IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Cleanroom Technique

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided. The clean room technique is also known as clean room design. (Sometimes the words "clean room" are merged into the single word, "cleanroom.") Sometimes this process is called the Chinese  … 
Definition continues below.
Cleanroom Technique Reports
226 - 250 of 3808 Matches Previous Page  |  Next Page
Achieve Data Center Stability and Reliability with Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Discover how to achieve total systems stability and reliability within your data center—without sacrificing advanced capabilities—with Red Hat Enterprise Linux. Tune into this video to invest in IT budget-friendly, open-source data center automation, leaving your admins to focus on value-added projects for your business.
Posted: 14 Jul 2016 | Premiered: 02 Jul 2014

Red Hat

Achieve Faster Time-to-Quality with Continuous Validation and Verification Engineering
sponsored by IBM
WHITE PAPER: Learn about two of the key components of continuous engineering: validation and verification. Discover how using these methods can speed up your development process, improve outcomes by detecting defects earlier, and produce higher quality products.
Posted: 29 Jun 2016 | Published: 31 Jan 2015


Achieve the Benefits of DevOps, Containers and the Cloud for your Java Apps
sponsored by Red Hat
VIDEO: Businesses everywhere are vying to achieve high quality, fast deployment, and easy maintenance for their applications. Explore ways to get these benefits for your apps with DevOps-enabling technologies, containers, cloud platforms, and more.
Posted: 12 Aug 2016 | Premiered: 03 Feb 2016

Red Hat

Add Graphics Virtualization To VDI To Enhance Training and Boost Productivity
sponsored by NVIDIA
WHITE PAPER: Round Rock, Texas found their initial VDI deployment faced problems with video playback – including degraded video quality and sound cutting in and out. Find out how they powered their VDI deployment with graphics virtualization technology to optimize graphics and support remote employees.
Posted: 28 May 2015 | Published: 28 May 2015


Addressing Security Vulnerabilities in Embedded Applications
sponsored by Programming Research
WHITE PAPER: This resource explains why it's so difficult to produce secure embedded software and provides best practices for embedded developers. Discover how you can minimize exploitable software vulnerabilities, cut costs, and speed up development with automated static analysis.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Addressing the Sharp Demand for Managing IT Complexity (CIO Insight)
sponsored by SAP/Lenovo/Intel
WHITE PAPER: Identify the root causes of IT complexity, and learn how to mitigate the burden it imposes on internal operations, especially agility and real-time information access. Read on now to reduce complexity and simplify IT ops.
Posted: 07 Sep 2016 | Published: 30 Jun 2015


Admins Nudged to the Cloud With Horizon Air Hybrid-Mode
sponsored by Dell, Inc. and Intel®
WHITE PAPER: See why VMware is now expanding Horizon View into a cloud platform to satisfy IT admins.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

TOPICS:  IT Management
Dell, Inc. and Intel®

Adopt This Battle-tested IT Implementation Plan
sponsored by Dell EMC and Microsoft
EGUIDE: New business initiatives either succeed or fail based on the quality of their IT implementation plan. In this exclusive guide, IT executives with experience introducing and managing new applications, services, and business initiatives, share an IT implementation strategy to help you deploy business initiatives.
Posted: 07 Sep 2016 | Published: 02 Sep 2016

Dell EMC and Microsoft

Adopting Low Code No Code App Development
sponsored by Metavine
RESOURCE: In order to keep up with the ever-increasing demand for apps to connect smart devices, the conventional approaches to development will need to be updated. Discover how low code no code (LCNC), machine learning, and artificial intelligence platforms can accelerate the rate of delivery, automate software engineering processes for IoT, and more.
Posted: 13 Oct 2016 | Published: 13 Oct 2016


Achieve Hybrid Storage With Cloud Economics and Agility
sponsored by Microsoft
WHITE PAPER: Learn how to improve overall cost of storage by up to 60% while increasing storage agility.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

TOPICS:  IT Management

Achieving Actionable Insights from IT Operations Big Data
sponsored by IBM
VIDEO: IT operations faces a data deluge, at the same time as they're trying to keep up with a higher demand for service and a shrinking response window for when things go wrong. But with analytics for IT operations, you can turn terabytes of monitoring data into actionable insights that allow IT to take a proactive approach to application performance.
Posted: 20 Nov 2013 | Premiered: 20 Nov 2013


Achieving Cost Savings in Backup with Deduplication
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: This document discusses that dollars and time currently consumed by existing tape libraries can be far better utilized by moving to disk back-up with deduplication.
Posted: 09 Jul 2010 | Published: 09 Jul 2010

ExaGrid Systems, Inc.

Achieving Release Velocity in an Enterprise DevOps Environment
sponsored by IBM
WHITE PAPER: This Forrester resource describes the economic impact of one application deployment solution that supports a DevOps approach and allows enterprises to move towards continuous delivery. Learn how this solution enabled organizations to cut costs through deployment automation, reduce the risk of failed deployments, and more.
Posted: 16 Nov 2015 | Published: 31 Aug 2015


Actionable Enterprise Architecture
sponsored by IBM
WHITE PAPER: This white paper provides an overview of the enterprise architecture concept and highlights how an actionable enterprise architecture approach from IBM can help organizations manage complexity and align IT projects and solutions with business objectives.
Posted: 11 Sep 2009 | Published: 01 Jun 2009


Active Administrator™, Version 5.6.1
sponsored by ScriptLogic Corporation
TRIAL SOFTWARE: Active Administrator™ is a comprehensive and proactive Active Directory management solution. Active Administrator provides four powerful integrated AD management features within one console, including centralized event auditing and reporting, back-up and recovery, Group Policy offline editing and rollback, and simplified delegation of AD rights.
Posted: 01 Jan 2011 | Premiered: 29 Dec 2010

ScriptLogic Corporation

Active Visibility into SSL Traffic for Multi-Tiered Security
sponsored by Gigamon
WHITE PAPER: Multi-tiered architectures rely on timely intelligence. Find out how to enable them with common visibility platforms.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

TOPICS:  IT Management

ActiveSync on BlackBerry 10: What Does it Enable?
sponsored by BlackBerry
WEBCAST: This exclusive webcast discusses how you can connect your mobile devices directly to critical business applications to increase productivity and overall efficiency.
Posted: 12 Nov 2013 | Premiered: Nov 12, 2013


Adapt to Changing Market Demand with IBM PureApplication Patterns
sponsored by IBM
VIDEO: In this brief video, discover how you can achieve game-changing improvements in IT efficiency and economics with a platform system specifically designed and tuned for running applications.
Posted: 08 Nov 2013 | Premiered: 21 May 2013


Adapting IT for Cloud Success
sponsored by VMware
EGUIDE: Enabling line organizations to undertake IT projects on their own, cloud computing is pressuring IT professionals to rethink their approach to application deployment and IT resource planning. In this eGuide, find tips on how to adapt to the cloud environment and address security and compliance risks.
Posted: 21 Sep 2016 | Published: 19 Sep 2016


Address System-on-Chip Development Challenges with Enterprise Verification Management
sponsored by IBM
WHITE PAPER: This white paper addresses the multidimensional challenges posed by verification management and offers a compelling solution known as enterprise verification management solution (EVMS) based on over a decade of development and in-house experience at IBM. 
Posted: 02 Nov 2010 | Published: 01 Sep 2009


Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016


Admiral Group ensures superb performance and scalability
sponsored by IBM
WHITE PAPER: Read this white paper to learn how one growing organization leveraged an advanced platform to scale and meet increasing demands. Discover how they were able to improve the overall performance of their systems, enabling them to cut costs and respond quicker to changing requirements.
Posted: 06 Jun 2012 | Published: 30 Jun 2011


Adobe ColdFusion 9
sponsored by Adobe Systems, Inc.
SOFTWARE DEMO: Adobe ColdFusion 9 software enables developers to rapidly build robust Internet applications by condensing complex business logic into fewer lines of code.
Posted: 05 Oct 2009 | Premiered: 05 Oct 2009

Adobe Systems, Inc.

Adopting ITSM Technology to Support ITIL Initiatives
sponsored by ServiceNow
WHITE PAPER: Discover how Yale University used new ITSM technology and ITIL best practices to deliver world-class IT services.
Posted: 19 May 2014 | Published: 07 May 2013


Advanced Endpoint Protection for Dummies
sponsored by Palo Alto Networks
WHITE PAPER: Learn how the modern attack strategy works, and find out the best techniques to prevent zero-day attacks and more.
Posted: 10 Dec 2015 | Published: 10 Dec 2015

TOPICS:  IT Management
Palo Alto Networks
226 - 250 of 3808 Matches Previous Page    8 9 10 11 12 13    Next Page
CLEANROOM TECHNIQUE DEFINITION (continued): …  wall method, because the intent is to place a demonstrable intellectual barrier between the reverse engineering process and the development of the new product. The use of the clean room technique can be compared, in some respects, with the fair use of copyrighted publications in order to compile a new document. For example, a new book about Linux can be authored on the basis of information obtained by researching existing books, articles, white papers, and Web sites. This does not necessarily constitute copyright infringement, even though other books on Linux already exist, and even if the new … 
Cleanroom Technique definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement