You've requested...

BlackBerry® Push Service SDK documentation

If a new window did not open, click here to view this asset.

Download this next:

A guide to developing modern mobile applications

A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.

- How Bet365 addressed Apple’s iOS App Store policy changes
- GitHub Mobile brings new push notifications to developers
- Lyft helps drive new foundation for mobile developers
- IoT and mobile app development transform the future of UX
- How software developers can create mobile apps securely and quickly
- CIO interview: Michael Cole, CTO, European Tour and Ryder Cup

These are also closely related to: "BlackBerry® Push Service SDK documentation"

  • Are you prepared for the 5 low-code pitfalls?

    Everyone seems to be adopting low code, but is it as easy as the name suggests?

    The dramatic shift is pushing companies to join the low-code movement, but critics and skeptics point to 5 potential pitfalls that might discourage newcomers.

    Discover in this e-book whether your development team might be susceptible to the most common low-code development pitfalls, and how your organization can seize on overlooked low-code opportunities.

  • Focus: Agile DevOps

    Businesses in every industry are finding themselves under pressure to out-innovate their competitors, and push out new products and services to customers at an ever-increasing rate.

    Where the IT department is concerned, being able to deliver on both these trends may require a fundamental overhaul of how it operates, through the breaking down of organisational silos into multiple, collaborative, cross-functional DevOps teams.

    With each of these teams often responsible for overseeing the continued development of a particular part of an application, service or website, adopting a DevOps approach to software delivery can rapidly speed up the time it takes to rollout new features and functions.

    In this guide, we take a closer look at how some household names have benefited from DevOps, while sharing some best practice around tackling both the technical and cultural aspects of adopting it successfully. 

Find more content like what you just read:

  • Human-like AI quest drives general AI development efforts

    While AI technologies can do things humans can't, they're currently limited to specific and straightforward tasks. A big goal for developers is to create human-like AI tools that think the way people do. This guide compiles stories on the push toward human-like AI and the challenges that AI vendors and users must overcome.

    Download

  • Containers in the enterprise: Use cases and latest developments

    In this e-guide we delve into the world of containers. We discover why many enterprises appear to be intent on using the technology to support the remodelling of their legacy applications in microservices. Also, we take a look at why interest in containers has risen thanks to enterprises moving from hybrid and multi-cloud environments.

    Download

  • Computer Weekly – 19 July 2016: Building big ideas in banking

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

    Download

  • Edge computing: 4 key factors

    No matter where you are in your edge journey—at the beginning, in the middle or nearing the end—receiving the right guidance can provide the push that you need. Access such guidance in this article, which maps out 4 key factors about edge computing that you should bear in mind.

    Download

  • SOA Dos and Don’ts: Application Integration Tips For The CIO

    Gartner reports that markets aligned to data integration and data quality tools are on an upward swing, set to push IT spending to $38 trillion by 2014. In this E-Guide, learn tips for application integration strategies.

    Download

  • A Computer Weekly buyer’s guide to green tech for business

    Business has a vital role to play in the wider push for sustainability. In this 14-page buyer's guide, Computer Weekly looks at what the private sector can do, how firms can remain competitive while sticking to green targets and digital tech's role in decision-making.

    Download

  • Application Security Handbook: Application Security: Managing Software Threats

    Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'.

    Download

  • Taking the first step in the “retailization of healthcare”

    The “retailization” of healthcare is in full effect as more and more healthcare leaders are pushing to offer more localized services in distributed care settings. Learn how to take your first step towards retailization with a more efficient scheduling solution in this blog.

    Download

  • CW APAC – Tech Career Guide: Artificial intelligence

    Artificial intelligence roles abound in the era of digitisation. In this handbook, focused on AI in the Asia-Pacific region, Computer Weekly looks at AI ethics, how to make it as a machine learning engineer, Accenture's push for tech talent and cyber security research lab advice.

    Download

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

    Download

  • Computer Weekly – 7 February 2017: Computer power pushes the boundaries

    In this week's Computer Weekly, we examine the ways chip engineers are looking beyond silicon to keep pushing the limits of Moore's Law. We find out about serverless computing and how it could deliver what many firms want from the cloud. And we look at the importance of culture change to digital transformation. Read the issue now.

    Download

  • Dutch organisations demand more from government

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

    Download

  • CW ANZ: Trend Watch – Security

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

    Download

  • Choosing and Managing Mobile Devices - Chapter 1: Addressing Challenges in Mobile Device Management

    This expert ebook examines some critical data security and employee-related challenges you will inevitably face when attempting to manage mobile devices. Read on and learn how to overcome these challenges and streamline your mobile device management.

    Download

  • Enhance MFA user experience: IT leader’s guide

    As IT leaders and teams continue to push for multifactor authentication (MFA) to be integrated into their organization’s daily processes, many employees are feeling the fatigue from each of the authentication steps. So, is there an easier, more effective way to use MFA? Dig into this article to learn more.

    Download

  • Computer Weekly - 5 May 2020: The role of AI in the war against pandemics

    In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.

    Download

  • 6 tenets telcos must consider to pursue a techco transformation

    To thrive amid disruption from internet giants, telcos must evolve. Read the full report for specific strategies across network and non-network domains that incumbents can implement on their journey to become next-gen techcos.

    Download

  • Data-first guide: Ensure a better modernization journey

    As data continues to become more and more integral to organizations’ daily processes, many leaders have started to push data-first approaches in order to meet new expectations. But what exactly does it mean to be data-first? Browse this guide to learn more.

    Download

  • 5 drivers of value-based care success

    In recent years there has been a push for digital transformation in the value-based care terrain in healthcare, but there needs to be a clear strategy and assessment process entities to determine if digital transformation is appropriate. Read this eBook to ensure that you undertake an intelligent and methodical digital transformation.

    Download

  • Growing as a Challenger Brand in a Hot Security Market

    Tune in to this TechTarget webinar to learn how to tap into the cybersecurity needs and interests of a market currently overwhelmed with options, and how to grow and thrive as a challenger in a hot security market.

    Download

  • Computer Weekly datacentre case studies

    Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.

    Download

  • 7 core skills for today’s modern CFO

    With uncertainty abound, now is the perfect time for CFOs to step up to the plate and excel. Download this white paper to access 7 core skills for today’s modern CFO and learn how to push your business beyond the expected.

    Download

  • The essential infrastructure upgrades you need before deploying AI

    In this white paper, discover why not being prepared for AI’s impact on infrastructure may put your AI initiatives at risk… and what you can do to prepare your business before AI deployment.

    Download

  • Why should you migrate your contact center to the cloud?

    The recent push for cloud migration has a lot of customer service leaders questioning what it means for their contact centers and other legacy systems. However, if you’re not keeping up with these migration trends, you’re falling behind. Browse this guide to learn more.

    Download

  • Why not all GenAI efforts are created equal

    Discover in this infographic how today’s organizations are making their largest AI initiatives a reality, and find out how your business can push ahead of the pack by avoiding the most common GenAI pitfalls.

    Download

  • Why you need convergence

    You need convergence today more ever.  Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive.

    Download

  • Ubisoft Leverages Zero Trust

    Read this case study to explore how Ubisoft, a pioneer in online gaming, uses HashiCorp Vault to enhance security, availability and performance across their global gaming platform.

    Download

  • UC & UCaaS: Assess the market

    The world has changed a lot in the past year, and the way we work has changed with it. These changes have driven enterprises to adopt UC at a rapid rate, and cloud UC – or UCaaS – is seeing more leverage as well. Watch this webinar to explore the trends driving UCaaS, gain clarity on the market and take a look at the future of UC and UCaaS.

    Download

  • Case study: How to choose an observability platform

    ShipHero, a provider of a cloud-based warehouse operating system, identified a goal: to adopt a cost-efficient observability platform that could support DevOps and customer service alike. To find out how ShipHero accomplished that goal, review this case study.

    Download

  • Key findings on the state of IETF Transport Layer Security (TLS) 1.3

    Today, the push for the finalized IETF Transport Layer Security (TLS) 1.3 standard for network encryption continues to affect organization’s decisions. This white paper presents the key findings from a recent study conducted to investigate perceptions and beliefs of end users surrounding the adoption of the TLS 1.3 standard. Read on to learn more.

    Download

  • Drive frontline success with next-gen push-to-talk tech

    Today, frontline worker comms gaps can hinder business agility. Modern solutions like RingCentral's push-to-talk boost productivity. Read now to equip frontliners with appropriate tools.

    Download

  • How partners can develop sustainability strategies

    Canalys ebook guides partners in sustainability strategy development. Takeaways: partners back ESG, need targets. Customers want green solutions. Laws prompt investments. Track metrics, use ITADs, secure vendor badges. Prioritize renewable energy, experts, electric fleets. See full report for improved sustainability.

    Download

  • Highly available shared hosting architecture: What you need to know

    Discover in this white paper how highly available shared hosting can give you better margins, lower churn, and word of mouth growth so that you stay dangerous to your competitors.

    Download

  • NFV open source: How service providers are innovating their network

    Learn how to have a successful transition to NFV open source by gaining valuable insight on how open source for NFV applications will require service providers to adopt new ways of designing, deploying and supporting their network infrastructure.

    Download

  • How to Drive Value from a Managed Service Provider (MSP)

    Download this e-book for an essential overview of key considerations to take into account when thinking about working with an MSP, so you can drive your business into the future and start reaping the benefits.

    Download

  • Keeping your cybersecurity on pace with your innovation

    As more enterprises push towards continuous digital transformation, they are met with unprecedented cyber risks and often do not have enough specialized support on issues related to innovative technologies. Read this eBook to learn about Pervasive Security, a new paradigm that integrates well with modern digital services implementation initiatives.

    Download

  • Colocation vs Cloud: Weighing up the enterprise options

    In this e-guide, we'll share case studies from companies who have gone down the colocation route, and take a look at some of the latest developments to affect this part of the wider datacentre market.

    Download

  • Hospital-Based HHA and Remote Patient Monitoring: Improving Patient Care with Clear Arch Health

    To improve patient care, a Michigan-based home healthcare agency needed to find a way to increase their capacity, which was constantly pushing the limit. Discover how Clear Arch Health provided a remote patient monitoring solution that increased nurse case load and enhanced revenue stream.

    Download

  • Royal Holloway: Protecting investors from cyber threats

    The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.

    Download

  • Computer Weekly Buyers' Guide: Cloud Computing

    This seven-page Buyer’s Guide to Cloud Computing by Computer Weekly journalists details the kinds of cloud offering that CIOs and senior IT professionals will need to take into account as they plan future outsourcing, hosting and application strategies.

    Download

  • What is MDR & why is it crucial for your security strategy?

    Managed security services evaluate security through a strategic, business, and industry lens, providing insights and context to help businesses proactively prepare to take down cyberattacks. An effective managed detection and response (MDR) partner can help you address several critical security challenges. Read on to learn how.

    Download

  • Hybrid IT: ASEAN firms shift to agile infrastructure

    In this e-guide, read about hybrid IT's growing mindshare in ASEAN, Red Hat's hybrid cloud container push and what you need to consider when buying hyper-converged infrastructure systems.

    Download

  • The 3 Ps of ABM: Prioritize, Preserve, Personalize

    In this e-book, “Focusing on the 3 Ps for ABM Revenue at Scale,” we discuss how you can implement ABM 2.0 to better inform your marketing efforts and meet your sales team’s needs.

    Download

  • A Computer Weekly buyer's guide to continuous integration and continuous deployment

    Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.

    Download

  • Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange

    This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.

    Download

  • Developing an Integrated Customer and Employee Experience

    Employees often use software that's much older and hard to use than the applications that customers use. Increasingly that gap detracts from both experiences. Learn how to fix it with our new guide to integrating both types of applications. Get it free in exchange for taking our brief survey on your employee experience platfrom purchase plans.

    Download

  • CW Middle East Oct to Dec 2017

    This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.

    Download