Software Application Development Reports

Jargon Buster Guide to Container Security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 08 Feb 2021 | Published: 19 Feb 2019

TechTarget ComputerWeekly.com

Top IT Predictions in APAC 2020
sponsored by TechTarget ComputerWeekly.com
DATA SHEET: As the new decade dawns, we wanted to look ahead at the technologies likely to dominate the Asia-Pacific IT landscape in 2020.
Posted: 08 Feb 2021 | Published: 16 Jan 2020

TechTarget ComputerWeekly.com

Computer Weekly – 8 January 2019: Technology innovation in music
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
Posted: 08 Feb 2021 | Published: 04 Jan 2019

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to continuous integration and continuous deployment
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.
Posted: 08 Feb 2021 | Published: 17 Dec 2019

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Mobile App Development
sponsored by TechTarget ComputerWeekly.com
EZINE: This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.
Posted: 08 Feb 2021 | Published: 21 Mar 2017

TechTarget ComputerWeekly.com

Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

Application delivery controllers evolve to meet new demands
sponsored by Citrix
EGUIDE: Explore how ADCs have evolved since they first came about, and the new capabilities they have in this expert guide.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

Citrix

Application Performance Management: Improving service availability
sponsored by TechTarget ComputerWeekly.com
EGUIDE: If it can't be measured, it can't be managed. Telemetry on applications and IT infrastructure are key to keeping applications running optimally and reducing unplanned downtime. Beyond using telemetry data to respond to abnormal events, historical data analysis can reveal more systemic issues. In this e-guide we look at trends in APM.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

TechTarget ComputerWeekly.com

Analyst Report - Vendor Comparison for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 08 Feb 2021 | Published: 02 Sep 2011

IBM

Legacy Software Modernization in the Manufacturing Industry
sponsored by Accesa
WHITE PAPER: The main aim of any software modernization project is to help companies create new business value. However, the best investment can be working with what you already have. This guide makes the case for legacy software modernization. Get the details here.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

All resources sponsored by Accesa