ComputerWeekly.com Research Library

Powered by Bitpipe.com

Applications Management Research

  • API Management: The role of APis in digital business transformation

    Sponsored by: ComputerWeekly.com

    Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.

  • API Security 101: Your Expert Guide to API Defense

    Sponsored by: TechTarget

    As organizations take measures against common vulnerabilities, hackers have set their sights on a new target: APIs. This e-guide shines a light on API risks and vulnerabilities, as well as the tactics forward-thinking businesses can use to stay secure.

  • 8 Experts On Flawless App Delivery

    Sponsored by: Citrix

    In a world of distributed computing and componentized applications, securely building and deploying a successful application is a challenge. Poor execution can result in underperforming apps, security risks and unacceptable infrastructure costs. Download this Citrix guide to hear from 8 experts on how to flawlessly deliver applications.

  • Application Delivery Network Buyers' Guide

    Sponsored by: ComputerWeekly.com

    The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.

  • API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4

    Sponsored by: Traceable

    Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.

  • 5 Things To Consider When Choosing An APM Tool

    Sponsored by: Splunk

    To accelerate innovation and protect digital and cloud investments, organizations need to invest in modern monitoring and application performance monitoring (APM) solutions that are built for the new data age powered by the cloud. In this e-book, explore 5 things you must consider when picking an APM tool.

  • Application Modernization Field Guide

    Sponsored by: Deloitte Consulting LLP

    The best approach to application modernization depends on your existing estate. However, there are some best practices and general guidelines any team can follow for modernization insight. Save IBM and Deloitte’s Application Modernization Field Guide here.

  • NVMe Centralized Logging

    Sponsored by: Pavilion

    Access this white paper to see the general architecture necessary for centralized logging, the 11 benefits of using a shared NVMe-oF storage platform for centralized storage, and what logging in a containerized environment looks like.

  • Application Modernization Today: 6 Reasons To Choose A Consistent Infrastructure Platform

    Sponsored by: VMware

    In this custom eBook, learn how to create and execute on a winning, future ready strategy for application modernization and discover 6 reasons to choose a consistent infrastructure platform.

  • Reduce API Security Risks with Automated and Continuous API Scanning

    Sponsored by: WhiteHat Security

    Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.

  • Why DevOps Has Not Become DevSecOps

    Sponsored by: WhiteHat Security

    Access this white paper to see the 6 myths that are contributing to the lack of DevSecOps adoption, watch as they are easily debunked, and learn 8 recommendations moving forward with this new understanding.

  • API Management: The role of APis in digital business transformation

    Sponsored by: ComputerWeekly.com

    Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.

  • Computer Weekly - 7 April 2020: Adapting IT to the new normal

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.

  • Accelerating Salesforce App Development and Improving User Experience: 5 Best Practices

    Sponsored by: Skuid PE

    Read this eBook to explore 5 best practices that can help you accelerate Salesforce app development and improve user experience.

  • Magic Quadrant for Application Performance Monitoring

    Sponsored by: Splunk

    Access this Gartner white paper to see their Magic Quadrant which evaluates the strengths and cautions of the leading application performance monitoring vendors.

  • The Atlassian guide to virtual PI planning

    Sponsored by: Atlassian

    Access this white paper to learn how digital collaboration tools can help teams share information, facilitate decision-making, and serve as a single source of truth for the entire organization to ensure your PI planning session is a success.

  • CONTRAST OSS HELPS DEVOPS MANAGE AND TRIAGE HIDDEN OSS LIBRARY RISK

    Sponsored by: Contrast Security

    Download this eBook to learn about a new approach to OSS security: Contrast OSS, and how it can help you prioritize critical vulnerabilities by tracking the libraries that actually get used during runtime operation.

  • SIG - SASE Convergence of Cloud Security and Networking

    Sponsored by: Cisco Umbrella

    It’s the new normal, and ensuring security for this cloud-centered reality is paramount. Businesses must deepen visibility, protection and control of internet traffic while simplifying security deployment and management. Watch this webinar to learn how Cisco is breaking new ground with a SASE as well as unified SD-WAN and cloud security offers.

  • SIG - SASE For Dummies

    Sponsored by: Cisco Umbrella

    Today’s IT teams must securely enable roaming users, devices, and SaaS apps without adding complexity or reducing performance. Likewise, they must develop strategies to protect users from a variety of evolving threats. Read this e-book to examine the changing network and security landscape and steps you can take to keep your organization secure.

  • Readying-Legacy-Applications-for-the-Cloud

    Sponsored by: UKCloud

    Gartner suggests there are 5 application migration strategies for rehosting an application: Rehost, refactor, revise, rebuild, and replace. However, UK Cloud argues that there’s a 6th “R” to consider: Retire.

  • REALIZING THE BENEFITS OF RPA IN FINANCE AND ACCOUNTING

    Sponsored by: UiPath

    Access this ebook to learn RPA use cases in finance and accounting, insights from actual users on what constitutes an effective EPA platform, 6 benefits of implementing RPA, and much more.

  • UiPath Process Mining

    Sponsored by: UiPath

    Access this ebook to learn key business challenges and how automaton addresses them, how UiPath Process Mining accelerates RPA, and how UiPaths helps companies in specific industries.

  • ITProTV | CompTIA PenTest+: Analyze Scripts: Python

    Sponsored by: Cornerstone OnDemand

    This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.

  • Remote Work in the Age of COVID-19

    Sponsored by: AppNeta

    The average 100,000 person organization has between 1,500 and 3,000 applications that run the business. In examining the applications in your organization, do they provide ample threat protection while still being able to run smoothly? Learn recommended steps to evolve your network strategy to support long-term remote work.

  • Face DevOps Challenges Head-On With a Redefined Approach to Application Monitoring

    Sponsored by: Splunk

    Aberdeen research has found that when leading organizations adopt modern APM tools,DevOps teams can gain deeper and faster insights into their applications so they can troubleshoot and prevent issues before they impact end users. Access this white paper to learn how.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences