You've requested...

Buyer’s Guide: Virtual Desktops in the Enterprise

If a new window did not open, click here to view this asset.

Download this next:

Essential Guide: Application Performance Management

Application monitoring solutions are designed to aid your organisation in detecting and resolving issues with application performance, before they affect your end users.

Focusing on monitoring and managing the performance/availability of applications, this guide offers news articles, tips and advice. This guide includes topics such as the speed of transactions, networking issues, workflow and related tools for performance detection and diagnosis.

These are also closely related to: "Buyer’s Guide: Virtual Desktops in the Enterprise"

  • Mobile application platforms: Essential guide

    One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. This is particularly relevant on smartphones where employees access consumer apps and enterprise apps on the same device.

    Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.

    The enterprise can no longer assume that everyone will use just one device.  The apps must support the fast changing mobile device market, in other words different hardware capabilities and different versions of operating system software. Mobile platforms help enterprises separate the complexities of supporting multiple permutations of devices to provide a core set of cross-platform functions apps can use.

    The emergence of mobile back-end as a service offerings takes this a step further, offering these capabilities as a cloud service.

    Beyond apps development, artificial intelligence technology is evolving all the time, and AI-powered voice-assisted search technology such as Amazon’s Alexa and Google Assistant is seen by many industry watchers as representative of a major change in how people interact with smartphones.

    Experts believe the future of mobile apps is to add intelligence to enhance the user experience. This so-called assistant technology is able to read email correspondence and understand what the user searches for on the web. For instance, Microsoft is looking at integrating its Cortana technology into office productivity. In the future, such technology could be used to understand a Skype call or gather useful information in a Word document.

    The demands of mobile apps bring new challenges around architecture, agility and integration. In this guide, we examine the issues around mobile applications and the platforms emerging to help developers.

  • Application Performance Management: Improving service availability

    If it can’t be measured, it can’t be managed. Telemetry on applications and IT infrastructure are key to keeping applications running optimally and reducing unplanned downtime. Beyond using telemetry data to respond to abnormal events, historical data analysis can reveal more systemic issues. In this e-guide we look at trends in APM.

Find more content like what you just read:

  • A Computer Weekly buyer's guide to secure and agile app development

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

    Download

  • IBM Worklight Developer Q&A

    Access this resource to see an open-forum developer question-and-answer for IBM's Worklight environment. See if another developer has encountered the same issue as you, and if someone has already provided an easy solution.

    Download

  • Infrastructure optimisation for business application management

    In this e-guide, we take a look at some of the latest trends in server hardware design and specifications to help IT buyers make an informed choice about the best infrastructure to run their portfolios of business applications on.

    Download

  • Watson Can Power Your Application. What Will You Do With It?

    View this webcast to see experts discuss and demonstrate the new IBM Watson services available on Bluemix.

    Download

  • Build an Android app using the MobileData cloud service

    Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.

    Download

  • Building an Android App using MobileData Cloud

    Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.

    Download

  • A Computer Weekly buyer's guide to application modernisation

    In this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.

    Download

  • Sharpen your DevOps edge

    In this e-guide, find out why the DevOps culture is taking root across the region, the common pain points of organisations as they embrace a DevOps mindset and what it takes to be successful in the DevOps journey.

    Download

  • A guide to developing modern mobile applications

    A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.

    Download

  • Infographic: How blockchain works

    To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.

    Download

  • 5G vs. Wi-Fi 6: What's the difference?

    Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.

    Download

  • Toughening up web and mobile application security

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

    Download

  • 5G vs. Wi-Fi 6: What's the difference?

    Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both. Here's a deep dive into their differences, the important places they overlap and software options for automating them.

    Download

  • Upgrade or rework: Pathway to application modernisation

    If there is one certainty in IT, it is that at some point, every shiny new application will become legacy. The tech sector is driven by a fast cadence of innovation, which means that last year's "must have" phenomenon quickly becomes stale and out-of-date. In this e-guide, we explore the different approaches to modernising outdated IT systems.

    Download

  • Perimeter Security Noise Leaves Applications Vulnerable to Attacks

    Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.

    Download

  • How to modernize your legacy ERP system in 5 steps

    Staying with a legacy ERP system may be the right decision for a company, but many organizations must modernize their legacy ERP to stay competitive in their industry. Here's a look at the five "Rs" of modernizing a legacy ERP system and how to decide on the right approach.

    Download

  • Focus: Cloud application development

    In this e-guide we take a close look at some of the latest trends in cloud application development, with in-depth interviews with the likes of Cloud Foundry and Pivotal, and find out how one public sector organisation is tapping into all these ideas in their quest for efficiency.

    Download

  • API Management: The role of APis in digital business transformation

    Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.

    Download

  • Ultimate IoT implementation guide for businesses

    IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.

