ComputerWeekly.com Research Library

Powered by Bitpipe.com

Software Research

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

  • Enterprise cloud applications – can we trust them?

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.

  • Computer Weekly@50: What was happening in July

    Sponsored by: ComputerWeekly.com

    The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.

  • CW@50: What was making the news in June

    Sponsored by: ComputerWeekly.com

    The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.

  • Middle East IT Priorities Report 2016

    Sponsored by: ComputerWeekly.com

    Computer Weekly’s in-depth study of IT spending priorities in the Middle East will help you benchmark your business spending in areas such as networking, datacentres and security.

  • CW@50 - What was making the news in May

    Sponsored by: ComputerWeekly.com

    The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.

  • CW@50: What was making the news in April?

    Sponsored by: ComputerWeekly.com

    The National Museum of Computing has uncovered several gems in the Computer Weekly archives, based on what was happening in the month of April over the last few decades.

  • CW@50: March editions of Computer Weekly

    Sponsored by: ComputerWeekly.com

    We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.

  • Does a proprietary solution automatically mean vendor lock-in?

    Sponsored by: ComputerWeekly.com

    The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?

  • 5 Must-have Features in a Marketing Automation Platform

    Sponsored by: Marketo

    There are many marketing automation platforms to choose from, so it is critical that you choose the one that best meets your organization's needs. In this e-guide, uncover which 5 must-have features to look for in a marketing automation platform and find a further outline of their clusters of features.

  • Align Employee Performance and Strategic Workforce Planning

    Sponsored by: MacroMicro

    Data grants insight into your talent's performance, but how can you use data from across the company to determine how an individual employee's performance assists in reaching your goals?

  • Target DevOps Bottlenecks with Connected Lifecycle Data

    Sponsored by: Tasktop

    Many businesses are looking to implement a successful DevOps strategy. This webcast identifies and explores the bottlenecks in the product lifecycle that can impact your transformation. Find out how to understand and connect the value chain, identify high value business metrics, implement high level reporting, and more.

  • Beyond the Scrum Team: Delivering "Done" at Scale

    Sponsored by: Tasktop

    Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.

  • Machine Learning Examples Crop Up For Data Center Management

    Sponsored by: SIOS Technology Corp

    Machine learning examples are finally making their way to the home territory of computer science – the data center. Learn why data centers are an ideal environment for machine learning and explore examples of machine learning found in data centers.

  • Service Cloud: New Capabilities Aiming to Unify Fragmented CEM

    Sponsored by: Salesforce.com

    Did you know that 61% of consumers must interact with a company on multiple channels to resolve a customer service issue? And did you also know that Salesforce has brought new capabilities to Service Cloud, aiming to help unify fragmented customer journeys? View this guide to learn about them, it's pricing and availability.

  • Talent Management: Why It Works and Which Vendors are Leading the Way

    Sponsored by: HRizon

    Explore this expert e-guide in which Yvette Cameron, Research Director at Gartner, weighs in on the leading vendors in the talent management space, and learn 5 steps to guide your selection process.

  • Explore the Combined Benefits of Continuous Delivery and Agile

    Sponsored by: Magenic

    In this expert e-guide, we help you learn how to implement continuous delivery successfully and build on the Agile teams you already have in place. Discover a way to develop and test software that allows you to quickly issue updates.

  • How to Include QA in Agile Story Mapping Meetings

    Sponsored by: Magenic

    In this expert e-guide, we explore some of the more effective methods for incorporating QA and other stakeholders in Agile story mapping. Access tips for preparation best practices and learn how to become a more effective team member.

  • The Essential Features of Cloud ERP

    Sponsored by: VAI, Vormittag Associates, Inc.

    Access this e-guide to discover what sets cloud/SaaS ERP apart from traditional, on-premise ERP deployments. Also learn about manufacturers who have successfully embraced the cloud for their ERP needs, and the special considerations process manufacturers should have before adopting ERP software.

  • Negotiate with SAP, IBM, Microsoft and Oracle to Make the Most from Your IT Budget

    Sponsored by: Gartner

    When it comes to contract negotiations, CIOs hold more sway than they think. Next time you negotiate with suppliers, ensure you get a better price from likes of SAP, IBM, Microsoft and Oracle. Access this expert guide to discover vendor negotiation tips for midmarket CIOs working with these vendors from Forrester Senior Analyst Duncan Jones.

  • Hardware vs. Software Load Balancer for Enterprise IT

    Sponsored by: Citrix

    When it comes to choosing between a hardware load balancer and a software load balancer, there are several key factors to consider. In this e-guide, get an in-depth look at hardware and software load balancing, the differences between each, and how to select the right one for your organization.

  • Software Lifecycle Integration: Integrate Your SDLC Tools and Accelerate Your Business

    Sponsored by: Tasktop

    Learn how you can improve usage of the tools you already have while streamlining software development and delivery. Explore how you can overcome collaboration problems using software lifecycle integration, which enables you to connect all software development and delivery tools, synchronize information across disciplines, and more.

  • Hardware's Key Role in a Software-Defined Era

    Sponsored by: SearchNetworking.com

    In this software age, is there any role left for hardware? In our three-part guide, our experts' response is a resounding, "yes." Read now to learn why hardware is still an essential networking choice in terms of scale, reliability, and performance.

  • Why SD-WAN is the Way to WAN Optimization

    Sponsored by: SearchNetworking.com

    If the growth of cloud computing and mobility has proven anything, it's that the legacy boundaries of the enterprise no longer exist. As a result, the traditional model of WAN optimization is changing too. Access this e-guide to discover if SD-WAN is right for your network.

  • Computer Weekly – 9 February 2016: How Software Protects People

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.

Browse by Report Type: Software White Papers | Software Multimedia | Software IT Downloads

See more topics related to: Software

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.