Building an Android App using MobileData Cloud
By: IBM View more from IBM >>
Download this next:
IBM Worklight Developer Q&A
By: IBM
Type: Resource
Thanks to its constantly shifting environment, mobile development can be challenging at best. Different software versions for different platforms make QA and development a tricky business, and things will change at the drop of a hat.
Access this resource to see an open-forum developer question-and-answer for IBM's Worklight environment. See if another developer has encountered the same issue as you, and if someone has already provided an easy solution.
These are also closely related to: "Building an Android App using MobileData Cloud"
-
Watson Can Power Your Application. What Will You Do With It?
By: IBM
Type: Webcast
View this webcast to see experts discuss and demonstrate the new IBM Watson services available on Bluemix.
-
Top 10 ASEAN stories of 2018
By: TechTarget ComputerWeekly.com
Type: eGuide
Contrary to perception that ASEAN is at least a couple of years behind the US and Europe in adopting and developing cuttingedge technologies, the region has been a hotbed of innovation, going by the region’s most-read Computer Weekly stories in 2018.
In this review of the top Computer Weekly articles focused on IT in ASEAN, we look at Ascend Money’s adoption of OpenShift, Go-Jek’s experience with the cloud and Singapore’s approach to the internet-of-things, among other developments.
Find more content like what you just read:
-
5G vs. Wi-Fi 6: What's the difference?
By: TechTarget ComputerWeekly.com
Type: Infographic
Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
-
Upgrade or rework: Pathway to application modernisation
By: TechTarget ComputerWeekly.com
Type: eGuide
If there is one certainty in IT, it is that at some point, every shiny new application will become legacy. The tech sector is driven by a fast cadence of innovation, which means that last year's "must have" phenomenon quickly becomes stale and out-of-date. In this e-guide, we explore the different approaches to modernising outdated IT systems.
-
A guide to developing modern mobile applications
By: TechTarget ComputerWeekly.com
Type: eBook
A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.
-
A Computer Weekly buyer's guide to secure and agile app development
By: TechTarget ComputerWeekly.com
Type: eGuide
As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding
-
Infographic: How blockchain works
By: TechTarget ComputerWeekly.com
Type: eGuide
To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
-
Build an Android app using the MobileData cloud service
By: IBM
Type: Webcast
Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.
-
-
Focus: Cloud application development
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we take a close look at some of the latest trends in cloud application development, with in-depth interviews with the likes of Cloud Foundry and Pivotal, and find out how one public sector organisation is tapping into all these ideas in their quest for efficiency.
-
Inside Grab's platform strategy
By: TechTarget ComputerWeekly.com
Type: eGuide
Grab's group CTO talks up the super app's platform strategy, architecture and organisational structure behind its growth across diverse Southeast Asian markets
-
Mobile application platforms: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.
-
Application Performance Management: Improving service availability
By: TechTarget ComputerWeekly.com
Type: eGuide
If it can't be measured, it can't be managed. Telemetry on applications and IT infrastructure are key to keeping applications running optimally and reducing unplanned downtime. Beyond using telemetry data to respond to abnormal events, historical data analysis can reveal more systemic issues. In this e-guide we look at trends in APM.
-
Infographic: Comparing cloud application models
By: TechTarget ComputerWeekly.com
Type: Infographic
The cloud is central to the deployment of most applications today. But, that doesn't mean all applications use the cloud in the same way. In fact, there are several types of cloud application models. In this infographic, we compare three of the most popular models: cloud-native, cloud-based and cloud-enabled.
-
DevSecOps delivers better business
By: TechTarget ComputerWeekly.com
Type: eGuide
Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
-
API Management: The role of APis in digital business transformation
By: TechTarget ComputerWeekly.com
Type: eGuide
Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
-
A Computer Weekly buyer's guide to next-generation programming tools
By: TechTarget ComputerWeekly.com
Type: eGuide
All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
-
Getting a handle on AIOps and self-healing systems
By: TechTarget ComputerWeekly.com
Type: eGuide
Reducing effort, reacting faster, preventing problems and improving understanding of the IT environment are the key benefits of AIOps, identified by analyst Forrester. To achieve these goals AIOPs platforms are increasingly making use of predictive analytics and automation to offer IT operations a level of self-healing.
-
Modern Apps CodeWhisperer eBook
By: AWS
Type: eBook
The eBook “Transforming Software Development with Generative AI” addresses the challenges faced by development teams as organizations make greater use of software to transform their businesses. The solution for many dev teams is Amazon CodeWhisperer, the real-time generative artificial intelligence (AI) coding companion.
-
A snippet of Enterprise Strategy Group GenAI data for you
By: TechTarget
Type: Landing Page
As new technologies are invented and further developed, organizations' tech investment priorities may change. After all, it is the demands of the business that often guides the direction of these developments. This cyclical phenomenon is what allows for industries of all types to grow so quickly, including your company.
-
DevOps: Latest developments & use cases in ASEAN
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the state of DevOps adoption across Southeast Asia, the importance of integrating security into DevOps processes and our top tips for securing management buy-in.
-
A Computer Weekly buyer's guide to continuous integration and continuous deployment
By: TechTarget ComputerWeekly.com
Type: eGuide
Continuous integration and continuous deployment offer a variety of advantages for software developers. In this 13-page buyer's guide, Computer Weekly looks at what changes are in its pipeline, assesses the cultural changes it brings and how it can deliver results at speed.
-
How to modernize your legacy ERP system in 5 steps
By: TechTarget ComputerWeekly.com
Type: Infographic
Staying with a legacy ERP system may be the right decision for a company, but many organizations must modernize their legacy ERP to stay competitive in their industry. Here's a look at the five "Rs" of modernizing a legacy ERP system and how to decide on the right approach.
-
Essential Guide: Application Performance Management
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This guide to managing application performance covers transaction speeds, networking, workflow and tools for performance detection and diagnosis.
-
Five Critical Considerations for Choosing Your Next Application Delivery Controller
By: A10 Networks
Type: eGuide
ph
-
Computer Weekly 8 January 2019: Technology innovation in music
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.
-
How microservices take the complexity out of governance
By: Apcera
Type: eGuide
What if there's an easy way to reduce overhead and adapt governance for modern app architectures? In this expert e-guide, explore a distributed, microservices-based approach to governance and learn how to adapt IT for microservices and containers with automation tools.
-
CW Middle East July-Sept 2019: SAP project drives digital transformation for Saudi Arabia's largest auto company
By: TechTarget ComputerWeekly.com
Type: Ezine
It's not just the countries of the Middle East that have a plan when it comes to digital transformation. Private businesses are also overhauling their systems. One such company is the automotive division of Saudi Arabia's Abdul Latif Jameel Company (ALJC), which has completed one of the biggest SAP projects ever undertaken in the auto sector.
-
Infrastructure optimisation for business application management
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we take a look at some of the latest trends in server hardware design and specifications to help IT buyers make an informed choice about the best infrastructure to run their portfolios of business applications on.
-
AI tools for software developers: Part Two
By: TechTarget ComputerWeekly.com
Type: eGuide
The Computer Weekly Developer Network is in the engine room, covered in grease and looking for Artificial Intelligence (AI) tools for software application developers to use. With so much AI power in development and so many new neural network brains to build for our applications, how should programmers 'kit out' their AI toolbox?
-
A Computer Weekly Buyer's Guide to Application Development and DevOps
By: TechTarget ComputerWeekly.com
Type: eGuide
Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.
-
Sharpen your DevOps edge
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, find out why the DevOps culture is taking root across the region, the common pain points of organisations as they embrace a DevOps mindset and what it takes to be successful in the DevOps journey.
-
Securing your software supply chain
By: TechTarget ComputerWeekly.com
Type: eGuide
Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
-
A Computer Weekly buyer's guide to application modernisation
By: TechTarget ComputerWeekly.com
Type: eGuide
In this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.
-
Infographic: Vulnerability management vs. Patch management
By: TechTarget ComputerWeekly.com
Type: Infographic
Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both. Here's a deep dive into their differences, the important places they overlap and software options for automating them.
-
Key software development trends to drive business success
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
-
Toughening up web and mobile application security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
-
Focus ASEAN: Enterprise Mobility
By: TechTarget ComputerWeekly.com
Type: eGuide
With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient.
-
ALM: Taking a middleware-focused approach
By: GigaSpaces Technologies Inc.
Type: eGuide
In this expert e-guide, Tom Nolle discusses how to take a middleware-focused approach to app lifecycle management practices. Uncover helpful advice for selecting middleware tools and managing OS and middleware platforms in the cloud. Plus, learn about the critical relationship between ALM, DevOps, and orchestration.
-
A Computer Weekly e-guide to SASE
By: TechTarget ComputerWeekly.com
Type: eGuide
Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
-
Computer Weekly buyer's guide to mobile app development
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
-
How the application integration landscape is changing
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we discover how the industry is trying to make it possible to link applications together in order to share resources with ease. We take a look at how technologies like Distributed Computing and the Common Object Model have been refined into web services, service-oriented architecture and composable applications and microservices.
-
Evaluating and Selecting AppSec Vendors to Fit Your Business Needs
By: Veracode, Inc.
Type: Resource
The application security (AppSec) market is oversaturated with an abundance of options, which can make finding an AppSec vendor/offering best fit for your unique needs a difficult task. Read this infosheet for some expert guidance to help get you started on your AppSec journey.
-
9 IBM Cloud Paks for app modernization and cloud efforts
By: TechTarget ComputerWeekly.com
Type: eGuide
It takes time, money and labour to modernize applications and workflows to use cloud environments. IBM brings a new dimension to cloud adoption with highly integrated solution stacks that can provide a range of typical workflows for business users. In this e-guide, learn how IBM Cloud Paks can help ease some challenges of application modernization.
-
5 reasons you should migrate to the cloud
By: New Relic
Type: eGuide
In this expert guide, discover five cloud benefits that may prove cloud migration naysayers wrong, including scalability and agility, visibility and governance, cost, and more.
-
Ultimate IoT implementation guide for businesses
By: TechTarget ComputerWeekly.com
Type: eGuide
IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.
-
A Computer Weekly Buyer's Guide to Mobile App Development
By: TechTarget ComputerWeekly.com
Type: Ezine
This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.
-
Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
-
Infographic: 12 API security best practices
By: TechTarget ComputerWeekly.com
Type: Infographic
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.