IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Cleanroom Technique

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided. The clean room technique is also known as clean room design. (Sometimes the words "clean room" are merged into the single word, "cleanroom.") Sometimes this process is called the Chinese  … 
Definition continues below.
Cleanroom Technique White Papers (View All Report Types)
26 - 50 of 2115 Matches Previous Page  |  Next Page
3 Ways to Cut the Cost and Pain of a Software Audit
sponsored by BDNA
WHITE PAPER: This white paper examines the top challenges IT professionals face when preparing for a vendor audit, as well as offering suggested solutions to cut the cost and pain of a software audit. Download now to access expert tips on how to prepare for your vendor audit.
Posted: 28 Apr 2016 | Published: 28 Apr 2016

BDNA

4 Critical Steps to Achieve IT Uptime, Connectivity with Data Center Colocation
sponsored by CyrusOne
WHITE PAPER: Discover how colocation can help you maintain your data centers in today's pressurized, highly-competitive business environment with high levels of network flexibility and security. Read on to complete 4 critical steps to improving IT uptime and connectivity as outlined here.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

CyrusOne

5 Best Practices for Designing Data-Driven Applications
sponsored by OpenText
WHITE PAPER: Developing compelling data-driven applications is no easy task. This resource reveals 5 best practices for designing data-driven apps that inform, connect, and motivate end users. Learn how you can make big data useful, build data-driven apps to scale, and more.
Posted: 03 May 2016 | Published: 31 Dec 2015

OpenText

5 Criteria for Making an Informed Investment
sponsored by NetApp & Cisco
WHITE PAPER: Looking to solve IT challenges with converged infrastructure? Consider these five criteria when assessing your options.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

TOPICS:  IT Management
NetApp & Cisco

5 Data Quality Problems in Every CMDB
sponsored by BDNA
WHITE PAPER: Explore why clean data is essential for your configuration management database (CMDB). Uncover the top 5 data quality problems in every CMDB and how you can address these challenges.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

3 Components in Securing the Software-Defined Data Center
sponsored by Intel Security
WHITE PAPER: The SDDC provides benefits for enterprise IT. Meet cloud security demands while expanding visibility and protection.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

3 Key Trends in IT Infrastructure
sponsored by Dimension Data
WHITE PAPER: Discover what IT and business leaders are saying about the future of their IT infrastructure.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

TOPICS:  IT Management
Dimension Data

3 Keys to Choosing a Document Management Vendor
sponsored by OnBase by Hyland
WHITE PAPER: In document management, your choice of vendor is everything. Find out the three crucial steps to making the right pick.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

TOPICS:  IT Management
OnBase by Hyland

3 Keys to Igniting Growth With Commerce in the Cloud
sponsored by Oracle Corporation
WHITE PAPER: E-commerce is crucial to your business success. Learn how to find the right partner for simple, sustained growth.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TOPICS:  IT Management
Oracle Corporation

3 Principles of the Mobile Era
sponsored by Appcelerator
WHITE PAPER: In this helpful resource, discover the three keys to mobility success that mobile-savvy organizations always keep in mind. You'll learn the tools, technologies, and strategies that are necessary for a mobile-ready IT, and how you can deliver quality, user-friendly mobile applications that run on a variety of devices.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Appcelerator

3 Steps to Building a Successful ECM Project
sponsored by OnBase by Hyland
WHITE PAPER: You have a vision of an ECM project, but how do you get there? Find out the steps, from design to execution.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

TOPICS:  IT Management
OnBase by Hyland

3 Strategies to Rapidly Deliver User-Friendly Multi-Channel Apps
sponsored by Mendix
WHITE PAPER: As competitors continue to release more user-friendly applications on the market, it's becoming harder to maintain customer loyalty. This white paper reveals 3 critical strategies that can help you satisfy users with your applications. Discover how to quickly deploy apps to deliver immediate business impact and ROI.
Posted: 23 Jul 2015 | Published: 23 Jul 2015

Mendix

3 Ways Anomaly Detection Improves IT Operations
sponsored by Prelert
WHITE PAPER: Read this white paper to discover the three ways anomaly detection can streamline your IT operations strategy.
Posted: 26 Mar 2015 | Published: 31 Dec 2014

Prelert

4 Findings on Managed Services for Workloads in the Cloud
sponsored by Dimension Data
WHITE PAPER: Learn why and how IT and business leaders are selecting managed services for production workloads in the cloud.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

TOPICS:  IT Management
Dimension Data

4 Levels of DevOps
sponsored by OpenMake Software
WHITE PAPER: While most software development organizations have fine-tuned their application lifecycle management (ALM) processes, many still struggle with bottlenecks during the handoff between development and operations. That's where DevOps comes in -- but how do you go from ALM to DevOps?
Posted: 28 May 2014 | Published: 28 May 2014

OpenMake Software

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014

Citrix

4 Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: IT leaders must support mobile without allowing greater risk. Find out four key steps to safe, widespread mobility.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  IT Management
Dell, Inc. and IntelĀ®

4 Steps to Improving Cloud Security and Compliance
sponsored by Dimension Data
WHITE PAPER: Learn how to increase your comfort level in the cloud by insisting on the highest levels of certification and more.
Posted: 21 Jan 2016 | Published: 22 Jan 2016

TOPICS:  IT Management
Dimension Data

4 Ways to Enhance Mobile App User Engagement
sponsored by Magnet
WHITE PAPER: This guide reveals how the key to building lasting relationships with customers via mobile applications lies beyond SMS or push notifications. Uncover 4 ways to drive mobile engagement and enhance customer satisfaction.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Magnet

4 Ways to Improve IT Operations With All-Flash Storage
sponsored by NetApp
WHITE PAPER: Learn how to deploy 10x more virtual desktops and reduce latencies to less than one millisecond with all-flash storage.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

TOPICS:  IT Management
NetApp

40 Leaders, 40 Stories: PPM Experts Discuss Moving from Project Management to Project Leadership
sponsored by Workfront
WHITE PAPER: This whitepaper combines interviews from 40 PPM leaders, providing diverse insight into their experiences successfully leading teams.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Workfront

5 Best Practices: Moving From Monitoring to Blocking Content
sponsored by Intel Security
WHITE PAPER: In 2015 almost 800 data breaches hit US-based companies. Discover the 5 best practices to protect your organization.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: Keep these five considerations in mind when implementing a hybrid cloud strategy.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

5 Considerations in Cloud Providers for Product Applications
sponsored by Dimension Data
WHITE PAPER: Cloud investment continues to skyrocket. Find out five areas to focus on to be sure you choose the right vendor.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

TOPICS:  IT Management
Dimension Data

5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 12 May 2014 | Published: 12 May 2014

Citrix
26 - 50 of 2115 Matches Previous Page    1 2 3 4 5    Next Page
 
CLEANROOM TECHNIQUE DEFINITION (continued): …  wall method, because the intent is to place a demonstrable intellectual barrier between the reverse engineering process and the development of the new product. The use of the clean room technique can be compared, in some respects, with the fair use of copyrighted publications in order to compile a new document. For example, a new book about Linux can be authored on the basis of information obtained by researching existing books, articles, white papers, and Web sites. This does not necessarily constitute copyright infringement, even though other books on Linux already exist, and even if the new … 
Cleanroom Technique definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement