Deployment Reports

A Computer Weekly buyer's guide to continuous integration and continuous deployment
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.
Posted: 08 Feb 2021 | Published: 17 Dec 2019

TechTarget ComputerWeekly.com

Application Performance Management: Improving service availability
sponsored by TechTarget ComputerWeekly.com
EGUIDE: If it can't be measured, it can't be managed. Telemetry on applications and IT infrastructure are key to keeping applications running optimally and reducing unplanned downtime. Beyond using telemetry data to respond to abnormal events, historical data analysis can reveal more systemic issues. In this e-guide we look at trends in APM.
Posted: 13 Sep 2021 | Published: 13 Sep 2021

TechTarget ComputerWeekly.com

2021 IT Priorities: APAC Key Technology Areas Infographic
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This year, we asked nearly 300 IT professionals in APAC which technology areas they identified as being imperative for 2021. In this infographic find out how remote working is influencing investments, learn about shifts in application development trends and which infrastructure tools will be deployed most in 2021.
Posted: 08 Feb 2021 | Published: 13 Jan 2021

TechTarget ComputerWeekly.com

Artificial Intelligence: Spotlight on ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about ASEAN's efforts in harnessing AI, the challenges ahead, as well as the rapid developments in the burgeoning field.
Posted: 08 Feb 2021 | Published: 27 Aug 2018

TechTarget ComputerWeekly.com

Top 10 business applications stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The steady incursion of artificial intelligence (AI) into enterprise software was a major theme behind Computer Weekly's indepth stories in this area in 2019. Human versus machine is the opposition that looms over much of the coverage here. Here are Computer Weekly's top 10 business applications stories of 2019.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

How Etsy's DevOps Teams Fend off Fraudsters
sponsored by BMC
EGUIDE: In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC

Empowering Mobile Workers across Apps and Networks
sponsored by Dell and Microsoft
EGUIDE: Download this e-guide to learn how fusion apps are empowering mobile workers by combining social and location data with key business data. You'll also learn best practices for setting up mobile workers across local office networks.
Posted: 21 May 2018 | Published: 17 May 2018

Dell and Microsoft

Clarifying the Platform as a Service Picture
sponsored by Salesforce.com
EGUIDE: App modernization hinges largely on the success of PaaS, and it is becoming increasingly confusing for enterprises looking to update their legacy applications. This e-guide is your overview of PaaS and its deployment models. You will learn how to evaluate PaaS vendors based on key criteria and whether to take a developer- or user-centric stance.
Posted: 20 Jun 2017 | Published: 16 Jun 2017

Salesforce.com

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

Software Today: What Applications Now Look Like
sponsored by Veracode, Inc.
WHITE PAPER: Download this infographic to see how modern applications are different today, and learn where you can take steps to prevent security risks throughout the development process.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.