You've requested...

Download this next:

Effective collaboration strategies for distributed development teams

Successful application lifecycle management (ALM) hinges on close collaboration between all team members – but geographic dispersion often bars the door to effective collaboration. With the right strategy, however, it doesn’t have to.

In this expert e-guide, uncover the tools and techniques that improve global collaboration in different parts of the application development lifecycle.

These are also closely related to: "Open source code risks, explored"

  • Radically Collaborative Patterns for Software Makers: A Mini-Encyclopedia

    In this 83-page encyclopedia, find an in-depth look into various ‘patterns’, or software strategies, that are significantly impacting how organizations approach development.

    The encyclopedia provides an overview of the most successful and radical patterns in the market right now, including:

    1. High-level patterns that involve the entire organization
    2. Team-wide patterns
    3. Patterns for specialized roles

    Scroll through the table of contents to find a pattern that could work for your development team. Download the resource here.

  • ALM: Taking a middleware-focused approach

    Navigating the confusion of creating harmony between middleware, emerging apps, and your OS can be incredibly frustrating, especially when you add in complexities like working in the cloud.

    In this expert e-guide, Tom Nolle discusses how to take a middleware-focused approach to app lifecycle management practices.

    Uncover helpful advice for selecting middleware tools and managing OS and middleware platforms in the cloud. Plus, learn about the critical relationship between ALM, DevOps, and orchestration. 

Find more content like what you just read:

  • E-Guide: Avoiding Application Security Pitfalls

    This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them.

    Download

  • Mistakes in Cloud Application Deployment

    This expert E-Guide explores the mistakes many organizations make when deploying apps in the cloud and describes how you can avoid making the same issues. In addition, learn why cloud integration is so complicated for today's testers.

    Download

  • Focus: Open source

    Open source used to be an alternative to commercial off –the-shelf software. Today, the largest commercial software providers are big supporters of open source technologies.

    Download

  • Open source security tips

    This white paper examines cyber threats to software supply chains and open source components, noting the increased attack surface due to third-party code use. It recommends automating open source governance in the development lifecycle to mitigate risks. Read the white paper here.

    Download

  • Infographic: 5 essential open source cybersecurity tools for 2022

    There are countless open source cybersecurity tools available in the market and some of them have become essential for finding vulnerabilities in 2022. In this infographic, we highlight five tools that have proven to be highly efficient and reliable and can be combined with other tools to help build up your defences.

    Download

  • A Computer Weekly Buyer's Guide to Enterprise Open Source

    In this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.

    Download

  • NFV open source: How service providers are innovating their network

    Learn how to have a successful transition to NFV open source by gaining valuable insight on how open source for NFV applications will require service providers to adopt new ways of designing, deploying and supporting their network infrastructure.

    Download

  • How open source is spurring digital transformation

    From Linux to Kubernetes, open source has been key to efforts by organisations across APAC to transform digitally. In this e-guide, read how Malaysia's AmBank is using open source to engineer its software from the ground-up, ANZ Bank's move to Red Hat OpenShift, and what suppliers are doing to support deployments of containerised applications.

    Download

  • The Issue With Open-Source Code Utilization

    Due to ongoing geopolitical events, some individuals have begun to “poison” major open-source projects to try to cause damage. Access this blog article to learn complications with open-source code utilization.

    Download

  • Top 5 open-source components & their vulnerabilities

    Software dependencies can equal open-source vulnerabilities. To empower your developers in leveraging open-source components while mitigating risk, read this white paper. Inside, Sonatype evaluates the top 5 open-source components, their vulnerabilities, and remediation recommendations.

    Download

  • IT Automation: Discover How 2 Platforms Stack Up

    When adopting an IT automation platform, should your organization take the open-source route? To make an informed decision, review this white paper that compares an open-source platform, StackStorm, and a commercially available platform, Composer.

    Download

  • The state of the software supply chain: Open-source edition

    90% of stakeholders report cost efficiency led them to prioritize open-source software. This report explores the state of the software supply chain, analyzing the current landscape across 4 key areas. Download the report now to gain a deeper understanding of the state of the software supply chain.

    Download

  • Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle

    In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.

    Download

  • Key software development trends to drive business success

    In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.

    Download

  • 7 free GRC tools for compliance professionals

    All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.

    Download

  • Percona: Open-source, containers, and pandemics

    In this e-guide: We explore how Percona have navigated themselves and the open-source industry through the pandemic. We also dive into Percona's advice about containerisation in enterprises.

    Download

  • Software bill of materials (SBOMs) — a critical component of software supply chain security

    In November 2022, open-source toolkit developers announced two high-severity vulnerabilities that affect all versions of OpenSSL 3.0.0 up to 3.0.6. How should organizations prepare? One of the most effective tools for finding and addressing

    Download

  • Security & productivity in software supply chains

    In this white paper, you’ll learn why the notion that security must be sacrificed for productivity is a myth and discover a solution designed to safeguard the software supply chain from open source dangers without compromising efficiency. Read on to learn how you can mitigate risks and secure your software pipeline while maintaining productivity.

    Download

  • The case for industrial automation on your warehouse floor

    As organizations continue to innovate, the complexity of manufacturing processes and product designs have only increased. Because of this, manufacturers must keep up with changing demands while also keeping costs down. Now, there is a modern approach to solve for this. Read on to learn more about an industrial edge platform that changes the game.

    Download

  • Get started simplifying IT infrastructure with automation

    In the spirit of open, find in this e-book a compilation of success stories from Red Hat customers who use infrastructure automation to create repeatable instructions and processes that replace or reduce human interaction with IT systems.

    Download

  • The ultimate guide to business service monitoring

    If a cloud service provider has an IT outage, its retail clients may not be able to do business. Traditionally, firms have turned to open-source tools to monitor business services IT. But in today’s complex IT environments, open source is no longer sufficient. Download this e-book to learn how to find the right business service monitoring tool.

    Download

  • Computer Weekly Buyer's Guide: Service Integration & Asset Management

    In this 13-page buyer's guide, Computer Weekly looks at the effects on the IT department of technology commoditisation, open source and software as a service, the trend of insourcing IT, and the concept of service integration and management for outsourced services.

    Download

  • Security and risk management in the wake of the Log4j vulnerability

    Read this e-book to get a quick refresher on the Log4j vulnerability and its threat, the longer-term issues of software management, compliance risks, and threat hunting — and how security and risk teams should rethink their roles and processes as a result.

    Download

  • How to Scale Your IaC Security Program

    If you have to shore up your cloud infrastructure security after you’ve already embedded IaC into your workflows, there are a few common challenges you’ll face—cloud infrastructure drift and misconfigured open source IaC components among them. Overcome these IaC challenges by reading this e-book.

    Download

  • CW APAC, March 2022: Trend Watch: Storage management

    In this handbook, Computer Weekly looks at how open source is shaping data storage management and this year’s emerging cloud supplier trends.

    Download

  • Optimizing the performance of ESB

    The enterprise service bus (ESB) and what it does are still points of confusion and contention. Read this expert e-guide to find out why an ESB is indispensable to any application integration project. Also, find out how open source ESB options are changing the market and why this will matter to buyers.

    Download

  • Computer Weekly – 28 February 2023: The race to net zero

    In this week's Computer Weekly, we examine the role of green tech in helping businesses contribute to the government's 2050 net-zero targets. We also talk to Spotify about the importance of open source for the music streaming service and how hybrid working is evolving as the post-pandemic workplace continues to change. Read the issue now.

    Download

  • How businesses can win talent war with mobile apps, HR data analytics, and cloud technology

    Becoming more digital has emerged as a ruling concept among forward-looking organisations in recent years. Now, while having multi-channel engagement with customers is a big aspect of digital, so too is attracting and retaining the employees who can make a reality of digital transformation.

    Download

  • Computer Weekly – 27 November 2018: Software patching at scale – how to make it work

    In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.

    Download

  • Computer Weekly – 13 November 2018: Will the $34bn IBM-Red Hat mega-merger succeed?

    In this week's Computer Weekly, after IBM buys Red Hat for $34bn to boost its cloud capabilities, we analyse how to make the deal a success. We examine the challenges that the emerging field of quantum computing presents for current encryption techniques. And our latest buyer's guide looks at storage for the internet of things. Read the issue now.

    Download

  • Private Cloud E-Zine Vol. 4

    As cloud continues to evolve, IT managers are looking for better integration of cloud platforms with existing tools, greater control and management, improved self-service and greater portability among cloud environments. This e-zine takes a look at trends in cloud computing, using open source software, moving applications to the cloud.

    Download

  • What edge computing looks like in 2024

    This paper describes how Red Hat and Intel combine leading microprocessor hardware and open source software to address edge computing challenges. Read the paper here.

    Download

  • Computer Weekly – 17 May 2022: Digitally transforming UK power networks for renewable energy

    In this week's Computer Weekly, we find out how the UK's power networks need to be digital transformed to be ready for renewable energy – and the role of open source. Wi-Fi 6 was meant to give a boost to wireless connectivity – we examine why adoption has stalled. And we look at what a quantum datacentre might be like. Read the issue now.

    Download

  • Trend Watch: Generative AI in APAC

    Organisations are starting to incorporate generative AI into their everyday processes. In this handbook, focused on GenAI in the Asia-Pacific region, Computer Weekly looks at how it's being deployed in healthcare, Australia's GenAI journey, the technology's relationship with the cloud and Red Hat's issues with source code.

    Download

  • Looking Back on 25 Years of Linux

    In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.

    Download

  • 6 benefits of Red Hat Enterprise Linux

    Along with describing how Red Hat’s platform works, this e-book—The Power of Red Hat Enterprise Linux—outlines what a Red Hat Enterprise Linux subscription provides. Read on to discover 6 benefits of leveraging the platform, including visibility into new technologies, enhanced security and more.

    Download

  • Why is Bristol Britain's smartest city?

    In this week's Computer Weekly, we visit Bristol, ranked as the UK's top smart city, to find out what it's learned and future plans. Our latest buyer's guide examines software-defined wide area networks (SD-WAN). And we trace the evolution of open source as more organisations contribute code to the community. Read the issue now.

    Download

  • Computer Weekly – 26 July to 1 August 2016: Olympic vision: Technology on track for Rio Games

    In this issue we interview the CIO for the forthcoming Rio Olympics. The technology his team has put in place will support delegations from over 200 countries, including 10,500 athletes. We also look at data centre and open source security, as well as take a first look at what the new UK Prime Minister's approach might be to the digital economy.

    Download

  • How to spot a QR code phishing email

    You can’t defend against QR code phishing emails unless you can identify them. So, how do you spot such an email? This blog by Senior Cyber Threat Intelligence Analyst at Cofense, Max Gannon, digs into the key characteristics of QR code phishing emails. Read on to unlock these insights and more.

    Download

  • Computer Weekly - 23 November 2021: Can the tech community show how to save the world?

    In this week's Computer Weekly, we report from the COP26 conference on how the tech world's collaborative open source model could help tackle climate change. Gartner has urged IT leaders to rethink their role as business come to rely on digital technologies. And we ask if your office security is at risk as staff return. Read the issue now.

    Download

  • Low-Code Implementation For “Virtual Try On” Contact Lenses

    Many organizations are still doing business while running an ecosystem made up of several applications with obsolete technologies. For one of the biggest eyewear retailers in the industry, they ran into that problem when they wanted to develop a virtual “try on” for contact lenses. Read on to learn what solution they used and how they did it.

    Download

  • Nexum at AnsibleFest 2022 Event Recap

    With the introduction of Ansible, engineers are no longer alone in the maintenance and development of their programs, as automation can save time and energy. This article presents an overview of Nexum’s participation in AnsibleFest 2022, where vendors gathered to highlight their uses of the open-source Ansible platform. Read on to learn more.

    Download

  • Computer Weekly – 16 January 2018: How to fix the Meltdown and Spectre chip flaws

    In this week's Computer Weekly, as CIOs come to terms with the Meltdown and Spectre processor flaws that make every computer a security risk, we examine how to protect your IT estate. We find out how Alexa-style smart speakers can help with CRM strategies. And we look at how the public sector is implementing DevOps. Read the issue now.

    Download

  • Top 10 ASEAN IT stories of 2020

    The booming digital economies of Southeast Asia showed much resilience in 2020, from tapping open source, data analytics and DevOps, to fending off cyber criminals who came knocking on their doors, all in the midst of an unprecedented pandemic. Here are Computer Weekly's top 10 ASEAN IT stories of 2020:

    Download

  • Breaking Down the Log4j2 Attack

    In this webcast, Endace’s Michael Morris speaks with Cisco’s Value Chain Security Leader about the Log4j2 attack. Watch now to unlock a discussion about open-source software vulnerabilities, remediation strategies and more.

    Download

  • Computer Weekly – 19 June 2018: Microsoft becomes devoted to open source developers

    In this week's Computer Weekly, after Microsoft's recent acquisition of GitHub, we examine the software giant's tools for embracing open source developers. Also, secretary of state for digital, culture, media and sport Matt Hancock talks about growing the UK digital economy and supporting the tech sector. Read the issue now.

    Download

  • Computer Weekly – 30 October 2018: A row is brewing over EU plans to curb datacentre energy use

    In this week's Computer Weekly, a row is brewing over an EU plan to curb datacentre energy use, and the leading server suppliers are not happy. Health secretary Matt Hancock tells us about his new technology vision for the NHS. And we examine the growing popularity of short-term "gig" employment for IT professionals. Read the issue now.

    Download

  • Zero trust verification and validation

    Open this use case to learn how to access a single source of truth for the network to continuously verify and validate the zero-trust architecture and prove network behavior.

    Download

  • SAST vs. DAST: What Are the Differences and Why Are They Both Important?

    If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.

    Download

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.

    Download

  • Computer Weekly – 19 July 2016: Building big ideas in banking

    In this issue we visit JP Morgan's European software development centre in Glasgow to see how the investment bank is working with local universities and collaborating in the open source community. Software chief, Stephen Flaherty, talks about how JP Morgan uses open source software and has now begun contributing to open source projects.

    Download

  • ESB & SOA Infrastructure

    How important are enterprise service buses (ESBs) to service-oriented architecture (SOA) and the enterprise? Will new efforts to understand ESBs pay off in the long-term? This e-book provides valuable insight on the role of ESBs in application integration and the modern enterprise.

    Download