Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >   Intellectual Property  >  

Secure Copyright Protection

RSS Feed   
Secure Copyright Protection Reports
 
Verifying the integrity of open source Android apps
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how researchers can determine whether an app was built from its published source code.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

How Unilever Spreads IT Innovation
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how consumer goods giant Unilever has changed its thinking about IT to support a global digital transformation. The UK boss of Hewlett Packard Enterprise assesses progress after the first year since HP split in two. And we examine how software development is changing in the enterprise. Read the issue now.
Posted: 18 Nov 2016 | Published: 22 Nov 2016

ComputerWeekly.com

Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

ComputerWeekly.com

Top 10 ASEAN IT stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: Over the year, Computer Weekly looked at how the region is embracing technology, not for its own sake but to become more nimble, secure and to overcome the challenges of a growing economy. Here are Computer Weekly's top 10 ASEAN IT stories of 2019.
Posted: 06 Jan 2020 | Published: 07 Jan 2020

ComputerWeekly.com

Case study: How One Company Increased App Development Velocity by 40%
sponsored by ZeroTurnaround
CASE STUDY: Access this brief case study to learn about the strategy that allowed the application developers at NetworkedAssets to cut down on downtime from redeploys and increase their team velocity by 40%. Discover how to instantly view and test your code changes without the need for any delays.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

ZeroTurnaround

Discover How Big Data Hadoop Solutions Compare
sponsored by IBM
WHITE PAPER: Find out how 9 different big data Hadoop solutions compare to one another, and learn about the various vendors and differentiated features of each option.
Posted: 03 Jul 2014 | Published: 27 Feb 2014

IBM

OpenStack Hype vs. Reality
sponsored by Red Hat
WHITE PAPER: This white paper examines the results of an IDG Quick Poll of CIOs regarding their stance on OpenStack deployment, highlighting the ways in which these companies plan to use this technology and the top barriers to OpenStack deployment.
Posted: 20 May 2014 | Published: 20 May 2014

Red Hat

Big Names Reveal Strategies and Experiences with Big Data, Open Source, and Analytics
sponsored by InterSystems
EGUIDE: In this expert e-guide, we examine the evolution of open source big data software and the proliferation of platforms like Apache Spark and Hadoop. Inside, you'll learn how open source tools can act as the building blocks of big data management and uncover key considerations for implementing a sound big data strategy.
Posted: 30 Nov 2016 | Published: 29 Nov 2016

InterSystems

Open Source Strategies Spark Security and Integration Concerns
sponsored by Black Duck Software
EGUIDE: In this e-guide, experts discuss the importance of moving past security concerns with open source strategies. Find out how your enterprise can keep your infrastructure secure with open source strategies so that you can meet your high-performance needs.
Posted: 16 Feb 2016 | Published: 11 Feb 2016

Black Duck Software

What You Need-to-Know Before Jumping into Containers
sponsored by Nirmata
EGUIDE: There's a lot of buzz about what containers can do, but the technology is new and there are gaps that still need to be filled. Read this e-guide to learn what the experts are saying about containers and why you need to be cautious in planning your container strategy.
Posted: 30 May 2017 | Published: 23 May 2017

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info