> White Papers > Technology > Software Development
 

Software Development

Software Development is a term to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.
Results 1 - 25 of 814Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 20, 2015
Today’s customers are well-informed and empowered by information. They use other people and online experts as information sources. They interact with companies by multiple methods and expect a relevant dialogue with each brand. This paper introduces the IBM Predictive Customer Intelligence solution, which is designed to help your company create personalized, relevant experiences for individual customers with a focus on driving new revenue. Along with explaining the architecture of the solution, this paper covers how the solution works.
Tags : ibm, software, business analytics, database, database development
     IBM
By: IBM     Published Date: May 18, 2015
Learn how to deliver higher quality software by increase the efficiency and effectiveness of your testing processes while reducing testing downtime and testing cost.
Tags : service virtualization, testing downtime, testing costs, testing processes, software delivery
     IBM
By: IBM     Published Date: May 18, 2015
TechWell, IBM, uTest, and Keynote partnered on a powerful new survey that explores where today’s testers are spending their time, what obstacles they most often encounter, and where they think their attention should be focused.
Tags : testing solutions, mobile testing, testing times, survey insights, release cycles
     IBM
By: IBM     Published Date: May 18, 2015
In this eBook, we share how IBM software and solutions can help an organization manage quality and begin testing SAP solutions and the integrations they depend on earlier, continuously, while testing smarter.
Tags : sap solutions, application integration, software delivery, application management, enterprise application
     IBM
By: ForgeRock     Published Date: May 05, 2015
Forrester Consulting propose des services de conseil indépendants et objectifs, qui s'appuient sur des enquêtes approfondies et permettent aux dirigeants d'assurer la réussite de leurs entreprises. Qu'il s'agisse d'une simple séance d'orientation stratégique ou de projets sur mesure de plus grande ampleur, les services de Forrester Consulting vous permettent d'entrer en contact avec des analystes spécialisés, qui mettent toute leur expertise à votre service pour vous aider à relever vos défis spécifiques. Pour plus d'informations, consultez le site forrester.com/consulting.
Tags : software development
     ForgeRock
By: Riverbed     Published Date: Apr 24, 2015
Download this infographic to see the advantages of using SteelHead SaaS and Microsoft Office 365.
Tags : steelhead saas, microsoft office 365, network latency, app delivery, networking
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
Enterprise IT has gone through several waves of evolution since the birth of computing. The computing platform has evolved from mainframe computing to minicomputers, shifted to client/server computing, and finally moved to Internet computing in the cloud era. Read this white paper to learn more about the need for location-independent computing.
Tags : hybrid enterprise, location-independent computing, enterprise it, computing platform, cloud computing
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn how to turn your network into an enabler of your hybrid enterprise, increase reliability, and reduce costs with Riverbed SteelHead hybrid networking.
Tags : riverbed steelhead, hybrid network, saas, user experience, reliability
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
Riverbed Technology has been addressing performance issues on private and cloud enterprise networks with Steelhead wide-area network (WAN) optimization. Since 2012, Riverbed has applied its technology to Office 365 and Salesforce with Riverbed® Steelhead® Cloud Accelerator. Steelhead Cloud Accelerator combines WAN and Internet optimization to ensure bandwidth reductions and a superior user experience.
Tags : microsoft office 365, riverbed technology, wide area network optimization, salesforce, cloud
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn 3 critical legacy application evaluation activities to ensure cloud migration success. Activity #1: Determine if there is a cost justification Activity #2: Conduct a cloud readiness study to better understand the business and technical factors Activity #3: Conduct a pre- and post-migration study to understand how the app will behave in the cloud
Tags : legacy application evaluation, cloud migration, cloud readiness, mobile, networking
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn how to: • Architect an integrated WAN to support evolving application deployment models using the Internet in concert with MPLS. • Create a WAN solution that can optimize traffic flows between the Internet and the MPLS for all applications and between both internal and external users. • Deploy a solution across all independent network services that can monitor, report, control and optimize end-to-end path forwarding for all endpoints.
Tags : enterprise wan, integrated wan, public cloud services, connectivity, application performance
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
This brief focuses on performance gains when using SteelHead SaaS with Office 365 for multi-tenant cloud services.
Tags : steelhead saas, microsoft office 365, optimization, cloud services, networking
     Riverbed
By: Riverbed     Published Date: Apr 24, 2015
To better serve business demands for information everywhere, enterprises must develop new strategies for optimizing multiple kinds of networks. Read this white paper to learn more about accelerating delivery of data, increasing employee productivity, and creating optimal user experiences by powering the hybrid enterprise.
Tags : data delivery, employee productivity, user experience, hybrid enterprise, networking
     Riverbed
By: Adobe     Published Date: Apr 13, 2015
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more. Download this white paper to learn more.
Tags : adobe, electronic signatures, digital transactions, paper-to-digital, business intelligence
     Adobe
By: VMware, Inc.     Published Date: Apr 08, 2015
Businesses are looking for a more flexible IT framework that can adapt to today’s rapidly changing and global environment.The need for faster, more cost-effective access to IT resources has created a healthy tension between business teams and IT, driving both to look for new and better solutions. Now VMware and our partners are delivering a new generation of hybrid cloud services that seamlessly extend your onsite data center to the cloud. Hybrid cloud services from VMware vCloud® Air™ and VMware vCloud Air Network Service Provider partners enable you to deploy and manage applications between your onsite and offsite environments to best meet the needs of your business.
Tags : interoperability, web services, web service security
     VMware, Inc.
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : security, software development, it management
     CDW-Trend Micro
By: ForgeRock     Published Date: Mar 10, 2015
In the modern age, customers are in control of when, where, and how they consume information. In this environment, customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before, and to gather as much data and insight from these interactions as possible. To achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity— not typical characteristics of employee-facing IAM, but all too typical of other systems of engagement. This species of solution is worthy of a unique name: identity relationship management (IRM).
Tags : iam, irm, forrester, forgerock, platforms
     ForgeRock
By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : iam, forgerock, irm, relationship management, software development
     ForgeRock
By: ForgeRock     Published Date: Mar 10, 2015
L'identité est une composante essentielle de la croissance numérique. Les entreprises et les organisations ne peuvent tirer pleinement parti des technologies mobiles, du cloud ou de l'Internet des objets (IdO, ou IoT en anglais) sans une stratégie d'identités évolutive et reproductible. Sans une telle stratégie, elles ne disposent d'aucun moyen d'identifier leurs clients et d'interagir avec eux de quelque manière que ce soit, par le biais d'un ordinateur portable, d'un mobile, d'une tablette, d'une voiture connectée, d'un objet connecté à porter (« wearable »), d'un appareil domotique ou de la toute dernière innovation en termes de connectivité. Ce guide a été conçu pour vous aider à comprendre les éléments fondamentaux de l'identité client et la manière dont elle peut vous aider à communiquer avec vos clients.
Tags : software development
     ForgeRock
By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
Tags : benefits to enterprise it security, exploit prevention, protection from exploits, software attacks, anti spam
     Kaspersky
By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks
     Cisco
By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : endpoint proliferation, ids, ips, externalization, cisco
     Cisco
By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : spyware, rootkits, hacking, cisco, advanced threat protection
     Cisco
By: Intacct Corporation     Published Date: Jun 18, 2014
In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!
Tags : intacct corporation, accounting and financial software, roi, auditing, networking
     Intacct Corporation
By: Aternity     Published Date: May 22, 2015
“End User Experience Monitoring” or EUEM is used pervasively by vendors in the APM market. But comprehensive EUEM requires a deeper look. This 30-minute webinar that will help you navigate these EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management
     Aternity
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: .NET, C++, Database Development, Java, Middleware, Open Source, Quality Assurance, Scripting, SOAP, Software Outsourcing, Software Testing, Visual Basic, Web Development, Web Service Security, Web Services, XML

Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.