IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Cleanroom Technique

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided. The clean room technique is also known as clean room design. (Sometimes the words "clean room" are merged into the single word, "cleanroom.") Sometimes this process is called the Chinese  … 
Definition continues below.
Cleanroom Technique Reports
126 - 150 of 3799 Matches Previous Page  |  Next Page
8 Ways to Boost Your Bottom Line
sponsored by Medfusion
WHITE PAPER: Patients are the core of your practice, but revenue is the lifeblood. Accelerating your patient payments doesn't have to be overwhelming. Access this resource to boost your bottom line by asking 8 questions of your current system.
Posted: 29 Aug 2016 | Published: 29 Aug 2016


A closer look at ITSM and ITIL
sponsored by
EBOOK: In this expert e-guide explore the various benefits ITSM and ITIL can provide including maximizing ROI and more.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

A Comprehensive Guide to Enterprise IoT Project Success
sponsored by Xively by LogMeIn
EGUIDE: Whether you're just starting to learn about the Internet of Things (IoT) or you're well into your assessment of how this paradigm shift will impact your organization, this e-guide can help by providing valuable insights into the current state of IoT platforms and examples of how the IoT is affecting business processes now.
Posted: 03 Jun 2016 | Published: 03 May 2016

Xively by LogMeIn

A Computer Weekly buyer's guide to CIO leadership
sponsored by
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at how the age of the customer requires IT leaders to focus on both the business technology and IT agendas; why IT leaders need to use blogging and social media to raise their profile and build influence in their organisations.
Posted: 28 Jan 2016 | Published: 26 Jan 2016

A Computer Weekly Buyer's Guide to Containers and Microservices
sponsored by
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how the architectures are configured, the suppliers building them – and the benefits to the organisation using them.
Posted: 14 Mar 2016 | Published: 15 Mar 2016

A Computer Weekly buyer's guide to enterprise app stores and self-service IT
sponsored by
ESSENTIAL GUIDE: Computer Weekly assesses how businesses can go about setting up an enterprise app store and integrating it with IT service management in this 11-page buyer's guide.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

A Computer Weekly buyer's guide to operational IT
sponsored by
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.
Posted: 06 Sep 2016 | Published: 30 Aug 2016

A Computer Weekly buyer's guide to testing and code quality
sponsored by
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

A Convergence of Interest and Products
sponsored by
EBOOK: Previously unattainable due to its high cost, converged infrastructure is on the cusp of its watershed moment. Recognizing its long term benefits, organizations must analyze the biggest benefits and key cautions about moving to a converged platform. This white paper aids you in this process. Read on to learn more.
Posted: 15 Jan 2016 | Published: 15 Jan 2016

A Guide to Choosing the Right ECM Tools for Your Business
sponsored by IBM
EGUIDE: ECM tools should be a cornerstone in your enterprise information toolkit, but there are many variables in play, and choosing the right platform requires consideration of your industry, objectives, existing software and in-house resources. In this e-guide, we explain the criteria you should use to evaluate and select ECM tools.
Posted: 26 Jul 2016 | Published: 21 Jul 2016


A Guide to Enterprise Linux For IBM Z Systems
sponsored by Red Hat
DATA SHEET: In this datasheet, you will discover how to extend your IBM z Systems to accommodate more applications and emerging workloads by implementing Red Hat Enterprise Linux. Read on to better utilize your available computing resources.
Posted: 19 Jan 2016 | Published: 31 Dec 2015

Red Hat

A Guide to Private Cloud Security
sponsored by Intel Security
WHITE PAPER: Find out how to successfully deploy a private cloud that maximizes protection and minimizes risk.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

A Guide to Protecting Your Critical Assets with Identity Governance
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to secure the gateway to your organization with robust identity governance policies. Read on to learn how to protect assets by enforcing business-driven identity governance for managing user roles.
Posted: 26 Jan 2016 | Published: 31 Mar 2015


A Better Way to Manage Desktops: HP Workplace Management Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Enterprises need to give employees a full, flexible and configurable managed desktop environment to meet diverse business requirements and user productivity needs. Find out how HP can help.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Enterprise

A Business Risk Approach to IT Governance
sponsored by IBM
WHITE PAPER: Learn best practices for assessing overall effectiveness in today's highly distributed organizations and how to manage IT risks. Also discover the role a centralized IT governance system can play in realizing your IT governance strategy.
Posted: 20 Jul 2016 | Published: 30 Sep 2011


A Buyer's Checklist for Mobile Application Platforms
sponsored by IBM
WHITE PAPER: Some organizations need help identifying key platform capabilities required for mobile. Use this checklist to find out.
Posted: 14 May 2015 | Published: 14 May 2015

TOPICS:  IT Management

A Cloud Computing E-Book: Re-make or Re-model?
sponsored by
EBOOK: The upsurge in cloud computing presents development teams with challenges that may require them to rethink established ways of building applications. Read this E-Book to get an overview of issues and strategies surrounding application development in the cloud.
Posted: 05 Aug 2011 | Published: 05 Aug 2011

A Computer Weekly Buyer's Guide to Value-Added IT Advice
sponsored by
EBOOK: In this 12-page buyer's guide, Computer Weekly looks at the changing position of the CIO and how there are more people in the role from less technical backgrounds than in the past; who a CIO should call when she or he needs advice.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

TOPICS:  CIOs | IT Management

A Deep Dive on DevOps and Application Deployments, Featuring a Guest Speaker from Forrester Research, Inc.
sponsored by Electric Cloud
WEBCAST: Watch this webcast to hear Forrester Research, Inc. analyst Glenn O'Donnell discuss current challenges in application deployment and best practices for creating strong communication and understanding between your development and operations teams.
Posted: 06 Sep 2012 | Premiered: Sep 6, 2012

Electric Cloud

sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to explore the advanced features and capabilities offered in Oracle's BPM Suite 11g and discover the advantages it can offer your organization.
Posted: 03 Jul 2012 | Published: 25 Jun 2012

Oracle Corporation

A Guide for CIOs: Make Your Mark with Business Transformation
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Review this informative white paper to discover the importance of implementing a formal transformation program. Gain insight into 2 business transformation success stories, 9 reasons why you should work with an experienced transformation partner, a simple 5-phase business transformation program, and much more.
Posted: 06 Jul 2012 | Published: 01 Jul 2012

Hewlett-Packard Enterprise

A Guide For Consultants Building Composite Financial Applications
sponsored by Xignite, Inc.
WHITE PAPER: This White Paper is for IT Consultants interested in learning how they can make money and grow their business using financial web services to build more unique and creative applications for their clients. It also introduces the Xignite Partner Network.
Posted: 27 Aug 2007 | Published: 01 Aug 2007

Xignite, Inc.

A Guide to Branching and Merging Patterns
sponsored by AccuRev
WHITE PAPER: In this paper, gain a better understanding of how branching and merging patterns work and how applying them to your projects can have a profound effect on how your development team handles change management and delivers software.
Posted: 06 Jan 2012 | Published: 05 Jan 2012


A Guide to Creating C++ Web Services
sponsored by Rogue Wave Software
WHITE PAPER: This white paper details the steps necessary for developing and hosting high performance C++ Web services.
Posted: 28 Mar 2008 | Published: 01 Mar 2008

Rogue Wave Software

A Guide to Hyper-Converged Infrastructures Purpose-Built for Zero Branch IT
sponsored by Riverbed Technology, Inc.
DATA SHEET: This data sheet explains how to converge server, storage, and network infrastructure to enable data centralization, instant recovery, and lower TCO. Read on to advantage of this hyper-converged infrastructure.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

Riverbed Technology, Inc.
126 - 150 of 3799 Matches Previous Page    4 5 6 7 8 9    Next Page
CLEANROOM TECHNIQUE DEFINITION (continued): …  wall method, because the intent is to place a demonstrable intellectual barrier between the reverse engineering process and the development of the new product. The use of the clean room technique can be compared, in some respects, with the fair use of copyrighted publications in order to compile a new document. For example, a new book about Linux can be authored on the basis of information obtained by researching existing books, articles, white papers, and Web sites. This does not necessarily constitute copyright infringement, even though other books on Linux already exist, and even if the new … 
Cleanroom Technique definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement