IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Capability Maturity Model

RSS Feed    Add to Google    Add to My Yahoo!
Capability Maturity Model White Papers (View All Report Types)
 
Transforming Storage Operations from Entrepreneurial to Predictive
sponsored by EMC Corporation
WHITE PAPER: Some organizations continue to operate without documented processes, procedures and polices. Learn how to avoid risks to services levels, business continuity - and a new approach to IT - one that moves from a reactive to a more predictive model.
Posted: 13 Dec 2004 | Published: 01 Dec 2004

EMC Corporation

Journey towards Zero Defects: Challenges, Best Practices and Testing Models
sponsored by Wipro Technologies
WHITE PAPER: Organizations face different challenges at different levels of testing maturity. Testing Maturity Model (TMM) and Test Process Improvement (TPI) are two of the contemporary testing maturity models discussed in this paper.
Posted: 10 Nov 2005 | Published: 01 Nov 2005

Wipro Technologies

Best Practices for Delivering Better Software Faster with ALM
sponsored by IBM
WHITE PAPER: This paper outlines the steps that organizations must take to improve their systems and software development processes, including key best practices. It discusses solutions for unifying fractured, global development groups with existing infrastructures.
Posted: 17 Mar 2010 | Published: 17 Dec 2009

IBM

7 Critical Capabilities Your Mobile App Development and Deployment Platform Must Include
sponsored by Alpha Software Inc.
WHITE PAPER: Explore the important differences between 3 different mobile app development approaches. Discover 7 mobile capabilities that real-world business apps require today, and find out how to get these mobile apps to market fast.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Alpha Software Inc.

4 Compelling Use Cases for Hyper-Converged Infrastructure
sponsored by VMware & Intel
WHITE PAPER: In this paper, discover four concrete use cases for v-SAN-powered hyper-converged infrastructure, with each case deconstructed. Read on to see how HCI is evolving traditionally restrictive hardware-centric environments for success with remote/branch office deployment, VDI/EUC, and 2 more.
Posted: 26 Sep 2017 | Published: 31 Jan 2017

VMware & Intel

10 Signs You've Outgrown Your Requirements Management Tool
sponsored by Perforce Software, Inc.
WHITE PAPER: Uncover 10 common signs that it's time to upgrade requirements management and learn how to implement an enterprise-grade platform that adapts and scales with your growth.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Perforce Software, Inc.

Why Service Desk Consolidation is the New Imperative for IT Leaders
sponsored by Cherwell
WHITE PAPER: Many organizations have taken to implementing service desks as needed, leading to widespread IT sprawl. Access this white paper to learn about the challenges CIOs are facing, the business cases for service desk consolidation, and what to look for when evaluating service management tools.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

Cherwell

Do IT Teams Need UX Professionals to Deliver Great User Experiences?
sponsored by Mendix
WHITE PAPER: In order for your application to deliver the best user experience (UX), you need to have a deep understanding of your users, their needs, and their behaviors. How many UX professionals does your team need to deliver consistently and at scale? Read on to find out.
Posted: 22 Sep 2017 | Published: 15 Sep 2017

Mendix

Executive Checklist: Linux Containers
sponsored by Red Hat
WHITE PAPER: There are many different types of containers you can decide to implement, depending on whether you need an open source solution. Access this solution brief to find the questions you need to ask yourself to determine what sort of container solution would be best for you.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Red Hat

Ten Layers of Container Security
sponsored by Red Hat
WHITE PAPER: Are containers secure? Can you really trust containers with your applications? Access this whitepaper to find out how to be sure your containers are as secure as possible by looking into all ten layers of container security.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement