IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Cleanroom Technique

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: The clean room technique is a process in which a new product is developed by reverse engineering an existing product, and then the new product is designed in such a way that patent or copyright infringement is avoided. The clean room technique is also known as clean room design. (Sometimes the words "clean room" are merged into the single word, "cleanroom.") Sometimes this process is called the Chinese  … 
Definition continues below.
Cleanroom Technique Reports
26 - 50 of 3320 Matches Previous Page  |  Next Page
3 Keys to a 5-Star Mobile User Experience
sponsored by Hewlett Packard Enterprise
RESOURCE: This infographic illustrates the vital importance of user experience through interesting statistics, and explores how you can ensure a 5-star experience for users of your mobile app.
Posted: 11 Jun 2015 | Published: 31 Oct 2014

Hewlett Packard Enterprise

3 Limitations of MongoDB on the Public Cloud
sponsored by Rackspace
WHITE PAPER: MongoDB, a frontrunner in the NoSQL world, is friendly to developers employing agile development processes. Access this resource that addresses 3 main problems with do-it-yourself (DIY) MongoDB on the cloud. Hint: scalability is a major concern.
Posted: 02 Oct 2014 | Published: 04 Dec 2013


3 Phases of Your Journey to IT as a Service - Where Are You on Your Journey
sponsored by VMware
RESOURCE: Take a look at this infographic for the three phases of your journey to IT-as-a-Service. Learn about its benefits, including reducing data center costs by 30%.
Posted: 01 Jul 2015 | Published: 31 Mar 2013


3 Strategies for Successful Multi-Channel App Delivery
sponsored by Mendix
WHITE PAPER: This white paper introduces 3 key strategies you need to follow to compete in today's app-dominated landscape. Read on to discover how your business can jump forward into the digital age.
Posted: 23 Jul 2015 | Published: 23 Jul 2015


3 Things in 3 Years: Innovating A Digital Strategy for the Financial Industry
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, learn the three factors to building a digital strategy for success in the next three years.
Posted: 10 Feb 2015 | Published: 07 Jan 2015

Hewlett Packard Enterprise

3 Ways to Move Application Development to the Cloud
sponsored by Oracle Corporation UK Ltd
EBRIEF: This executive brief discusses 3 ways in which you can benefit from moving application development to the cloud with a database cloud service. Read more to learn how to improve your enterprise's application development and testing processes and lower development costs with a PaaS solution.
Posted: 27 Oct 2015 | Published: 31 Dec 2013

Oracle Corporation UK Ltd

4 Components of a Solid Mobile App Security Strategy
sponsored by IBM
WHITE PAPER: This white paper explains how to design a business-driven app strategy that advances business goals without putting enterprise data and your network at risk.
Posted: 15 Jul 2015 | Published: 08 Jul 2015


4 Critical Steps for IT Uptime, Security, and Connectivity
sponsored by CyrusOne
WHITE PAPER: To accommodate customer demands, increasing amounts of data, and changing regulations, your business needs to stay ahead of the curve. This white paper explores how colocation can help you do just that, with high levels of network flexibility and security.
Posted: 12 Mar 2015 | Published: 12 Mar 2015


4 Customers who never have to refresh their PCs again
sponsored by Citrix
CASE STUDY: Access this white paper to explore the journey of four companies who reallocated their annual PC refresh budget into a cutting-edge solution that delivers employee mobility -- paired with IT management efficiency and corporate security -- all within, or under, the standard yearly budget allocated to replace outdated PCs.
Posted: 13 Nov 2015 | Published: 13 Nov 2015


4 Data Traffic Security Challenges Exposing Enterprises to Hack Attacks
sponsored by Certes Networks
WHITE PAPER: This white paper discusses the 4 major points of weakness that your enterprise needs to prioritize in 2015 in order to defend your business-critical data from hackers.
Posted: 12 Feb 2015 | Published: 22 Jan 2015

Certes Networks

4 Factors Forcing IT to Modernize End-User Computing
sponsored by VMware
WHITE PAPER: Access this white paper to explore the top four end-user trends that are forcing IT to modernize end-user computing. Also, discover expert advice from CIOs as they share best practices for end-user computing management – even when time and budget are tight.
Posted: 19 May 2015 | Published: 31 Dec 2014


4 Secrets to Meaningful Security Discussions with the Board Of Directors
sponsored by Citrix
WHITE PAPER: Security is of greater interest to corporate boards than ever before, and an effective security strategy is crucial. This white paper highlights 4 ways to engage your board of directors in a meaningful discussion about security-related risks.
Posted: 30 Jul 2015 | Published: 30 Jul 2015


5 Best Practices for Designing Data-Driven Applications
sponsored by OpenText
WHITE PAPER: This executive brief will help you recognize how data impacts the customer journey. Access now and learn how to use your audience's experience to deliver relevant data.
Posted: 13 Oct 2015 | Published: 29 May 2015


5 Considerations for Finding the Right Cloud Provider for Product Applications
sponsored by Dimension Data
WHITE PAPER: Access this white paper to learn why the cloud is not considered a primary delivery model for all IT services and discover five key criteria when selecting the right cloud provider for your mission critical workloads.
Posted: 08 Oct 2015 | Published: 28 Sep 2015

Dimension Data

5 Essentials to Improving Your Software Quality
sponsored by nfocus
WHITE PAPER: If you are already using Agile methodologies to develop your software, then DevOps is the logical next step. Access this brief whitepaper to discover 5 ways you can improve your software quality, all while reducing your time to market
Posted: 09 Nov 2015 | Published: 09 Nov 2015


3 Essentials to Mobile Application Success
sponsored by IBM
VIDEO: Access this brief video for a look into the capabilities of mobile, and what new challenges companies will need to facilitate. Find out 3 essentials to a successful mobile application.
Posted: 09 Dec 2014 | Premiered: 09 Dec 2014


3 key Lessons for Agile Continuous Performance Testing
sponsored by Hewlett Packard Enterprise
WEBCAST: For Agile development to be a success, you need to ensure quality at each step of the process. To do this, performance testing is immensely helpful -- if you do it correctly. In this informative webcast, learn three important lessons for Agile performance testing.
Posted: 12 Feb 2014 | Premiered: Feb 12, 2014

Hewlett Packard Enterprise

3 Principles of the Mobile Era
sponsored by Appcelerator
WHITE PAPER: In this helpful resource, discover the three keys to mobility success that mobile-savvy organizations always keep in mind. You'll learn the tools, technologies, and strategies that are necessary for a mobile-ready IT, and how you can deliver quality, user-friendly mobile applications that run on a variety of devices.
Posted: 11 Oct 2013 | Published: 11 Oct 2013


3 Quick Tips for a Software-Defined Data Center Strategy
sponsored by VMware, Inc.
EGUIDE: This e-guide presents three expert tips to creating a software-defined data center strategy.
Posted: 16 Aug 2013 | Published: 16 Aug 2013

VMware, Inc.

3 Tips for Planning Data Center Transformation
sponsored by HP
VIDEO: To embrace the new instant-on, mobile, interconnected business world, IT organizations need to transform their infrastructure and data centers to support agility. This video series features 10 expert tips for planning your IT transformation. Check out this brief video for tips 7-5.
Posted: 12 Oct 2011 | Premiered: 11 Oct 2011


4 Levels of DevOps
sponsored by OpenMake Software
WHITE PAPER: While most software development organizations have fine-tuned their application lifecycle management (ALM) processes, many still struggle with bottlenecks during the handoff between development and operations. That's where DevOps comes in -- but how do you go from ALM to DevOps?
Posted: 28 May 2014 | Published: 28 May 2014

OpenMake Software

4 Secrets to Meaningful Security Discussions with the Board of Directors
sponsored by Citrix
WHITE PAPER: This informative whitepaper outlines 4 helpful hints for meaningful security discussions with your Board of Directors.
Posted: 07 May 2014 | Published: 07 May 2014


40 Leaders, 40 Stories: PPM Experts Discuss Moving from Project Management to Project Leadership
sponsored by Workfront
WHITE PAPER: This whitepaper combines interviews from 40 PPM leaders, providing diverse insight into their experiences successfully leading teams.
Posted: 04 Feb 2015 | Published: 04 Feb 2015


5 Easy steps to adopting an enterprise app store
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines five easy steps that your organization can take to adopt a secure and effective enterprise app store that will help you empower your workers and reap the benefits of enterprise mobility.
Posted: 12 May 2014 | Published: 12 May 2014


5 Key Virtualization Management Challenges - and How to Overcome Them
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Virtualization introduces fundamental changes to IT, and adds significant management challenges. Read this informative white paper written by Enterprise Management Associates to learn what these challenges are as well as some of the solutions and strategies used to deal with them.
Posted: 26 Jun 2009 | Published: 01 Mar 2009

Hewlett Packard Enterprise
26 - 50 of 3320 Matches Previous Page    1 2 3 4 5    Next Page
CLEANROOM TECHNIQUE DEFINITION (continued): …  wall method, because the intent is to place a demonstrable intellectual barrier between the reverse engineering process and the development of the new product. The use of the clean room technique can be compared, in some respects, with the fair use of copyrighted publications in order to compile a new document. For example, a new book about Linux can be authored on the basis of information obtained by researching existing books, articles, white papers, and Web sites. This does not necessarily constitute copyright infringement, even though other books on Linux already exist, and even if the new … 
Cleanroom Technique definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement