Software Development White Papers

Software Development is a term to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.

Sub-Categories: .NET, C++, Database Development, Java, Middleware, Open Source, Quality Assurance, Scripting, SOAP, Software Outsourcing, Software Testing, Visual Basic, Web Development, Web Service Security, Web Services, XML
Results 1 - 25 of 716Sort Results By: Published Date | Title | Company Name
By: Cask     Published Date: Feb 04, 2015

It’s time for business applications to include Big Data functionality, and it’s time for developers to get on the Big Data train. This webinar will focus on how to make that happen.

Tags : cask, hadoop, big data, application development, big data application development, storage virtualization, application integration, database development
    
By: IBM     Published Date: Jan 16, 2015

Read the 2014 IDC MarketScape for Worldwide B2B Integration Gateway Software to learn what’s causing so many businesses to adopt advanced integration solutions, and discover why IBM is positioned as a Leader in this vendor assessment.

Tags : ibm, industry solutions, b2b, b2b integration, software, integration gateway software, integration solutions, software development
    
By: LogMeIn     Published Date: Jan 06, 2015

This paper confirms a changing mix in how Businesses demand web conferencing solutions that are built for modern employees, and a new, more agile and connected workforce.

Tags : death of the web conference, demands on web conferencing solutions, conferencing tools, modern conferencing tools, network performance management, remote network management, wireless communications, customer interaction service
    
By: Symantec Corporation     Published Date: Dec 23, 2014

Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs.

Tags : cloud-based, code, enterprise, symantec, apps, secure app service, security, software development
    
By: Oracle     Published Date: Dec 11, 2014

"Tips and tricks from the experts: How to ensure a smooth marketing automation software implementation. This guide will give you the top seven steps you must take before implementing any marketing automation software solution. From team formation and alignment to system integration and training, this is a must read for the concerned project manager or IT professional. Read: “Managing a Smooth Marketing Automation Software Implementation”"

Tags : oracle, eloqua, marketing automation, crm, intelligent integration, data quality, networking, software development
    
By: Oracle     Published Date: Dec 11, 2014

"Hopeful messaging is wasted messaging. Clear targeting means more than just Who. It also demands a knowledge of How, When, and What. Read this quick guide on what you can do to ensure your web pages and white papers, social posts, and search optimization are primed and ready for any “road to discovery” your audience takes. Get a clearer picture of who is involved in the buying process. Download the “Modern Marketing Essentials How-To Guide: Targeting”

Tags : oracle, marketing cloud, targetting, persona-driven communication, segmentation, database transformation, networking, software development
    
By: Oracle     Published Date: Dec 11, 2014

"It’s not a secret: Your prospects are learning about your products without your help. The hidden sales cycle has emerged over the past decade as the world has moved online. Before, the only way customers and prospects could get information about your products and services was by talking to you. Today, talking to you is the last thing they do. By the time they finally get in touch, most of them will have made their decisions. No more than ever, you must have a strategy in place to engage prospects anytime. Download: “Are you Taking Advantage of the Hidden Sales Cycle?” "

Tags : sales cycle, oracle, eloqua, online information, eguide, networking, software development, knowledge management
    
By: Cisco     Published Date: Nov 17, 2014

Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile

Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking
    
By: Cisco     Published Date: Nov 17, 2014

Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.

Tags : endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development
    
By: Cisco     Published Date: Nov 17, 2014

Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.

Tags : spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications
    
By: Lenovo     Published Date: Sep 16, 2014

Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OS’s that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.

Tags : agency it, workforce mobility, mobile productivity, cloud computing, it management, project management, web services, database security
    
By: Symantec Corporation     Published Date: Jun 24, 2014

News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.

Tags : security, pos, data, malware, cyber attacks, point-of-sale, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.

Tags : security, android, applications, code signing, software, developer, apps, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application

Tags : security, applications, symantec, code signing, malware, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.

Tags : security, malware, code signing, software, downloads, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.

Tags : security, mobile, mobile app, code, mobile application, code signing, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.

Tags : security, code signing, software, private keys, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.

Tags : security, software, mobile, mobile application, malware, code signing, software development
    
By: Intacct Corporation     Published Date: Jun 18, 2014

In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!

Tags : intacct corporation, accounting and financial software, roi, auditing, networking, software development, it management
    
By: BubblewrApp     Published Date: Jan 20, 2015

"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."

Tags : secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development
    
By: Box     Published Date: Jan 16, 2015

Has your organization been dealing with storage latency and performance issues? With a population of nearly 10 million people, Los Angeles County is the most populous county in the United States. It's no surprise that with 1.5 million people taking public transportation every day to help ease some of LA County's infamous traffic, making sure passengers get where they're going is a monumental task. At the heart of it all is the organization's IT department. The LA Metro infrastructure consists of 600 servers, 500 of which are virtualized. When the city's IT team began receiving user complaints and experiencing performance issues with their Virtual Desktop Infrastructure (VDI) environment, they began looking for alternatives. Download the case study now and learn how replacing the city's existing storage solution helped solve a wide range of technical problems and eliminated unnecessary latency, ensuring all 1.5 million passengers got where they needed to be.

Tags : nexgen, flash, la metro, vdi, vmware, vdi, software development
    
By: Box     Published Date: Jan 16, 2015

How do you know what the right storage set up is for you? How do you ensure that you're using best practices when implementing? As IT virtualization continues to become more and more prevalent, the storage component of the virtualization architecture continues to play a critical role in performance and availability. Additionally, the ability to benchmark and predict storage performance in a virtualized environment is essential to an efficient and well-run VDI setup. Download now and learn how to select and size the best storage array for your VMWare deployment to maximize your VM density and increase ROI.

Tags : nexgen, flash, qos, vmware, storage, software development, it management
    
By: Box     Published Date: Jan 16, 2015

Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!

Tags : nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
By: Bright Computing     Published Date: Nov 29, 2014

Delivering a cost-effective HPC solution to Cisco Unified Computing System (UCS) customers has become easier thanks to Bright Computing. Read more to Learn how these products provide an HPC cluster solution that offers cost-saving features.

Tags : bright computing, hpc, hpc clusters, clustering, cisco ucs, cluster management, software architrcture, ethernet networking
    
By: IBM     Published Date: Nov 25, 2014

Coop Danmark implemented IBM DemandTec Markdown Optimization – delivering insight into the right products to markdown at the best price for the optimal length of time, and helping it maximize the profitability of local price reductions.

Tags : ibm, coop, markdown optimization solutions, smarter commerce, software development, it management, enterprise applications, platforms
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.