ALM Reports

A Computer Weekly Buyer's Guide to Mobile App Development
sponsored by TechTarget ComputerWeekly.com
EZINE: This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.
Posted: 08 Feb 2021 | Published: 21 Mar 2017

TechTarget ComputerWeekly.com

Creating Digital Transformation Success and Implementing Cultural Change
sponsored by Comcast Business
EGUIDE: In this expert e-guide, we explore what it takes to get started with a successful digital transformation and take steps towards modernizing the various pieces of your organization's culture. Discover the increasingly important roles of big data, Agile, DevOps, talent management, and more.
Posted: 10 Mar 2017 | Published: 08 Mar 2017

Comcast Business

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype

Beyond the Scrum Team: Delivering "Done" at Scale
sponsored by Tasktop
WEBCAST: Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.
Posted: 27 Jul 2016 | Premiered: Jul 26, 2016

Tasktop

Software Lifecycle Integration: Six Reasons Not to Delay
sponsored by Tasktop
WHITE PAPER: Access this resource to learn 6 reasons why you may be costing your organization by waiting to integrate your software lifecycle.
Posted: 23 Jul 2015 | Published: 14 Dec 2015

Tasktop

Use Every Available Tool for Cloud Application Monitoring
sponsored by VMware
EGUIDE: When a cloud-based application has performance issues or goes down, who do you blame and who can fix it? Read this e-guide to learn how you can use every tool at your disposal for cloud application monitoring and make sure that your apps perform up to expectation.
Posted: 18 Dec 2017 | Published: 15 Dec 2017

VMware

Middleware Automation: What It Is and How It's Used
sponsored by Oracle Corporation
EGUIDE: When introducing microservices, containers and cloud services to your enterprise architecture, consider using automated middleware software and services. In this exclusive e-guide, middleware software experts Calvin Martin and Akbar Aziz discuss what middleware automation is and how it can be used.
Posted: 18 Feb 2016 | Published: 15 Feb 2016

Oracle Corporation

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM

Optimize Application Performance with Customer-Driven Development and the Cloud
sponsored by SoftEngi
EGUIDE: If your application disappoints, users won't hesitate to go elsewhere. This e-guide describes how to implement customer-driven application development to release final products that meet user expectations, ultimately delivering maximum return on investment.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

SoftEngi

How Etsy's DevOps Teams Fend off Fraudsters
sponsored by BMC
EGUIDE: In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC