Deployment Reports

Innovation Awards APAC 2023 - Financial Services: DBS Bank
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about DBS Technology Marketplace and how it delivers anything-as-a-service (XaaS) capabilities that enable the bank's applications teams to adapt cloud-native applications quickly and efficiently.
Posted: 20 May 2023 | Published: 21 May 2023

TechTarget ComputerWeekly.com

Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

Top IT Predictions in APAC in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.
Posted: 19 Dec 2022 | Published: 20 Dec 2022

TechTarget ComputerWeekly.com

Upgrade or rework: Pathway to application modernisation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: If there is one certainty in IT, it is that at some point, every shiny new application will become legacy. The tech sector is driven by a fast cadence of innovation, which means that last year's "must have" phenomenon quickly becomes stale and out-of-date. In this e-guide, we explore the different approaches to modernising outdated IT systems.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

TechTarget ComputerWeekly.com

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

App Testing and ALM: Selecting Your Tools for the Cloud
sponsored by Applause
EGUIDE: In this expert e-guide, Tom Nolle examines what it takes to create effective app testing and ALM techniques for cloud development. From test data management to horizontal integration, explore the key considerations for app testing in the cloud, and discover tips on what to look for when buying app testing and ALM tools.
Posted: 15 Dec 2017 | Published: 12 Dec 2017

Applause

Three Reasons Cloud-hosted Virtual Desktops Haven't Taken Off
sponsored by Citrix
EGUIDE: Desktop-as-a-service (DaaS) technology has been around for a while now, but relatively few organizations have bought on to this cloud-hosted virtual desktop trend because of a few major DaaS concerns. This e-guide details three reasons cloud-hosted virtual desktops haven't taken off yet.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Citrix

Three Essentials For An Effective Mobile App Strategy
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: Whether or not you think your organization will experience a large spike in mobile app demand, it's important that a mobile app strategy is in your future. This expert e-guide details three parts to every effective mobile app strategy.
Posted: 18 Aug 2016 | Published: 12 Aug 2016

Hewlett Packard - Intel Xeon

Starting and Scaling DevOps in the Enterprise
sponsored by TechTarget IT Operations
EBOOK: DevOps is a shift in how leading edge companies are starting to manage their software and IT work. However, many larger organizations face challenges supporting a DevOps culture with their legacy architecture, which is not conducive to a small team environment.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

All resources sponsored by TechTarget IT Operations

How Etsy's DevOps Teams Fend off Fraudsters
sponsored by BMC
EGUIDE: In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC