Skip to main content

Search

Inviting users to an application

Best practices for building accessibility into Pega applications

  • Módulo

    Best practices for building accessibility into Pega applications

    5 Temas

    1 h 15 minutos

    Visible to: All users
  • Pega provides a variety of out-of-the-box accessibility features with Pega Platform™ that you can use to create an application that is accessible and...

Best practices for keeping your Pega applications running smoothly

  • Módulo

    Best practices for keeping your Pega applications running smoothly

    3 Temas

    25 minutos

    Visible to: All users
  • Learn about the best practices for keeping your Pega applications running smoothly on Pega Cloud®, including using My Pega Cloud, guardrails, and Pega...

Managing application access for Business Architects

Pega positioning for Business Architects

Business case for accessibility

  • Módulo

    Business case for accessibility

    3 Temas

    35 minutos

    Visible to: All users
  • Building accessibility into your plan for the development of applications has a cost the same as all requirements. An organization must make choices...

Tracking and auditing changes to data

Pega Low-Code App Factory introduction

  • Módulo

    Pega Low-Code App Factory introduction

    2 Temas

    22 minutos

    Pega Platform 8.4 Visible to: All users
  • Learn about low-code development and review how Pega Low-Code App Factory aids in effectively scaling low-code in an enterprise.

Pega Support

  • Módulo

    Pega Support

    2 Temas

    25 minutos

    Pega Cloud for Government Visible to: All users
  • Learn the basics of Pega Support and change management, including Scheduled Maintenance Windows, patches, updates, and the purpose of the Pega Change...

Security Checklist awareness

  • Módulo

    Security Checklist awareness

    1 Tema

    20 minutos

    Platform Visible to: All users
    • What is the Security Checklist?
    • How do I access the Security Checklist?
    • How to use the Security Checklist?/What is the purpose?
    • What happens if I...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice