ComputerWeekly.com Research Library

Powered by Bitpipe.com

Applications Management Research

  • Readying-Legacy-Applications-for-the-Cloud

    Sponsored by: UKCloud

    Gartner suggests there are 5 application migration strategies for rehosting an application: Rehost, refactor, revise, rebuild, and replace. However, UK Cloud argues that there’s a 6th “R” to consider: Retire.

  • REALIZING THE BENEFITS OF RPA IN FINANCE AND ACCOUNTING

    Sponsored by: UiPath

    Access this ebook to learn RPA use cases in finance and accounting, insights from actual users on what constitutes an effective EPA platform, 6 benefits of implementing RPA, and much more.

  • UiPath Process Mining

    Sponsored by: UiPath

    Access this ebook to learn key business challenges and how automaton addresses them, how UiPath Process Mining accelerates RPA, and how UiPaths helps companies in specific industries.

  • ITProTV | CompTIA PenTest+: Analyze Scripts: Python

    Sponsored by: Cornerstone OnDemand

    This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.

  • Remote Work in the Age of COVID-19

    Sponsored by: AppNeta

    The average 100,000 person organization has between 1,500 and 3,000 applications that run the business. In examining the applications in your organization, do they provide ample threat protection while still being able to run smoothly? Learn recommended steps to evolve your network strategy to support long-term remote work.

  • Migration Isn’t Archiving

    Sponsored by: Komprise

    While there are similarities, the differences between data migration and archiving can have a big impact on your organization. Download this white paper to dig into the differences between archiving and data migration so that you can strategically apply each in your organization.

  • Computer Weekly - 7 April 2020: Adapting IT to the new normal

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.

  • An Introduction to Containers and Orchestration for IT Admins

    Sponsored by: TechTarget

    Take a look at this Container Guide from SearchITOperations.com to learn more about the types of modifications many organizations are making to their apps to make them container-ready, and some of the container skills you'll need to know as this technology becomes ever more popular.

  • An Introduction to Containers and Orchestration for IT Admins

    Sponsored by: TechTarget

    Take a look at this Container Guide from SearchITOperations.com to learn more about the types of modifications many organizations are making to their apps to make them container-ready, and some of the container skills you'll need to know as this technology becomes ever more popular.

  • Why migrate when you can modernize?

    Sponsored by: LANSA

    Is it worth maintaining legacy apps, or should you take the risk of moving to something new? Take a look at this whitepaper to learn how to think of these issues as opportunities and modernize your legacy apps with optimized workflows and integration.

  • CW ANZ – Jan 2019: Keeping pace with microservices

    Sponsored by: ComputerWeekly.com

    In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.

  • CW ASEAN – January 2019: Dive into microservices

    Sponsored by: ComputerWeekly.com

    In this edition of CW ASEAN, we uncover the state of adoption of microservices in ASEAN and what needs to be in place for enterprises to get the most out of the technology.

  • Top 10 Australia IT stories of 2018

    Sponsored by: ComputerWeekly.com

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.

  • Computer Weekly – 20 November 2018: How the Science Museum is moving to the digital age

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how London's Science Museum is dealing with legacy IT to move into the age of digital and data. We examine Nationwide Building Society's move to cloud and DevOps. And we look at how technologies such as machine learning and blockchain are helping to automate global supply chains. Read the issue now.

  • Modernize business-critical workloads with intelligence

    Sponsored by: Dell EMC

    You need to modernize your applications, but what tools or solutions are available to help you accomplish this? Take a look at this resource to learn how to identify cost savings and potential gaps in your features and functions, which could be currently making a negative impact on your competitive posture or operational efficiencies.

  • Sharpen your DevOps edge

    Sponsored by: ComputerWeekly.com

    In this e-guide, find out why the DevOps culture is taking root across the region, the common pain points of organisations as they embrace a DevOps mindset and what it takes to be successful in the DevOps journey.

  • Computer Weekly – 31 July 2018: Learning digital government lessons from Estonia

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the world's most digitally advanced nations, Estonia, and ask what the UK government can learn. We talk to Airbus about how aircraft manufacturers are prioritising cyber security. And we examine how AI and robots will augment – not replace – human productivity. Read the issue now.

  • AI & Automation: Turning data into insights

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the trends that are shaping the demand for AI and how organizations including healthcare service providers and F1 racing teams are leveraging technology on their own terms.

  • Application security: More important than ever

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • Infrastructure optimisation for business application management

    Sponsored by: ComputerWeekly.com

    In this e-guide, we take a look at some of the latest trends in server hardware design and specifications to help IT buyers make an informed choice about the best infrastructure to run their portfolios of business applications on.

  • 10 Must-Have Features for Big Data Analytics Tools

    Sponsored by: Cloudera

    In this e-guide, discover the 10 must-have features in big data analytics tools that can help reduce the effort required by data scientists to improve business results.

  • Sound application development rests with secure APIs in the cloud

    Sponsored by: SearchCloudComputing.com

    This handbook probes potential API security risks and puts forth a number of best practices for maintaining a secure, managed environment.

  • AI Lowers Hurdles to Digital Transformation of Healthcare

    Sponsored by: SearchHealthIT.com

    In the era of healthcare AI, tools can unlock buried clinical information that predicts risks, provides reasons for intervention, raises the quality of care and reduces medical costs. Explore this e-zine to find out how health IT pros prescribe remedies for funding slowdowns, data quality concerns and other digital transformation stumbling blocks.

  • Container applications need backup: Who knew?

    Sponsored by: SearchStorage.com

    The need to protect data in container applications has emerged with the advent of persistent data in containers. In this 'Storage' magazine issue, we also look at how object storage can thwart ransomware attacks.

  • Container-based deployment revitalizes traditional enterprise apps

    Sponsored by: Diamanti

    Container-based deployment could be the only realistic path forward for some apps, succeeding where virtual machines have sometimes fallen short. Read this e-guide to learn how your peers are using Docker to accelerate the containerization of many existing enterprise applications, and the benefits they are realizing.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences