Find White Papers
Home
About Us
List Your Papers
    
> Technology > Software Development

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Software Development

Software Development is a term to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.
Results 326 - 350 of 1056Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Apr 06, 2015
Read this report from AIIM to discover what issues on-premise ECM users are facing, how external collaboration support is managed, what cloud and mobile functionalities users are requesting, and what alternative scenarios are being considered.
Tags : 
ecm, ibm, external collaboration support, cloud, mobile
    
IBM
Webinar Published By: IBM     Published Date: Apr 06, 2015
How effective is your mobile app development process when it comes to meeting customer needs and business objectives? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift.” IBM customer, Bank of Montreal, also shares their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction. And a bad app will do the opposite (you could risk doubling your costs if you’re not mindful of the key cost drivers).
Tags : 
mobile app development, customer-facing applications, enterprise applications, ibm, mobile moments
    
IBM
White Paper Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
security, software development, it management
    
CDW-Trend Micro
White Paper Published By: IBM     Published Date: Mar 10, 2015
The agile approach is unique in that it focuses on the important aspects of the development process: the people and the artifacts - software and hardware. Learn how Agile encourages developers to be more iterative, team-oriented, self-improving and customer focused.
Tags : 
agile approach, ibm, software development, hardware development, it management
    
IBM
White Paper Published By: IBM     Published Date: Mar 10, 2015
This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.
Tags : 
real-time agility, ibm, agile methods, software development, it management
    
IBM
White Paper Published By: IBM     Published Date: Mar 10, 2015
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process. Agile development has become a cornerstone of most software development organizations. Marked by iterative processes that deliver incremental value over time, agile development has enabled organizations to manage software complexity more effectively and to improve quality and time to market compared with previous development processes.
Tags : 
software development, ibm, agile development, software delivery, it management
    
IBM
White Paper Published By: IBM     Published Date: Mar 10, 2015
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, systems development, product development, traceability, customer lifecycle
    
IBM
White Paper Published By: ForgeRock     Published Date: Mar 10, 2015
In the modern age, customers are in control of when, where, and how they consume information. In this environment, customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before, and to gather as much data and insight from these interactions as possible. To achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity— not typical characteristics of employee-facing IAM, but all too typical of other systems of engagement. This species of solution is worthy of a unique name: identity relationship management (IRM).
Tags : 
iam, irm, forrester, forgerock, platforms
    
ForgeRock
White Paper Published By: ForgeRock     Published Date: Mar 10, 2015
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
irm, management, time-to-market, forgerock, revenue generator
    
ForgeRock
White Paper Published By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
iam, forgerock, irm, relationship management, software development
    
ForgeRock
White Paper Published By: ForgeRock     Published Date: Mar 10, 2015
L'identité est une composante essentielle de la croissance numérique. Les entreprises et les organisations ne peuvent tirer pleinement parti des technologies mobiles, du cloud ou de l'Internet des objets (IdO, ou IoT en anglais) sans une stratégie d'identités évolutive et reproductible. Sans une telle stratégie, elles ne disposent d'aucun moyen d'identifier leurs clients et d'interagir avec eux de quelque manière que ce soit, par le biais d'un ordinateur portable, d'un mobile, d'une tablette, d'une voiture connectée, d'un objet connecté à porter (« wearable »), d'un appareil domotique ou de la toute dernière innovation en termes de connectivité. Ce guide a été conçu pour vous aider à comprendre les éléments fondamentaux de l'identité client et la manière dont elle peut vous aider à communiquer avec vos clients.
Tags : 
software development
    
ForgeRock
White Paper Published By: GridGain     Published Date: Mar 10, 2015
SaaS is becoming increasingly popular, and as the industry develops, more and more companies are dropping older business models in favor of this rapidly evolving methodology. Download now to learn why.
Tags : 
gridgain, saas, saas infrastrutcture, hosted applications, applications
    
GridGain
White Paper Published By: Pentaho     Published Date: Feb 26, 2015
This eBook from O’Reilly Media will help you navigate the diverse and fast-changing landscape of technologies for processing and storing data (NoSQL, big data, MapReduce, etc).
Tags : 
data systems, data-intensive applications, scalability, maintainability, data storage
    
Pentaho
White Paper Published By: Pentaho     Published Date: Feb 26, 2015
This TDWI Best Practices report explains the benefits that Hadoop and Hadoop-based products can bring to organizations today, both for big data analytics and as complements to existing BI and data warehousing technologies.
Tags : 
big data, big data analytics, data warehousing technologies, data storage, business intelligence
    
Pentaho
White Paper Published By: Sitecore     Published Date: Feb 25, 2015
Are too many technologies preventing you from having a single customer view? Find out the latest customer lifetime value trends in the new Forbes Insights report.
Tags : 
content management, vendors, digital experience, optimization, web page
    
Sitecore
White Paper Published By: Sitecore     Published Date: Feb 25, 2015
Sitecore is named as a Leader in The Forrester Wave™ Web Content Management Systems, Q1 2015.
Tags : 
content management, vendors, digital experience, optimization, web page
    
Sitecore
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall
    
McAfee
White Paper Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing
    
CDW
Webinar Published By: Juniper Networks     Published Date: Feb 18, 2015
In this Webinar, experts from IDC, Shutterstock and Juniper discuss how to transition to network virtualization and look at benefits of SDN and automating their networks.
Tags : 
juniper networks, network automation, network performance management, database development, infrastructure
    
Juniper Networks
White Paper Published By: Rackspace     Published Date: Feb 13, 2015
Understand the successes and challenges other organizations have experienced in implementing a DevOps approach.
Tags : 
rackspace, devops, development, operations, cloud
    
Rackspace
White Paper Published By: IBM     Published Date: Feb 11, 2015
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.
Tags : 
criminal fraud detection, authentication methods, ibm, criminal detection software, security
    
IBM
White Paper Published By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
Tags : 
benefits to enterprise it security, exploit prevention, protection from exploits, software attacks, anti spam
    
Kaspersky
Free Offer Published By: Cask     Published Date: Feb 04, 2015
It’s time for business applications to include Big Data functionality, and it’s time for developers to get on the Big Data train. This webinar will focus on how to make that happen.
Tags : 
cask, hadoop, big data, application development, big data application development
    
Cask
Webinar Published By: IBM     Published Date: Feb 02, 2015
Learn more about the benefits of Bluemix. This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application.
Tags : 
mobile data, android application, mobiledata service, business processes, business technology
    
IBM
White Paper Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service
    
BubblewrApp
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End


Sub-Categories: .NET, C++, Database Development, Java, Middleware, Open Source, Quality Assurance, Scripting, SOAP, Software Outsourcing, Software Testing, Visual Basic, Web Development, Web Service Security, Web Services, XML

Search