Application Architectures Reports

Computer Weekly – 30 May 2023: Can the UK cash in on chips?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
Posted: 26 May 2023 | Published: 30 May 2023

TechTarget ComputerWeekly.com

The State of the i
sponsored by Connectria
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria

Building a Strong Application Security Program
sponsored by Onapsis
EGUIDE: What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Onapsis

The Oracle Data Integrator Enterprise Edition Architecture
sponsored by Oracle Corporation
WHITE PAPER: Read this technical brief to learn more about the Oracle Data Integrator Enterprise Edition architecture in detail.
Posted: 22 Dec 2009 | Published: 01 Feb 2009

Oracle Corporation

Upgrading to SharePoint Server 2010
sponsored by Microsoft Corporation India Pvt Ltd
EGUIDE: The articles in this guide help you plan for and perform an upgrade from Microsoft Office SharePoint Server 2007 to SharePoint Server 2010.
Posted: 07 Dec 2009 | Published: 04 Dec 2009

Microsoft Corporation India Pvt Ltd

CW EMEA - January 2023: Protecting the privacy of schoolchildren
sponsored by TechTarget ComputerWeekly.com
EZINE: In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.
Posted: 11 Jan 2023 | Published: 12 Jan 2023

TechTarget ComputerWeekly.com

Re-make or Re-model? A Cloud Computing E-Book, Chapter 2
sponsored by IBM
EBOOK: The upsurge in cloud computing presents development teams with challenges that may require them to rethink  established ways of building applications. Read this e-book, which discusses languages for cloud computing, distributed caching, scaling horizontally, and changing data architectures midcloud, for further discussion of these issues.
Posted: 28 Sep 2010 | Published: 21 Sep 2010

IBM

SD-WAN Technology Promises Enterprises Control, Cost Savings
sponsored by Silver Peak
EGUIDE: The time for SD-WAN is now. Access this e-guide to discover the potential benefits of adopting SD-WAN, as well as how to achieve ROI with SD-WAN technology.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Silver Peak

Modernize Your Legacy Apps for Cloud, Mobile, and More
sponsored by Red Hat
EGUIDE: In this e-guide, Gartner analyst Dale Vecchio reveals 3 primary approaches to legacy app modernization. Plus, learn approaches for incorporating mobile apps as part of your legacy system modernization effort.
Posted: 22 Jun 2016 | Published: 20 Jun 2016

Red Hat

Framing Your Enterprise IoT Approach for a More Connected Future
sponsored by Xively by LogMeIn
EGUIDE: In this expert e-guide, we discuss how you can prepare for whatever comes next in IoT. You'll learn which challenges should take top priority when it comes to integrating IoT, like information architecture, Agile development, and more. Plus, you'll get advice on what to consider before and after picking an IoT platform.
Posted: 10 Aug 2016 | Published: 09 Aug 2016

Xively by LogMeIn