Software Development Lifecycles Reports

Computer Weekly - 16 March 2021: Containers play a key role in post-pandemic IT architectures
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide examines the key role that container technology will play in post-pandemic IT architectures. The UK government is under fire for its opaque approach to gigabit broadband strategy. And we assess the storage options for the growing volumes of unstructured data. Read the issue now.
Posted: 15 Mar 2021 | Published: 16 Mar 2021

TechTarget ComputerWeekly.com

Embracing Enterprise Mobility: Choosing the Right Application Development Platform
sponsored by IBM
WHITE PAPER: Extending your enterprise with mobile applications and device isn't an option anymore -- it's a necessity. But choosing the right platform for mobile application development isn't simple, when there are so many options on the market. Download this buyer's checklist for mobile application platforms to help you with your decision.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

IBM

How to Unlock the Promise of Agile in the Enterprise
sponsored by Workfront
WHITE PAPER: This in-depth white paper discusses Agile, and how it can be implemented on a large scale. Read on to find out what benefits one can expect from enterprise-wide Agile implementation, and what challenges await.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

Workfront

Creating Digital Transformation Success and Implementing Cultural Change
sponsored by Comcast Business
EGUIDE: In this expert e-guide, we explore what it takes to get started with a successful digital transformation and take steps towards modernizing the various pieces of your organization's culture. Discover the increasingly important roles of big data, Agile, DevOps, talent management, and more.
Posted: 10 Mar 2017 | Published: 08 Mar 2017

Comcast Business

API Testing Maturity Model: Picking the Right Strategy
sponsored by Parasoft Corporation
RESOURCE: This brief resource considers 5 different API testing maturity models, and discusses essential points that apply to every development team. Access now to see how these models compare.
Posted: 30 Dec 2014 | Published: 30 Dec 2014

Parasoft Corporation

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

How Etsy's DevOps Teams Fend off Fraudsters
sponsored by BMC
EGUIDE: In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC

Low-Code/No-Code Platforms: Simplify Mobile App Development
sponsored by TechTarget Software Quality
EBOOK: This expert handbook takes a look at how low-code development platforms are becoming more prevalent in organizations looking to expand their web and mobile development options. Learn why low-code/no-code with drag-and-drop visual capabilities should be a welcome alternative for software developers and a simplified method for non-developers.
Posted: 15 Mar 2017 | Published: 02 Mar 2017

TechTarget Software Quality

Uniting IT and App Development for Mobile App Strategies
sponsored by TechTarget Enterprise Desktop
EZINE: The new wave of enterprise mobile application development has altered how app dev fits into IT's overall strategy. Learn how the sides can come together.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

TechTarget Enterprise Desktop

Webinar: Why Benchmark Application Security?
sponsored by Veracode, Inc.
TRANSCRIPT: Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.