Software Development White Papers

Software Development is a term to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.

Sub-Categories: .NET, C++, Database Development, Java, Middleware, Open Source, Quality Assurance, Scripting, SOAP, Software Outsourcing, Software Testing, Visual Basic, Web Development, Web Service Security, Web Services, XML
Results 1 - 25 of 659Sort Results By: Published Date | Title | Company Name
By: CloudBees     Published Date: Sep 09, 2014

Continuous Delivery is about developing a process from code to test to stage to deployment in production with historical traceability for control, security and compliance. Join Gigaom Research and our sponsor CloudBees for “Continuous Delivery: Driving Business Agility, Improving Business Execution and Decreasing Time to Market,” a free analyst webinar on Tuesday, September 9, 2014 at 10 a.m. PT.

Tags : cloudbees, continuous delivery, business automation, ttm, time to market, business management, application development, software delivery
    
By: Workday     Published Date: Aug 28, 2014

This webinar focuses on helping you make the move to the cloud apps.

Tags : webinar on the cloud, cloud apps, moving to cloud apps, customisation of the cloud, mobile computing, mobile data systems, application integration, application performance management
    
By: Neustar     Published Date: Aug 27, 2014

Advance planning is the key to holiday profits. Jack Frost may not be nipping at anyone's nose in August, but now is when e-retailers want to put the finishing touches on readying their e-commerce platforms for the all-important holiday shopping season.

Tags : site performance, holiday rush, e-commerce platforms, e-retailers, web services, productivity, project management
    
By: Workday     Published Date: Aug 27, 2014

This paper provides a clear insight into the real SaaS manifesto

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, knowledge management, enterprise applications, storage
    
By: Cray Inc.     Published Date: Aug 21, 2014

Learn how to optimize codes for faster application performance with Intel® Xeon® Phi™ coprocessor.

Tags : optimization, nics, supercomputers, application, performance, hybrid processing, software development, it management
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, web service security, mobile computing
    
By: Verio     Published Date: Aug 06, 2014

Neovise, a cloud computing industry research and analyst firm, prepared this Perspective Report. • Cloud(n), an IaaS public cloud solution developed by NTT and hosted by Verio, delivers unique value, flexibility, reliability, backed by 24/7 customer support. • Using NTT’s vast global network, Verio can offer 99.99% reliability as well as free bandwidth and fixed pricing caps, so customers never pay more than expected. • Citrix CloudPlatform provides developers with a secure, reliable, hypervisor agnostic foundation supporting almost any workload, scaling in and out, as needed. • The intuitive management portal enables custom configured cloud servers to be spun up in minutes, using pre-set or uploaded templates. Load balancing, auto scaling, and monitoring are included. With an extensible API, the portal integrates with over 200 3rd party solutions, including AWS. • ISVs, SaaS and developers should seriously consider the many advantages of Cloud(n).

Tags : ntt, cloudn, cloud(n), public cloud, iaas, citrix, cloudplatform, aws
    
By: Global Knowledge     Published Date: Jul 29, 2014

This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

Tags : global knowledge, ibm, tivoli, monitor, infrastructure, capacity, security, software development
    
By: Global Knowledge     Published Date: Jul 29, 2014

Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help organizations to achieve their goals.

Tags : global knowledge, network functions virtualization, nfv, network, reality, sdn, software, networking
    
By: Global Knowledge     Published Date: Jul 29, 2014

There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process, requirements, and options for upgrading to vSphere 5.5.

Tags : global knowledge, vcenter, server, esxi, host, vsphere, upgrade, security
    
By: IBM     Published Date: Jul 29, 2014

In this e-book, you will learn how to gain faster application delivery with automated release and deployment.

Tags : ibm, ibm urbancode, application delivery, automated release and deployment, release, deployment, application release, software delivery
    
By: Riverbed     Published Date: Jul 15, 2014

Your business is complex. Big data promises to manage this complexity to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, fueling more complexity, delays, and downtime. Forrester predicts this will inevitably get worse. To combat this onslaught, you can no longer just accelerate current practices or rely on human intelligence. You need machines to analyze conditions to invoke the appropriate actions. These actions themselves can be automated. To perform adaptive, full-service automation, you need IT analytics, a disruption to your existing monitoring and management strategy.

Tags : big data analysis, it analytics, manage, complex, automation, monitoring, management strategy, networking
    
By: Incapsula     Published Date: Jul 11, 2014

Given today's threat landscape and the availability of inexpensive "Do it yourself DDoS attack kits,” commercial websites of all sizes have become targets of DDoS attacks. This guide offers online businesses practical guidelines and evaluation criteria for choosing their DDoS mitigation solution.

Tags : ddos, mitigation service, cloud-based, delivery, security, speed, availability, websites
    
By: IBM     Published Date: Jul 07, 2014

In the face of runaway innovation, there are leaders in every industry and region who are determined to push ahead and be the source of innovations that change our world. They've opened up their organizations to new ways of working, and they're leading from a position of trust.

Tags : ibm, social business, smarter workforce, innovation, c-suite, global, ceo, leaders
    
By: Symantec Corporation     Published Date: Jun 24, 2014

News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.

Tags : security, pos, data, malware, cyber attacks, point-of-sale, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.

Tags : security, android, applications, code signing, software, developer, apps, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application

Tags : security, applications, symantec, code signing, malware, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.

Tags : security, malware, code signing, software, downloads, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.

Tags : security, mobile, mobile app, code, mobile application, code signing, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.

Tags : security, code signing, software, private keys, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.

Tags : security, software, mobile, mobile application, malware, code signing, software development
    
By: Global Knowledge     Published Date: Jun 19, 2014

The principles in this white paper help you introduce greater predictability into your own Agile requirements activities, both individually and across your organization. As you start to apply these ideas and pose these questions, you'll likely see certain patterns emerge that will help you establish your own set of practices that make Agile work for you.

Tags : global knowledge, agile, business, analyst, technology, software development
    
By: Intacct Corporation     Published Date: Jun 18, 2014

In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!

Tags : intacct corporation, accounting and financial software, roi, auditing, networking, software development, it management
    
By: Global Knowledge     Published Date: Jun 18, 2014

After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes sense, and any applicable limitations.

Tags : global knowledge, sdn, cloud, cloud computing, nfv, deployment, software development, it management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.