IT Management  >   Systems Design and Development  >  

Platform Development

RSS Feed   
Platform Development Reports
 
Intro to Continuous Security on AWS
sponsored by AWS Mphasis/Stelligent
WHITE PAPER: Often, organizations moving to the cloud are left to choose between giving up agility and pace of innovation in lieu of security or accepting greater risk. However, through continuous security, you can validate your cloud infrastructure security across an organization. This white paper details 4 stages of continuous security for AWS resources.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

AWS Mphasis/Stelligent

The ROI of the ZeroNorth® AppSec Automation & Orchestration Platform
sponsored by ZeroNorth
WHITE PAPER: Today, DevOps presents an opportunity to flip the script on AppSec investments. Organizations can finally see past the myth of AppSec as a never-ending cost center by automating and orchestrating AppSec tools with development pipelines. See how AppSec automation and orchestration can fit into your DevOps strategy here.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

ZeroNorth

Australia Post Uses New Relic Observability to Manage Pandemic Challenges
sponsored by New Relic
CASE STUDY: In Australia, coronavirus lockdown measures shifted consumer demands in a rush normally associated with the holiday season. Learn how the Australia Post scaled to meet rising customer demands with the help of New Relic.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

New Relic

2021 IT Priorities: APAC report
sponsored by ComputerWeekly.com
EGUIDE: Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
Posted: 09 Dec 2020 | Published: 10 Dec 2020

ComputerWeekly.com

How to Talk to NetOps About Automation
sponsored by F5 Networks
WHITE PAPER: Now, rather than exercising tight control, NetOps is butting heads with DevOps. However, DevOps and NetOps need each other to maintain an Agile workstyle. NetOps plays an important role in maintaining security and performance of all the apps that DevOps creates. Learn how to get everyone on the same side in this guide.
Posted: 28 Dec 2020 | Published: 28 Dec 2020

F5 Networks

5 elements of successful digital transformation
sponsored by Red Hat
WHITE PAPER: According to Red Hat, successful digital transformation efforts share five elements: leadership, product, development, architecture, and operations. In this checklist, learn how using these 5 key elements when planning technology investments helps protect your organization from failure—and produces positive outcomes. Start here.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

Red Hat

Thank You For Requesting a Cisco Intersight Demo
sponsored by Cisco
SOFTWARE DEMO: Click here to request a virtual demo of Cisco Intersight, managing a Cisco UCS or HyperFlex environment, from one of Cisco’s industry experts.
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Cisco

Red Hat Modernization and Migration Solutions
sponsored by Red Hat and TCS
DATA SHEET: Organizations saddled with proprietary technology need to balance adopting new technologies and approaches with supporting and modernizing existing critical systems. Explore Red Hat’s modernization and migration solutions here to learn how you can balance legacy systems with modern demands.
Posted: 05 Nov 2020 | Published: 05 Nov 2020

Red Hat and TCS

Sheetz Case Study
sponsored by Eggplant
CASE STUDY: When the pandemic began, Sheetz, a family-owned convenience store chain, recognized the need to rapidly adapt to the new normal. Using Eggplant’s Intelligent Platform, Sheetz was able to quickly roll out mobile checkout, curbside pick-up, and integrations with third-party delivery services. See how they did it in this guide.
Posted: 04 Nov 2020 | Published: 03 Nov 2020

Eggplant

Container Security Vulnerabilities: How to Avoid Them and Stay Secure
sponsored by TechTarget
RESOURCE: Inside our new Essential Guide to Container Security, discover: What's changed in container security since the initial Docker release, 5 types of container and orchestrator vulnerabilities, and lessons learned from a past Kubernetes vulnerability. To gain FREE access to this expert guide, please complete our online survey.
Posted: 27 Oct 2020 | Published: 01 Nov 2020

TechTarget
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info