Tool Command Language Reports

Computer Weekly – 12 November 2024: Innovating with weather data at the Met Office
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the Met Office is using its vast stores of weather data to create innovative new products. Our latest buyer's guide looks into identity and access management systems. And we examine the geopolitical threats that could curb the openness of open source. Read the issue now.
Posted: 11 Nov 2024 | Published: 12 Nov 2024

TechTarget ComputerWeekly.com

CW500: A roadmap to software-defined everything – Paddy Power Betfair
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly's CW500 Club heard from IT leaders plotting a roadmap to software-defined everything - this presentation was given by Steven Armstrong, principal automation engineer at Paddy Power Betfair.
Posted: 08 Feb 2021 | Published: 17 Oct 2016

TechTarget ComputerWeekly.com

A guide to continuous software delivery
sponsored by TechTarget ComputerWeekly.com
EBOOK: Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
Posted: 30 Aug 2022 | Published: 30 Aug 2022

TechTarget ComputerWeekly.com

Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Nov 2018

TechTarget ComputerWeekly.com

Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
Posted: 16 Dec 2022 | Published: 20 Dec 2022

TechTarget ComputerWeekly.com

Enterprise cloud applications – can we trust them?
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 08 Feb 2021 | Published: 27 Jul 2016

TechTarget ComputerWeekly.com

A Tour of HP Sarbanes-Oxley IT Assessment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans.
Posted: 29 Apr 2009 | Published: 01 Apr 2009

Hewlett Packard Enterprise

Epicor ICE 2.0: Introducing Next-Generation Business Architecture
sponsored by Epicor Software Corporation
WHITE PAPER: Epicor Internet Component Environment (ICE) 2.0 is a modern business architecture and application framework which utilizes a 100% service-oriented architecture (SOA) and Web 2.0 technologies for a new breed of enterprise solution.
Posted: 21 Nov 2008 | Published: 21 Nov 2008

Epicor Software Corporation

Performance Center of Excellence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: As the application lifecycle evolves, components that drive efficiency and quality become more crucial. Organizations building centers of excellence (CoE) around performance testing find that the CoE centralizes resources and utilizes the full capabilities of today's robust automation products. Read on to learn more about the benefits of CoE.
Posted: 27 Feb 2009 | Published: 27 Feb 2009

Hewlett Packard Enterprise

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis