IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Analysis Techniques

RSS Feed    Add to Google    Add to My Yahoo!
Analysis Techniques White Papers (View All Report Types)
 
The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Vertica for Structured Finance
sponsored by Vertica Systems
WHITE PAPER: This paper examines the increased business challenges in structured finance, the impact on the underlying enabling technologies, and describes how the use of Vertica’s column store, massively parallel processing (MPP) approach to database management and analytic processing can address some of these challenges.
Posted: 26 Aug 2011 | Published: 26 Aug 2011

Vertica Systems

Data Sheet: Mobile App Analytics At a Glance
sponsored by CA Technologies
WHITE PAPER: Analytics takes you beyond your app's look and feel by monitoring user transaction for optimal performance. Uncover important features that will help you yield continuous delivery provided by metrics, monitored business transactions, and more.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

CA Technologies

Rapid Application Delivery Platforms: Just How Fast is Fast?
sponsored by OutSystems
WHITE PAPER: In this paper, you will discover how to leverage a RAD platform to enable improvements in app delivery speed, volume, and quality. Read on to discover how RAD platforms speed up development and delivery processes for your mobile devices and platforms.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

OutSystems

Support Your Innovation Needs with SQL Server
sponsored by Microsoft
WHITE PAPER: Access this white paper and uncover ways to leverage the data explosion in the face of customer demand with SQL Server.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

3 Ways to Move Application Development to the Cloud
sponsored by Oracle Corporation
WHITE PAPER: There are ways to modernize development approaches without squeezing what's left of resources. Explore ways to accelerate innovation, avoid complexity, and increase developer productivity with cloud-based development tools.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Oracle Corporation

Why Test Data Management May Be the Only Way to Drive Continuous Delivery
sponsored by CA Technologies.
WHITE PAPER: This informative resource describes how an end-to-end approach to Test Data Management (TDM) enables faster delivery of high-quality software. Discover the services a TDM strategy must perform to optimize your software development.
Posted: 18 Jan 2016 | Published: 31 Aug 2015

CA Technologies.

A Critique of Software Test Case Design Methods
sponsored by CA Technologies.
WHITE PAPER: Learn the criteria by which you can objectively rate test case design methods. Also discover objective critiques of several common kinds of test case design, including combinatorial methods, multiplicative coverage methods, and formal models. Find out which test case design method is right for you.
Posted: 19 Jan 2016 | Published: 30 Sep 2015

CA Technologies.

Research Report: Enabling the Full Potential of New Operating Systems
sponsored by Microsoft
WHITE PAPER: This executive brief uses recent research to outline some of the challenges facing client computing, security, and compliance teams. Discover ways new capabilities - such as biometric authentications, universal application deployment, and a seamless app experience - demand a new generation of hardware to properly enable and support them.
Posted: 01 Feb 2016 | Published: 30 Oct 2015

Microsoft

A Guide to Protecting your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on now to protect assets, and control access risks and separation-of-duties (SoD) violations, by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement