Software  >   Systems Software  >  

Software Development Kits

RSS Feed    Add to Google    Add to My Yahoo!
Software Development Kits White Papers (View All Report Types)
 
Precise, Realistic Testing: Service Virtualization Streamlines Dev Process
sponsored by CA Technologies.
WHITE PAPER: In this white paper, discover the four essential capabilities of service virtualization (SV), and how SV enables development teams to perform more precise, more realistic, and more requirements-driven testing. Read on to explore how service virtualization enables parallel development, testing across heterogeneous platforms, and more.
Posted: 16 May 2013 | Published: 31 Dec 2012

CA Technologies.

Improve Your Mobile Application Security
sponsored by IBM
WHITE PAPER: Mobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself.
Posted: 06 May 2014 | Published: 31 Oct 2012

IBM

RSA Improves Agility with JBoss Enterprise BRMS
sponsored by Red Hat
WHITE PAPER: RSA, a worldwide insurance group, uses business rules to show customers products tailored to their specific needs. Read how RSA used Red Hat JBoss BRMS to improve their application, thus leading to more sales, better agility, and the ability to respond quickly to changing business needs.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Red Hat

Continuous application delivery to WebSphere Application Server
sponsored by IBM
WHITE PAPER: This whitepaper considers server options that automate tasks to streamline supplication server runtime, including application deployment, test and production environments, and middleware configuration.
Posted: 05 Aug 2014 | Published: 30 Apr 2014

IBM

Challenging Some of the Myths About Static Code Analysis
sponsored by Rogue Wave Software
WHITE PAPER: This guide provides 4 common myths about static code analysis (SCA), which serve mostly to distort the true value static analysis can bring to your software development lifecycle. Read on to learn about the truths to these myths, and how easily you can write code that you'll be proud of.
Posted: 02 Dec 2014 | Published: 30 Nov 2013

Rogue Wave Software

The Secret to Agile Delivery? Tap into the ALM Hub of Activity and Insight
sponsored by Hewlett-Packard Company
WHITE PAPER: In this infographic, discover how a new approach to ALM can prepare you for the high velocity and increased quality required of Agile development.
Posted: 05 Jun 2014 | Published: 31 Mar 2014

Hewlett-Packard Company

Mobile Design Patterns: Push, Don't Pull
sponsored by IBM
WHITE PAPER: Is it better to wait for users to request, or "pull," the content they need, or to "push" content updates when you think users need them? This resource weighs in on the "push vs. pull" design model debate, describing key advantages of the push model in the mobile space.
Posted: 14 Mar 2014 | Published: 05 Dec 2013

IBM

The ABCs of continuous release and deploy in a DevOps approach
sponsored by IBM
WHITE PAPER: In this resource, explore the bottlenecks that slow down software delivery and learn how you can overcome them by creating better collaboration through DevOps. Get an in-depth look at how to achieve the continuous release and deployment adoption path to DevOps, with specific examples of each step in the process.
Posted: 09 Oct 2013 | Published: 31 May 2013

IBM

Release and Deploy for the Complex, Multi-platform Enterprise
sponsored by OpenMake Software
WHITE PAPER: Application release and deploy in today's multi-platform enterprise can quickly become costly, chaotic, and error-prone. However, if you can centralize the management, configuration, and reuse of release and deployment processes, you can eliminate those issues for good.
Posted: 30 May 2014 | Published: 29 May 2014

OpenMake Software

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement