API Reports

Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
Posted: 17 Oct 2022 | Published: 18 Oct 2022

TechTarget ComputerWeekly.com

Top IT Predictions in APAC in 2023
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this round-up, we review some of the key IT trends that are likely to shape the industry across the APAC region in 2023.
Posted: 19 Dec 2022 | Published: 20 Dec 2022

TechTarget ComputerWeekly.com

UCaaS vs. CCaaS vs. CPaaS: What's the difference?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: It can be difficult to make sense of popular cloud communications service models. Compare UCaaS vs. CCaaS vs. CPaaS to understand their differences and how they can be used together.
Posted: 05 Nov 2023 | Published: 06 Nov 2023

TechTarget ComputerWeekly.com

Unlocking value in the railway network's data
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.
Posted: 08 Feb 2021 | Published: 30 Jun 2020

TechTarget ComputerWeekly.com

Understanding CPaaS market growth, trends and providers
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The CPaaS market is maturing as increased demand for digital communications drives new use cases. Organizations looking to buy CPaaS APIs should examine the various use cases that APIs can address and how to choose a CPaaS provider. Read this article to learn more about the trends and providers fueling CPaaS market growth.
Posted: 06 Nov 2023 | Published: 07 Nov 2023

TechTarget ComputerWeekly.com

Explore the New Open API Economy
sponsored by TIBCO Software Inc.
WHITE PAPER: In this white paper, learn about the business drivers of the open API economy, and discover what you should consider before deciding if open APIs are right for you. Plus, get a list of questions to determine your readiness and tips for evaluating your options going forward.
Posted: 17 Feb 2014 | Published: 31 Dec 2013

TIBCO Software Inc.

BPM-Led Strategies for App Modernization and Robotic Process Automation
sponsored by HelpSystems
EGUIDE: In this e-guide, expert consultant Tom Nolle explores how organizations can leverage BPM to modernize legacy apps effectively. Discover how workflows, APIs, and microservices fit into this framework and your modernization implementation. Plus, learn how BPM will support robotic process automation for the evolving world of IoT and mobile.
Posted: 27 Feb 2017 | Published: 22 Feb 2017

HelpSystems

Architecture Plan and Design Best Practices: Outputs, Interfaces, and Scheduling
sponsored by IBM
EGUIDE: Consult this expert e-guide for advice from Gartner Vice President Anne Thomas Manes and other IT professionals on architecture planning, design best practices, and new approaches to building services with service-oriented architecture (SOA).
Posted: 13 Mar 2014 | Published: 13 Mar 2014

IBM

Mobile Application Development Is About to Get Even Easier
sponsored by Red Hat
EGUIDE: In this e-guide, uncover the key differences that enable efficient mobile app production. Additionally, explore the upcoming role Java IDE will have for the future of the development tool space.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

Red Hat

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM