Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Telephone Application Program Interface

RSS Feed   
Telephone Application Program Interface Reports
 
CW ANZ – Jan 2019: Keeping pace with microservices
sponsored by ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how enterprises are using microservices to solve problems and the challenges they are facing in moving to this new paradigm in software development. Read the issue now.
Posted: 11 Jan 2019 | Published: 11 Jan 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to continuous integration and continuous deployment
sponsored by ComputerWeekly.com
EGUIDE: Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.
Posted: 17 Dec 2019 | Published: 17 Dec 2019

ComputerWeekly.com

Reduce API Security
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

Top 10 software development stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: There has never been a better time to be in software development. After years of being regarded as non-core, software development has quickly become a differentiator as businesses embark on digital transformations. Here are Computer Weekly's top 10 software development articles of 2019.
Posted: 27 Dec 2019 | Published: 27 Dec 2019

ComputerWeekly.com

Unlocking value in the railway network's data
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.
Posted: 29 Jun 2020 | Published: 30 Jun 2020

ComputerWeekly.com

Nexus Lifecycle: How to identify newly vulnerable components across your application portfolio
sponsored by Sonatype
VIDEO: With the convenience and efficiency of open source comes the security risks business can’t neglect – the problem is most development teams know this yet still struggle with remediating issues and staying risk averse. Watch this brief 5-minute video for a look at how you can negate potential security risks in open source code with Nexus Lifecycle.
Posted: 23 Dec 2019 | Premiered: 23 Dec 2019

Sonatype

Computer Weekly – 14 January 2020: Building the internet of the future
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Cisco unveils the $5bn platform that it believes will be the future of the internet – we look through the details. The McLaren Formula One team discusses how IoT and data analytics have been key to its revival on the track. And we examine the importance of diversity in software development. Read the issue now.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

ComputerWeekly.com

Computer Weekly – 9 June 2020: How retailers are staying connected during their coronavirus shutdown
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we look at how the hard-hit retail sector has turned to technology to stay connected during the coronavirus lockdown. Our latest buyer's guide examines best practice in data quality. And we look at how remote working affects software development teams.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

Secure Coding Practices: Use Software Composition Analysis
sponsored by WhiteHat Security
WEBCAST: Software composition analysis (SCA) is now a necessary process in application development. Why? Because only 10% of code is written end-to-end by an organization’s developers. Let’s say that another way: applications are built with 90% borrowed code. Watch this webinar to understand and compare your security options.
Posted: 09 Jan 2020 | Premiered: Jan 9, 2020

TOPICS:  Security | Software
WhiteHat Security

New Technologies for HR Managers Boost Employee Experience
sponsored by SearchHRSoftware
EBOOK: Download this expert handbook to uncover several new forms of technology that are integral to the intelligent enterprise and learn how these tools can help to boost employee experience and give your organization a competitive advantage.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

SearchHRSoftware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences