You've requested...

BlackBerry® Push Service SDK documentation

If a new window did not open, click here to view this asset.

Download this next:

Overcome developer shortages with this DevOps suite

With the serious shortage of skilled, security-cleared developers, achieving the high-level DevOps and other CI/CD practices your company desires remains out of reach. Even if you had an infinite budget, there aren’t enough qualified engineers to get the work done.

Additionally, traditional embedded development methods won’t allow the sort of gains that you’d see by adopting more efficient methodologies. To respond to these challenges, organizations are developing strong portfolios of tools that enable the implementation of new DevOps processes.

Download this whitepaper to learn how to get started with your own portfolio and overcome engineer shortages and modernize your organization’s DevOps.

These are also closely related to: "BlackBerry® Push Service SDK documentation"

  • A guide to developing modern mobile applications

    A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.

    - How Bet365 addressed Apple’s iOS App Store policy changes
    - GitHub Mobile brings new push notifications to developers
    - Lyft helps drive new foundation for mobile developers
    - IoT and mobile app development transform the future of UX
    - How software developers can create mobile apps securely and quickly
    - CIO interview: Michael Cole, CTO, European Tour and Ryder Cup

  • Focus: Agile DevOps

    Businesses in every industry are finding themselves under pressure to out-innovate their competitors, and push out new products and services to customers at an ever-increasing rate.

    Where the IT department is concerned, being able to deliver on both these trends may require a fundamental overhaul of how it operates, through the breaking down of organisational silos into multiple, collaborative, cross-functional DevOps teams.

    With each of these teams often responsible for overseeing the continued development of a particular part of an application, service or website, adopting a DevOps approach to software delivery can rapidly speed up the time it takes to rollout new features and functions.

    In this guide, we take a closer look at how some household names have benefited from DevOps, while sharing some best practice around tackling both the technical and cultural aspects of adopting it successfully. 

Find more content like what you just read:

  • Human-like AI quest drives general AI development efforts

    While AI technologies can do things humans can't, they're currently limited to specific and straightforward tasks. A big goal for developers is to create human-like AI tools that think the way people do. This guide compiles stories on the push toward human-like AI and the challenges that AI vendors and users must overcome.

    Download

  • Containers in the enterprise: Use cases and latest developments

    In this e-guide we delve into the world of containers. We discover why many enterprises appear to be intent on using the technology to support the remodelling of their legacy applications in microservices. Also, we take a look at why interest in containers has risen thanks to enterprises moving from hybrid and multi-cloud environments.

    Download

  • Computer Weekly – 19 July 2016: Building big ideas in banking

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

    Download

  • Edge computing: 4 key factors

    No matter where you are in your edge journey—at the beginning, in the middle or nearing the end—receiving the right guidance can provide the push that you need. Access such guidance in this article, which maps out 4 key factors about edge computing that you should bear in mind.

    Download

  • SOA Dos and Don’ts: Application Integration Tips For The CIO

    Gartner reports that markets aligned to data integration and data quality tools are on an upward swing, set to push IT spending to $38 trillion by 2014. In this E-Guide, learn tips for application integration strategies.

    Download

  • A Computer Weekly buyer’s guide to green tech for business

    Business has a vital role to play in the wider push for sustainability. In this 14-page buyer's guide, Computer Weekly looks at what the private sector can do, how firms can remain competitive while sticking to green targets and digital tech's role in decision-making.

    Download

  • Application Security Handbook: Application Security: Managing Software Threats

    Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'.

    Download

  • CW APAC – Tech Career Guide: Artificial intelligence

    Artificial intelligence roles abound in the era of digitisation. In this handbook, focused on AI in the Asia-Pacific region, Computer Weekly looks at AI ethics, how to make it as a machine learning engineer, Accenture's push for tech talent and cyber security research lab advice.

    Download

  • 8 key features of a PTT tool

    Two-way radios, smartphones, tablets: They’re all push-to-talk (PTT) tools that dispersed employees use to communicate. These devices can serve as a valuable starting point for increasing employee productivity and security. Check out this white paper to discover how you can level up your organization’s PTT strategy.

    Download

  • Dutch organisations demand more from government

    In this e-guide read about the findings of an investigation into the IT used by the Dutch government. It doesn't make good reading for the government, but sends a strong message that serious work needs to be done. Also read how a cyber-security organisation is calling Dutch government to push towards the creation of electronic IDs for citizens.

    Download

  • Computer Weekly – 7 February 2017: Computer power pushes the boundaries

    In this week's Computer Weekly, we examine the ways chip engineers are looking beyond silicon to keep pushing the limits of Moore's Law. We find out about serverless computing and how it could deliver what many firms want from the cloud. And we look at the importance of culture change to digital transformation. Read the issue now.

    Download

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

    Download

  • Public cloud storage for mainframe: Research report

    Understanding the motivating factors for use of cloud storage in mainframe environments offers some insights into the dynamics of IT operations. Tap into this research content to learn about the driving forces that are pushing companies to lean on cloud storage as mainframe environments continue to accumulate more data.

    Download

  • CW ANZ: Trend Watch – Security

    With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.

    Download

  • Choosing and Managing Mobile Devices - Chapter 1: Addressing Challenges in Mobile Device Management

    This expert ebook examines some critical data security and employee-related challenges you will inevitably face when attempting to manage mobile devices. Read on and learn how to overcome these challenges and streamline your mobile device management.

    Download

  • Enhance MFA user experience: IT leader’s guide

    As IT leaders and teams continue to push for multifactor authentication (MFA) to be integrated into their organization’s daily processes, many employees are feeling the fatigue from each of the authentication steps. So, is there an easier, more effective way to use MFA? Dig into this article to learn more.

    Download

  • Computer Weekly - 5 May 2020: The role of AI in the war against pandemics

    In this week's Computer Weekly, we look at how AI and data science are supporting the global push to deal with the coronavirus pandemic. We reveal, and talk to, the man behind the world's first computer virus pandemic, the Love Bug. And we examine how the IT services market will change as a result of the current crisis. Read the issue now.

    Download

  • Computer Weekly datacentre case studies

    Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.

    Download

  • Growing as a Challenger Brand in a Hot Security Market

    Tune in to this TechTarget webinar to learn how to tap into the cybersecurity needs and interests of a market currently overwhelmed with options, and how to grow and thrive as a challenger in a hot security market.

    Download

  • 7 core skills for today’s modern CFO

    With uncertainty abound, now is the perfect time for CFOs to step up to the plate and excel. Download this white paper to access 7 core skills for today’s modern CFO and learn how to push your business beyond the expected.

    Download

  • Why should you migrate your contact center to the cloud?

    The recent push for cloud migration has a lot of customer service leaders questioning what it means for their contact centers and other legacy systems. However, if you’re not keeping up with these migration trends, you’re falling behind. Browse this guide to learn more.

    Download

  • Why you need convergence

    You need convergence today more ever.  Advances in software virtualisation and the migration of intelligence to the cloud are driving the convergence of networking, security and storage functionality at the network edge, a crucial element in making sure that workforces dispersed by the coronavirus crisis stayed effective and productive.

    Download

  • UC & UCaaS: Assess the market

    The world has changed a lot in the past year, and the way we work has changed with it. These changes have driven enterprises to adopt UC at a rapid rate, and cloud UC – or UCaaS – is seeing more leverage as well. Watch this webinar to explore the trends driving UCaaS, gain clarity on the market and take a look at the future of UC and UCaaS.

    Download

  • Highly available shared hosting architecture: What you need to know

    Discover in this white paper how highly available shared hosting can give you better margins, lower churn, and word of mouth growth so that you stay dangerous to your competitors.

    Download

  • How to Drive Value from a Managed Service Provider (MSP)

    Download this e-book for an essential overview of key considerations to take into account when thinking about working with an MSP, so you can drive your business into the future and start reaping the benefits.

    Download

  • IT Leader’s Guide to Data Quality Metrics

    Monte Carlo recently spoke with hundreds of data leaders to determine the data quality metrics used by the top teams. Using that information, they built a cheat sheet designed to help data leaders establish the high reliability levels required to push the envelope on the most advanced, impactful data projects. Read on to learn more.

    Download

  • NFV open source: How service providers are innovating their network

    Learn how to have a successful transition to NFV open source by gaining valuable insight on how open source for NFV applications will require service providers to adopt new ways of designing, deploying and supporting their network infrastructure.

    Download

  • Colocation vs Cloud: Weighing up the enterprise options

    In this e-guide, we'll share case studies from companies who have gone down the colocation route, and take a look at some of the latest developments to affect this part of the wider datacentre market.

    Download

  • Keeping your cybersecurity on pace with your innovation

    As more enterprises push towards continuous digital transformation, they are met with unprecedented cyber risks and often do not have enough specialized support on issues related to innovative technologies. Read this eBook to learn about Pervasive Security, a new paradigm that integrates well with modern digital services implementation initiatives.

    Download

  • A Guide to IT Monitoring and Management

    Neglecting critical IT tasks often opens the door to system failures and downtime that disrupts business goals. These challenges have pushed businesses to look to MSPs that offer IT monitoring and management services. Open this white paper to take a closer look at IT monitoring and management, including challenges, benefits and more.

    Download

  • Hospital-Based HHA and Remote Patient Monitoring: Improving Patient Care with Clear Arch Health

    To improve patient care, a Michigan-based home healthcare agency needed to find a way to increase their capacity, which was constantly pushing the limit. Discover how Clear Arch Health provided a remote patient monitoring solution that increased nurse case load and enhanced revenue stream.

    Download

  • Royal Holloway: Protecting investors from cyber threats

    The cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.

    Download

  • Computer Weekly Buyers' Guide: Cloud Computing

    This seven-page Buyer’s Guide to Cloud Computing by Computer Weekly journalists details the kinds of cloud offering that CIOs and senior IT professionals will need to take into account as they plan future outsourcing, hosting and application strategies.

    Download

  • Mainframe Topology: A live demo

    With Broadcom, you can view your entire mainframe hierarchy with just the push of a button. Watch this video for an introductory and instructional look at Broadcom's Mainframe Topology capabilities.

    Download

  • Hybrid IT: ASEAN firms shift to agile infrastructure

    In this e-guide, read about hybrid IT's growing mindshare in ASEAN, Red Hat's hybrid cloud container push and what you need to consider when buying hyper-converged infrastructure systems.

    Download

  • The 3 Ps of ABM: Prioritize, Preserve, Personalize

    In this e-book, “Focusing on the 3 Ps for ABM Revenue at Scale,” we discuss how you can implement ABM 2.0 to better inform your marketing efforts and meet your sales team’s needs.

    Download

  • Cloud data platform: Democratize analytics for your business

    After seeking out a system to centralize and analyze data, a leading insurance agency discovered a connected, multi-cloud data platform for enterprise analytics. Access this case study to learn how they were able to integrate data scattered across the company and push their digital transformation efforts forward.

    Download

  • A Computer Weekly buyer's guide to continuous integration and continuous deployment

    Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.

    Download

  • Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange

    This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.

    Download

  • Developing an Integrated Customer and Employee Experience

    Employees often use software that's much older and hard to use than the applications that customers use. Increasingly that gap detracts from both experiences. Learn how to fix it with our new guide to integrating both types of applications. Get it free in exchange for taking our brief survey on your employee experience platfrom purchase plans.

    Download

  • CW Middle East Oct to Dec 2017

    This year the Gitex event in Dubai had a focus on how technology is disrupting organisations across the Middle East. One of the main themes of discussion was smart cities and with Dubai recognised as a world leader, this was no surprise.

    Download

  • CW ANZ – February 2019: Home in on storage minutiae

    In this edition of CW ANZ, we look at how organisations are using storage analytics to manage their storage footprint and what suppliers are doing to help enterprises get the most of out of the technology.

    Download

  • Top 10 ASEAN stories of 2018

    In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money's adoption of OpenShift, Go-Jek's experience with the cloud and Singapore's approach to the internet-of-things, among other developments.

    Download

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.

    Download

  • Managed Services Versus Staffing Decision Guide

    What’s the optimal IT staffing model for your healthcare organization? Download this e-book for side-by-side comparisons of IT managed services, contingent staffing and a hybrid approach of using both. Get the pros and cons of each staffing model and a checklist of questions to help you determine a strategy that works best for your organization.

    Download

  • Radically Collaborative Patterns for Software Makers: A Mini-Encyclopedia

    In this 83-pg encyclopedia, find an in-depth look into various ‘patterns’, or software strategies. The encyclopedia provides an overview of the most successful and radical patterns in the market right now, including high-level patterns that involve the entire organization, team-wide patterns, and patterns for specialized roles.

    Download

  • Mobile Device Management Technical Guide

    In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.

    Download

  • AI tools for software developers: Part One

    The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?

    Download