IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Cleanroom Technique

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided. The clean room technique is also known as clean room design. (Sometimes the words "clean room" are merged into the single word, "cleanroom.") Sometimes this process is called the Chinese  … 
Definition continues below.
Cleanroom TechniqueReports
226 - 250 of 2436 Matches Previous Page  | Next Page
Application Release Automation (ARA) Basics
sponsored by OpenMake Software
WHITE PAPER: A model-driven framework with repeatable processes can help you take control of software release, and application release automation (ARA) can make it possible. This white paper provides and in-depth overview of what ARA software can offer your organization.
Posted: 29 May 2014 | Published: 29 May 2014

OpenMake Software

Application Release Automation with Zero Touch Deployment
sponsored by CA Technologies.
WHITE PAPER: While application release automation can cut time-to-market and decrease bottlenecks, it isn't without difficulties. In this helpful resource, explore the key technological and organizational challenges that you might face when implementing an automated deployment system, and learn how to overcome them.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

CA Technologies.

Application Release Automation with Zero-Touch Deployment
sponsored by CA Technologies.
WHITE PAPER: Read now to explore the business and technological circumstances that drive Agile development teams to seek out release automation platforms, as well as the benefits of this technology and the complexities of deployment automation.
Posted: 04 Jun 2014 | Published: 30 Jun 2013

CA Technologies.

Application Security 101
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a guide to modern application security with a focus on why software development teams should be trained in secure development techniques.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

Veracode, Inc.

Application Security Advice: Stop Threats before They Start
sponsored by SearchSoftwareQuality.com
EBOOK: Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
Posted: 20 May 2014 | Published: 20 May 2014

SearchSoftwareQuality.com

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

Architecting your Data Center with High-Density Computing In Mind
sponsored by Equinix
WHITE PAPER: Explore this whitepaper to learn how you can best design and provision your data center with high-density computing in mind and how implementing high-density computing capabilities alongside your existing equipment can ultimately save your organization time and money.
Posted: 23 Apr 2014 | Published: 31 Dec 2013

Equinix

Architects Lead the Next Generation of Data-Driven Applications
sponsored by Red Hat
WHITE PAPER: This white paper explores the benefits of an open-source, software-based storage platform that enables the next-generation of data-driven applications.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Red Hat

Architects Lead the Next Generation of Data-Driven Applications
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how application architects can quickly and confidently deliver long-lasting applications that minimize cost, complexity, and risk while increasing architectural flexibility with Red Hat Storage Server, an open, software-defined storage platform.
Posted: 01 Jul 2014 | Published: 29 Nov 2013

Red Hat

Archive Data in the Largest Secure Private Cloud
sponsored by HP Autonomy
WHITE PAPER: This white paper highlights a hosted archiving technology that provides the same capabilities of an on-premise archiving solution, but hosts the data in a secure, private cloud to help increase the business agility, cost savings/predictability, and productivity that a cloud deployment enables.
Posted: 15 Apr 2014 | Published: 06 Mar 2014

HP Autonomy

Are You Looking for a Way to End the Finger Pointing and Improve your Customers’ Experience?
sponsored by CA Technologies.
WHITE PAPER: This white paper explains the benefits of a monitoring solution that equips enterprise IT organizations and service providers with capabilities to dramatically improve service quality and reduce the costs and time of IT service delivery.
Posted: 04 Jun 2014 | Published: 30 Apr 2014

CA Technologies.

Are You On The Path to Great Mobile App Performance?
sponsored by Hewlett-Packard Company
WHITE PAPER: To avoid frustrated users, negative reviews, and lost revenue, you can invest in a mobile app monitoring strategy. View this infographic to discover the benefits of such a strategy, and learn how a user-centric approach to app monitoring can help you proactively detect performance issues and keep users happy.
Posted: 28 May 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

Application Release and Deployment For Dummies
sponsored by IBM
EBOOK: In this digital entry of the popular For Dummies book series, get a primer on application release and deployment, and find insight to help you speed time to market, drive down costs, and reduce risk.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

IBM

Application Release Automation: An Introduction
sponsored by UC4 Software, Inc
VIDEO: Application release can be very complex and challenging due the manual efforts involved. Automating this process can free up IT staff, cut costs, and accelerate release cycles. This brief video introduces application release automation, a new technology that takes care of the whole package, including planning, deploying, monitoring and more.
Posted: 02 Apr 2012 | Premiered: 31 Jan 2012

UC4 Software, Inc

Application security testing: Protecting your application and data
sponsored by IBM
EBOOK: Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

IBM

Application Transformation and Modernization
sponsored by Hewlett-Packard Limited
PRESENTATION TRANSCRIPT: Many organizations are finding that their applications are much more diverse and varied than many businesses would like. Access this presentation transcript to learn how to go about improving and updating your applications for a modern age. Learn the key considerations you must take into account and where to start.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

Hewlett-Packard Limited

Application Transformation and Modernization
sponsored by Hewlett-Packard Company
PRESENTATION TRANSCRIPT: Many organizations are finding that their applications are much more diverse and varied than many businesses would like. Access this presentation transcript to learn how to go about improving and updating your applications for a modern age. Learn the key considerations you must take into account and where to start.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett-Packard Company

Applying agile and lean principles to the governance of software and systems development
sponsored by IBM
WHITE PAPER: This paper presents eighteen best practices for leaner, more agile software development project governance.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

IBM

Applying agile principles to the development of smarter products
sponsored by IBM
WHITE PAPER: Consult this informative resource to learn how applying agile practices to smarter product development can improve the product lifecycle and help you meet (and exceed) consumer demand.
Posted: 11 Nov 2013 | Published: 31 Oct 2012

IBM

Applying ITIL Best Practice Principles to IPAM
sponsored by BT Diamond IP
WHITE PAPER: This white paper will explain how each of the main ITIL areas can be applied specifically to IP address management (IPAM), and the benefits that can be accrued from using this management framework.
Posted: 20 Dec 2010 | Published: 20 Dec 2010

BT Diamond IP

Applying Requirements to the Life Cycle
sponsored by IBM
PODCAST: Tune in to this podcast for an in-depth discussion about how requirements management can improve the entire development lifecycle, along with best practices of managing requirements for quality delivery, every time.
Posted: 04 Sep 2013 | Premiered: Sep 4, 2013

IBM

Approaches for Agile development teams
sponsored by IBM
EGUIDE: This expert e-guide discusses the different approaches for agile development teams. Learn about a handful of methods from experts Mary LeMieux-Ruibal, Mirkeya Capellan and Lisa Crispin, including focusing more on trends than numbers, employing a risk-based testing approach, calculating testing costs and much more.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

IBM

Architectural Quality: Design, Development and Testing Rules
sponsored by hello2morrow, Inc.
WHITE PAPER: Read this white paper and explore essential architectural quality rules and their individual considerations. Discover a tool that enforces the most important rules automatically during development.
Posted: 29 Sep 2008 | Published: 24 Sep 2008

hello2morrow, Inc.

ArcSight Logger: Universal Log Management Solution
sponsored by ArcSight, an HP Company
PRODUCT OVERVIEW: ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

ArcSight, an HP Company

Arekibo- Ireland's Leading Digital Agency Saves 75% Development Time with Kendo UI
sponsored by Telerik
CASE STUDY: In this case study, learn how Arekibo, Ireland's leading digital consulting agency, succeeded in delivering a compelling web experience using HTML5 and JavaScript, while also saving 75% on development time.
Posted: 08 Oct 2013 | Published: 31 Dec 2012

Telerik
226 - 250 of 2436 Matches Previous Page    8 9 10 11 12 13    Next Page
 
CLEANROOM TECHNIQUE DEFINITION (continued): …  wall method, because the intent is to place a demonstrable intellectual barrier between the reverse engineering process and the development of the new product. The use of the clean room technique can be compared, in some respects, with the fair use of copyrighted publications in order to compile a new document. For example, a new book about Linux can be authored on the basis of information obtained by researching existing books, articles, white papers, and Web sites. This does not necessarily constitute copyright infringement, even though other books on Linux already exist, and even if the new … 
Cleanroom Technique definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement