ComputerWeekly.com Research Library

Powered by Bitpipe.com

Software Research

  • Computer Weekly: Counting the Real Cost of Financial Cyber Crime

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.

  • Is Artificial Intelligence on the March to Replace Traditional IT Administrators?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at how artificial intelligence is being used to automate existing jobs, such as IT administrators and customer service agents. Capital One's European CIO talks about how to create an agile business. And we offer tips on how to deal with an Oracle software audit. Read the issue now.

  • CW500: A roadmap to software-defined everything – Paddy Power Betfair

    Sponsored by: ComputerWeekly.com

    Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.

  • CW500: A roadmap to software-defined everything – Morgan Stanley

    Sponsored by: ComputerWeekly.com

    Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything – this presentation was given by Rob White, executive director of the global database group at Morgan Stanley.

  • How Microsoft Aims to Tackle Information Overload

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.

  • Application Modernisation: The Essential Guide

    Sponsored by: ComputerWeekly.com

    In this guide, we look at how distributed systems have evolved to support more agile software development.

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Computer Weekly 50th anniversary special

    Sponsored by: ComputerWeekly.com

    It's been 50 years since Computer Weekly's launch on 22 September 1966. To mark this achievement, we have compiled a special edition of the magazine to reflect on how much the British technology industry has contributed over that time.

  • First edition of Computer Weekly 1966

    Sponsored by: ComputerWeekly.com

    To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.

  • The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.

  • Different Approaches to App Modernization and Development

    Sponsored by: Metavine

    In this expert e-guide, we examine the different approaches to app modernization, including how to leverage the third platform, redesign cloud-native apps, and couple modernization efforts with PaaS. Find out how each of these approaches makes integrating the cloud into your architecture and updating legacy apps an easier, more streamlined process.

  • Surge in Mobile Users Spawns App Development, Testing Advances

    Sponsored by: SearchSOA.com

    This expert handbook examines how business and technology leaders are adapting their mobile development and test strategies. Find out how responsive design testing, DevOps, enterprise architecture models, and automation are reshaping mobile development.

  • SD-WAN Technology Promises Enterprises Control, Cost Savings

    Sponsored by: Silver Peak

    The time for SD-WAN is now. Access this e-guide to discover the potential benefits of adopting SD-WAN, as well as how to achieve ROI with SD-WAN technology.

  • Why Officially Supported Clients aren't Optional in API Projects

    Sponsored by: TIBCO Software Inc.

    APIs are about more than just coordinating software processes, building code, and integrating the various pieces of app development – they're about community and communication. In this expert e-guide, explore the use of open source and building relationships with officially supported clients to help guide API projects.

  • How A Good Sales Strategy Can Convert Prospects Into Customers

    Sponsored by: Oracle Corporation UK Ltd

    Sales now rely on metrics and data analytics to identify top prospects. Rethinking your sales and marketing is critical to developing a workable cloud strategy. In this guide, compare how 2 companies use different sales technologies to gain a competitive edge. Plus, learn how to transform your sales and marketing strategy for improved results.

  • Data Analytics Software Optimizes App Performance

    Sponsored by: SearchSoftwareQuality.com

    Developers have a wealth of information at their disposal to apply data analytics metrics, speed development and improve applications.

  • Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing

    Sponsored by: Tasktop

    This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.

  • How To Build An Enterprise Application Security Program

    Sponsored by: Symantec + Blue Coat

    Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.

  • Getting DevOps Up to Speed: Tools for Collaborating with IT

    Sponsored by: VividCortex

    Feedback about a DevOps environment on the back end is as important to its success as automated tools are on the front end. In this expert e-guide, we explore how to make the communication path between DevOps and IT a two-way street. Inside, discover how tools like container management, ChatOps, and more can bridge the gap.

  • Servers and Storage Become Inextricably Linked

    Sponsored by: Dell EMC and Microsoft

    The rise of flash storage and convergence technologies make it tougher to see storage and servers as separate entities in a software-defined world. Rich Castagna, VP of Editorial at TechTarget, shares why he believes servers and storage have become inextricably linked.

  • Building a Strong Application Security Program

    Sponsored by: Onapsis

    What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.

  • How to Evaluate SD-WAN, Hybrid WAN Products

    Sponsored by: SearchNetworking.com

    Software-defined WANs are replacing legacy networks for better performance and cost-effectiveness. The marketplace is packed with vendors, each pitching different values, and it can be difficult to know what you actually need. This SD-WAN buyer's guide helps you evaluate vendors based on your unique needs.

  • Computer Weekly – 23 August 2016: Odeon and UCI Cinemas Group adopts hybrid cloud strategy

    Sponsored by: ComputerWeekly.com

    In this issue, we profile Odeon and UCI Cinemas Group's use of hybrid cloud as part of a digital transformation programme aimed at enhancing customer experience and staving off competition from on-demand streaming. We also look at the summertime game of musical chairs at the Government Digital Service, and at 50 years of business software.

  • Framing Your Enterprise IoT Approach for a More Connected Future

    Sponsored by: Xively by LogMeIn

    In this expert e-guide, we discuss how you can prepare for whatever comes next in IoT. You'll learn which challenges should take top priority when it comes to integrating IoT, like information architecture, Agile development, and more. Plus, you'll get advice on what to consider before and after picking an IoT platform.

  • 5 Must-have Features in a Marketing Automation Platform

    Sponsored by: Marketo

    There are many marketing automation platforms to choose from, so it is critical that you choose the one that best meets your organization's needs. In this e-guide, uncover which 5 must-have features to look for in a marketing automation platform and find a further outline of their clusters of features.

Browse by Report Type: Software White Papers | Software Multimedia | Software IT Downloads

See more topics related to: Software

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.