IT Management  >  

SDD

RSS Feed   
SDD Reports
 
The Systems Engineering Balancing Act: Choosing an Optimum Development Approach
sponsored by IBM
WHITE PAPER: This thought leadership white paper proposes a combination of requirements-driven, model-driven and test-driven approaches as a mechanism for delivering systems development projects at a reduced cost and risk.
Posted: 23 Mar 2011 | Published: 23 Mar 2011

IBM

Four Key Elements to Improving Systems Engineering in Aerospace and Defense
sponsored by IBM
WEBCAST: This webcast explores four key ways in which A&D companies can improve SE and looks at IBM Rational® solutions and approaches that can help organizations deliver quality products on time and within budget, while increasing efficiency and improving collaboration.
Posted: 13 Dec 2010 | Premiered: Dec 13, 2010

IBM

Initial Investment Payback Analysis: Dell PowerEdge R710 solution vs. Dell PowerEdge 2850 solution
sponsored by Dell, Inc. and Intel®
TEST RESULTS: In this report, we estimate both the number of older solutions each Dell PowerEdge R710 solution can replace and the payback period for replacing those older solutions. One key finding discovered is that each Dell PowerEdge R710 solution can replace up to nine Dell PowerEdge 2850 solutions, and could yield a payback in around 9 months.
Posted: 24 Sep 2009 | Published: 01 May 2009

Dell, Inc. and Intel®

Applying agile and lean principles to the governance of software and systems development
sponsored by IBM
WHITE PAPER: This paper presents eighteen best practices for leaner, more agile software development project governance.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

IBM

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
sponsored by Information Security Magazine
EZINE: November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010

Information Security Magazine

E-Guide: Building a Successful SOA Strategy
sponsored by Oracle Corporation
EGUIDE: This e-guide discusses an architecture-driven SOA paradigm, and what's been holding back adoption of this type of approach. It also looks at the cultural, organizational and operational impact of an architecture-driven SOA, and why the SOA architect needs to step up and lead.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

Oracle Corporation

The Hitchhiker's Guide to Hadoop 2
sponsored by SearchDataManagement
EBOOK: With the introduction of Hadoop 2, ending the reliance on MapReduce and introducing HDFS federation and high availability, this is a big step toward maturity for the technology. In this Hadoop 2 guide, explore new possibilities; determine how your business can take advantage of these increased options.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

SearchDataManagement

Smarter system development: a systems engineering trade study to support green initiatives with model-driven development
sponsored by IBM
WHITE PAPER: Trade study analysis is an effective method of comparing potential solutions to a given problem. Using a model-driven approach allows you to perform trade studies before development or implementation begins and saves time, money, and development headaches. Read on to learn more.
Posted: 14 May 2009 | Published: 01 Apr 2009

IBM

Software Integrity for Agile Environments
sponsored by Coverity by Synopsys
WHITE PAPER: While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Coverity by Synopsys

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle
sponsored by iTKO LISA
WHITE PAPER: This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

iTKO LISA
 
Browse by Report Type:
SDD White Papers | SDD Multimedia | SDD IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info