Navigation
  • About US
    • COMPANY OVERVIEW
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • Solutions
    • SEARCH BY BRANDS
    • SEARCH BY CATEGORY
      • INFORMATION SECURITY SOLUTIONS
        • Vulnerability Management
        • Multifactor Authentication
        • Threat Intelligence
        • Network Management Solutions
        • Security Information and Event Management
        • Remote Access Software
        • Systems Administration Tools
        • Robotic Process Automation
        • Data Loss Prevention
        • Data / Password Recovery
        • Asset Management Solutions
        • Identity and Access Management
        • Antivirus
        • Activity Monitoring and Surveillance
        • Forensic Solutions
        • Content Disarm and Reconstruction
      • SOFTWARE DEVELOPMENT SOLUTIONS
        • Integrated Development Environments
        • Development Components
          • UI Components
          • Networking Components
          • Office Components
          • Barcode Components
          • Communication
        • Imaging Solutions
        • Software Localization
        • Release Automation & Management
        • eLearning Authoring Solutions
        • Charting Solutions
        • PDF Solutions
        • Reporting Solutions
        • Testing & QA
        • Text Retrieval/Enterprise Search
        • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • What’s New
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • Search HERE
Software Asia Limited
MENUMENU
  • About US
    • COMPANY OVERVIEW
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • Solutions
    • SEARCH BY BRANDS
    • SEARCH BY CATEGORY
      • INFORMATION SECURITY SOLUTIONS
        • Vulnerability Management
        • Multifactor Authentication
        • Threat Intelligence
        • Network Management Solutions
        • Security Information and Event Management
        • Remote Access Software
        • Systems Administration Tools
        • Robotic Process Automation
        • Data Loss Prevention
        • Data / Password Recovery
        • Asset Management Solutions
        • Identity and Access Management
        • Antivirus
        • Activity Monitoring and Surveillance
        • Forensic Solutions
        • Content Disarm and Reconstruction
      • SOFTWARE DEVELOPMENT SOLUTIONS
        • Integrated Development Environments
        • Development Components
          • UI Components
          • Networking Components
          • Office Components
          • Barcode Components
          • Communication
        • Imaging Solutions
        • Software Localization
        • Release Automation & Management
        • eLearning Authoring Solutions
        • Charting Solutions
        • PDF Solutions
        • Reporting Solutions
        • Testing & QA
        • Text Retrieval/Enterprise Search
        • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • What's New
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • Search HERE

Set your main menu in Appearance > Menus

Email Us Service Hotline: +852 25128491
Software Asia Limited
MENUMENU
  • About US
    • COMPANY OVERVIEW
    • JOIN US TODAY
      • AS OUR SOFTWARE PUBLISHERS
      • AS OUR PROCUREMENT MANAGERS
      • AS OUR RESELLERS
    • CAREER WITH LOGON
    • CONTACT US
  • Solutions
    • SEARCH BY BRANDS
    • SEARCH BY CATEGORY
      • INFORMATION SECURITY SOLUTIONS
        • Vulnerability Management
        • Multifactor Authentication
        • Threat Intelligence
        • Network Management Solutions
        • Security Information and Event Management
        • Remote Access Software
        • Systems Administration Tools
        • Robotic Process Automation
        • Data Loss Prevention
        • Data / Password Recovery
        • Asset Management Solutions
        • Identity and Access Management
        • Antivirus
        • Activity Monitoring and Surveillance
        • Forensic Solutions
        • Content Disarm and Reconstruction
      • SOFTWARE DEVELOPMENT SOLUTIONS
        • Integrated Development Environments
        • Development Components
          • UI Components
          • Networking Components
          • Office Components
          • Barcode Components
          • Communication
        • Imaging Solutions
        • Software Localization
        • Release Automation & Management
        • eLearning Authoring Solutions
        • Charting Solutions
        • PDF Solutions
        • Reporting Solutions
        • Testing & QA
        • Text Retrieval/Enterprise Search
        • Database
  • Services
    • TRAINING SERVICES
    • IMPLEMENTATION SERVICES
    • AFTER-SALES SERVICES
    • BEST PRACTICES CONSULTING
  • What's New
    • EVENTS
    • LATEST UPDATES
    • SPECIAL OFFERS
  • Search HERE
View large
Installshield-news, webinar

InstallShield Module 8 | Building and Managing Multiple Operating System Targeted Product Installers

Posted on at by

InstallShield Training Module 8


Building and Managing Multiple Operating System Targeted Product Installers


Wednesday 20 Jan | 5PM (GMT+8)

Does your application need to be deployed / configured on configured for different Windows platforms or editions ? Each platform has unique requirements. Does this mean you have to build an installer for each platform ? The cost and loss of productivity suggests, NO WAY!

Join this session so we can show you how to create a Single Installer which will give you

  • Common Installer for all targeted Operating Systems
  • Control what gets installed and what is shown
  • Best of All, the entire application management lifecycle – Build – Deploy- Update all in one place
    Optimise management, deployment of the Installers.

Agenda:

  • Architecting the Installer – Planning and Creating the installer structure to achieve the goal
  • Functional Design – Here we will see how to make the installer functional to suit the needs of targeting a specific operating system
  • Build and Test – Compile the installer and test its functionality
  • Q & A

Register today

Oops! We could not locate your form.

Speaker’s Profile

kiran

KIRAN VVN

Consultant. Advisor. Author.

Kiran is an experienced mentor and Flexera Certified trainer with over 18 years of extensive experience in the following areas :

  • Application Packaging
  • Application Repackaging
  • Migration
  • Application Management

Kiran is also a co-author of the book “The Path: Leveraging Operations in a Complex and Chaotic World”, which narrates the business issues that occurs in today’s operational management.

About LOGON’s Training Services

LOGON provides certified training courses. LOGON’s trainers are experienced and certified with specific qualifications and familiar with our products.

These courses are delivered both remotely and on premise. Courses can be customized to meet client’s time frame and budget. Our mission is to combine our outstanding knowledge and real practical skills to deliver professional training to our partners and customers.

was last modified: January 7th, 2021 by
Share Post
Previous
JetBrains Toolbox 2020.3 Released
Next
JetBrains Solution Walkthrough | Introducing JetBrains Space

About Author

COMPANY

Company Overview
Career with LOGON
Contact Us

JOIN US TODAY

Resellers
Software Publishers
Procurement Managers

WE ARE AVAILABLE ON

SAP Ariba   coupa

gem

SERVICES

Training Services
Implemetation Services
After-sales Services
Best Practices Consulting

WHAT'S NEW

Events
Latest Updates
Special Offers

FOLLOW US ON

GET IN TOUCH

Phone:+852 25128491
Email: sales@logon-int.com

Legal   |   Privacy Policy

Important Links

  • Call me
  • Legal
  • Privacy Policy

Search engine

Use this form to find things you need on this site
Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Newsletter
Contact Us Today
Book a Demo with us


Book a Demo with us


Free Website Risk Detection Request

Request a Demo !

Search

Results for {phrase} ({results_count} of {results_count_total})

Displaying {results_count} results of {results_count_total}

Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
UserLock Video