Software  >   Systems Software  >   Software Development Tools  >   Web Development Tools  >  

JSF

RSS Feed   
JSF Reports
 
Computer Weekly – 19 June 2018: Microsoft becomes devoted to open source developers
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after Microsoft's recent acquisition of GitHub, we examine the software giant's tools for embracing open source developers. Also, secretary of state for digital, culture, media and sport Matt Hancock talks about growing the UK digital economy and supporting the tech sector. Read the issue now.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

ComputerWeekly.com

Infographic: advances in and adoption of DevOps
sponsored by ComputerWeekly.com
EGUIDE: For DevOps teams, containers and new software delivery norms are tenets of a productive development and deployment strategy. Accordingly, advances and adoption of each illustrate the degree to which DevOps adds value to an organisation. This infographic shows the current level of DevOps maturity.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

ComputerWeekly.com

CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by ComputerWeekly.com
EZINE: An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 23 Oct 2020 | Published: 12 Nov 2020

ComputerWeekly.com

CW Buyer's Guide to Emerging technology
sponsored by ComputerWeekly.com
EBOOK: The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

ComputerWeekly.com

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

Computer Weekly - 3 August 2021: The fears and benefits of virtualising reality
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the mingling of virtual and physical worlds and find positive applications and worrisome implications from augmented reality. We find out how to run a virtual hackathon during the pandemic – pizza still included. And we look at how to improve performance of your private cloud. Read the issue now.
Posted: 01 Aug 2021 | Published: 03 Aug 2021

ComputerWeekly.com

Computer Weekly – 6 November 2018: After 10 years, Post Office IT system goes on trial
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 10 years after we revealed concerns over the Post Office accounting system, affected subpostmasters finally get their day in court. We look at how businesses are turning to wearable tech to help employees. And we analyse the key players in the market for object storage. Read the issue now.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

ComputerWeekly.com

Rein in IoT with containers and microservices
sponsored by SearchSoftwareQuality.com
EBOOK: Because of its abstract and constantly evolving nature, the internet of things can be difficult to manage. Fortunately, there are two increasingly popular technologies that can help – containers and microservices. In this guide, discover how these recent additions to development and testing arsenals can be used to tackle the challenges of IoT.
Posted: 04 Jun 2018 | Published: 04 Jun 2018

SearchSoftwareQuality.com

DCIM Tool Evaluation Guide
sponsored by RunSmart
EGUIDE: Since the data center infrastructure management (DCIM) market seems nearly limitless, it is important to have an evaluation process to find the software platform that best meets your organization's unique needs. This e-guide discusses the six key evaluation areas necessary to finding the DCIM tool that works best for you.
Posted: 11 Dec 2017 | Published: 04 Dec 2017

RunSmart

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 
Browse by Report Type:
JSF White Papers | JSF Multimedia | JSF IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences