"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

software development life cycle

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jul 26, 2017
To deliver on the potential for transformative innovation, businesses must maximize the latent value of legacy application code and data—and fast. Talking Points: • Go Agile with Agile processes and tools that speed innovation on legacy applications • Onboard your team quickly with modern toolsets and languages that seamlessly integrate legacy code • Integrate legacy code and simplify how you manage the software development lifecycle
Tags : 
    
CA Technologies
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, security management, security policies, application integration
    
Ounce Labs, an IBM Company
Published By: Delphix     Published Date: May 03, 2016
Today's test data management (TDM) solutions force teams to work with compromised data sets, and push testing to too late in the software development lifecycle. The end result is rework, delayed releases, and costly bugs that cripple production systems. Furthermore, prevailing approaches to test data management - including subsetting, synthetic data, shared environments, and standalone masking--represent flawed solutions that fail across one or more key dimensions.
Tags : 
    
Delphix
Published By: CA Technologies     Published Date: Jun 04, 2015
Enterprises that depend heavily on IT to deliver services to customers are constantly driven by market pressures to better develop and release new software features to meet growing demands. Facilitating the collaboration between development and IT operations and bringing application to market faster with high quality are crucial to today’s business success. This solution brief provides insights into the DevOps movement, why it matters and how you can cross the chasm to achieve better collaboration to deliver business value rapidly. You’ll learn how CA Technologies solutions for DevOps bring your portfolio of IT technology forward in a cadence of faster, more predictable releases, letting you confirm the results of each phase of the software life cycle toward positive business outcomes.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 03, 2015
"Enterprises that depend heavily on IT to deliver services to customers are constantly driven by market pressures to better develop and release new software features to meet growing demands. Facilitating the collaboration between development and IT operations and bringing application to market faster with high quality are crucial to today’s business success. This solution brief provides insights into the DevOps movement, why it matters and how you can cross the chasm to achieve better collaboration to deliver business value rapidly. You’ll learn how CA Technologies solutions for DevOps bring your portfolio of IT technology forward in a cadence of faster, more predictable releases, letting you confirm the results of each phase of the software life cycle toward positive business outcomes."
Tags : 
    
CA Technologies
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: CollabNet     Published Date: Dec 20, 2011
Transformation begins high in the organization with the decision to change -- to break out of the status quo and turn Application Lifecycle Management into a strategic advantage. A common Application Lifecycle Management platform provides the benefits enterprises need today-real time visibility and traceability, collaboration across stakeholders and process automation that leads to improved quality, time to market.
Tags : 
alm, software development, application lifecycle management, dev teams, collaboration, automation, agile, continuous integration, application security, business process automation
    
CollabNet
Published By: CollabNet     Published Date: Jan 11, 2013
Read this paper to find out what is happening in the industry in regards to Agile ALM and what you can do to take your dev teams to the next level.
Tags : 
agile, software development, alm, application lifecycle management, best practices, project management, database development, quality assurance, software testing
    
CollabNet
Published By: Intralinks     Published Date: Oct 03, 2013
For many companies, in particular in industries like pharmaceuticals, software development, or entertainment, their intellectual property is more valuable than any physical asset. And with the increasing need to collaborate with external business partners to accelerate product life cycles and enhance innovation, there is a greater risk for sensitive information to be compromised. In this 6-page white paper, discover the benefits of how the right inter-enterprise collaboration tool can ensure secure document sharing and team collaboration, and what to keep in mind as you look for a provider.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications
    
Intralinks
Published By: IBM Software     Published Date: Aug 04, 2010
Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don't understand, is how to implement a robust process for integrating security and risk management throughout the web application.
Tags : 
ibm ouncelab, secure web application, software development lifecycle, security integration, risk management, testing, application security, security management, software testing, web development, web service security
    
IBM Software
Published By: IBM Software     Published Date: Aug 04, 2010
Implementing source code vulnerability testing in the software development life cycle. Finding and fixing security issues early is an application project can help reduce development costs while improving software quality. Source code security tools implemented and used across the software development life cycle are known to provide such results.
Tags : 
ibm ouncelab, software development life cycle, automated source code, security testing, security management, business process automation, software testing, web development
    
IBM Software
Published By: IBM     Published Date: Jul 09, 2009
The product portfolio decisions you make today will determine whether your company is relevant tomorrow. With such a fine line between success and failure, now is the time to make product portfolio decisions based on fact-not guesswork, political agendas, intuition or the opinions of the loudest voice in the room. Learn more today!
Tags : 
ibm, value driven, product portfolios, rational software, value, portfolio management, customer value, value maximization, strategic alignment, npd, r&d, research and design, new product development, ibm rational focal point, lifecycle, networking, knowledge management, enterprise applications
    
