Packaged Software

RSS Feed   
Packaged Software Reports
 
IT Monitoring Meltdown: Just 11% Of Decision-Makers Are Satisfied With Their Monitoring Tools
sponsored by StackState
RESOURCE: In a recent study, 83% of respondents are actively seeking new monitoring services or looking to improve their approach to monitoring. In this report, explore the results of the study and some tips for improving your organization's use of monitoring tools.
Posted: 16 Nov 2020 | Published: 06 Aug 2020

StackState

Computer Weekly – 4 October 2016: How Microsoft aims to tackle information overload
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we hear from Microsoft CEO Satya Nadella about how the firm wants to use cloud, machine learning and innovative datacentre technologies to open up access to information. Our new buyer's guide looks at network function virtualisation. And we examine the role of blockchain in cloud data security. Read the issue now.
Posted: 30 Sep 2016 | Published: 04 Oct 2016

ComputerWeekly.com

Computer Weekly – 15 November 2016: Counting the cost of financial cyber crime
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the cyber security of banks is under scrutiny after an attack on Tesco Bank leads to millions lost in fraudulent transactions. Our latest buyer's guide, on server operating systems, looks at Windows Server 2016. And Coca-Cola explains how a move to the cloud is helping to motivate staff. Read the issue now.
Posted: 11 Nov 2016 | Published: 15 Nov 2016

ComputerWeekly.com

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

Gamma International: The Macedonia files
sponsored by ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 23 Nov 2017 | Published: 23 Nov 2017

ComputerWeekly.com

Audi fine-tunes its digital performance to boost online car sales
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

ComputerWeekly.com

Uniting IT and App Development for Mobile App Strategies
sponsored by SearchEnterpriseDesktop
EZINE: The new wave of enterprise mobile application development has altered how app dev fits into IT's overall strategy. Learn how the sides can come together.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

SearchEnterpriseDesktop

Getting DevOps Up to Speed: Tools for Collaborating with IT
sponsored by VividCortex
EGUIDE: Feedback about a DevOps environment on the back end is as important to its success as automated tools are on the front end. In this expert e-guide, we explore how to make the communication path between DevOps and IT a two-way street. Inside, discover how tools like container management, ChatOps, and more can bridge the gap.
Posted: 07 Oct 2016 | Published: 06 Oct 2016

VividCortex

Evaluate Hybrid Cloud Management Tools for Your Enterprise Needs
sponsored by Splunk
EGUIDE: Use this e-guide as your hybrid cloud management tool evaluation kit. Inside, you will find 3 primary decisions to make with every tool you see, as well as a list of criteria for those tools that catch your eye.
Posted: 18 May 2017 | Published: 15 May 2017

Splunk

DCIM Tool Evaluation Guide
sponsored by RunSmart
EGUIDE: Since the data center infrastructure management (DCIM) market seems nearly limitless, it is important to have an evaluation process to find the software platform that best meets your organization's unique needs. This e-guide discusses the six key evaluation areas necessary to finding the DCIM tool that works best for you.
Posted: 11 Dec 2017 | Published: 04 Dec 2017

RunSmart
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences