Software Development White Papers

Software Development is a term to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.

Sub-Categories: .NET, C++, Database Development, Java, Middleware, Open Source, Quality Assurance, Scripting, SOAP, Software Outsourcing, Software Testing, Visual Basic, Web Development, Web Service Security, Web Services, XML
Results 1 - 25 of 747Sort Results By: Published Date | Title | Company Name
By: ForgeRock     Published Date: Mar 10, 2015

In the modern age, customers are in control of when, where, and how they consume information. In this environment, customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before, and to gather as much data and insight from these interactions as possible. To achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity— not typical characteristics of employee-facing IAM, but all too typical of other systems of engagement. This species of solution is worthy of a unique name: identity relationship management (IRM).

Tags : iam, irm, forrester, forgerock, platforms, relationship management, software development
    
By: ForgeRock     Published Date: Mar 10, 2015

Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and epeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.

Tags : irm, management, time-to-market, forgerock, revenue generator, software development
    
By: ForgeRock     Published Date: Mar 10, 2015

Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.

Tags : iam, forgerock, irm, relationship management, software development
    
By: ForgeRock     Published Date: Mar 10, 2015

L'identité est une composante essentielle de la croissance numérique. Les entreprises et les organisations ne peuvent tirer pleinement parti des technologies mobiles, du cloud ou de l'Internet des objets (IdO, ou IoT en anglais) sans une stratégie d'identités évolutive et reproductible. Sans une telle stratégie, elles ne disposent d'aucun moyen d'identifier leurs clients et d'interagir avec eux de quelque manière que ce soit, par le biais d'un ordinateur portable, d'un mobile, d'une tablette, d'une voiture connectée, d'un objet connecté à porter (« wearable »), d'un appareil domotique ou de la toute dernière innovation en termes de connectivité. Ce guide a été conçu pour vous aider à comprendre les éléments fondamentaux de l'identité client et la manière dont elle peut vous aider à communiquer avec vos clients.

Tags : software development
    
By: Pentaho     Published Date: Feb 26, 2015

This eBook from O’Reilly Media will help you navigate the diverse and fast-changing landscape of technologies for processing and storing data (NoSQL, big data, MapReduce, etc).

Tags : data systems, data-intensive applications, scalability, maintainability, data storage, application development, storage management, application integration
    
By: Pentaho     Published Date: Feb 26, 2015

This TDWI Best Practices report explains the benefits that Hadoop and Hadoop-based products can bring to organizations today, both for big data analytics and as complements to existing BI and data warehousing technologies.

Tags : big data, big data analytics, data warehousing technologies, data storage, business intelligence, data integration, enterprise applications, data management
    
By: Riverbed     Published Date: Feb 26, 2015

Only Riverbed can address all of the use cases and demands of IT in the performance management arena.

Tags : performance management, infrastructure monitoring, infrastructure, enterprise, management software tools, user experience monitoring, network management, network performance
    
By: Riverbed     Published Date: Feb 26, 2015

To build modern applications, developers could use some help. That is where application performance management (APM) solutions come in. This whitepaper will provide you 10 ways developers can use APM to improve the quality and performance of their software.

Tags : modern applications, developers, application performance management, apm, software quality, software performance, application security, security management
    
By: Sitecore     Published Date: Feb 25, 2015

Are too many technologies preventing you from having a single customer view? Find out the latest customer lifetime value trends in the new Forbes Insights report.

Tags : content management, vendors, digital experience, optimization, web page, hosting, business, agenda
    
By: Sitecore     Published Date: Feb 25, 2015

Sitecore is named as a Leader in The Forrester Wave™ Web Content Management Systems, Q1 2015.

Tags : content management, vendors, digital experience, optimization, web page, hosting, business, agenda
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.

Tags : mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering
    
By: Juniper Networks     Published Date: Feb 18, 2015

In this Webinar, experts from IDC, Shutterstock and Juniper discuss how to transition to network virtualization and look at benefits of SDN and automating their networks.

Tags : juniper networks, network automation, network performance management, database development, infrastructure
    
By: LogMeIn     Published Date: Jan 06, 2015

This paper confirms a changing mix in how Businesses demand web conferencing solutions that are built for modern employees, and a new, more agile and connected workforce.

Tags : death of the web conference, demands on web conferencing solutions, conferencing tools, modern conferencing tools, network performance management, remote network management, wireless communications, customer interaction service
    
By: Oracle     Published Date: Dec 11, 2014

"Hopeful messaging is wasted messaging. Clear targeting means more than just Who. It also demands a knowledge of How, When, and What. Read this quick guide on what you can do to ensure your web pages and white papers, social posts, and search optimization are primed and ready for any “road to discovery” your audience takes. Get a clearer picture of who is involved in the buying process. Download the “Modern Marketing Essentials How-To Guide: Targeting”

Tags : oracle, marketing cloud, targetting, persona-driven communication, segmentation, database transformation, networking, software development
    
By: Cisco     Published Date: Nov 17, 2014

Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile

Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking
    
By: Cisco     Published Date: Nov 17, 2014

Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.

Tags : endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development
    
By: Cisco     Published Date: Nov 17, 2014

Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.

Tags : spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications
    
By: Lenovo     Published Date: Sep 16, 2014

Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OS’s that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.

Tags : agency it, workforce mobility, mobile productivity, cloud computing, it management, project management, web services, database security
    
By: CDW     Published Date: Mar 26, 2015

Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.

Tags : security, software development, it management
    
By: IBM     Published Date: Mar 10, 2015

The agile approach is unique in that it focuses on the important aspects of the development process: the people and the artifacts - software and hardware. Learn how Agile encourages developers to be more iterative, team-oriented, self-improving and customer focused.

Tags : agile approach, ibm, software development, hardware development, it management, best practices, business intelligence
    
By: IBM     Published Date: Mar 10, 2015

This paper introduces practical approaches to Agile focused on core principles and practices and shows how they improve project results for embedded systems development. Agile methods are a cohesive set of concepts, principles and practices to address the challenges of software development.

Tags : real-time agility, ibm, agile methods, software development, it management, best practices, business intelligence, business management
    
By: IBM     Published Date: Mar 10, 2015

This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process. Agile development has become a cornerstone of most software development organizations. Marked by iterative processes that deliver incremental value over time, agile development has enabled organizations to manage software complexity more effectively and to improve quality and time to market compared with previous development processes.

Tags : software development, ibm, agile development, software delivery, it management, business intelligence, business management
    
By: IBM     Published Date: Mar 10, 2015

Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.

Tags : ibm, systems development, product development, traceability, customer lifecycle, software development, it management, knowledge management
    
By: CDW     Published Date: Feb 24, 2015

The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.

Tags : software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management, software testing
    
By: IBM     Published Date: Feb 13, 2015

Packed with everything you need to know about Hadoop analytics, this handy guide provides you with a solid understanding of the critical big data concepts and trends, and suggests ways for you to revolutionize your business operations through the implementation of cost-effective, high performance Hadoop technology.

Tags : ibm, big data, hadoop, high performance computing, hpc, distributed computing, network performance, application integration
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.