EZINE:
In this week's Computer Weekly, with organisations increasingly turning to low-code/no-code tools to enable "citizen developers" among staff – we look at whether this can help to ease software developer skills shortages. Read the issue now.
EZINE:
In this week's Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties' election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology. Read the issue now.
EGUIDE:
Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
EZINE:
In this week's Computer Weekly, a year after lockdown began, we look at employers' changing attitudes to returning to the workplace. We find out how the software developer community has coped during the Covid-19 pandemic. And we examine the cyber security concerns prompted by latest social media craze, Clubhouse. Read the issue now.
EBOOK:
Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
EGUIDE:
In this e-guide, expert consultant Tom Nolle explores how organizations can leverage BPM to modernize legacy apps effectively. Discover how workflows, APIs, and microservices fit into this framework and your modernization implementation. Plus, learn how BPM will support robotic process automation for the evolving world of IoT and mobile.
EGUIDE:
In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.
TRANSCRIPT:
Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
EGUIDE:
In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
RESEARCH CONTENT:
With the immense consequences of downtime in mind, what are Fortune 1000 enterprises doing to improve the application development process, and what role should DevOps play? Access this research report today to learn from the best practices in place in more than 20 Fortune 1000 companies.