    Download

  • 9 IBM Cloud Paks for app modernization and cloud efforts

    It takes time, money and labour to modernize applications and workflows to use cloud environments. IBM brings a new dimension to cloud adoption with highly integrated solution stacks that can provide a range of typical workflows for business users. In this e-guide, learn how IBM Cloud Paks can help ease some challenges of application modernization.

    Download

  • A Computer Weekly buyer's guide to next-generation programming tools

    All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.

    Download

  • Infographic: Comparing cloud application models

    The cloud is central to the deployment of most applications today. But, that doesn't mean all applications use the cloud in the same way. In fact, there are several types of cloud application models. In this infographic, we compare three of the most popular models: cloud-native, cloud-based and cloud-enabled.

    Download

  • 5 ways to reduce the cost of Kubernetes

    Cloud computing must support applications efficiently, and cost-effectiveness is a part of that. Unfortunately, many Kubernetes deployments focus on technical operations capabilities and fail to consider the costs associated with their benefits. Here are 5 tips to reduce the cost of Kubernetes.

    Download

  • How to Scale Your IaC Security Program

    If you have to shore up your cloud infrastructure security after you’ve already embedded IaC into your workflows, there are a few common challenges you’ll face—cloud infrastructure drift and misconfigured open source IaC components among them. Overcome these IaC challenges by reading this e-book.

    Download

  • How the application integration landscape is changing

    In this e-guide, we discover how the industry is trying to make it possible to link applications together in order to share resources with ease. We take a look at how technologies like Distributed Computing and the Common Object Model have been refined into web services, service-oriented architecture and composable applications and microservices.

    Download

  • Top 10 ASEAN stories of 2018

    In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money's adoption of OpenShift, Go-Jek's experience with the cloud and Singapore's approach to the internet-of-things, among other developments.

    Download

  • Can you spot 5 myths about RASP?

    Can you separate RASP fact from fiction? This handy guide debunks the top 5 commonly-believed RASP myths. Put your AppSec knowledge to the test by reading on now.

    Download

  • Guide to building an enterprise API strategy

    Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.

    Download

  • Top 10 business applications stories of 2018

    The steady modernisation of ERP systems, as they edge to the cloud and are complemented by new-generation customer software, was markedly evident this year. And blockchain and AI are making inroads. In this e-guide, Computer Weekly takes a look at the top 10 business applications of 2018.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • A guide to what to look for in Application Performance Monitoring and Observability

    In this E-Guide, we explore the market for APM tools, their role as part of a wider security strategy and look at how APM should be tied to business metrics.

    Download

  • 5 reasons you should migrate to the cloud

    In this expert guide, discover five cloud benefits that may prove cloud migration naysayers wrong, including scalability and agility, visibility and governance, cost, and more.

    Download

  • CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company

    It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.

    Download

  • Focus: Application Virtualisation

    This e-guide focuses on application virtualisation and how big companies are finding various ways to stop applications adversely affecting each other.

    Download

  • A Computer Weekly Buyer's Guide to Datacentre Management

    Only 31% of IT decision-makers surveyed said that they had a repeatable, optimised or managed strategy in place. Take a look at this vendor-neutral buyer's guide to see how the experts are predicting cloud computing will impact your data center in the next 3 years.

    Download

  • A Computer Weekly Buyer's Guide to Microsoft Office 365

    Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.

    Download

  • A Computer Weekly buyer's guide to API management

    Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.

    Download

  • How microservices take the complexity out of governance

    What if there's an easy way to reduce overhead and adapt governance for modern app architectures? In this expert e-guide, explore a distributed, microservices-based approach to governance and learn how to adapt IT for microservices and containers with automation tools.

    Download

  • ALM: Taking a middleware-focused approach

    In this expert e-guide, Tom Nolle discusses how to take a middleware-focused approach to app lifecycle management practices. Uncover helpful advice for selecting middleware tools and managing OS and middleware platforms in the cloud. Plus, learn about the critical relationship between ALM, DevOps, and orchestration.

    Download

  • DevOps: Latest developments & use cases in ASEAN

    In this e-guide, read more about the state of DevOps adoption across Southeast Asia, the importance of integrating security into DevOps processes and our top tips for securing management buy-in.

    Download

  • Application security: More important than ever

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

    Download

  • Application Delivery Network Buyers' Guide

    The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.

    Download

  • 12 API security best practices

    As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.

    Download

  • Focus ASEAN: Enterprise Mobility

    With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient.

    Download

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

    Download

  • A snippet of Enterprise Strategy Group GenAI data for you

    As new technologies are invented and further developed, organizations' tech investment priorities may change. After all, it is the demands of the business that often guides the direction of these developments. This cyclical phenomenon is what allows for industries of all types to grow so quickly, including your company.

    Download

  • Securing your software supply chain

    Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.

    Download