Software Application Development Reports

A Computer Weekly buyer's guide to next-generation programming tools
sponsored by TechTarget ComputerWeekly.com
EGUIDE: All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
Posted: 08 Feb 2021 | Published: 27 Nov 2019

TechTarget ComputerWeekly.com

Infographic: How blockchain works
sponsored by TechTarget ComputerWeekly.com
EGUIDE: To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
Posted: 08 Feb 2021 | Published: 17 Sep 2019

TechTarget ComputerWeekly.com

DevSecOps delivers better business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
Posted: 08 Feb 2021 | Published: 29 Jan 2019

TechTarget ComputerWeekly.com

Computer Weekly – 30 January 2018: Davos debates global tech risks
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Jan 2018

TechTarget ComputerWeekly.com

12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Application Development and DevOps
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.
Posted: 08 Feb 2021 | Published: 04 Jul 2018

TechTarget ComputerWeekly.com

Legacy Software Modernization in the Manufacturing Industry
sponsored by Accesa
WHITE PAPER: The main aim of any software modernization project is to help companies create new business value. However, the best investment can be working with what you already have. This guide makes the case for legacy software modernization. Get the details here.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

All resources sponsored by Accesa

Application delivery controllers evolve to meet new demands
sponsored by Citrix
EGUIDE: Explore how ADCs have evolved since they first came about, and the new capabilities they have in this expert guide.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

Citrix

Tips for Effective Mobile App Testing
sponsored by Eggplant
EGUIDE: To avoid costly mistakes down the road, it's important to conduct usability testing to better understand users' reactions to an app before rolling it out. Download this e-guide to discover the right testing criteria to help build and deliver high-quality mobile apps.
Posted: 31 May 2018 | Published: 29 May 2018

Eggplant

Deploying cloud and containers and the tools you'll need
sponsored by Diamanti
EGUIDE: While Docker is currently the most common container tool, the rest of the story is more complex. Read this eGuide to find out which orchestration tools are the most popular in the market – including a look at both Docker and Kubernetes – and how they can ease your cloud container transition.
Posted: 04 Jun 2018 | Published: 04 Jun 2018

Diamanti