IBM
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
Being better than your competitors at creating and using custom software can bring substantial competitive advantage. Similarly, being worse can put you at a significant disadvantage. If your organization doesn’t see ALM as one of its most important business processes, it’s time to change that view.
Tags : 
vsts, alm, application lifecycle management, moody’s, alm, business process, software development lifecycle, sdlc, software development, enterprise applications, business process management, .net
    
Microsoft Visual Studio Team System
Published By: rPath     Published Date: Dec 10, 2010
Read this white paper to learn how rPath's approach to automation relieves IT from the classic tradeoff between speed and control. It enables IT organizations to deliver applications much faster-in minutes-while maintaining control.
Tags : 
rpath, pushbutton application deployment, software development, lifecycle management, database development, application integration
    
rPath
Published By: IBM     Published Date: Jun 09, 2010
Secure at the Source: Save money and reduce risks by correcting software vulnerabilities early on in the development lifecycle. Download this free white paper to learn more.
Tags : 
vulnerabilities, secure application, ibm, source code, software development, it security, application security, software outsourcing
    
IBM
Published By: IBM     Published Date: Jun 09, 2010
Learn how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle with this free IBM white paper.
Tags : 
software delivery, data security, ibm, data protection, it security, web applications, application security
    
IBM
Published By: Coverity     Published Date: Mar 13, 2012
This white paper outlines a practical approach to implementing secure practices into the software development lifecycle. And it is only by bringing security into all phases of development that you can begin to protect your operations.
Tags : 
development, lifecycle, software, development, security, secure, practices, phases, protection, malfunction, breach, recall, revenue, attack
    
Coverity
Published By: Coverity     Published Date: Apr 20, 2012
This white paper outlines a practical approach to implementing secure practices into the software development lifecycle.
Tags : 
development, lifecycle, software, development, security, secure, practices, phases, protection, malfunction, breach, recall, revenue, attack
    
Coverity
Published By: HP     Published Date: Apr 13, 2014
Read the Lufthansa customer case study and learn how a Quality Center SaaS model enabled the airline to cut IT cost while providing 24 hour a day service.
Tags : 
compliance, cost-efficiency, hp quality center, it-governance, software as a service (saas), software development, software quality assurance, test management, alm, application lifecycle management, it management, enterprise applications, convergence
    
HP
Published By: IBM     Published Date: Feb 27, 2014
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.
Tags : 
ibm, ibm software, innovation, software development, smart products, product delivery, smart software, consumerization, unified platform, control risks, software delivery, manage big data, automation, configuration data, error-free data, information technology, lifecycle risks, it management, access control, business intelligence
    
IBM
Published By: IBM     Published Date: Feb 27, 2014
The IBM Rational Intelligent Transportation Systems solution addresses the challenges with complex projects for the planning, development, deployment and lifecycle management of transportation software. Learn more by reviewing the ekit resources.
Tags : 
ibm, ibm software, rational intelligent, transportation systems, transportation industry, sustainability, environmental protection, planning, development, deployment, lifecycle management, transportation software, intelligent transportation systems, rational its, business intelligence
    
IBM
Published By: IBM     Published Date: May 18, 2015
This paper will explore best practices for identifying and eliminating seven types of waste.
Tags : 
software development cycles, software delivery, eliminating waste, collaborative lifecycle management, clm, reduce cycle times, handoffs, task switching, software development, best practices, productivity
    
IBM
Published By: IBM     Published Date: May 18, 2015
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive. Inside you will find: • Business and technical drivers behind automated application release and deployment • Evaluation guides • Success stories that utilize application release and deployment solutions
Tags : 
application delivery, application deployment, software delivery methods, deployment solutions, automated application release, software development life cycle, migration, monitoring, mobile computing, quality assurance, web development, analytical applications, collaboration, productivity, cloud computing
    
IBM
Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic, security, it management, security management
    
Cenzic
Published By: Thinksoft     Published Date: Nov 13, 2007
This guide/primer serve as an introductory how-to guide on outsourced software testing for business heads as well as software project managers. It first places testing within the content of total product life cycle and then describes the sequential stages within testing program, and how these stages can run parallel with the other development stages.
Tags : 
outsourcing, outsourced software testing, software testing, testing vendor, stages in outsourced software testing, product development life cycle, thinksoft, thinksoft global, software outsourcing, quality assurance
    
Thinksoft
Previous   1 2    Next    
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory