IT Management  >   Systems Design and Development  >  

Application Development

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Development of Software, Software Design, Designing Software, Software Engineering, Software Application Development, Enterprise Application Development, Platform Development, Software Development, Applications Development, Development
DEFINITION: In computer program and software product development, the development environment is the set of processes and programming tools used to create the program or software product. The term may sometimes also imply the physical environment. An integrated development environment is one in which the processes and tools are coordinated to provide developers an orderly interface to and convenient view of  … 
Definition continues below.
Application DevelopmentReports
1 - 25 of 1176 Matches Previous Page  | Next Page
6 Capabilities of a Development Platform that Delivers Greater ROI
sponsored by IBM
WHITE PAPER: Stagnant budgets force developers to use tools that rely on hand coding every functionality, integration, and modification. This thorough whitepaper considers a development platform that not only increases developer efficiency, but totes a greater implementation ROI.
Posted: 26 Aug 2014 | Published: 31 Oct 2012

IBM

The Total Economic Impact of IBM WebSphere Application Server Migrating from an Open Source Environment
sponsored by IBM
WHITE PAPER: Discover the total economic impact and potential return on investment (ROI) your business may experience from deploying WebSphere Application Server.
Posted: 26 Aug 2014 | Published: 30 Jun 2012

IBM

Detailed Comparison of IBM WebSphere MQ 7.5 vs. Apache ActiveMQ 5.9
sponsored by IBM
WHITE PAPER: This detailed analysis reveals key information about 2 leading application options and discusses their technical factors.
Posted: 26 Aug 2014 | Published: 31 May 2014

IBM

Identify the best VMware licensing - HP SLMS
sponsored by Hewlett-Packard Limited
WHITE PAPER: Maximizing the investment in VMware licensing is challenging, especially in regards to tracking renewals and complying with licensing requirements. This whitepaper discusses the advantages of a software licensing management system. Also discover the best way to analyze your enterprise's needs for licensing agreements to maximize your investment.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Hewlett-Packard Limited

Application Server TCO Comparison: WebSphere vs. JBoss
sponsored by IBM
WHITE PAPER: Find out how a couple of the leading application server options compare to one another.
Posted: 26 Aug 2014 | Published: 14 Dec 2012

IBM

Deployment Best Practices and Guidelines to Deliver Any App to Mobile Users
sponsored by Citrix
WHITE PAPER: Access to corporate applications allows mobile workers to be more productive, responsive and informed. Discover six ways to provide enterprise application access on mobile devices.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Citrix

5 Ways Software Load Balancers Help Development (And Business)
sponsored by Nginx
WHITE PAPER: The ability to deliver applications in a scalable, maintainable, and flexible development environment is essential to success moving forward. View this whitepaper now to see how hardware-based load balancers can be a hindrance to your ability to deliver applications.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Nginx

Transforming Enterprise Applications for Mobile/BYOD Environments
sponsored by Dell Software
WHITE PAPER: This resource addresses a number of issues involved in the process of preparing enterprise applications for mobile devices.
Posted: 22 Aug 2014 | Published: 22 Nov 2013

Dell Software

Why You Need Test Data Management
sponsored by Informatica
WHITE PAPER: Uncover the pros and cons of adopting Agile methods and the ins-and-outs of test data management.
Posted: 22 Aug 2014 | Published: 29 Mar 2014

Informatica

Choosing the Right API Management Solution for the Enterprise User
sponsored by CA Technologies.
WHITE PAPER: Publishing application programming interfaces (APIs) to an external developer community introduces a number of challenges and risks for the enterprise. This informative whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery.
Posted: 22 Aug 2014 | Published: 31 Dec 2013

CA Technologies.

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
EBOOK: Overcoming developer access and secure coding barriers and implementing mobile innovation without sacrificing data security are massive blocks for a seamless mobile experience. This e-book discusses best practices for handling the security requirements of different mobile apps.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

CA Technologies.

Mobile Business Intelligence: Quenching the Thirst for Quicker Decisions
sponsored by QlikTech, Inc.
WHITE PAPER: Mobile BI users have more tools at their disposal to explore data, develop timely insight, and make confident decisions on the move. This informative whitepaper discusses when mobile BI is needed, and how it can bolster employee engagement in analytics.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

QlikTech, Inc.

Large Financial Services Firm Passes Its PCI Audit— and Implements an Ongoing Governance Program
sponsored by Veracode, Inc.
CASE STUDY: A large financial services firm sought help with a one-time project to pass its payment card information (PCI) audit. View this case study now to see how this financial firm decided on continuous analysis, and the advantages they saw as a result. Also learn about a software system that achieves this without acquiring more servers.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

The Impact of Data Breaches: Why Application Security is A Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

Automating the Application Release Process: Build vs. Buy
sponsored by CA Technologies.
WHITE PAPER: Companies are turning to application release automation as a cost-effective solution for development bottlenecks. Some are able to write shell scrips to automate deployment activities. Read about the essentials for building, executing, and managing release automation, and discover software that provides automation from the ground up.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

CA Technologies.

Webinar: Why Benchmark Application Security?
sponsored by Veracode, Inc.
WEBCAST: Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
Posted: 19 Aug 2014 | Premiered: Aug 19, 2014

Veracode, Inc.

Webinar: When is Application Security Done?
sponsored by Veracode, Inc.
WEBCAST: Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.
Posted: 19 Aug 2014 | Premiered: Aug 19, 2014

Veracode, Inc.

Why Security is Paramount in Enterprise Mobility Management
sponsored by BlackBerry
WHITE PAPER: Inside this informative white paper, explore a new Enterprise Mobility Management (EMM) solution which makes it easy to create, manage, and secure apps on any device.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

The Total Economic Impact of Veracode's Cloud-Based Application Security Service
sponsored by Veracode, Inc.
CASE STUDY: A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

Maximizing mobile efficiency and productivity
sponsored by Dell Software
WHITE PAPER: Finding ways to accommodate a range of devices for your mobile network can be frustrating.  This paper offers best practices to help your uses stay productive and happy.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Dell Software

Learn Faster: Deploy What You Have - Virtualize What You Don't
sponsored by IBM
WEBCAST: Software development teams are turning to Agile development to increase both the quality and the turnaround time for their products. This webcast discusses the advantages of leveraging a balance of both deployment automation and service virtualization, ultimately establishing an efficient integration testing pattern.
Posted: 18 Aug 2014 | Premiered: Aug 18, 2014

IBM

Top 5 Cloud Coding Mistakes in Java Applications
sponsored by Cloud Technology Partners
WHITE PAPER: The focus of organizations has shifted to large portfolios of existing applications which were never designed to work well in a cloud environment. This whitepaper tackles 5 common coding mistakes made in Java applications, and provides analysis of the cause and clear solutions.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

Cloud Technology Partners

Red Hat JBoss Fuse Performance, Scaling, and HA Review
sponsored by Red Hat
WHITE PAPER: Enterprises with applications in production need to get the most from their open source integration and messaging technology. View this white paper now to learn about one system that can help create concise, clear, and fully functional configuration artifacts in your system.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Red Hat

The Department of Defense Saves Millions, Builds an Agile, Private Cloud
sponsored by Red Hat
CASE STUDY: The United States Department of Defense needed to revamp a division that relied on a physical hardware-based infrastructure. This case study discusses the benefits the DoD saw from using a software suite to migrate to this modern infrastructure.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Red Hat

RSA Improves Agility with JBoss Enterprise BRMS
sponsored by Red Hat
WHITE PAPER: RSA, a multinational insurance group, sought to remain ahead of the curve in the extremely competitive insurance market. Customers were demanding efficient and comprehensive services when visiting the RSA eChoice website. This whitepaper discusses the benefits RSA found by implementing a business rule management system (BRMS).
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Red Hat
1 - 25 of 1176 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION DEVELOPMENT DEFINITION (continued): … In computer program and software product development, the development environment is the set of processes and programming tools used to create the program or software product. The term may sometimes also imply the physical environment. An integrated development environment is one in which the processes and tools are coordinated to provide developers an orderly interface to and convenient view of the development process (or at least the processes of writing code, testing it, and packaging it for use). An example of an IDE product is Microsoft's Visual Studio .NET. The term computer-assisted software environment (CASE) is generally used to describe a set of tools and practices that facilitate management of a software development project.
Application Development definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement