IT Management  >   Systems Design and Development  >  

Development

RSS Feed    Add to Google    Add to My Yahoo!
DevelopmentReports
 
Evaluating SAP Workflow Add-On Applications
sponsored by Onapsis
EGUIDE: The following expert e-guide reveals the key drivers behind the adoption of SAP workflow add-ons, and reviews key technical and business considerations to keep in mind when evaluating third-part applications.
Posted: 31 Oct 2014 | Published: 31 Oct 2014


Private PaaS — Setting the Standard for Integrated Development and Deployment
sponsored by Red Hat
WHITE PAPER: View this IDC report now to see essential considerations for a private PaaS system, and what most companies expect when migrating to this new infrastructure. Read on to find out about key topics for deciding whether this infrastructure is right for your company.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Red Hat

Why You Should Choose a Software-based Load Balancer
sponsored by Nginx, Inc.
WEBCAST: This on-demand webcast considers one vendor that provides a powerful yet flexible solution for load balancing and application performance. View now to discover the agile advantages teams can expect with a scalable solution like this, and if this type of platform can streamline not only your development process, but your end-user experience as well.
Posted: 24 Oct 2014 | Premiered: Oct 24, 2014

Nginx, Inc.

News Corp Australia: How APIs Deliver Exceptional User Experience
sponsored by Intel® Services
WEBCAST: View this webcast to learn how News Corp Australia, a leading news organization in Australia, relies on APIs as the single thread for unification to deliver optimal user experience. News Corp Australia's lead API program manager will share high volume results and explain how APIs can benefit your business alike.
Posted: 25 Sep 2014 | Premiered: Jul 15, 2014

Intel® Services

Five Steps for a Winning Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: The landscape of devices, operating systems, and touch points continuously grows in complexity – resulting in a security nightmare for application developers. View this informative white paper now to find out the 5 steps for a winning application security program.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Veracode, Inc.

Case Study: Chinese Commercial Cloud Center Cuts E-Commerce Deployment Time to a Week
sponsored by IBM
CASE STUDY: In this brief white paper, learn about the tool that Wuxi Lake Cloud, China's first commercial cloud center that provides services to the country's e-commerce market, harnessed to achieve a pre-configured, pre-installed and pre-optimized pattern deployment method which adapts to each users' unique system architecture.
Posted: 24 Oct 2014 | Published: 28 Feb 2014

IBM

Cloud Integration Tools Relieve the Latest Deployment Challenges
sponsored by IBM
EGUIDE: In this expert e-guide, Tom Nolle, President of CIMI Corporation, sheds light on how cloud integration tools relieve the latest deployment challenges.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

IBM

Computer Weekly – 30 September 2014: Hacking IT from the inside
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.
Posted: 29 Sep 2014 | Published: 30 Sep 2014

ComputerWeekly.com

Which Processes You Should Include In Software Testing
sponsored by Cloud Technology Partners
EBOOK: Finding and fixing bugs early in the software testing process is the most efficient and cost-effective way to alleviate defects in products. This expert guide dives into the world of tracking defects, and considers the argument for how it can improve the software development process.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Cloud Technology Partners

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement