IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Cleanroom Technique

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided. The clean room technique is also known as clean room design. (Sometimes the words "clean room" are merged into the single word, "cleanroom.") Sometimes this process is called the Chinese  … 
Definition continues below.
Cleanroom TechniqueReports
226 - 250 of 2167 Matches Previous Page  | Next Page
As Cloud Empowers Lines of Business, Challenges for IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper covers the results of a thorough survey that was conducted to determine the impact of cloud technology on IT departments.
Posted: 11 Dec 2013 | Published: 16 Sep 2013

Cisco Systems, Inc.

ASOS: The boardroom view of IT
sponsored by ComputerWeekly.com
PRESENTATION: Nick Beighton , CFO of the online fashion retailer ASOS.com, draws on his experience in both IT and finance to offer tips to CIOs on building credibility with the board of directors.
Posted: 20 Dec 2013 | Published: 07 Sep 2012

ComputerWeekly.com

Automated Management and Monitoring for your IT System
sponsored by CentraStage
WEBCAST: This brief video explores the benefits of automated IT monitoring and management and how your business can best utilize this tool.
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Automating your Microsoft World: Application Efficiencies
sponsored by N-able Technologies
WEBCAST: Watch this exclusive video to learn how to leverage an automation manager tool to streamline the performance of key Microsoft applications.
Posted: 01 Oct 2013 | Premiered: Oct 1, 2013

N-able Technologies

Automating your Microsoft World: Operating System Efficiencies
sponsored by N-able Technologies
WEBCAST: This informative video examines how you can leverage an automation manager to automate your cloud efficiencies, allowing you to streamline your application performance and delivery.
Posted: 01 Oct 2013 | Premiered: Oct 1, 2013

N-able Technologies

Arekibo- Ireland's Leading Digital Agency Saves 75% Development Time with Kendo UI
sponsored by Telerik
CASE STUDY: In this case study, learn how Arekibo, Ireland's leading digital consulting agency, succeeded in delivering a compelling web experience using HTML5 and JavaScript, while also saving 75% on development time.
Posted: 08 Oct 2013 | Published: 31 Dec 2012

Telerik

Aruba’s MultiUse Video
sponsored by Aruba Networks
VIDEO: Why continue managing devices, when you can manage the applications? This video will teach you about enterprise mobile management, and how you can make enterprise mobility a lot simpler. Dive in to learn more.
Posted: 30 Apr 2013 | Premiered: 29 Mar 2013

Aruba Networks

ASNA Product Review: RPG Display Modernization Gets Wings
sponsored by ASNA
PRODUCT OVERVIEW: Access this resource to learn how to convert old 5350 screens to modern GUI formats in a few easy steps with limited personnel, positioning your organization for further enhancements. Discover a cost-effective path that minimizes your personnel resources without the pain of other conversion technologies.
Posted: 03 Jan 2012 | Published: 03 Jan 2012

ASNA

Assuring Enterprise-Quality Agile Development
sponsored by HP Software
WHITE PAPER: This white paper provides an overview of the advantages of hybridizing agile development methods with the QA lessons learned from previous methods. Learn how this strategy provides the best of both worlds for developing flexible, secure software products.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

HP Software

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Author and deploy rules using WebSphere ILOG JRules Business Rules Management System
sponsored by IBM
PRODUCT DEMO: Learn how the WebSphere ILOG JRules BRMS can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions.
Posted: 12 Dec 2010 | Premiered: 12 Dec 2010

IBM

Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines
sponsored by Dell, Inc.
WHITE PAPER: This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

Dell, Inc.

Automate to Thrive: Driving Business Agility with Effective Release Management
sponsored by SERENA Software, Inc.
WHITE PAPER: This white paper gives an overview of the challenges release management presents, three tips for improving your software release strategies, and insight on how effective release management is poised to become a driver of competitive advantage.
Posted: 03 Apr 2012 | Published: 03 Apr 2012

SERENA Software, Inc.

Automated Energy Efficiency for the Intelligent Business - Intel® Xeon® Processor 5500 Series Delivers Energy Efficiency Without Compromising Performance
sponsored by Insight & Intel
PRODUCT OVERVIEW: The Intel Xeon processor 5500 series with Intel® Intelligent Power Technology, delivers up to 50 percent lower idle power. By replacing aging single-core processor-based servers with new, more energy-efficient servers, you can gain capacity to grow and to increase IT performance using fewer servers.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Insight & Intel

Automated, Standardized, and Private Cloud Management
sponsored by Novell, Inc.
TRANSCRIPT: This iView describes the types of operational changes IT teams need to make in order to benefit from the promise of private-cloud architectures, and identifies a key set of capabilities and attributes to look for when considering management tools to help implement, automate, and operate these environments.
Posted: 21 Oct 2010 | Published: 21 Oct 2010

Novell, Inc.

Automating a Unified Physical Infrastructure
sponsored by Panduit
WHITE PAPER: Read our fourth newsletter featuring research from Gartner to learn how to support business requirements and customer demands in the datacenter while reducing capital and operational expenses.
Posted: 01 Oct 2010 | Published: 20 Aug 2010

Panduit

Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.
Posted: 10 Sep 2009 | Published: 16 Oct 2008

Oracle Corporation

Automating IT Workloads to Accelerate the Delivery of a Business Driven Infrastructure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores the role of workload automation in today's IT environments. Find out where many existing tools fall short as well as why an end-to-end process is recommended.
Posted: 15 Jul 2011 | Published: 01 Apr 2009

CA Technologies.

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

Automation in Agile ALM: Interview with author Michael Hüttermann -- Part 1
sponsored by IBM
EGUIDE: Automation is often touted as a key in successful application development efforts, but it comes in many different flavors. This tip guide describes the variety of automation techniques and benefits of using automation throughout the application development lifecycle.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

Automation in ALM: The Changing World of Test, Thanks to Automation
sponsored by Hewlett-Packard Company
EBOOK: Read this e-book to discover a series of expert articles covering: six tips for selecting automated test tools for Agile development; when it's appropriate to automate testing and best practices for implementation; the important role of automated UI testing in exploratory testing; and how automation is changing the role of the software tester.
Posted: 08 Mar 2012 | Published: 27 Feb 2012

Hewlett-Packard Company

Automation Makes Perfect: Taking the Time Crunch Out of IT Compliance with Automation
sponsored by Tripwire, Inc.
WHITE PAPER: Continuous compliance can help you narrow the gap between identifying compliance vulnerabilities and repairing systems to an audit-passing state. Read this paper to learn more.
Posted: 03 Aug 2010 | Published: 03 Aug 2010

Tripwire, Inc.

Automation, continuous integration and continuous improvement in Agile ALM -- Part 2
sponsored by IBM
EGUIDE: This second part of a two-part expert Q & A digs more deeply into automation skills, build automation, continuous integration, and continuous improvement to processes within application lifecycle management (ALM).
Posted: 29 Nov 2011 | Published: 07 Nov 2011

IBM

Automotive Supplier Achieves Impressive ROI: Global automotive supplier will achieve return on investment in two years with new powerful technology
sponsored by Dell, Inc. and Intel®
CASE STUDY: TRW, a German automotive company, was facing power and software limitations in the prototyping stages of design development that proved to be costly and slowed performance. This case study shows how they turned to Dell to upgrade their server and storage systems in line with its cutting-edge development processes.
Posted: 24 Sep 2009 | Published: 24 Sep 2009

Dell, Inc. and Intel®

Avoiding 7 Common Mistakes of IT Security Compliance
sponsored by Qualys, Inc.
EGUIDE: This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals.
Posted: 21 Oct 2009 | Published: 01 Apr 2009

Qualys, Inc.
226 - 250 of 2167 Matches Previous Page    8 9 10 11 12 13    Next Page
 
CLEANROOM TECHNIQUE DEFINITION (continued): …  wall method, because the intent is to place a demonstrable intellectual barrier between the reverse engineering process and the development of the new product. The use of the clean room technique can be compared, in some respects, with the fair use of copyrighted publications in order to compile a new document. For example, a new book about Linux can be authored on the basis of information obtained by researching existing books, articles, white papers, and Web sites. This does not necessarily constitute copyright infringement, even though other books on Linux already exist, and even if the new … 
Cleanroom Technique definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement