IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Cleanroom Technique

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided. The clean room technique is also known as clean room design. (Sometimes the words "clean room" are merged into the single word, "cleanroom.") Sometimes this process is called the Chinese  … 
Definition continues below.
Cleanroom TechniqueWhite Papers (View All Report Types)
126 - 150 of 1140 Matches Previous Page  | Next Page
Archive Data in the Largest Secure Private Cloud
sponsored by HP Autonomy
WHITE PAPER: This white paper highlights a hosted archiving technology that provides the same capabilities of an on-premise archiving solution, but hosts the data in a secure, private cloud to help increase business agility, cost savings/predictability, and productivity that a cloud deployment enables.
Posted: 15 Apr 2014 | Published: 06 Mar 2014

HP Autonomy

As Cloud Empowers Lines of Business, Challenges for IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper covers the results of a thorough survey that was conducted to determine the impact of cloud technology on IT departments.
Posted: 11 Dec 2013 | Published: 16 Sep 2013

Cisco Systems, Inc.

Avoiding the Top Three Challenges of Custom-Coded SharePoint Applications
sponsored by Dell Software
WHITE PAPER: This white paper discusses the top three challenges of custom-coded SharePoint applications and how to avoid them.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Dell Software

Behavior-Driven Development and Business Rules Management System
sponsored by Red Hat
WHITE PAPER: View this helpful white paper to learn more about three development frameworks, that when integrated, comprise an approach to business rules management system (BRMS) development that ensures fast application delivery and the ability to keep up with market change.
Posted: 04 Dec 2013 | Published: 31 Jul 2013

Red Hat

Best Practices for JBoss Enterprise BRMS
sponsored by Red Hat
WHITE PAPER: To streamline processes, you can leverage business process management (BPM) tools and business rules management systems (BRMS). This resource provides a comprehensive guide to best practices for one BRMS. Read now to learn how to leverage this tool to create process- and rule-based applications on a large scale.
Posted: 06 Dec 2013 | Published: 06 Dec 2013

Red Hat

Applying ITIL Best Practice Principles to IPAM
sponsored by BT Diamond IP
WHITE PAPER: This white paper will explain how each of the main ITIL areas can be applied specifically to IP address management (IPAM), and the benefits that can be accrued from using this management framework.
Posted: 20 Dec 2010 | Published: 20 Dec 2010

BT Diamond IP

Architectural Quality: Design, Development and Testing Rules
sponsored by hello2morrow, Inc.
WHITE PAPER: Read this white paper and explore essential architectural quality rules and their individual considerations. Discover a tool that enforces the most important rules automatically during development.
Posted: 29 Sep 2008 | Published: 24 Sep 2008

hello2morrow, Inc.

Assuring Enterprise-Quality Agile Development
sponsored by HP Software
WHITE PAPER: This white paper provides an overview of the advantages of hybridizing agile development methods with the QA lessons learned from previous methods. Learn how this strategy provides the best of both worlds for developing flexible, secure software products.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

HP Software

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines
sponsored by Dell, Inc.
WHITE PAPER: This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

Dell, Inc.

Automate to Thrive: Driving Business Agility with Effective Release Management
sponsored by SERENA Software, Inc.
WHITE PAPER: This white paper gives an overview of the challenges release management presents, three tips for improving your software release strategies, and insight on how effective release management is poised to become a driver of competitive advantage.
Posted: 03 Apr 2012 | Published: 03 Apr 2012

SERENA Software, Inc.

Automating a Unified Physical Infrastructure
sponsored by Panduit
WHITE PAPER: Read our fourth newsletter featuring research from Gartner to learn how to support business requirements and customer demands in the datacenter while reducing capital and operational expenses.
Posted: 01 Oct 2010 | Published: 20 Aug 2010

Panduit

Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.
Posted: 10 Sep 2009 | Published: 16 Oct 2008

Oracle Corporation

Automating IT Workloads to Accelerate the Delivery of a Business Driven Infrastructure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores the role of workload automation in today's IT environments. Find out where many existing tools fall short as well as why an end-to-end process is recommended.
Posted: 15 Jul 2011 | Published: 01 Apr 2009

CA Technologies.

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
sponsored by Tripwire, Inc.
WHITE PAPER: Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

Avoiding the 10 Most Common Mistakes in Selecting and Implementing e-Procurement Software
sponsored by coupa.com
WHITE PAPER: This whitepaper identifies common pitfalls in choosing and implementing e-procurement software. Find out e-procurement software best practices that help companies save time, save money, and increase the likelihood of a successful implementation.
Posted: 05 Sep 2007 | Published: 01 Sep 2007

coupa.com

B2B Cloud Integration: A strategic approach to optimizing your value chain
sponsored by IBM
WHITE PAPER: This E-book presents an overview of the B2B integration landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

IBM

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Baseline Discovery Audit Datasheet
sponsored by BMC-Accenture
WHITE PAPER: This exclusive resource presents a baseline discovery auditing solution to help you gain insight into key infrastructure and application dependencies in your environment, before embarking on cloud, automation, or proactive operations initiatives.
Posted: 29 Aug 2011 | Published: 29 Aug 2011

BMC-Accenture

Beagle Research Group: Next Generation Platforms for On-Demand Applications
sponsored by Salesforce.com
WHITE PAPER: Learn how enterprise software platforms for CRM and other applications remove much of the complexity of software development, operation and maintenance -- enabling you to extend on-demand success across your entire enterprise.
Posted: 18 Oct 2006 | Published: 01 Mar 2006

Salesforce.com

Become a Java developer
sponsored by IBM
WHITE PAPER: Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
Posted: 02 May 2012 | Published: 03 Jan 2012

IBM

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

Behavior Driven Development: Agile Testing with Red Hat JBoss BRMS
sponsored by Red Hat
WHITE PAPER: In this resource, discover how a software development process known as behavior-driven development, combined with a tool that integrates business rules management, business process management (BPM), and complex event processing (CEP), enables you to speed up and improve the application delivery lifecycle.
Posted: 08 Aug 2013 | Published: 30 Jun 2013

Red Hat

Best Practices for a Mobility Center of Excellence
sponsored by SAP APJ
WHITE PAPER: Mobile technology has taken the business world by storm, and IT teams must deal with a flood of new challenges. Read this paper to learn how to effectively deal with a constantly changing, complex mobile market, extremely high user expectations for rapid delivery of high quality mobile apps, and data security issues across varied devices.
Posted: 27 Mar 2012 | Published: 29 Feb 2012

SAP APJ
126 - 150 of 1140 Matches Previous Page    4 5 6 7 8 9    Next Page
 
CLEANROOM TECHNIQUE DEFINITION (continued): …  wall method, because the intent is to place a demonstrable intellectual barrier between the reverse engineering process and the development of the new product. The use of the clean room technique can be compared, in some respects, with the fair use of copyrighted publications in order to compile a new document. For example, a new book about Linux can be authored on the basis of information obtained by researching existing books, articles, white papers, and Web sites. This does not necessarily constitute copyright infringement, even though other books on Linux already exist, and even if the new … 
Cleanroom Technique definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement