Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

CAPI

RSS Feed    Add to Google    Add to My Yahoo!
CAPI Reports
 
CW@50: What was making the news in April?
sponsored by ComputerWeekly.com
EBOOK: The National Museum of Computing has uncovered several gems in the Computer Weekly archives, based on what was happening in the month of April over the last few decades.
Posted: 19 Apr 2016 | Published: 19 Apr 2016

ComputerWeekly.com

20 Ways to Better Deliver, Manage, & Secure APIs
sponsored by Axway
WHITE PAPER: In today's increasingly mobile world, organizations need to use APIs to provide customers and employees consistent access to business services and data anytime, anywhere, from any device. Discover 20 ways a unified API platform can allow you to accelerate API delivery.
Posted: 08 Apr 2016 | Published: 08 Apr 2016

Axway

Market Guide for Network Packet Brokers
sponsored by Big Switch Networks
RESOURCE: The network packet brokers market has grown and diversified as architectures based on software-defined networking provide insertion opportunities to new entrants. Access this Garnter report to learn what they found in their research and how your business should invest.
Posted: 04 Apr 2016 | Published: 19 Jan 2016

Big Switch Networks

Quickly Rewriting Software History
sponsored by GizmoxTS
WHITE PAPER: This informational resource explores a machine-guided, but human controlled approach to modernizing your app portfolio. Uncover 3 use cases demonstrating how you can use this strategy to refresh your outdated apps with speed, accuracy, and ease.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

GizmoxTS

Agile Manifesto: Both Timeless and Outdated?
sponsored by Magenic
EGUIDE: The Agile Manifesto was published in 2001. Has it stood the test of time, or does it no longer matter? In this expert e-guide, we reveal key insights from Derwyn Harris, co-founder of Jama Software, about which Agile principles are now obsolete and which ones are more relevant than ever before.
Posted: 04 May 2016 | Published: 29 Apr 2016

Magenic

Succeeding with Static Code Analysis: An Implementation Guide
sponsored by Programming Research
WHITE PAPER: Static code analysis can help you rapidly ensure the safety and security of embedded software, but it isn't a one-size-fits-all solution. Discover the biggest challenges that can prevent static code analysis from effectively detecting issues early on.
Posted: 19 May 2016 | Published: 19 May 2016

Programming Research

Computer Weekly – 3 May 2016: How high-speed rail is accelerating innovation
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how HS2, the UK's planned high-speed railway, is developing its IT from scratch and having to predict the future. We hear from DevOps experts who try to bust some of the myths around continuous software delivery. And our latest buyer's guide analyses graph databases. Read the issue now.
Posted: 29 Apr 2016 | Published: 03 May 2016

ComputerWeekly.com

9 Best Practices to Build a Digital Business Architecture
sponsored by Axway
WHITE PAPER: APIs can help you leverage third-party development talent and encourage collaboration, but there are several security and performance issues you have to address in order to ensure responsible, effective use of APIs. Discover 9 best practices to optimize your digital business architecture with APIs.
Posted: 12 Apr 2016 | Published: 31 Dec 2015

Axway

Hardware's Key Role in a Software-Defined Era
sponsored by SearchNetworking.com
EBOOK: In this software age, is there any role left for hardware? In our three-part guide, our experts' response is a resounding, "yes." Read now to learn why hardware is still an essential networking choice in terms of scale, reliability, and performance.
Posted: 16 May 2016 | Published: 16 May 2016

TOPICS:  Hardware | Software
SearchNetworking.com

Object Storage: S3 API and Security
sponsored by Cloudian
JOURNAL ARTICLE: This brief article dives into the security features of AWS's online object storage web service, focusing on controlling access to data. Read on and discover how the security features can support your complex application integrations and enable you to deliver value-add functionality that isn't directly included in AWS.
Posted: 08 Apr 2016 | Published: 07 Mar 2016

Cloudian
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement