ComputerWeekly.com Research Library

Powered by Bitpipe.com

Software Research

  • Software licensing – battleground or crucible?

    Sponsored by: TechTarget ComputerWeekly.com

    Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?

  • Your guide to the open source universe

    Sponsored by: TechTarget ComputerWeekly.com

    Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.

  • Blockchain Enterprise Survey: deployments, benefits and attitudes

    Sponsored by: TechTarget ComputerWeekly.com

    Blockchain deployments are rapidly becoming mainstream. Nearly 40% of respondents' companies are deploying blockchain technology, rising to 57% amongst companies with over 20,000 employees. In part, this is due to increased awareness and understanding of what blockchain entails, particularly at Founder/CEO level.

  • Next step app development: Microservices

    Sponsored by: TechTarget ComputerWeekly.com

    Adopting a microservices approach to application development is increasingly considered an essential part of any bid to modernise the legacy IT setup an organisation relies on.

  • Next stage of virtualisation: Containers

    Sponsored by: TechTarget ComputerWeekly.com

    The buzz and hype surrounding container technologies has reached fever pitch in recent years, prompting CIOs and IT decision makers to mull over what role, if any, they should and could play in their digital transformation plans.

  • A Computer Weekly Buyer's Guide to Mobile App Development

    Sponsored by: TechTarget ComputerWeekly.com

    This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.

  • Using IT initiatives to save money and reinforce green credentials

    Sponsored by: TechTarget ComputerWeekly.com

    Analyst Group Quocirca explains how organisations can use web data caching software to save money and improve their green credentials.

  • Computer Weekly – 8 November 2016: The march of the robot workers

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.

  • Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • CW500: A roadmap to software-defined everything – Paddy Power Betfair

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.

  • CW500: A roadmap to software-defined everything – Morgan Stanley

    Sponsored by: TechTarget ComputerWeekly.com

    Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything – this presentation was given by Rob White, executive director of the global database group at Morgan Stanley.

  • Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Application Modernisation: The Essential Guide

    Sponsored by: TechTarget ComputerWeekly.com

    In this guide, we look at how distributed systems have evolved to support more agile software development.

  • Computer Weekly 50th anniversary special

    Sponsored by: TechTarget ComputerWeekly.com

    It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.

  • First edition of Computer Weekly 1966

    Sponsored by: TechTarget ComputerWeekly.com

    To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

  • Computer Weekly@50: What was happening in July

    Sponsored by: TechTarget ComputerWeekly.com

    The National Museum of Computing has again been looking into Computer Weekly's 50 years of magazine issues for another selection of articles highlighting significant news published in the month of July over the past five decades.

  • Enterprise cloud applications – can we trust them?

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.

  • CW@50: What was making the news in June

    Sponsored by: TechTarget ComputerWeekly.com

    The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of June over the past few decades.

  • CW@50 - What was making the news in May

    Sponsored by: TechTarget ComputerWeekly.com

    The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.

  • CW@50: March editions of Computer Weekly

    Sponsored by: TechTarget ComputerWeekly.com

    We search back through the Computer Weekly archives held at The National Museum of Computing to present what was happening in IT over the past five decades.

  • Does a proprietary solution automatically mean vendor lock-in?

    Sponsored by: TechTarget ComputerWeekly.com

    The dread of any IT manager is in making a significant purchase of hardware or software to then find that they are 'locked in' to one supplier. But analyst Clive Longbottom asks, is this still the case?

  • Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities

    Sponsored by: Imperva.

    This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.

  • Virtual Data Center eZine - Vol.5

    Sponsored by: Dell Compellent

    According to the Data Center Decisions 2008 Purchasing Intentions Survey, server selection and disaster recovery (DR) are front-burner issues for data center decision makers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.