Research Library

Powered by

Applications Software Research

  • The DevOps Transformation at Gannett

    Sponsored by: Chef Software

    This case study explores how Gannett connected previously siloed data, resolved issues with shadow IT, and enabled access to the cloud to help deploy their apps faster and with more scalability. Find out how they leveraged automation and used a DevOps approach to support faster, more efficient deployments.

  • Microservices for Java Developers

    Sponsored by: Red Hat

    This extensive e-book explores how Java developers and architects can assess whether or not a microservice architecture is right for their organization. Discover how to implement microservices successfully by finding out what other companies have done to make them work for their cultures, organizational structures, and market pressures.

  • Leveraging Automation for DevOps

    Sponsored by: Chef Software

    This white paper explores how to implement automated and collaborative workflows in a way that reduces risk, ensures stability, and guarantees regulatory compliance. Discover how to create a dynamic infrastructure that will aid in your company's DevOps transformation and optimize its use of automation.

  • Top 5 Applications You Should Blacklist Now

    Sponsored by: Thycotic

    Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.

  • Adopting Low Code No Code App Development

    Sponsored by: Metavine

    In order to keep up with the ever-increasing demand for apps to connect smart devices, the conventional approaches to development will need to be updated. Discover how low code no code (LCNC), machine learning, and artificial intelligence platforms can accelerate the rate of delivery, automate software engineering processes for IoT, and more.

  • Securing the Unpatchable

    Sponsored by: Palo Alto Networks

    Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.

  • Transform Your Applications, Transform Your Business

    Sponsored by: Hewlett-Packard Enterprise

    Learn how to drive innovation, while reducing costs business-wide, by strategically modernizing and managing your digital applications. Gain an idea of what features are most important for your business as you look to move away from a dated legacy platform and select the right technology partner.

  • Getting Ready for Next-Gen Application Lifecycle Management

    Sponsored by: Hewlett Packard Enterprise

    This technical white paper explores the use of a next-generation app lifecycle management platform made for defining, managing, and automating activities. Discover how to implement and support a successful Agile transformation to optimize the speed, quality, and scale of your app development.

  • The Next Generation of Application Lifecycle Management

    Sponsored by: Hewlett Packard Enterprise

    This resource explores how to leverage a functionally rich, unified, yet open platform that helps development teams become more agile and accelerate the development lifecycle. Discover how to implement continuous delivery and enable real-time visibility across enterprise projects so that you can drive innovation and enhance customer satisfaction.

  • The Platform of Platforms for the Internet of Things

    Sponsored by: IBM

    This IDC white paper examines the idea of a holistic IoT platform, with an emphasis on device management, connectivity, app management, analytics, and more. Discover how the future of IoT platforms is shaping up and which differentiating factors will lend a competitive edge to potential industry leaders.

  • Siemens Energy Management Takes an Agile, Integrated Approach to the App Lifecycle

    Sponsored by: Hewlett Packard Enterprise

    Watch this brief video to find out how Siemens switched to a smarter DevOps-centric methodology to become more agile and flexible. Discover how they accelerated software development by leveraging updated app lifecycle management for shortened requirements, engineering time and decreased risk.

  • Continuous Testing for Agile and DevOps: A Real World Approach

    Sponsored by: Hewlett Packard Enterprise

    This webcast provides an overview of continuous testing and examines some of the challenges that can impede DevOps. Access helpful tips for finding the right balance between manual and automated testing so that you can optimize your ability to reduce the risks associated with each software release.

  • Continuous Testing for Agile and DevOps: A Real World Approach

    Sponsored by: Hewlett Packard Enterprise

    This webcast provides an overview of continuous testing and examines some of the challenges that can impede DevOps. Access helpful tips for finding the right balance between manual and automated testing so that you can optimize your ability to reduce the risks associated with each software release.

  • Allow Your Enterprise Greater Mobile App Security

    Sponsored by: MobileIron

    This white paper explains how your enterprise can boost the security of its information across a variety of devices, without putting unnecessary restraints on growth or accessibility. Learn how you can Allow your IT admins disable keyboard options to block unrestricted access, simply track data usage, and more.

  • Lean Functional Testing for Agile and DevOps

    Sponsored by: Hewlett Packard Enterprise

    This video examines a functional test automation platform that is built specifically for continuous testing, Agile development, mobile, and DevOps. Discover how to improve collaboration between developers and testers so you can deliver quality software faster and more efficiently.

  • Behavior Driven Development for Continuous Testing

    Sponsored by: Hewlett Packard Enterprise

    Explore the concept of behavior driven development, an Agile software development technique that promotes collaboration between QA, development, and business stakeholders. Find out how this user behavior-oriented approach will help you satisfy the need for both speed and quality.

  • Simplifying the Complexity of the Internet of Things

    Sponsored by: Xively by LogMeIn

    To understand exactly what it takes to create strong IoT-enabled products and engage customers, Forrester conducted research into the key priorities and objects of 232 manufacturers. Access this report to explore their 4 key findings about product differentiation, device management, IoT data analysis, and support.

  • DHS US-CERT Alert on SAP Cybersecurity

    Sponsored by: Onapsis

    This U.S. government alert addresses recent vulnerabilities issues caused by SAP applications. Learn the cause and extent of these vulnerabilities, as well as solutions for mitigating them.

  • Honeywell Success Story: Performance Management with Real-Time Analytics

    Sponsored by: Catchpoint Systems Inc.

    This case study explores how Honeywell isolated poorly-performing components, ensured online content delivery, and guaranteed performance of individual internal apps and products using digital performance analytics.

  • Ensure Business Continuity With Zero Touch Auto-Failover and Recovery

    Sponsored by: DataCore Software Corporation

    In this webcast, learn about a high-availability storage solution that writes and mirrors data information onto 2 separate virtualization nodes simultaneously. Access now to see how 71% of surveyed IT organizations reduced their storage-related downtime by 75%.

  • Web Application Hosting: Leverage Best Practices and Cloud Architectures

    Sponsored by: IBM

    As web apps diversify and increase in number, so do the many ways to manage and maintain the infrastructures powering these apps. This e-book explores one way to apply industry-adopted standard architecture capabilities to app deployments so you can grow and advance your infrastructure.

  • Extending the Value of Mobile Java Apps

    Sponsored by: IBM

    In the age of mobile development, you may want to revisit your strategy for Java and JEE systems. Watch this webinar to get tips on how to implement microservices and APIs, improve user experience, and more. You'll also learn how to improve app integration and leverage cloud-based mobile backend as a service.

  • Discover the Keys to Fast App Deployment

    Sponsored by: BT

    Do your IT professionals find themselves bogged down in an endless cycle of configuration, testing and local rollout? Learn how to increase your agility, and save your IT managers the endless hassle of manual deployment with cloud-based app automation. Download this paper now to get SLA-assured availability and security.

  • Lifecycle Management Best Practices for Mobile Apps

    Sponsored by: IBM

    This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.

  • Framing Your Enterprise IoT Approach for a More Connected Future

    Sponsored by: Xively by LogMeIn

    In this expert e-guide, we discuss how you can prepare for whatever comes next in IoT. You'll learn which challenges should take top priority when it comes to integrating IoT, like information architecture, Agile development, and more. Plus, you'll get advice on what to consider before and after picking an IoT platform.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.