ComputerWeekly.com Research Library

Powered by Bitpipe.com

Software Research

  • How Strategists Can Use the Cloud to Delight Customers

    Sponsored by: Magenic

    Flip through a collection of cloud innovation stories from real companies like Domino's Pizza and Deloitte to find out how they leveraged cloud applications to transform their business model – and usher in new eras of growth.

  • Jump-Start Your Understanding of SD-WAN

    Sponsored by: Telstra

    When it comes to assessing your SD-WAN and business requirements, you'll need to consider security. Learn about a provider that embeds security directly into network architecture in this interactive infographic.

  • Why Telstra for SD-WAN

    Sponsored by: Telstra

    The network underlay plays a critical role in the SD-WAN overlay—and since the underlay network's capacity caps performance for the SD-WAN overlay, it is crucial that you have the best base to build your network on. Learn how you can build your SD-WAN overlay with Telstra in this interactive infographic.

  • Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.

  • CW ANZ – Jan 2019: Keeping pace with microservices

    Sponsored by: ComputerWeekly.com

    In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.

  • Computer Weekly – 8 January 2019: Technology innovation in music

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.

  • How to Find the Best Fit: ERP Software

    Sponsored by: SelectHub

    For many companies, selecting an ERP system is the most expensive—and risky— IT decision they'll make. In this e-guide from SelectHub, gain expert insight into the world of ERP, and get started on selecting your dream ERP solution by following their step-by-step guide.

  • Case Study: Test Strategy Review

    Sponsored by: nfocus

    In this case study, find out how the company was able to seamlessly rollout their Smart Meter programme through the help of an independent partner who reviewed their current test strategy, approach, practices and coverage.

  • Security by Design: DevOps in the Era of the GDPR

    Sponsored by: Trend Micro

    Check out this infographic to see how DevOps teams are affected by the GDPR, how secure DevOps can help with GDPR compliance, and more.

  • Computer Weekly – 27 November 2018: Software patching at scale – how to make it work

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.

  • An IT Leader's Guide to Modern Development QA & QC

    Sponsored by: nfocus

    To better understand the importance and role of quality assurance (QA), testing, and quality control (QC) in the development process, download the PDF of this developer's guide. Inside you'll find out how to help your organization improve your quality assurance approach and practices.

  • Continuous Testing in Micro Focus

    Sponsored by: Micro Focus_Infosys

    Download this guide for tips on how to achieve success with continuous testing, through a combination of process and technical enablers – from testing baked into user stories, to manual testing and automated infrastructure.

  • The State of Software Security: Volume 9

    Sponsored by: Veracode, Inc.

    In this report, get a clear picture of software security risk, uncover how long it takes for different types of vulnerabilities to be fixed, and to understand why certain risks linger for as long as they do.

  • CW ASEAN: Unlock flash opportunities

    Sponsored by: ComputerWeekly.com

    Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.

  • CW ANZ: Taming the data beast

    Sponsored by: ComputerWeekly.com

    Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.

  • How Logitech Used a Low-code Platform to Replace Thousands of Lotus Notes-Based Apps

    Sponsored by: OutSystems

    In this e-book, find out how Logitech adopted a low-code development platform to replace legacy, difficult-to-deploy apps based on Lotus Notes.

  • Don't Confuse Low-Code with No-Code

    Sponsored by: OutSystems

    Explore the differences between low-code vs. no-code, with a particular focus on the users these tools are designed for and what they're designed to help these users do. Learn how to properly outfit your development projects with low-code and no-code tools so you can enable rapid development for cloud and mobile.

  • Applying Software-Defined Security to the Branch Office

    Sponsored by: Versa Networks

    The end goal of deploying software-defined security (SD-Security) for your branch offices is to have additional layers of security for better defense-in-depth, when and where you need them. Read this white paper to learn how you can apply SD-security to your branch office.

  • Kubernetes management options from Google, AWS, and Azure

    Sponsored by: TechTarget

    If you're running container or considering using Kubernetes, you need a Kubernetes management tool.Open this guide to explore what a Kubernetes management tool can do for you, and some of the top offerings from vendors like AWS, Azure, and Google.

  • Research Study: Cloud-Based Business Solutions Suite Delivers Key Performance Improvements to Software Companies

    Sponsored by: Oracle NetSuite

    Download this study to examine what effect implementing NetSuite's cloud-based suite had on improving KPIs for software companies, as well as use cases for the platform.

  • Components: Increasing Speed and Risk

    Sponsored by: Veracode, Inc.

    Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.

  • How the Testing Manifesto changes your testing process

    Sponsored by: TechTarget

    Take a look at this guide, How to: Continuous Testing, to get a breakdown of when in your Agile or DevOps process you should be testing, how to prevent most bugs, and more testing techniques that will help you reduce bottlenecks.

  • Don't Invite Bad Code In

    Sponsored by: Veracode, Inc.

    Download this white paper to discover a software composition analysis technology that checks your third-party code at the same time you're scanning your own code, giving you complete visibility into your applications' security, in a single report.

  • How To Make Application Security A Competitive Advantage

    Sponsored by: Veracode, Inc.

    Download this white paper to learn about the critical importance of application security in the enterprise and how you can make app security a competitive advantage.

  • Your Guide to Low-Code PaaS App Development

    Sponsored by: ServiceNow

    Learn about a low-code PaaS app development offering designed for building apps quickly for ITSM, security operations, customer service, and beyond.

Browse by Report Type: Software White Papers | Software Multimedia | Software IT Downloads

See more topics related to: Software

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.