IT Management  >   Systems Design and Development  >   Application Development  >   Software Development Methodologies  >  

Spiral Model

RSS Feed    Add to Google    Add to My Yahoo!
Spiral ModelReports
 
Mitigate Business Intelligence Project Risks With Rule-Based Audits and Proofs-of-Concept
sponsored by Syncsort
WHITE PAPER: Learn about two methods for minimizing the risk associated with business intelligence (BI) iterations: Rule-Based Audits and Proof-of-Concepts. Implemented together, they represent a continuum of risk mitigating techniques.
Posted: 19 Mar 2007 | Published: 01 Mar 2007

Syncsort

Info-Tech Research declares IBM a Champion in Systems Management
sponsored by IBM
WHITE PAPER: Access this guide to examine an evaluation of 13 competitors in the systems management market. You'll be able to compare products based on functionality and price and get insight into where the market is going. On top of this, you'll learn what sets IBM apart from the competition in the systems management market.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

API and API Infrastructure Security for the CSO
sponsored by Apigee
WHITE PAPER: Security must be built into the APIs themselves. But that's not enough. Threat protection, identity services, infrastructure security, and compliance also must be top of mind. This eBook provides a framework to help CSOs and CISOs consider API security.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Apigee

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

K2 Helps a Top Game Developer Improve Efficiency
sponsored by K2
VIDEO: Access this video case study to learn how Square Enix, a top game developer, was able to leverage K2 software to save time and focus on solving new challenges.
Posted: 24 Nov 2014 | Premiered: 20 Jan 2013

K2

SAP Mobile Platform 3.0 - A New Way to Build Apps
sponsored by SAP
VIDEO: Check out this brief video to learn how SAP Mobile Platform 3.0 for developers can aid in building user-centric apps for employees, partners, and consumers. Watch now to learn how your business can benefit from using this technology.
Posted: 20 Nov 2014 | Premiered: 20 Nov 2014

SAP

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.

Infographic: SSD vs. HDDs- How Do they compare?
sponsored by SanDisk Corporation
RESOURCE: Access this infographic to see solid state drives compared side by side with hard disks.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

SanDisk Corporation

Building an Android App using MobileData Cloud
sponsored by IBM
WEBCAST: Watch this video to learn how to augment a simple Android application with functionality provided by IBM Bluemix.
Posted: 24 Nov 2014 | Premiered: Nov 24, 2014

IBM

Create a natural language question answering system with IBM Watson and Bluemix Services
sponsored by IBM
RESOURCE: Access the step-by-step demonstration to see how IBM Watson technology can be used to develop a simple application.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement