Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Common ISDN Application Programming Interface

RSS Feed   
Common ISDN Application Programming Interface Reports
 
Discover Hidden API Security Vulnerabilities and How to Defend Against Them
sponsored by Ping Identity Corporation
WHITE PAPER: Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Ping Identity Corporation

AI tools for software developers: Part Two
sponsored by ComputerWeekly.com
EGUIDE: The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?
Posted: 17 Jan 2020 | Published: 17 Jan 2020

ComputerWeekly.com

What can low-code really do for you?
sponsored by TechTarget
RESOURCE: Just how much can a low-code tool do for you? Will you be able to create mission-critical apps? Answer a few questions in this short multiple-choice survey to find out. You'll be given unique permission to download SearchSoftwareQuality.com's new e-guide, Limited or Limitless: A Low-Code Development Overview".
Posted: 02 Nov 2019 | Published: 29 Feb 2020

TechTarget

Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Posted: 24 May 2019 | Published: 24 May 2019

ComputerWeekly.com

Gaining a Hacker's Perspective of API Vulnerabilities
sponsored by Ping Identity Corporation
WEBCAST: While APIs have enabled organizations to modernize their business operations, most organizations feel that they are also an area of potential weakness. This webinar aims to better understand today’s challenges and how to mitigate them by examining key API threats through the perspective of a hacker.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Ping Identity Corporation

How Okta and Netskope Delivered on BMC's Cloud Security Strategy
sponsored by Okta + Netspoke
CASE STUDY: In this blog post, Joel Bruesch, Sr. Director of Cybersecurity at BMC Software, overviews key security challenges he’s seen in his leadership role and highlights how BMC partnered with Okta and Netskope to build an identity-first cloud security.
Posted: 29 May 2020 | Published: 21 Jun 2019

Okta + Netspoke

MicroScope - January 2020: SMEs and managed services
sponsored by ComputerWeekly.com
EZINE: In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.
Posted: 28 Dec 2019 | Published: 03 Jan 2020

ComputerWeekly.com

Computer Weekly - 19 November 2019: Is facial recognition happening too fast?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.
Posted: 15 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

Containers in the Cloud
sponsored by Tata Communications and Intel
EGUIDE: Containers are going to play a growing role in cloud application management. As containers continue to mature, you need to begin adopting containers--if you haven't already--in order to get ahead of your competition. This e-guide gives an in-depth look at how clouds will maximize the benefits of containers.
Posted: 07 Dec 2017 | Published: 30 Nov 2017

Tata Communications and Intel

App Testing and ALM: Selecting Your Tools for the Cloud
sponsored by Applause
EGUIDE: In this expert e-guide, Tom Nolle examines what it takes to create effective app testing and ALM techniques for cloud development. From test data management to horizontal integration, explore the key considerations for app testing in the cloud, and discover tips on what to look for when buying app testing and ALM tools.
Posted: 15 Dec 2017 | Published: 12 Dec 2017

Applause
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info