ComputerWeekly.com Research Library

Powered by Bitpipe.com

Applications Management Research

  • Accelerating Application Transformation Through Environment as a Service

    Sponsored by: QualiSystems

    Digital transformation has placed pressure on enterprises to adapt to retain competitive advantage, but application transformation can be cumbersome. Download this short whitepaper for the 3 ways an environment-as-a-service can elevate your application transformation process to meet customer experience standards.

  • Scale Devops 3x With Self-service Application Environments

    Sponsored by: QualiSystems

    Establishing shared applications through development lifecycles is a resource consuming burden that slows down development teams. Download this 2-page whitepaper to learn how self-service application environments can scale DevOps, and streamline development lifecycles for your development teams.

  • Slash Your Dev/Test And Lab Infrastructure Cost By 61%

    Sponsored by: QualiSystems

    Environment provisioning seems time and resource intensive, but in certain cases it can streamline development and testing for better efficiency. Download this 2-page whitepaper to learn how an environment provisioning tool can optimize development and testing, cutting cost up to 61%.

  • Quali at a Glance

    Sponsored by: QualiSystems

    Repeatedly provisioning business applications can become a challenging and tedious task for many development teams, which places an emphasis on the need for an environment provisioning service. Download this whitepaper to learn about environment previsioning's potential to accelerate development without compromising on quality.

  • CloudShell Colony Overview

    Sponsored by: QualiSystems

    Cloud platforms can boost productivity and efficiency, but without an environment-as-a-service platform, they often leave more to be desired in your DevOps processes. Download this two-page whitepaper to learn how to streamline your cloud platform provisioning in cloud-based platforms like AWS, Azure, Kubernetes, and more.

  • A New Approach to Secure Mobile Banking Apps

    Sponsored by: Arxan

    Customer demand has pushed for standardized mobile banking, which means financial institutions are required to properly handle the heightened security requirements that come with it. Read this whitepaper to learn the 3 transformational benefits of a well-designed endpoint security strategy for mobile banking applications.

  • Cathay United Bank Case Study

    Sponsored by: Red Hat

    Banking services who fail to transform with streamlined development process will be undermined by newer and more modern competitors. Read about how a traditional and established Taiwan bank, Cathay United, was able to enhance their competitive edge despite the rapid delivery and agility of emerging fintech startup competitors.

  • The Future of Enterprise Application Development

    Sponsored by: Appian

    With a growing expectation for businesses to transform and enhance their customer experience, the need for superior application development has become a priority. Review this whitepaper to see how a low-code approach can enhance and streamline your application development moving forward.

  • Two Digital Moments of Truth for Monitoring Mobile Applications

    Sponsored by: New Relic

    Your business' reputation amongst users stands upon the shoulders of application quality, which is why proactive mobile app monitoring has become so important. Read this article to understand real instances in which application monitoring can impact your application quality, and learn how to mitigate application issues before they arise.

  • How to drive an effective DevOps for business approach

    Sponsored by: New Relic

    While that's the efficiency of DevOps is great, its biggest draw comes from its business boosting benefits. Read this brief article to understand all the business-centric perks of a DevOps method, giving you the leverage to get your stakeholders and teams to buy-in.

  • Blue Prism Transforms Security from Reactive to Proactive with Veracode

    Sponsored by: Veracode, Inc.

    Establishing trust in your product's security is just as important as its overall quality in the eye of the user -- a fact almost all developers are familiar with. That's why many development teams are making a shift from reactive to proactive application security models. Keep reading to find out why, illustrated by a real world story.

  • Digital Transformation: Removing Adoption Barriers to Cloud Content Services

    Sponsored by: Hyland

    When it comes to potentially disrupting critical data and processes that keep a business running smoothly, some ask if the risk of moving an on-premises enterprise content management system is worth the rewards. This white paper highlights the benefits and advantages of migrating content management to a cloud-based content services approach.

  • Moving to Modern C++: Ensuring Safety and Security with AUTOSAR Coding Guidelines

    Sponsored by: Perforce

    This paper delves into the AUTOSAR C++14 coding guidelines and examines how AUTOSAR differs from established coding standards. Access it here to learn if your team should adopt the AUTOSAR guidelines and how to transition from your existing coding standard.

  • How 1 Company Combats App Issues Before Public Release

    Sponsored by: Data Theorem

    Learn how Data Theorem's App Secure is helping Evernote identify and fix variety of vulnerability issues in their apps before releasing them to the public app stores.

  • CW ANZ – Jan 2019: Keeping pace with microservices

    Sponsored by: ComputerWeekly.com

    In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.

  • CW ASEAN – January 2019: Dive into microservices

    Sponsored by: ComputerWeekly.com

    In this edition of CW ASEAN, we uncover the state of adoption of microservices in ASEAN and what needs to be in place for enterprises to get the most out of the technology.

  • Top 10 Australia IT stories of 2018

    Sponsored by: ComputerWeekly.com

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.

  • Computer Weekly – 20 November 2018: How the Science Museum is moving to the digital age

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how London's Science Museum is dealing with legacy IT to move into the age of digital and data. We examine Nationwide Building Society's move to cloud and DevOps. And we look at how technologies such as machine learning and blockchain are helping to automate global supply chains. Read the issue now.

  • Modernize Business-Critical Workloads with Intelligence

    Sponsored by: Dell EMC

    You need to modernize your applications, but what tools or solutions are available to help you accomplish this? Take a look at this resource to learn how to identify cost savings and potential gaps in your features and functions, which could be currently making a negative impact on your competitive posture or operational efficiencies.

  • Sharpen your DevOps edge

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out why the DevOps culture is taking root across the region, the common pain points of organisations as they embrace a DevOps mindset and what it takes to be successful in the DevOps journey.

  • Container Security: 10 Things DevOps Need to Do

    Sponsored by: Aqua Security

    In this resource, find out the ten key things DevOps should keep in mind when developing and securing containerized applications to minimize the risk posed by loose vulnerabilities.

  • Achieving Continuous Delivery with Kubernetes

    Sponsored by: Aqua Security

    In this eGuide for developers, learn how to understand and build the practices and pipelines that enable continuous application integration and delivery within Kubernetes.

  • A Path to Pivotal Cloud Foundry

    Sponsored by: Magenic

    If you're curious about .NET modernization or simply looking for advice on your enterprise monoliths, look no further. In this guide, you'll find out how to analyze a .NET monolith, including three-tier web applications, how to modernize existing applications via microservices, and more.

  • 10 Must-Have Features for Big Data Analytics Tools

    Sponsored by: Cloudera

    In this e-guide, discover the 10 must-have features in big data analytics tools that can help reduce the effort required by data scientists to improve business results.

  • Sound application development rests with secure APIs in the cloud

    Sponsored by: SearchCloudComputing.com

    This handbook probes potential API security risks and puts forth a number of best practices for maintaining a secure, managed environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.