Computer Telephony Applications Software Research
-
CW Innovation Awards: Jio taps machine learning to manage telco network
Sponsored by: TechTarget ComputerWeekly.comIn this case study, learn how India's largest telecom operator built its own machine learning platform to meet the growing data and signalling requirements of new networks.
-
CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company
Sponsored by: TechTarget ComputerWeekly.comIt's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.
-
CW Nordics November 2017
Sponsored by: TechTarget ComputerWeekly.comThe Nordic countries are pace-setters when it comes to digital transformation and although there is a wealth of IT talent in the region, it seems it is not enough.
-
CW500: A roadmap to software-defined everything – Morgan Stanley
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything – this presentation was given by Rob White, executive director of the global database group at Morgan Stanley.
-
CW500: A roadmap to software-defined everything – Paddy Power Betfair
Sponsored by: TechTarget ComputerWeekly.comComputer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.
-
CW@50 - What was making the news in May
Sponsored by: TechTarget ComputerWeekly.comThe National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
-
CW@50: March editions of Computer Weekly
Sponsored by: TechTarget ComputerWeekly.comWe search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.
-
CW@50: What was making the news in June
Sponsored by: TechTarget ComputerWeekly.comThe National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.
-
CW EMEA - January 2023: Protecting the privacy of schoolchildren
Sponsored by: TechTarget ComputerWeekly.comIn this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
-
Data Analytics Software Optimizes App Performance
Sponsored by: TechTarget Software QualityDevelopers have a wealth of information at their disposal to apply data analytics metrics, speed development and improve applications.
-
Database Worst Practices: The Top 5 Mistakes Developers Make
Sponsored by: EnterpriseDB CorporationDownload this webcast and learn how applications today are growing more and more complex with an increased risk of error and what you can do to prevent this.
-
DataSheet: Rational Quality Manager
Sponsored by: IBMIBM Rational Quality Manager offers two views on the individual user’s dashboard: A work-item list that shows a tester what work has been assigned to him or her, and a team event log that updates automatically as activities occur/progress. Together these views help ensure that everyone is on the same page.
-
DCIM Software Evaluation Guide
Sponsored by: Nlyte SoftwareBefore you invest in data center infrastructure management (DCIM) tools, you need to know your needs and how to analyze whether a prospective tool will meet them. In this e-guide you will learn how to evaluate and compare DCIM software platforms based on key considerations.
-
DCIM Tool Evaluation Guide
Sponsored by: RunSmartSince the data center infrastructure management (DCIM) market seems nearly limitless, it is important to have an evaluation process to find the software platform that best meets your organization's unique needs. This e-guide discusses the six key evaluation areas necessary to finding the DCIM tool that works best for you.
-
Defend Against Injection-based Attacks
Sponsored by: KlocworkThis paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
-
Deliver a superior experience: Application Transformation Solutions
Sponsored by: Hewlett-Packard EnterpriseThis brief resource introduces a holistic approach to enterprise applications that can help you bridge the gap between the old and the new to deliver the strong, positive experiences that users are looking for.
-
Delivering Agile at Scale to a Multinational Communications Provider
Sponsored by: IBMThis case study investigates the adoption of Agile processes within a Northern European multinational provider of communication technology, equipment, and services. In particular, the report looks to chart the journey toward Agile and its progress across the wider organization.
-
Dell PowerVault MD3000 3000 Mailbox Single Copy Cluster Microsoft Exchange 2007 Storage Solution
Sponsored by: DellEMC and Intel®This white paper describes a tested and validated storage solution for a 3000 mailbox Exchange 2007 environment with Single Copy Cluster in a high availability clustering mechanism based on the Microsoft Cluster Service shared storage.
-
Dell Wyse Datacenter for Citrix Reference Architecture
Sponsored by: DellLearn how to deliver virtual desktops via XenDesktop 7.1 on Windows Server Hyper-V 2012 R2 or VMware vSphere 5.
-
Dell PowerVault MD3000i 5000 Mailbox Single Copy Cluster Microsoft® Exchange 2007 Storage Solution
Sponsored by: DellEMC and Intel®This document provides information on Dell's PowerVault MD3000i Plus MD1000 storage solution for Microsoft Exchange Server 2007, based on Microsoft Exchange Solution Reviewed Program (ESRP) Storage program.
-
Deploy Real-time Operational Detection and Prevention to Combat Various Threats and Fraud.
Sponsored by: IBM Software GroupWhen you understand people and their names in context and in real time, you have an increased capability to preempt threats and fraud. Find out what you can do to help protect your business.
-
Design Your App Modernization Strategy
Sponsored by: Red HatOnce you determine that you need to modernize certain apps, the next step is figure out which method best fits your development, whether it's restructuring with PaaS or redesigning with APIs. In this e-guide, explore how to design an app modernization strategy that suits your business's architecture and cloud use.
-
Designing a Modern Enterprise Architecture
Sponsored by: MetavineIn this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.
-
Designing Next Generation Test Systems
Sponsored by: National InstrumentsThis guide addresses challenges that pressure engineering teams to reduce the cost and time of testing, provides insight into how test managers and engineers are overcoming these challenges, and offers guidelines on building modular, software-defined...
-
Determining the Most Effective Endpont Management
Sponsored by: IBMThis white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.