Deployment Reports

CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company
sponsored by TechTarget ComputerWeekly.com
EZINE: It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.
Posted: 08 Feb 2021 | Published: 11 Jul 2019

TechTarget ComputerWeekly.com

Artificial Intelligence: Spotlight on ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about ASEAN's efforts in harnessing AI, the challenges ahead, as well as the rapid developments in the burgeoning field.
Posted: 08 Feb 2021 | Published: 27 Aug 2018

TechTarget ComputerWeekly.com

How containers and Kubernetes change deployment and DevOps
sponsored by Diamanti
EGUIDE: Containers and Kubernetes are being used by more and more organizations to package multicomponent applications for deployment, and orchestrate container management. In this e-guide, learn the three reasons that containers and Kubernetes may cause a shift in your DevOps tool approach.
Posted: 29 Oct 2018 | Published: 26 Oct 2018

Diamanti

Creating Digital Transformation Success and Implementing Cultural Change
sponsored by Comcast Business
EGUIDE: In this expert e-guide, we explore what it takes to get started with a successful digital transformation and take steps towards modernizing the various pieces of your organization's culture. Discover the increasingly important roles of big data, Agile, DevOps, talent management, and more.
Posted: 10 Mar 2017 | Published: 08 Mar 2017

Comcast Business

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

Clarifying the Platform as a Service Picture
sponsored by Salesforce.com
EGUIDE: App modernization hinges largely on the success of PaaS, and it is becoming increasingly confusing for enterprises looking to update their legacy applications. This e-guide is your overview of PaaS and its deployment models. You will learn how to evaluate PaaS vendors based on key criteria and whether to take a developer- or user-centric stance.
Posted: 20 Jun 2017 | Published: 16 Jun 2017

Salesforce.com

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Tips for Effective Mobile App Testing
sponsored by Eggplant
EGUIDE: To avoid costly mistakes down the road, it's important to conduct usability testing to better understand users' reactions to an app before rolling it out. Download this e-guide to discover the right testing criteria to help build and deliver high-quality mobile apps.
Posted: 31 May 2018 | Published: 29 May 2018

Eggplant

How to Keep up with Governance, Risk, and Compliance in the face of Faster App Development
sponsored by TechTarget App Architecture
EBOOK: This handbook explores how to implement holistic governance, risk, and compliance (GRC) for SOA and microservices by leveraging ALM, APIs, and Web Services Security. Learn more about microservices and how they're changing the world of app security.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

TechTarget App Architecture

How Etsy's DevOps Teams Fend off Fraudsters
sponsored by BMC
EGUIDE: In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC