Watson Can Power Your Application. What Will You Do With It?
By: IBM View more from IBM >>
Download this next:
Build an Android app using the MobileData cloud service
By: IBM
Type: Webcast
Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.
These are also closely related to: "Watson Can Power Your Application. What Will You Do With It?"
-
Radically Collaborative Patterns for Software Makers: A Mini-Encyclopedia
By: VMware Tanzu
Type: Resource
In this 83-page encyclopedia, find an in-depth look into various ‘patterns’, or software strategies, that are significantly impacting how organizations approach development.
The encyclopedia provides an overview of the most successful and radical patterns in the market right now, including:
- High-level patterns that involve the entire organization
- Team-wide patterns
- Patterns for specialized roles
Scroll through the table of contents to find a pattern that could work for your development team. Download the resource here.
-
Effective collaboration strategies for distributed development teams
By: TechTarget Content Management
Type: eGuide
Successful application lifecycle management (ALM) hinges on close collaboration between all team members – but geographic dispersion often bars the door to effective collaboration. With the right strategy, however, it doesn’t have to.
In this expert e-guide, uncover the tools and techniques that improve global collaboration in different parts of the application development lifecycle.
Find more content like what you just read:
-
ALM: Taking a middleware-focused approach
By: GigaSpaces Technologies Inc.
Type: eGuide
In this expert e-guide, Tom Nolle discusses how to take a middleware-focused approach to app lifecycle management practices. Uncover helpful advice for selecting middleware tools and managing OS and middleware platforms in the cloud. Plus, learn about the critical relationship between ALM, DevOps, and orchestration.
-
E-Guide: Avoiding Application Security Pitfalls
By: TechTarget Security
Type: eGuide
This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them.
-
IBM Worklight Developer Q&A
By: IBM
Type: Resource
Access this resource to see an open-forum developer question-and-answer for IBM's Worklight environment. See if another developer has encountered the same issue as you, and if someone has already provided an easy solution.
-
Building an Android App using MobileData Cloud
By: IBM
Type: Webcast
Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.
-
Upgrade or rework: Pathway to application modernisation
By: TechTarget ComputerWeekly.com
Type: eGuide
If there is one certainty in IT, it is that at some point, every shiny new application will become legacy. The tech sector is driven by a fast cadence of innovation, which means that last year's "must have" phenomenon quickly becomes stale and out-of-date. In this e-guide, we explore the different approaches to modernising outdated IT systems.
-
A guide to developing modern mobile applications
By: TechTarget ComputerWeekly.com
Type: eBook
A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.
-
5G vs. Wi-Fi 6: What's the difference?
By: TechTarget ComputerWeekly.com
Type: Infographic
Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
-
How To Scale Agile Software Development With Product Teams In The Enterprise
By: VMware Tanzu
Type: White Paper
For larger organizations, undertaking an agile transformation means managing dependencies, communications, and outcomes across globally distributed teams—and things can get complicated fast. Explore key strategies for the agile enterprise here.
-
Top 10 ASEAN stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money's adoption of OpenShift, Go-Jek's experience with the cloud and Singapore's approach to the internet-of-things, among other developments.
-
A Computer Weekly buyer's guide to secure and agile app development
By: TechTarget ComputerWeekly.com
Type: eGuide
As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding
-
Focus: Cloud application development
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we take a close look at some of the latest trends in cloud application development, with in-depth interviews with the likes of Cloud Foundry and Pivotal, and find out how one public sector organisation is tapping into all these ideas in their quest for efficiency.
-
Infographic: How blockchain works
By: TechTarget ComputerWeekly.com
Type: eGuide
To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
-
Application security testing: Protecting your application and data
By: TechTarget Security
Type: eBook
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
-
DevSecOps delivers better business
By: TechTarget ComputerWeekly.com
Type: eGuide
Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
-
-
API Management: The role of APis in digital business transformation
By: TechTarget ComputerWeekly.com
Type: eGuide
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
-
Application Performance Management: Improving service availability
By: TechTarget ComputerWeekly.com
Type: eGuide
If it can't be measured, it can't be managed. Telemetry on applications and IT infrastructure are key to keeping applications running optimally and reducing unplanned downtime. Beyond using telemetry data to respond to abnormal events, historical data analysis can reveal more systemic issues. In this e-guide we look at trends in APM.
-
A Computer Weekly buyer's guide to next-generation programming tools
By: TechTarget ComputerWeekly.com
Type: eGuide
All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
-
E-Guide: Improving software with the building security in maturity model
By: TechTarget Security
Type: eGuide
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
-
Infographic: Comparing cloud application models
By: TechTarget ComputerWeekly.com
Type: Infographic
The cloud is central to the deployment of most applications today. But, that doesn't mean all applications use the cloud in the same way. In fact, there are several types of cloud application models. In this infographic, we compare three of the most popular models: cloud-native, cloud-based and cloud-enabled.
-
A Computer Weekly buyer's guide to continuous integration and continuous deployment
By: TechTarget ComputerWeekly.com
Type: eGuide
Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.
-
DevOps: Latest developments & use cases in ASEAN
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the state of DevOps adoption across Southeast Asia, the importance of integrating security into DevOps processes and our top tips for securing management buy-in.
-
Mobile application platforms: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.
-
Perimeter Security Noise Leaves Applications Vulnerable to Attacks
By: Contrast Security
Type: White Paper
Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
-
How to Choose the Right PaaS Vendor to Incorporate with your Cloud Strategy
By: TechTarget Business Analytics
Type: eGuide
When you are ready to deploy a Platform as a Service (PaaS) project, don’t forget that it must be able to be incorporated into your cloud computing strategy. Read this e-guide to discover tips for seamlessly integrating your PaaS strategy with the cloud.
-
Building a SOA Center of Excellence for Application Integration
By: TechTarget Business Analytics
Type: eGuide
Access the following expert e-guide to uncover why you need to consider shifting your efforts to building a powerful application integration center. Discover the benefits to be gained with a successful SOA approach and how you can virtually eliminate missteps and slowed processes.
-
Best Practices for Implementing PaaS
By: TechTarget Business Analytics
Type: eGuide
Platform-as-a-Service (PaaS) has the potential to ease common application development challenges and streamline the app dev process -- but most companies are unsure of how to leverage it effectively. Access this e-guide to learn PaaS best practices and essential strategies to help you plan, evaluate, and implement a successful PaaS platform.
-
Getting a handle on AIOps and self-healing systems
By: TechTarget ComputerWeekly.com
Type: eGuide
Reducing effort, reacting faster, preventing problems and improving understanding of the IT environment are the key benefits of AIOps, identified by analyst Forrester. To achieve these goals AIOPs platforms are increasingly making use of predictive analytics and automation to offer IT operations a level of self-healing.
-
Securing Containers in a Kubernetes Environment: 4 Key Vulnerabilities and Best Practices
By: CyberArk
Type: eBook
53% of respondents to the annual Red Hat security survey had detected a misconfiguration in Kubernetes in the last twelve months, and 55% had delayed or slowed down app deployments due to a security concern. This eBook covers the vulnerabilities within Kubernetes, followed by a list of best practices for developers to follow.
-
A snippet of Enterprise Strategy Group GenAI data for you
By: TechTarget
Type: Landing Page
As new technologies are invented and further developed, organizations' tech investment priorities may change. After all, it is the demands of the business that often guides the direction of these developments. This cyclical phenomenon is what allows for industries of all types to grow so quickly, including your company.
-
Experts Answer Pressing PaaS Cloud Development Questions
By: TechTarget Business Analytics
Type: eGuide
As is the case with any “as a Service” application, before you embark on a Platform as a Service (PaaS) project, you must establish standards and strategies for how you plan to approach the implementation in order to be successful. This e-guide lays out expert tips for PaaS application development in the cloud.
-
E-Guide: The dangers of application logic attacks
By: TechTarget Security
Type: eGuide
Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them.
-
How to modernize your legacy ERP system in 5 steps
By: TechTarget ComputerWeekly.com
Type: Infographic
Staying with a legacy ERP system may be the right decision for a company, but many organizations must modernize their legacy ERP to stay competitive in their industry. Here's a look at the five "Rs" of modernizing a legacy ERP system and how to decide on the right approach.
-
How microservices take the complexity out of governance
By: Apcera
Type: eGuide
What if there's an easy way to reduce overhead and adapt governance for modern app architectures? In this expert e-guide, explore a distributed, microservices-based approach to governance and learn how to adapt IT for microservices and containers with automation tools.
-
Five Things to Consider Before Moving Legacy Development Efforts to PaaS
By: TechTarget Business Analytics
Type: eGuide
For software developers, Platform-as-a-Service (PaaS) offers clear advantages over managing your own development infrastructure and allows more time to focus on designing and coding. But is PaaS right for all development projects? Before you make the move to PaaS, there are several questions to ask yourself and your prospective vendors.
-
Securing your software supply chain
By: TechTarget ComputerWeekly.com
Type: eGuide
Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
-
Integration Testing: Tips and Best Practices
By: TechTarget Business Analytics
Type: eGuide
The term "integration test" means different things to different people. Integration testing can be challenging for all companies, no matter what the meaning. In this Solution Spotlight, readers will learn tips and best practices around Integration testing, as well as challenges they may face and how to avoid issues.
-
A Computer Weekly Buyer's Guide to Application Development and DevOps
By: TechTarget ComputerWeekly.com
Type: eGuide
Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.
-
AI tools for software developers: Part Two
By: TechTarget ComputerWeekly.com
Type: eGuide
The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?
-
Application Integration: On-Premises vs. SaaS
By: TechTarget Business Analytics
Type: eGuide
This E-Guide provides expert tips and best practices on deciding between on-premises vs. SaaS and dealing with the application integration woes that follow.
-
Key software development trends to drive business success
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
-
Computer Weekly 8 January 2019: Technology innovation in music
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
-
CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company
By: TechTarget ComputerWeekly.com
Type: Ezine
It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.
-
Questions to ask when Choosing a PaaS Vendor
By: TechTarget Business Analytics
Type: eGuide
How do you know when to leverage PaaS? What should you know about choosing a PaaS vendor? Cloud computing business consultant Jeff Kaplan answers those questions and more in this expert e-guide, where you'll learn essential questions to ask when choosing a PaaS vendor.
-
E-Guide: Expert insights to application security testing and performance
By: TechTarget Security
Type: eGuide
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
-
Focus ASEAN: Enterprise Mobility
By: TechTarget ComputerWeekly.com
Type: eGuide
With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient.
-
How to take an Agile approach to mobile app development
By: TechTarget ComputerWeekly.com
Type: Ezine
This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.
-
Computer Weekly buyer's guide to mobile app development
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.