Subscribe: Most Popular White Papers and WebcastsSoftware and Web Development Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
application  apps  business  cloud  code  development  guide  learn  published computerweekly  published  red hat  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsSoftware and Web Development Research

Most Popular White Papers and Webcasts Software and Web Development Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Fri, 16 Mar 2018 14:50:22 EDT

Last Build Date: Fri, 16 Mar 2018 14:50:22 EDT


Cloud migration: Choosing the right strategy and tools

Mon, 12 Mar 2018 24:00:00 EDT

In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late. Published by:

Cloud: The keystone of digital transformation

Mon, 12 Mar 2018 24:00:00 EDT

In this e-guide, find out how applications built on serverless computing and microservices can change the way you use cloud, what it takes to manage a multi-cloud environment, and tips and tricks to advance cloud app development. Published by:

Automate Business Processes and Integrate your SharePoint Environment

Wed, 21 Feb 2018 24:00:00 EST

Learn about a business process automation platform that provides no-code, drag-and-drop tools for designing workflows and integrating systems like SharePoint and Office 365. Published by: K2

Automate and Transform your Business Processes

Wed, 21 Feb 2018 24:00:00 EST

Find out how to take a low-code approach to building and scaling automated business process apps, forms, and workflows across your enterprise quickly and cost-effectively. Published by: K2

With BizDevOps, building apps without code becomes possible

Fri, 23 Feb 2018 24:00:00 EST

For success in BizDevOps, the low-code/no-code development strategy puts citizen developers in charge of creating business apps without code. Published by:

Expanding the Threat Intelligence Horizon

Wed, 21 Feb 2018 24:00:00 EST

How is your organization defending and responding to threats? Explore this webcast with Phantom and McAfee to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies. Published by: Phantom Cyber

Powering EnterpriseDB Postgres with the Right Infrastructure

Wed, 02 Aug 2017 24:00:00 EDT

Learn about mature open source-based DBMS like EnterpriseDB Postgres and explore key considerations for ensuring high performance like integration, migration, management, infrastructure, and more. Published by: IBM

Computer Weekly – 20 February 2018: The enterprise opportunities for smart speakers

Fri, 16 Feb 2018 24:00:00 EST

In this week's Computer Weekly as voice-activated smart speakers grow in popularity, we examine how IT teams can use the technology in enterprise applications. Our latest buyer's guide looks at the latest developments in CRM. And UK tech sector leaders tell Parliament why they are so worried about Brexit. Read the issue now. Published by:

Forcepoint CASB: Visibility and Control of Cloud Applications

Mon, 12 Feb 2018 24:33:19 EST

Watch this webcast to learn about 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they can provide. Published by: Forcepoint

Build Your Automated Testing Strategy for Continuous Delivery

Fri, 09 Feb 2018 24:00:00 EST

In this expert e-guide, we explore how to build the automated and cloud-based software testing strategy that fits your organization's specific development needs. Published by: Plutora

Contextual Access to Apps and Data Anywhere Anytime

Mon, 12 Feb 2018 24:00:00 EST

Tune into this video to learn about the power of contextual access, which allows IT to set policies for who can access data based on location, device and network. You'll learn how to ensure all endpoints—whether dedicated desktop or mobile device—are properly protected. Published by: Citrix

IoT: Take Control of the Edge

Mon, 05 Feb 2018 24:00:00 EST

With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud. Published by: VMware Pulse

Continuous delivery pipelines - metrics, myths, and milestones

Mon, 05 Feb 2018 24:00:00 EST

To make a successful DevOps change, you'll need to make sure all of your code has automated testing, that those tests are passing on an ongoing basis, use infrastructure as code and release code on continually. Watch this webcast to learn the steps to accomplish all of that and more in your organization. Published by: Plutora

Unifying Endpoint Management with Windows 10

Mon, 05 Feb 2018 24:00:00 EST

A key pain point for enterprises using Windows 10 is that you need insight into which devices require updates and which already have them. Read this guide to learn about this new unified endpoint management system to empower your employees while simplifying IT's job. Published by: VMware

A new release management strategy depends on speed and efficiency

Mon, 05 Feb 2018 24:00:00 EST

In a DevOps methodology, an organization needs a software deployment process that enables continuous application development and integration. Published by: SearchITOperations

Lower Total Cost of Ownership with Red Hat Enterprise Linux

Thu, 31 Mar 2016 24:00:00 EDT

This paper provides an analysis of five organizations that migrated enterprise applications from proprietary legacy systems to Red Hat enterprise Linux solutions. While the main focus is on lowering cost, this study also looks at non-financial, strategic decision-making information. Published by: Red Hat

IT Modernization: Achieving a Balance Between 2nd and 3rd Platform Investments

Fri, 30 Dec 2016 24:00:00 EST

How do you welcome change without disrupting your business? This white paper explains how to achieve a balance between 2nd and 3rd platform infrastructure investments. Read on to also see why open source software is a key enabler of change. Published by: Red Hat

CW ASEAN - January 2018: AI puzzle coming together

Mon, 29 Jan 2018 24:00:00 EST

Forward-looking organizations in ASEAN are embracing artificial intelligence, but mixed access to connectivity and a lack of skills and understanding are holding back wider adoption. In this month's CW ASEAN, we take a look at how ASEAN is embracing AI and what is being done to shore up AI capabilities and adoption across the region. Published by:

Computer Weekly – 30 January 2018: Davos debates global tech risks

Thu, 25 Jan 2018 24:00:00 EST

In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now. Published by:

Modernizing Legacy Applications Saves Bottom Lines

Fri, 19 Jan 2018 24:00:00 EST

Since their legacy Lotus Notes environment was going to shutdown, which included over 200 custom apps, one company took a group of workers that had been developing ITIL and service management modules for years and transitioned them into a team that builds custom apps. Find out the benefits they realized from this process. Published by: ServiceNow

YoYo Wallet Case Study: Enhanced Mobile App Testing and QA

Mon, 22 Jan 2018 24:00:00 EST

Find out how Yoyo Wallet improved their software testing abilities to identify and resolve bugs in their mobile payment apps faster and more efficiently without having to build a large internal QA department. Published by: Applause

Automating the Business of Science with Applications

Fri, 19 Jan 2018 24:00:00 EST

A national science and engineering research lab provides support and services to over 12,000 users with diverse regional, functional, and divisional requirements. This called for a renovation in how they handled their IT service management. Find out how the lab benefitted from this service overhaul. Published by: ServiceNow

Applying Secure Design Patterns to Microservices Development

Tue, 16 Jan 2018 24:00:00 EST

From a developer's perspective, find out what you can do to improve app security for microservices-based development so that you can find and resolve issues even as you continuously release and iterate code. Published by: WhiteHat Security

POPSUGAR Gains Greater Control and Insight into App Testing and Feedback

Mon, 22 Jan 2018 24:00:00 EST

Watch this brief video case study to find out how POPSUGAR changed their testing strategy by partnering with Applause so that they could automate manual testing processes, gain greater visibility into QA feedback, iterate faster, and more. Published by: Applause

How to Build Tomorrow's Mobile App Experiences

Mon, 22 Jan 2018 24:00:00 EST

Find out how to update your software testing strategy so that you can build differentiated mobile apps with the user experience in mind. Published by: Applause

Why Websites Stay Vulnerable: And What You Can Do About It

Wed, 24 Jan 2018 24:00:00 EST

Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security. Published by: WhiteHat Security

Web Application Authorization and Authentication Explained

Wed, 24 Jan 2018 24:00:00 EST

According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program. Published by: WhiteHat Security

2017 Application Security Statistics Report

Tue, 16 Jan 2018 24:00:00 EST

According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report. Published by: WhiteHat Security

Getting the Most out of your AppSec Program

Tue, 23 Jan 2018 24:00:00 EST

According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program. Published by: WhiteHat Security

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code

Tue, 16 Jan 2018 24:00:00 EST

Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster. Published by: WhiteHat Security

DevSecOps Blueprint

Mon, 22 Jan 2018 24:00:00 EST

The average time to fix vulnerabilities in the DAST industry is 174 days. Take a look at this webcast to uncover successful DevSecOps implementations and data to guide the deployment of DevSecOps in your organization. Published by: WhiteHat Security

Container-based deployment revitalizes traditional enterprise apps

Fri, 19 Jan 2018 24:00:00 EST

Container-based deployment could be the only realistic path forward for some apps, succeeding where virtual machines have sometimes fallen short. Read this e-guide to learn how your peers are using Docker to accelerate the containerization of many existing enterprise applications, and the benefits they are realizing. Published by: Diamanti

DevOps, PaaS help define a divergent digital transformation roadmap

Tue, 16 Jan 2018 24:00:00 EST

Learn why an application modernization and digital transformation strategy can be a unique challenge to everyone, along with some common solutions. Published by: SearchMicroservices

The Role of DevOps in Value Transformation

Fri, 12 Jan 2018 24:00:00 EST

In this expert e-guide, George Spalding, the executive vice president at Pink Elephant, discusses DevOps and the role it plays in value transformation. Published by: Plutora

New generation Business Process Management meets Agile and AI

Tue, 09 Jan 2018 24:00:00 EST

In this e-guide we find out how in its IT-centric guise, Business Process Management has been developing since the mid-2000s, and, more recently still, influenced by agile software development techniques and the renaissance of artificial intelligence/ machine learning. Published by:

Enhance Your MS Flow Productivity with BPM

Tue, 02 Jan 2018 24:00:00 EST

Watch this video to learn how to create a connector from MS Flow to a business process management and automation platform so you can easily integrate complex systems, build workflows, create forms, and more. Published by: K2

Demo: Build Forms, Workflows, and Views without Writing Any Code

Tue, 02 Jan 2018 24:00:00 EST

Watch this demo on how to use K2's platform to build and modify forms, workflows, views, and smart user interfaces without writing any code, taking an insurance claim app that communicates customer input to the backend as an example. Published by: K2

Involve Your Customers in Self-Service CRM Applications

Tue, 02 Jan 2018 24:00:00 EST

In this webcast, find out how to create self-service CRM apps, facilitate data integration, customize customer portals, and more without having to write any code. Published by: K2

Cloud-Based Database Software Adds New IT Options for Users

Thu, 28 Dec 2017 24:00:00 EST

Use this expert handbook to judge for yourself how vendors such as Amazon, Microsoft and Oracle have evolved their cloud databases and database-as-a-service platforms to create more user-friendly interfaces and support large enterprises. Published by: SearchOracle

VDI Gets a Grip on Your Application Packaging and Delivery Strategy

Wed, 06 Dec 2017 24:00:00 EST

Virtual desktop infrastructure (VDI) pulls focus toward the infrastructure components needed to run a VDI environment, but the reality is that improved application delivery is a major VDI benefit. This e-guide reveals the four steps to app delivery success through VDI. Published by: Flexera Software

Strategy & technology trends for ANZ CIOs

Mon, 11 Dec 2017 24:00:00 EST

This e-guide highlights strategies to help make emerging technologies such as big data analytics, artificial intelligence and cloud computing work for your business. Plus, get a sneak preview of the tech trends that are likely to dominate 2018. Published by:

Fintech & the digital customer experience

Thu, 09 Nov 2017 24:00:00 EST

In this e-guide, find out how banks such as Malaysia's RHB are keeping up in the digital age, the state of mobile payments across the APAC region, and why some bankers believe retail banking will be fully automated in just a few years. Published by:

Machine Learning Tools: Amazon v. Azure v. Google v. IBM

Thu, 02 Nov 2017 24:00:00 EDT

With the platform war over machine learning tools heating up, we designed this new expert guide that compares 4 leading vendors. Simply take our survey to receive instant access to your PDF download. Published by: TechTarget

Software Development Patterns and Processes for Continuous Application Modernization

Sat, 31 Dec 2016 24:00:00 EST

This white paper illustrates three specific software development patterns with which you can modernize existing apps. Read on to use these techniques to help establish a practice for continuous modernization, to extend the life of existing apps, and to determine when it is necessary to rewrite from scratch. Published by: Red Hat

Continuous Integration and Delivery with Ansible

Fri, 27 Oct 2017 24:00:00 EDT

If your team is struggling to enable continuous integration and continuous deployment (CI/CD), it may be time to consider implementing an IT automation engine. Read on here to learn about an open source automation engine that could help you enable CI/CD with zero downtime. Published by: Red Hat

Infrastructure Control with Red Hat Ansible Tower

Fri, 27 Oct 2017 24:00:00 EDT

In this paper, discover a framework for controlling, securing, and managing your Ansible automation. Download now to see how this framework provides a single language for DevOps, continuous integration and continuous delivery (CI/CD), and more. Published by: Red Hat

How to Achieve a Successful Microservices Architecture

Sat, 31 Dec 2016 24:00:00 EST

Discover how to achieve success with microservices here. Read on to build your microservices foundation to improve upon service-oriented architecture, and thus benefit from easier development and maintenance, independent scalability of application components, and more. Published by: Red Hat

How SD-WAN Boosts Aggregate Bandwidth for UC Functions

Wed, 25 Oct 2017 24:00:00 EDT

In this e-guide, Terry Slattery explains how an SD-WAN uses smart controllers to collect a set of WAN links to promote reliable UCC functions. Published by: LiveAction

Low-Code Development: Massively Scale Mobile Apps

Tue, 24 Oct 2017 24:00:00 EDT

Learn about a low-code development platform, designed to scale vertically and horizontally with key mobile app performance needs. Discover just how far you can push the scalability of low-code app development by reading through a scenario in which Bank of America scaled to meet Black Friday-level demands for performance. Published by: OutSystems

How to escape StuckStack and profit from your OpenStack investment

Tue, 24 Oct 2017 24:00:00 EDT

When an OpenStack deployment falls behind the pace of upgrades, it becomes impossible to keep up with the latest versions. Download this eBook to discover a four-point plan to remobilising your infrastructure and regaining organisational agility. Published by: Canonical