Busque una promocion de su interes:
Spanish Arabic Belarusian Chinese (Simplified) Croatian Danish Dutch English French German Greek Hebrew Italian Japanese Korean Norwegian Portuguese Russian Slovenian Swedish Polish Hungarian Romanian

5.02.2013

Build a Windows 8 App in 15 Minutes or Less


Windows 8 is here. Even if you don't plan to build Windows 8 applications immediately, you should learn what it takes to build Windows 8 applications. You'll see how Windows 8 development relates to existing development from those using Microsoft or competing technologies.

You'll learn what is needed to start building, what it takes to distribute applications, and how money can be made. If you are already a developer that knows how to code in Java, C#, Objective-C, Visual Basic, or another lower-level language, then this online camp is for you.

Join us for this special three-hour interactive event, where our speakers will be holding live demos and answering questions in real-time. Topics to be covered include:

    Building a Windows 8 App in 15 minutes or less
    Where is Microsoft headed, how it differs from others (Apple/Google), and why it makes sense
    Win8 Development versus Android, iOS, and Pre-Win8 Dev
    Understanding the potential to Make Money With Windows 8
    What help is available? (There are some very good, free help and tools available)

Application Development eSeminar
Windows 8 for Developers Online Camp
May 21, 2013
FEATURED SPEAKERS:

Joseph Mayo
Independent Consultant – Mayo Software Consulting, Inc.

Greg Levenhagen
Senior Software Engineer – Skyline Technologies

5.01.2013

Managing Identity and Access BYOD World

Network Security eSeminar
Who are You? Managing Identity and Access
in a Socially Connected BYOD World
May 16, 2013

For all the bottom-line benefits of BYOD and the consumerization of IT, the challenges of managing identify and access for the explosion of devices – and their users – has been a great one. How can you tame the identity beast while keeping users, clients and partners safely connected – and keeping the bad guys out?

Join this timely eSeminar sponsored by CDW to learn about the latest methodologies and best practices to create and automatically enforce 21st century identity and access polices that give you visibility into what's happening on your network now, and tools to ensure only trusted devices and users have access to sensitive data.
  • Where today's identity and access threats are coming from
  • Methods for managing and monitoring guests on the wired or wireless network
  • Whether "non-user" devices like cameras and sensors are safe or being "spoofed"
EATURED SPEAKERS:

Shiloh Jackson
Solutions Architect – CDW

Michael Krieger
VP, Market Experts Group – Ziff Davis Enterprise

Comunicate con nosotros completa los datos

Interesado en / Interested in
Nombre /  Name
Apellido  / Last Name
Correo / E-mail
Direccion / Address
Ciudad / City
Estado / State
Pais  / Country
Codigo Postal / PostCode
Telefono / phone
Comentarios acerca de su consulta