IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Spiral Model

RSS Feed    Add to Google    Add to My Yahoo!
Spiral ModelReports
 
Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort

Top 5 Cloud Coding Mistakes in Java Applications
sponsored by Cloud Technology Partners
WHITE PAPER: The focus of organizations has shifted to large portfolios of existing applications which were never designed to work well in a cloud environment. This whitepaper tackles 5 common coding mistakes made in Java applications, and provides analysis of the cause and clear solutions.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

Cloud Technology Partners

Extending the life of your existing data centers. Smart execution helps you double IT capacity in the same footprint
sponsored by IBM
WHITE PAPER: Explore this resource to discover a case study on how IBM was able to grow its IT capacity 8x without expanding its energy footprint. Read on, and discover how you can achieve similar results within your own infrastructure.
Posted: 27 Aug 2014 | Published: 31 Oct 2012

IBM

Deployment Best Practices and Guidelines to Deliver Any App to Mobile Users
sponsored by Citrix
WHITE PAPER: Access to corporate applications allows mobile workers to be more productive, responsive and informed. Discover six ways to provide enterprise application access on mobile devices.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Citrix

Automating the Application Release Process: Build vs. Buy
sponsored by CA Technologies.
WHITE PAPER: Companies are turning to application release automation as a cost-effective solution for development bottlenecks. Some are able to write shell scrips to automate deployment activities. Read about the essentials for building, executing, and managing release automation, and discover software that provides automation from the ground up.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

CA Technologies.

Choosing the Right API Management Solution for the Enterprise User
sponsored by CA Technologies.
WHITE PAPER: Publishing application programming interfaces (APIs) to an external developer community introduces a number of challenges and risks for the enterprise. This informative whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery.
Posted: 22 Aug 2014 | Published: 31 Dec 2013

CA Technologies.

CIOS With and Without PPM Software Discuss IT Project Governance
sponsored by Innotas
EGUIDE: This e-guide reveals the importance of prioritizing and implementing an IT governance strategy, both with and without PPM, to better ensure IT project efficiency and success.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Innotas

The Total Economic Impact of Veracode's Cloud-Based Application Security Service
sponsored by Veracode, Inc.
CASE STUDY: A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

6 Capabilities of a Development Platform that Delivers Greater ROI
sponsored by IBM
WHITE PAPER: Stagnant budgets force developers to use tools that rely on hand coding every functionality, integration, and modification. This thorough whitepaper considers a development platform that not only increases developer efficiency, but totes a greater implementation ROI.
Posted: 26 Aug 2014 | Published: 31 Oct 2012

IBM

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement