Software  >   Applications Software  >   Enterprise Applications Software  >  

MRO

RSS Feed   
MRO Reports
 
Successfully Mitigating Corporate Risk
sponsored by AT&T Corp
WHITE PAPER: This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.
Posted: 06 Apr 2010 | Published: 05 Apr 2010

AT&T Corp

Tube Lines Takes Stock of Its Assets with IBM Maximo Asset Management
sponsored by IBM
CASE STUDY: Integrating asset maintenance activity and equipment history in IBM Maximo with financial and planning systems is helping Tube Lines meet its financial targets, plan for long-range capital investments and improve the rail infrastructure. Read this case study now to learn more.
Posted: 08 Dec 2010 | Published: 08 Dec 2010

IBM

Embedding 'AI-Powered' Analytics into Your Application
sponsored by Yellowfin
VIDEO: Daniel Shaw-Dennis, SVP Global Marketing and Alliances of Yellow, discusses everything you need to know about embedding ‘AI-Powered’ analytics into your applications in this video.
Posted: 24 Oct 2019 | Premiered: 24 Oct 2019

Yellowfin

A Guide to Kubernetes with Rancher
sponsored by Rancher
WHITE PAPER: So how do you decide on a containers deployment method between the various deployments options from cloud vendors to software providers? Download this whitepaper which dives into how Rancher Labs allows for large-scale container deployment and multi-cluster management that will keep the process under control.
Posted: 10 Sep 2019 | Published: 31 Jan 2019

Rancher

Design Thinking: No-code Development in the Digital Economy
sponsored by Crowd Machine
RESOURCE: The following blog post highlights 4 essential steps in the application development prototype process and explains how no-code can simplify this development and reduce the app dev lifecycle. Read it now to learn how to put the essentials to work in your organization.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Crowd Machine

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 17 Jun 2019 | Published: 18 Jun 2019

ComputerWeekly.com

A Computer Weekly Buyer's Guide to Microsoft Office 365
sponsored by ComputerWeekly.com
EBOOK: Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

ComputerWeekly.com

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

ComputerWeekly.com

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 
Browse by Report Type:
MRO White Papers | MRO Multimedia | MRO IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info