ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Portfolio Management Research

  • Why Mobile Needs A Four-Tier Engagement Platform

    Sponsored by: Kony

    Access this in-depth Forrester research report to discover why mobile needs a four-tier engagement platform. Read on to discover the 4 steps to take toward the four-tier engagement architecture.

  • Application Release Automation Made Simple

    Sponsored by: Automic

    This whitepaper discusses what an application release automation (ARA) system is, and what key components companies should look for when considering a solution.

  • Nine Essentials to Create Amazing Business Applications Faster

    Sponsored by: Progress

    Access this informative white paper to discover essential development tips to help create a company strategy that will help with future successes. Find out about mobile trends, new approaches to application development, and 9 ways to speed enterprise app dev.

  • Future Proofing Mobile Application Development

    Sponsored by: Progress

    Access this video to find key factors to consider when implementing a mobile development strategy that will remain relevant and successful in the future.

  • Digital Transformation: Getting in Shape for the Digital World

    Sponsored by: Apigee

    The focal point of computing power is shifting from the server room to the mobile device. Wherever your business is on the path to digital transformation, this eBook outlines strategies you can follow and real steps you can take to prepare for the future.

  • Why APIs Are Different Than Integration

    Sponsored by: Apigee

    In this eBook, we explore API-centric architecture in detail, and examine some of the important implications of this shift for enterprise application development today.

  • Scalable App Services and Big Data Analytics: Find your Cost of Ownership

    Sponsored by: IBM

    Many companies are looking to implement platforms that manage distributed application services and big data analytics. Access this resource to find out how much one such platform may cost your company.

  • 5 Steps to Improve Product Quality Through Requirements Traceability

    Sponsored by: TechExcel

    Access this essential whitepaper to discover the 5 steps to improve product quality through requirements traceability. Read on to discover how you can bolster you testing process, and how you can ensure happy clients and top-notch products.

  • Mobile Dev Demo: Coding for Multiple Operating Systems

    Sponsored by: IBM

    Learn more about the Apache Cordova framework, how to use it in IBM MobileFirst Platform Foundation projects and more.

  • General information when developing for Android

    Sponsored by: IBM

    Find insights into developing applications for Android mobile devices in this guide from IBM.

  • General information when developing for iOS

    Sponsored by: IBM

    The IBM MobileFirst Platform Foundation enables mobile application development. Access this resource to learn how to develop iOS apps.

  • Debugging your applications

    Sponsored by: IBM

    Debugging is part of the application development process. Find out how to debug Web-based resources with standard tools.

  • Getting started with IBM Worklight Foundation

    Sponsored by: IBM

    Find out how to set up your IBM MobileFirst Platform Foundation development environment, how to create a Worklight app and more.

  • IBM Worklight Foundation

    Sponsored by: IBM

    Having a single platform to develop, test, manage, and secure your mobile web, native, and hybrid apps is essential to efficiency. View this resource to find out about one system that offers a streamlined desktop, including a free trial of this software. Also find tutorials, sample coding, and a developer question and answer.

  • Java Insecurity: How to Deal with the Constant Vulnerabilities

    Sponsored by: Lumension

    Access this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.

  • Overcoming the Challenges of Internal API Programs

    Sponsored by: Intel® Services

    Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.

  • The Value (and Challenges) of Internal API Programs

    Sponsored by: Intel® Services

    View this webcast now to discover the differences in implementing an internal API system and choosing a public API interface. Also learn about the technical and cultural challenges that face enterprise architects, and best practices aroudn implementing an internal API program.

  • The Impact of Data Breaches: Why Application Security is a Business Imperative

    Sponsored by: Veracode, Inc.

    64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.

  • How to Migrate 50 Apps to AWS in 50 Days

    Sponsored by: Cloud Technology Partners

    A Fortune 50 enterprise needed to migrate 50 applications to a web service in 50 days. View this webinar now to see a web services system that helps streamline enterprise portfolios. Find out which applications can be adapted and how to evaluate your application portfolio to identify optimal candidates for the cloud.

  • Webinar: Why Benchmark Application Security?

    Sponsored by: Veracode, Inc.

    Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.

  • Webinar: When is Application Security Done?

    Sponsored by: Veracode, Inc.

    Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.

  • Reduce costs and Maintenance Efforts by Modernizing Apps for the Cloud

    Sponsored by: DellEMC and Intel®

    Companies are turning to legacy application modernization to reduce costs and maintenance efforts. This expert whitepaper provides clear steps to consider when modernizing your legacy applications to a cloud environment.

  • Experts Weigh in on Portfolio Analysis Tools

    Sponsored by: DellEMC and Intel®

    Experts believe that a shift to business-focused application portfolio anagement is currently under way, giving organizations the opportunity to align objectives with enterprise demands. View this expert eGuide now to find out how companies are re-evaluating their business application portfolio to modernize legacy applications.

  • Strategic License Management

    Sponsored by: Flexera Software

    In this white paper, discover a five-step implementation plan for software asset management (SAM), and explore top criteria for selecting a SAM tool.

  • Improve IT Visibility, Avoid Change Failures

    Sponsored by: Hewlett Packard Enterprise

    This informative white paper introduces an IT service management (ITSM) tool that automates the mapping of applications, infrastructure components, and their dependencies, resulting in a simplified approach to change and configuration management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.