Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Internet Server API

RSS Feed   
Internet Server API Reports
 
Secure DevOps Brings Better, Faster, Safer Software
sponsored by SearchSecurity.com
EBOOK: In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
Posted: 03 May 2019 | Published: 03 May 2019

SearchSecurity.com

Latest Thinking in DevOps: Your Guide to Agile Software Development Practices for Enterprise
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we share some of the latest thinking on DevOps in the enterprise, as well as the success stories of some household names who have made agile software development work for them.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

ComputerWeekly.com

How to Build an Enterprise Kubernetes Strategy
sponsored by Rancher
WHITE PAPER: When building a Kubernetes strategy for container deployment, you must assess your container-based goals and leverage Kubernetes in a way that supports them appropriately. Download this strategy guide to learn how you should build your container deployment approach to best fit your specific containers objectives.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Rancher

How to: Continous Testing
sponsored by TechTarget
RESOURCE: Getting testing done quickly and efficiently is now the most significant obstacle most organizations face when trying to get software out the door quickly. There are actually 4 key components to have in place when using continuous testing. Open this guide to learn all 4.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

TOPICS:  Software
TechTarget

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 23 Nov 2017 | Published: 23 Nov 2017

ComputerWeekly.com

Top 6 API Security Needs for Serverless Apps
sponsored by Data Theorem
WHITE PAPER: The growth in serverless apps is going to accelerate because the cost and time benefits for developers are overwhelmingly positive. However, the 6 areas in this white paper highlight the need for a new approach to security with an architecture that is substantially different than previous techniques. Read on to learn more.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Data Theorem

7 Warning Signs You Need to Replace Your ESB
sponsored by Dell Boomi
EBOOK: Uncover 7 warning signs that your ESB is struggling to keep up with modern integration requirements and learn how to update your integration infrastructures for cloud, mobile, social, big data, and IoT apps.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Dell Boomi

CW ANZ: Taming the data beast
sponsored by ComputerWeekly.com
EZINE: Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ComputerWeekly.com

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info