Software Development White Papers

Software Development is a term to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.

Sub-Categories: .NET, C++, Database Development, Java, Middleware, Open Source, Quality Assurance, Scripting, SOAP, Software Outsourcing, Software Testing, Visual Basic, Web Development, Web Service Security, Web Services, XML
Results 1 - 25 of 738Sort Results By: Published Date | Title | Company Name
By: Sitecore     Published Date: Feb 25, 2015

Are too many technologies preventing you from having a single customer view? Find out the latest customer lifetime value trends in the new Forbes Insights report.

Tags : content management, vendors, digital experience, optimization, web page, hosting, business, agenda
    
By: Sitecore     Published Date: Feb 25, 2015

Sitecore is named as a Leader in The Forrester Wave™ Web Content Management Systems, Q1 2015.

Tags : content management, vendors, digital experience, optimization, web page, hosting, business, agenda
    
By: Kaspersky     Published Date: Feb 05, 2015

This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.

Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks, anti spam, anti spyware, anti virus, application security
    
By: Cask     Published Date: Feb 04, 2015

It’s time for business applications to include Big Data functionality, and it’s time for developers to get on the Big Data train. This webinar will focus on how to make that happen.

Tags : cask, hadoop, big data, application development, big data application development, application integration, enterprise software, database development
    
By: IBM     Published Date: Feb 02, 2015

Learn more about the benefits of Bluemix. This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application.

Tags : mobile data, android application, mobiledata service, business processes, business technology, software development, knowledge management, enterprise applications
    
By: LogMeIn     Published Date: Jan 06, 2015

This paper confirms a changing mix in how Businesses demand web conferencing solutions that are built for modern employees, and a new, more agile and connected workforce.

Tags : death of the web conference, demands on web conferencing solutions, conferencing tools, modern conferencing tools, network performance management, remote network management, wireless communications, customer interaction service
    
By: Cisco     Published Date: Nov 17, 2014

Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile

Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking
    
By: Cisco     Published Date: Nov 17, 2014

Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.

Tags : endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development
    
By: Cisco     Published Date: Nov 17, 2014

Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.

Tags : spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications
    
By: Intacct Corporation     Published Date: Jun 18, 2014

In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!

Tags : intacct corporation, accounting and financial software, roi, auditing, networking, software development, it management
    
By: Pentaho     Published Date: Feb 26, 2015

This eBook from O’Reilly Media will help you navigate the diverse and fast-changing landscape of technologies for processing and storing data (NoSQL, big data, MapReduce, etc).

Tags : data systems, data-intensive applications, scalability, maintainability, data storage, application development, storage management, application integration
    
By: Pentaho     Published Date: Feb 26, 2015

This TDWI Best Practices report explains the benefits that Hadoop and Hadoop-based products can bring to organizations today, both for big data analytics and as complements to existing BI and data warehousing technologies.

Tags : big data, big data analytics, data warehousing technologies, data storage, business intelligence, data integration, enterprise applications, data management
    
By: Riverbed     Published Date: Feb 26, 2015

Only Riverbed can address all of the use cases and demands of IT in the performance management arena.

Tags : performance management, infrastructure monitoring, infrastructure, enterprise, management software tools, user experience monitoring, network management, network performance
    
By: Riverbed     Published Date: Feb 26, 2015

To build modern applications, developers could use some help. That is where application performance management (APM) solutions come in. This whitepaper will provide you 10 ways developers can use APM to improve the quality and performance of their software.

Tags : modern applications, developers, application performance management, apm, software quality, software performance, application security, security management
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.

Tags : mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering
    
By: CDW     Published Date: Feb 24, 2015

The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.

Tags : software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management, software testing
    
By: Juniper Networks     Published Date: Feb 18, 2015

In this Webinar, experts from IDC, Shutterstock and Juniper discuss how to transition to network virtualization and look at benefits of SDN and automating their networks.

Tags : juniper networks, network automation, network performance management, database development, infrastructure
    
By: Juniper Networks     Published Date: Feb 18, 2015

Hear the views of 250 network professionals in this Webinar with GigaOM Research and Juniper Networks. Like-minded professionals speak on effective cloud adoption, the potential of software-defined networking and network automation.

Tags : network automation, cloud, sdn, network, software networking, data management, network security, servers
    
By: IBM     Published Date: Feb 11, 2015

With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters and traditional risk-based authentication solutions can cause many users to be unnecessarily challenged and disrupted, yet do not manage to reduce fraud. As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.

Tags : criminal fraud detection, authentication methods, ibm, criminal detection software, security, software development, business intelligence, risk management
    
By: BubblewrApp     Published Date: Jan 20, 2015

"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."

Tags : secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development
    
By: Box     Published Date: Jan 16, 2015

Has your organization been dealing with storage latency and performance issues? With a population of nearly 10 million people, Los Angeles County is the most populous county in the United States. It's no surprise that with 1.5 million people taking public transportation every day to help ease some of LA County's infamous traffic, making sure passengers get where they're going is a monumental task. At the heart of it all is the organization's IT department. The LA Metro infrastructure consists of 600 servers, 500 of which are virtualized. When the city's IT team began receiving user complaints and experiencing performance issues with their Virtual Desktop Infrastructure (VDI) environment, they began looking for alternatives. Download the case study now and learn how replacing the city's existing storage solution helped solve a wide range of technical problems and eliminated unnecessary latency, ensuring all 1.5 million passengers got where they needed to be.

Tags : nexgen, flash, la metro, vdi, vmware, vdi, software development
    
By: Box     Published Date: Jan 16, 2015

How do you know what the right storage set up is for you? How do you ensure that you're using best practices when implementing? As IT virtualization continues to become more and more prevalent, the storage component of the virtualization architecture continues to play a critical role in performance and availability. Additionally, the ability to benchmark and predict storage performance in a virtualized environment is essential to an efficient and well-run VDI setup. Download now and learn how to select and size the best storage array for your VMWare deployment to maximize your VM density and increase ROI.

Tags : nexgen, flash, qos, vmware, storage, software development, it management
    
By: Box     Published Date: Jan 16, 2015

Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!

Tags : nexgen, hybrid, flash, cisco, nexus, vmware, software development, it management
    
By: IBM     Published Date: Jan 16, 2015

Read the 2014 IDC MarketScape for Worldwide B2B Integration Gateway Software to learn what’s causing so many businesses to adopt advanced integration solutions, and discover why IBM is positioned as a Leader in this vendor assessment.

Tags : ibm, industry solutions, b2b, b2b integration, software, integration gateway software, integration solutions, software development
    
By: Kony     Published Date: Jan 13, 2015

This Gigaom Research webinar will discuss the current state of mobile development processes and tools, evaluate the impact of disruptive forces over the coming years, and provide guidance about how to approach cross-platform mobile development and how to build a flexible, scalable toolset.

Tags : kony, mobile applications, mobile application development, mobile apps, application development platform, development tools, mobile computing, wireless application software
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.