IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Booch Modeling Technique

RSS Feed    Add to Google    Add to My Yahoo!
Booch Modeling Technique White Papers (View All Report Types)
 
Relational Modeling with UML
sponsored by IBM Software Group
WHITE PAPER: This white paper explains the basic concepts behind relational modeling, how it applies to databases and how it is implemented using UML.
Posted: 20 Jun 2007 | Published: 01 Jan 2003

IBM Software Group

Competitive Analysis of Market Leaders in Data Modeling: PowerDesigner, ERwin and ER/Studio
sponsored by Sybase, an SAP company
WHITE PAPER: Read this paper to learn all the factors you need to consider when choosing a data modeling tool. You will learn about the different model types and how each tool measures up to the demanding needs of your company today and in the future. This paper will lay out all the information you need to make a clear decision on data modeling today.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Sybase, an SAP company

Get started with JavaScript
sponsored by IBM
WHITE PAPER: This knowledge path begins with an overview of the JavaScript language to provide a foundation for writing JavaScript code. It then covers more advanced topics such as object-oriented JavaScript and DOM modification for HTML page manipulation before covering introductory Asynchronous JavaScript + XML (Ajax) concepts and how to make Ajax requests.
Posted: 16 Mar 2012 | Published: 05 Apr 2011

IBM

The State of Latency, Containers & Microservices Survey Methodologies & Results
sponsored by Turbonomic
WHITE PAPER: This detailed white paper investigates the state of latency, containers and microservices in the data center by conducting a survey aimed to explore common themes within these systems.
Posted: 08 Sep 2016 | Published: 01 Aug 2015

Turbonomic

Shadow IT, And What To Do About It.
sponsored by Embotics
WHITE PAPER: This insightful blog entry introduces a cloud management platform that will allow you to create a service catalog of standardized, approved systems, whether in the private, public or hybrid cloud allowing you to deliver business requirements quickly and cost effectively.
Posted: 22 Aug 2016 | Published: 08 Jul 2016

Embotics

How to Kill Agility: Nine Metrics Mistakes
sponsored by CA Technologies
WHITE PAPER: Today, organizations embrace rework and rely more heavily on user feedback to improve their products. Access this white paper to explore the role of metrics in software development, and nine common metric mistakes to avoid.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

CA Technologies

Why Cloud Virtualization Is the Best Fit for Your IT Future
sponsored by VMware
WHITE PAPER: When choosing a virtualization platform, there are 5 boxes you must check off before making a firm investment. Access this paper to discover a platform that keeps pace with all environments—including hybrid cloud—and which encompasses broad OS and app ecosystem support, lowers TCO, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

VMware

Your Agility Survival Guide
sponsored by CA Technologies
WHITE PAPER: Building agility into your organization means sensing, creating, and adapting to change quickly and confidently. Access this white paper and learn how to leverage delivery agility, portfolio agility, and business agility for higher profits and faster revenue growth.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

CA Technologies

Create Application Prototypes in Hours
sponsored by CA Technologies
WHITE PAPER: What if you could have an application prototype up and running in hours instead of days? What if you could speed up the engagement process? Discover a technology that gets application prototypes working faster than ever by enabling you to utilize your existing assets.
Posted: 23 Aug 2016 | Published: 30 Nov 2015

CA Technologies

To Increase Downloads, First Instill Trust: Security Advantages of Code Signing
sponsored by Symantec
WHITE PAPER: Malware poses a serious threat to the mobile environment: malicious code can slip into app stores and become a threat to anyone who downloads them. Discover how code signing enables end users to take advantage of the ease and convenience of content distribution—without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 31 Dec 2014

Symantec
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement