> White Papers > Technology > Software Development
 

Software Development

Software Development is a term to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.
Results 1 - 25 of 733Sort Results By: Published Date | Title | Company Name
By: Netapp     Published Date: Dec 12, 2014
This ESG Lab Report documents the real world performance, reliability, availability, and serviceability of NetApp EF- Series flash arrays in Oracle database environments. A combination of hands on testing by ESG Lab and audited in- house performance testing executed by NetApp were used to create this report.
Tags : netapp ef- series flash, oracle database, challenges of managing data, storage management, business intelligence
     Netapp
By: Oracle     Published Date: Dec 11, 2014
"Tips and tricks from the experts: How to ensure a smooth marketing automation software implementation. This guide will give you the top seven steps you must take before implementing any marketing automation software solution. From team formation and alignment to system integration and training, this is a must read for the concerned project manager or IT professional. Read: “Managing a Smooth Marketing Automation Software Implementation”"
Tags : oracle, eloqua, marketing automation, crm, intelligent integration
     Oracle
By: Oracle     Published Date: Dec 11, 2014
"Hopeful messaging is wasted messaging. Clear targeting means more than just Who. It also demands a knowledge of How, When, and What. Read this quick guide on what you can do to ensure your web pages and white papers, social posts, and search optimization are primed and ready for any “road to discovery” your audience takes. Get a clearer picture of who is involved in the buying process. Download the “Modern Marketing Essentials How-To Guide: Targeting”
Tags : oracle, marketing cloud, targetting, persona-driven communication, segmentation
     Oracle
By: Oracle     Published Date: Dec 11, 2014
"It’s not a secret: Your prospects are learning about your products without your help. The hidden sales cycle has emerged over the past decade as the world has moved online. Before, the only way customers and prospects could get information about your products and services was by talking to you. Today, talking to you is the last thing they do. By the time they finally get in touch, most of them will have made their decisions. No more than ever, you must have a strategy in place to engage prospects anytime. Download: “Are you Taking Advantage of the Hidden Sales Cycle?” "
Tags : sales cycle, oracle, eloqua, online information, eguide
     Oracle
By: IBM     Published Date: Nov 25, 2014
Coop Danmark implemented IBM DemandTec Markdown Optimization – delivering insight into the right products to markdown at the best price for the optimal length of time, and helping it maximize the profitability of local price reductions.
Tags : ibm, coop, markdown optimization solutions, smarter commerce, software development
     IBM
By: IBM     Published Date: Nov 25, 2014
When empowered customers use multiple channels to engage and purchase, merchants struggle to make optimal merchandising decisions to maximize sales, profit and shopper loyalty. We’ll show you how IBM can help through our portfolio of Omni-Channel Merchandise Optimization solutions.
Tags : ibm, ibm experienceone, optimal merchandising, cloud-computing, software development
     IBM
By: Izenda     Published Date: Nov 20, 2014
If you’re responsible for delivery of a .NET application and your users have analytics requirements, you have some decisions to make. Watch Gigaom Research and our sponsor Izenda for “User Driven BI in the Cloud and Within Your Application,” a free recorded analyst webinar.
Tags : izenda, business intelligence, saas, saas applications, bi applications
     Izenda
By: IBM     Published Date: Nov 19, 2014
IBM's new Platform-as-a-Service (PaaS) offering, IBM Bluemix, delivers the speed and flexibility of the cloud to allow developers to more quickly compose and build enterprise-grade applications for by providing access to IBM's vast software portfolio as composable services. This powerful PaaS/services combination, built on open standards and taking advantage of Cloud Foundry, enables developers to avoid vendor lock-in while leveraging their existing application development assets and skills, which is essential for building hybrid clouds. IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment.This session provides an overview of IBM Bluemix capabilities.
Tags : ibm, bluemix, cloud-computing, middleware, networking
     IBM
By: IBM     Published Date: Nov 19, 2014
IBM DevOps for Bluemix provides an integrated set of DevOps services in the IBM Bluemix PaaS, for individuals and teams building mobile and cloud applications (‘systems of engagement’) that enable teams to shrink the application delivery cycle time, and consistently deliver software with speed, quality and accuracy. This session provides an overview of IBM DevOps services on Bluemix, focusing on quickly getting started with new projects and collaborative development with agile tracking and planning.
Tags : ibm, bluemix, devops, collaborative development, productivity
     IBM
By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks
     Cisco
By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : endpoint proliferation, ids, ips, externalization, cisco
     Cisco
By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : spyware, rootkits, hacking, cisco, advanced threat protection
     Cisco
By: Dyn     Published Date: Oct 16, 2014
Web presence is now a required option for customers accessing a business’s products and services. But more than just an option, web pages have become the face of most companies to the public. Learn how can you take control of the Internet effect on your company’s web presence through Internet monitoring, analysis and planning.
Tags : dyn, internet visibility, web infrastructure, web presense, customer service
     Dyn
By: Citrix Systems     Published Date: Oct 07, 2014
Mobile workspaces fulfill the vision for anywhere, anytime flexibility and productivity. People are empowered to get their work done in an always-on, fully secure environment that follows them everywhere, on any device. With seamless access to all corporate resources—even on the same devices that hold their personal content—people can get their work done faster and better for optimal business impact. By achieving true enterprise mobility, the organization as a whole gains new levels of agility and performance. This paper discusses the elements to a complete mobile workspace solution.
Tags : business, growth, workspace, mobile, experience
     Citrix Systems
By: CA Technologies     Published Date: Sep 11, 2014
In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.
Tags : devops, software, training, project management, software development
     CA Technologies
By: Workday     Published Date: Aug 28, 2014
This webinar focuses on helping you make the move to the cloud apps.
Tags : webinar on the cloud, cloud apps, moving to cloud apps, customisation of the cloud, mobile computing
     Workday
By: Workday     Published Date: Aug 27, 2014
This paper provides a clear insight into the real SaaS manifesto
Tags : saas manifesto, in the cloud, saas security, saas definition, networking
     Workday
By: Global Knowledge     Published Date: Jul 29, 2014
This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.
Tags : global knowledge, ibm, tivoli, monitor, infrastructure
     Global Knowledge
By: Global Knowledge     Published Date: Jul 29, 2014
Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help organizations to achieve their goals.
Tags : global knowledge, network functions virtualization, nfv, network, reality
     Global Knowledge
By: Global Knowledge     Published Date: Jun 19, 2014
The principles in this white paper help you introduce greater predictability into your own Agile requirements activities, both individually and across your organization. As you start to apply these ideas and pose these questions, you'll likely see certain patterns emerge that will help you establish your own set of practices that make Agile work for you.
Tags : global knowledge, agile, business, analyst, technology
     Global Knowledge
By: Intacct Corporation     Published Date: Jun 18, 2014
In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!
Tags : intacct corporation, accounting and financial software, roi, auditing, networking
     Intacct Corporation
By: Global Knowledge     Published Date: Jun 18, 2014
After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes sense, and any applicable limitations.
Tags : global knowledge, sdn, cloud, cloud computing, nfv
     Global Knowledge
By: Global Knowledge     Published Date: May 30, 2014
You may have heard about software-defined networking (SDN) and its cousin network functions virtualization (NFV). These emerging technologies are likely to revolutionize the IT industry as well as your job. This white paper introduces you to SDN and NFV, examines their impact on you as well as the industry, and summarizes why you should care and how to prepare for the coming changes.
Tags : global knowledge, sdn, software, nfv, technology
     Global Knowledge
By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software
     Lumension
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: .NET, C++, Database Development, Java, Middleware, Open Source, Quality Assurance, Scripting, SOAP, Software Outsourcing, Software Testing, Visual Basic, Web Development, Web Service Security, Web Services, XML

Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.