Software Development White Papers

Software Development is a term to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.

Sub-Categories: .NET, C++, Database Development, Java, Middleware, Open Source, Quality Assurance, Scripting, SOAP, Software Outsourcing, Software Testing, Visual Basic, Web Development, Web Service Security, Web Services, XML
Results 1 - 25 of 656Sort Results By: Published Date | Title | Company Name
By: Riverbed     Published Date: Aug 22, 2014

Secure, Intelligent, WAN Optimization for Microsoft Exchange Server 2013.

Tags : secure, intelligent, optimization, exchange server, security, software development
    
By: Riverbed     Published Date: Aug 22, 2014

An IDC® study documented the business impact of WAN optimization solutions on enterprise organizations. Current trends and issues that were explored include evolving and shifting communication patterns, connection types, applications and bandwidth.

Tags : optimize, network, profit, business impact, solutions, organization, trends, issues
    
By: Riverbed     Published Date: Aug 22, 2014

Businesses rely on SharePoint availability and performance. This infographic shows the impact of SharePoint slowdowns, challenges with delivering SharePoint and recommendations for an effective SharePoint deployment.

Tags : business performance, sharepoint availability, performance, challenges, delivery, recommendation, effective, deployment
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, application security, web service security, mobile computing
    
By: CA Technologies     Published Date: Aug 01, 2014

This paper offers a look at the obstacles of prior generations of service management platforms, and it reveals how a new generation of solutions addresses some of these fundamental limitations.

Tags : service desks, service management platforms, service desk solutions, failing service desks, saas, mobile computing, smart phones, customer interaction service
    
By: Symantec     Published Date: Jul 30, 2014

This report will help you to understand the threats that you face, your vulnerabilities and how you can protect against this.

Tags : vulnerability assessment, website security, protecting against vulnerabilities, web service security, vulnerability management
    
By: Global Knowledge     Published Date: Jul 29, 2014

This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

Tags : global knowledge, ibm, tivoli, monitor, infrastructure, capacity, security, software development
    
By: Global Knowledge     Published Date: Jul 29, 2014

Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help organizations to achieve their goals.

Tags : global knowledge, network functions virtualization, nfv, network, reality, sdn, software, networking
    
By: Global Knowledge     Published Date: Jul 29, 2014

There are many issues and requirements to consider when you upgrade vCenter server and ESXi hosts to vSphere 5.5. The last thing you want is to have the upgrade fail or to encounter problems that you could have avoided with a little bit of research. This paper highlights the process, requirements, and options for upgrading to vSphere 5.5.

Tags : global knowledge, vcenter, server, esxi, host, vsphere, upgrade, security
    
By: IBM     Published Date: Jul 22, 2014

At the heart of a successful agile development team is a skilled group of developers. Agile software professionals continuously deliver on their objectives, but they need robust development tools and practices to maximize their productivity. If you’re a software developer or solution architect, you'll gain the insights you need to ensure your team has the right tools and practices to maximize your effectiveness in agile development.

Tags : ibm, devops, developement, product development, agile, software, agile software, agile software professional
    
By: Jelastic     Published Date: Jul 22, 2014

This webinar will highlight the benefits of utilizing short-term and turnkey options for leveraging IaaS and PaaS solutions as well as the pros and cons of build versus buy decision when building infrastructure.

Tags : jelastic, iaas, paas, open source, turnkey, database development, quality assurance, scripting
    
By: Incapsula     Published Date: Jul 11, 2014

Given today's threat landscape and the availability of inexpensive "Do it yourself DDoS attack kits,” commercial websites of all sizes have become targets of DDoS attacks. This guide offers online businesses practical guidelines and evaluation criteria for choosing their DDoS mitigation solution.

Tags : ddos, mitigation service, cloud-based, delivery, security, speed, availability, websites
    
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014

Say hello to video conferencing like you’ve never seen. Only Lifesize delivers one solution for simply connecting your conference rooms to everyone who needs to be in the meeting—from anywhere, on any device. And that’s just the beginning. Download to learn more.

Tags : lifesize, cloud, video conferencing, solution, cloud technology, connect, software development, wireless
    
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014

Data sharing is the first priority in web conferencing. Web conferencing doesn't work well for day-to-day collaboration. Everything is a scheduled, “meet-me” conference. You can’t just call someone. Web conferencing providers don’t offer a complete solution. You have to separately manage and integrate video systems and instant messaging through independent platforms that do not integrate into the web conferencing service, resulting in an inferior and disjointed user experience. Download now to learn why Lifesize Cloud is the ONLY solution you need!

Tags : lifesize, web conferencing, team collaboration, data sharing, video systems, software development, wireless, data management
    
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014

Meet-me services like Blue Jeans® and Zoom® support only one model: a prescheduled, “meet-me” conference with long, numerical dial strings and access codes. They don’t offer a “connected experience.” You have to separately manage and integrate video systems, resulting in an inferior, disjointed user experience that is more challenging to manage. Meet-me models can’t match Lifesize. Everything else is a group meeting to which participants call in and wait for everyone else. There’s no directory dialing, no point-to-point calling, no presence status and no call escalation. The only thing consistent about meet-me services is that they copy the cumbersome user experience of the audio conferencing model—dial, enter code, enter ID, wait … Download now to learn why Lifesize Cloud is the ONLY solution you need!

Tags : lifesize, cloud, video, connected experience, video systems, meet-me model, software development, wireless
    
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014

Businesses increasingly have more remote workers. Whether working remote full-time, part-time or just while traveling for business, these workers rely heavily on their own mobile devices to stay connected, yet they still need to stay connected to their teams for meetings in their office. Now, more than ever, there’s a strong demand for a video conferencing solution that can provide a simple and instant connection from the office to the home and on the go. Download now to learn more!

Tags : lifesize, cloud, video, conference, remote, mobile, connection, software development
    
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014

Only Lifesize provides an award-winning room video system with best-in-class mobile apps combined with a cloud video service so that everyone gets a connected experience from the meeting room to the office and on the go. Download now to see what some of the top industry reporters, analysts and customers have to say about this new solution from Lifesize.

Tags : lifesize, cloud, video, mobile, apps, connected, cloud solutions, software development
    
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014

How we communicate in the business world is changing. Businesses increasingly have more remote workers. Whether working remote fulltime, part-time or just traveling for business, these workers rely heavily on their own mobile devices to stay connected to their teams, as well as to participate in meetings. Now more than ever, remote workers want (and expect) face-to-face interaction—and they want a seat at the meeting. There’s a strong demand for a video conferencing solution that can provide a simple and instant connected experience from the office to the home and on the go. Download now to learn more about cloud video conferencing.

Tags : lifesize, cloud, cloud video, remote, mobile, conferencing, software development, cloud computing
    
By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014

Cisco and Polycom are expensive, on-premises solutions that take weeks to deploy. They require large, ongoing investments to manage them and do not offer a cloud service. How much time and how many resources do you have to spend training and supporting users to work with your Cisco or Polycom solution? Don’t be fooled by packaging. Their solutions are still complex, on-premises hardware that require a team of IT specialists to support and lack the flexibility for you to grow at your own pace. For a price similar to that of your infrastructure software maintenance, you can use Lifesize Cloud and skip the high cost and complexity of Cisco’s or Polycom’s on-premises infrastructure.

Tags : lifesize, on-premise solutions, cloud service, software, infrastructure, maintenance, software development, storage
    
By: IBM     Published Date: Jul 07, 2014

In the face of runaway innovation, there are leaders in every industry and region who are determined to push ahead and be the source of innovations that change our world. They've opened up their organizations to new ways of working, and they're leading from a position of trust.

Tags : ibm, social business, smarter workforce, innovation, c-suite, global, ceo, leaders
    
By: Symantec Corporation     Published Date: Jun 24, 2014

News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.

Tags : security, pos, data, malware, cyber attacks, point-of-sale, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.

Tags : security, android, applications, code signing, software, developer, apps, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application

Tags : security, applications, symantec, code signing, malware, software development
    
By: Symantec Corporation     Published Date: Jun 24, 2014

The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.

Tags : security, malware, code signing, software, downloads, software development
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.