior and WAF Detection

    Screening HTTP traffic can be something really tricky and attacks to applications are becoming increasingly complex day-by-day. By analyzing thousands upon thousands of infections, the speaker noticed that regular blacklisting is increasingly failing and started research on a new approach to mitigate the problem. Initially reverse engineering the most popular...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    From the Ground Up

    In this podcast, the speaker will explain about the continuation of that proof and is aimed at developers to help them detect security vulnerabilities using live source-sink analysis. It is dependent on the code coverage and not aimed to be used in a production environment.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Ground Truths of a Rugged DevOps Practitioner

    In this podcast, the speaker will explain about the rugged DevOps practitioner. DevOps is an emerging set of principles, methods and practices for communication, collaboration and integration between software development (application/software engineering) and IT operations (system administration/infrastructure) professionals.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    The DevOps of Everything

    Although the movement started out as a problem statement to solve developer and operations collaboration, it quickly moved into other disciplines such as security, networking and storage. In this podcast, the speaker will take a look at the DevOps affect on things like converged infrastructure, software defined networking, software defined...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Where the Security Rubber Meets the DevOps Road

    DevOps is a natural evolution of agile, lean, continuous integration and other patterns common amongst high performers and continuous process improvement. As someone who has helped dozens of organizations get started with DevOps patterns and tool chains, in this podcast, the speaker will explain where people get started - and...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Runtime Manipulation of Android and iOS Applications

    With over 1.6 million applications in the Apple AppStore and Google Play store, and around 7 billion mobile subscribers in the world, mobile application security has been shoved into the forefront of many organizations. Mobile application security encompasses many facets of security. Device security, application security, and network security all...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Use After Free Exploitation

    Use after free vulnerabilities is the cause of a large number of web browser and client-side compromises. Software bugs residing on the heap can be difficult to detect through standard debugging and QA. In this podcast, the speaker will first define the use after free vulnerability class, and then dive...

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Methods of Malware Persistence on OS X Mavericks

    As Mac OS X continues to increase in popularity, OS X malware, once a rare phenomenon, is now more common than ever. Due to this, it is essential for forensic and malware analysts to possess an in-depth understanding of OS X and how it may be attacked by malicious code.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    Video: Real World ROI - HP Backup, Recovery, and Archive Customers Share Their Experiences

    This video from Enterprise Strategy Group discusses findings of research they did with HP customers on how backup, recovery, and archiving solutions from HP, including the HP StoreOnce Backup product family, have helped them save time and money. Sponsored by HP and Intel® Xeon® Processor :

    Provided By HP & Intel® Xeon® Processor

  • Podcasts // May 2015

    Application Security at DevOps Speed and Portfolio Scale

    Software development is moving much faster than application security with new platforms, languages, frameworks, paradigms, and methodologies like agile and Devops. Unfortunately, software assurance hasn't kept up with the times. Although the people making progress in application security, the gains are much slower than the stunning advances in software development.

    Provided By SecurityTube.net

  • Podcasts // May 2015

    TechViews - Deconstructing DevOps

    The TechViews programs will help to cut through the noise of the market and bring you real insights from thought leaders across the industry. 15 minute podcast on DevOps - What is it? Why use it? Listen now.

    Provided By CA Technologies

  • Podcasts // May 2015

    HP 3PAR StoreServ Chalk Talk (HP Discover EMEA December 2013 update)

    Learn about the December 2013 updates to the HP 3PAR StoreServ portfolio in this lastest HP Storage ChalkTalk from HPStorageGuy Calvin Zito. Sponsored by HP and Intel® Xeon® Processor : Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered...

    Provided By HP & Intel® Xeon® Processor

  • Podcasts // May 2015

    A New Degree Programme That Breaks The Mould

    In this podcast, Julian Birkinshaw, Deputy Dean of Programmes, discusses the new Masters in Management degree programme that will welcome students from around the world for its first intake in August 2009.

    Provided By London Business School

  • Podcasts // May 2015

    How Do I: Incoming E-mail Scan

    This podcast explains how to configure Microsoft Forefront Security for Exchange Server to scan incoming and outgoing emails. In this podcast the speaker explains how to configure file and keyword filters as well as configuring notifications.

    Provided By Microsoft

  • Podcasts // May 2015

    How Do I: Exchange Quarantined E-mails

    This podcast explains how to manage emails and files that have been quarantined by Microsoft Forefront Security for Exchange Server. In this podcast the speaker shows how to configure the security mode for messages delivered from quarantine, how to export the incident and the quarantine log files, how to redeliver...

    Provided By Microsoft

  • Podcasts // May 2015

    How Do I: Exchange Message Scan

    This podcast shows how to configure Microsoft Forefront Security for Exchange Server to scan messages that are in the store and as they are accessed. In this podcast the speaker explains how to configure file filters, content filters and email notifications.

    Provided By Microsoft

  • Podcasts // May 2015

    How Do I: Exchange Remove Files

    This podcast shows how to use Forefront Server Security for Exchange server to scan the existing messages within an Exchange mailbox store for specific files and then remove them. In this podcast he shows how to configure a manual scan job to search for files of a particular type, generate...

    Provided By Microsoft

  • Podcasts // May 2015

    How Do I: Forefront Management Console Part 3

    The Microsoft Forefront Security Management Console provides Forefront administrators with a tool that allows them to centrally manage the Forefront server deployments within their environments. In this, podcast of aseries of 3, the speaker explains how to configure alerting using the management console and discuses the use of filters to...

    Provided By Microsoft

  • Podcasts // May 2015

    Migrating Public-Facing Web Sites to SharePoint 2010

    Migrating existing Web sites, wikis, and blogs to Microsoft SharePoint 2010 is a challenge faced by many SharePoint site owners. Metalogix Website Migration Manager provides a comprehensive solution. In this podcast, speakers describe and demonstrate many of the most important aspects of Web content migration, including source content inventory and...

    Provided By Microsoft

  • Podcasts // May 2015

    Project Professional 2010 and SharePoint Server 2010 Better Together

    The organization may not use Microsoft Project Server but instead use the Microsoft Project Professional desktop application. If the organization also uses SharePoint Server, there is good news: Microsoft Project Professional 2010 comes with the ability to integrate with Microsoft SharePoint Server 2010. Attend this podcast to discover how one...

    Provided By Microsoft

  • Podcasts // May 2015

    X Design Pattern for Web Sites Where Contributors and Consumers Cross Boundaries

    Historically, Internet sites were built for external users to consume passive content. Now, there is an added ability for internal contributors to provide managed content. In this podcast, speakers speak customer cases studies of Internet sites, extranets, and communities, and they explain how the X design pattern provides the ability...

    Provided By Microsoft

  • Podcasts // May 2015

    geekSpeak: Refactoring Tips and Tricks With Llewellyn Falco

    Are you happy at work? Are you proud of the code you are working with? In this podcast, the speakers focus on tips and techniques to do help one turn his current code base into excellent code. The guest an Agile software consultant, talks about refactoring - the process of...

    Provided By Microsoft

  • Podcasts // May 2015

    Real-World Solutions: Importing Workspace Data to Project Server Custom Fields

    In this podcast, speakers discuss a method of importing data from Microsoft Office Project Server Project Workspaces (PWS) into project-level custom fields. They also cover a scenario where a customer has requested a Project Center view that displays the number of active issues for each project, which requires custom code.

    Provided By Microsoft

  • Podcasts // May 2015

    Key Tips for Using Microsoft Office Project to Manage Public Sector Projects

    In this podcast, users of Microsoft Office Project in the Public Sector, including managers, planners, and coordinators, learn how to easily set up project plans using all the tools in Project. Speakers walk people through a proven planning process using project management best practices for planning the scope, timeline (Schedule),...

    Provided By Microsoft

  • Podcasts // May 2015

    Using Microsoft Office for Business Intelligence

    In this podcast, one will discover how Microsoft Office system products provide: A powerful, pervasive BI platform that can support every BI function and drive business performance. A flexible, customizable, and user-centric BI client that utilizes familiar technologies. The tools needed to gain insight and enable decisions at every level...

    Provided By Microsoft

  • Podcasts // May 2015

    Using the Enterprise Project Management 2007 Report Pack

    The Microsoft Office Enterprise Project Management (EPM) 2007 Report Pack provides rich reports for common information needs. The EPM 2007 Report Pack is a collection of 12 Microsoft SQL Server Reporting Services (SSRS) reports designed for various user groups of the EPM solution. In this podcast, speakers provide an overview...

    Provided By Microsoft

  • Podcasts // May 2015

    Software Design Tools in Visual Studio 2010

    This podcast is an overview of the enhanced set of tools included in Microsoft Visual Studio 2010 that allows software designers and architects to express their software patterns and in a visual and contextual manner within Visual Studio. It explores discovery and refactoring of an existing design. It showcases how...

    Provided By Microsoft

  • Podcasts // May 2015

    The MOF Reliability Workbook for Exchange 2010 Client Access and Transport

    The Microsoft Operations Framework (MOF) Reliability Workbook for Exchange 2010 Client Access and Transport helps one fine-tune task lists that are used to monitor and maintain the health and reliability of the Microsoft Exchange Server 2010 environment. This podcast helps to learn how MOF provides ready-to-use monitoring and maintenance activities...

    Provided By Microsoft