> Technology > Software Development
 

Software Development

Software Development is a term to encompass the processes of software engineering combined with the research and goals of software marketing to develop computer software products. Synonyms include software life cycle and software process. There are several models for such processes, each describing approaches to a variety of tasks or activities that take place during the process.
Results 276 - 300 of 570Sort Results By: Published Date | Title | Company Name
White Paper Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 24, 2014
Android is on the rise. Unfortunately, popularity can also bring unwanted attention. While Android fans love the fact that it is an open development platform that offers developers the ability to build extremely rich and innovative applications, the same open nature of the Android platform is what makes it so attractive to malware creators. It’s high time for Android developers to increase their awareness of the pitfalls awaiting their users. This white paper focuses on the value of secure code signing practices for building more secure Android apps.
Tags : 
security, android, applications, code signing, software
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 24, 2014
For years, developers have known that one of the best ways to reassure users is by signing code using a digital signature accessed via a private key issued by a respected certificate authority. But signed code is not invulnerable. Due to lax key security and vetting processes, malware has managed to infiltrate applications with signed code. Read the white paper, Protect Your Applications—and Reputation—with Symantec EV Code Signing, to learn: • Key background on the latest malware threats • How you can provide users with reassurance that your application is safe to download • Why EV Code Signing Certificates represent the next step in advanced website security and their effectiveness • How you can help provide a frictionless experience when users attempt to download your application
Tags : 
security, applications, symantec, code signing, malware
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 24, 2014
The malware threat and resulting lack of confidence on the part of online users puts software developers and other companies that rely on software downloads at risk. Code signing is an industry-recommended and widely-used defense against tampering, corruption, or malware infection in software code, armed with a powerful method to both identify code and assure the identity of the code signer. This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : 
security, malware, code signing, software, downloads
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 24, 2014
The efficacy of code signing as an authentication mechanism for software depends on the secure storage of code signing private keys used by software publishers. Companies that are diligent and willing to invest in the appropriate security measures can make the compromise of their private keys highly unlikely. This white paper describes recent security breaches and why they may have happened, along with best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates.
Tags : 
security, code signing, software, private keys, software development
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Jun 24, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
security, software, mobile, mobile application, malware
    
Symantec Corporation
White Paper Published By: Intacct Corporation     Published Date: Jun 18, 2014
In the last few years, the demands on the finance department—from real-time reporting to global consolidation—have increased significantly. At the same time, the choices for accounting and financial software have become much more complex. How do you begin to research, evaluate, and select the right software for your business? Download the 2015 Buyer's Guide to Accounting and Financial Software and discover: • Why most financial software systems hinder your ability to get good financial information • The six key questions you need to ask before considering a move to a cloud-based financial solution • Why the process for evaluating software is different for cloud solutions – and the seven SLA must-haves you should get in writing Get all the facts for a successful buying journey!
Tags : 
intacct corporation, accounting and financial software, roi, auditing, networking
    
Intacct Corporation
White Paper Published By: Aerohive Networks     Published Date: May 27, 2014
Learn about two approaches for efficient WLAN design and see how you can seamlessly integrate 802.11ac into your WLAN in order to lay the foundation for the future of high-speed technologies.
Tags : 
aerohive, wi-fi, wlan, wireless lan, 802.11ac
    
Aerohive Networks
White Paper Published By: Phunware     Published Date: May 22, 2014
Retailers and mall owners now have a major opportunity to differentiate their brands and locations, more deeply engage their customers, and jump ahead of competitors. Get insight on, gaining a competitive advantage with mobile, monetizing store traffic through mobile, the importance of the mobile shopper connection and engaging shoppers with location-aware mobile apps.
Tags : 
shopper whitepaper, software development
    
Phunware
Case Study Published By: Red Hat     Published Date: May 20, 2014
When a company sells services to a consumer audience primarily through a Web user interface (UI), that Web UI had better be online and available, all the time, especially if you are an airline. Such is the real-world scenario that faces Chris Skretowski, Linux Specialist at Devon, United Kingdom–based Flybe, Europe's largest regional airline. Flybe was one of the 21 companies that were interviewed for quantitative results on their operations as part of an IDC ROI analysis. This case study presents the qualitative side of the company's story.
Tags : 
red hat, web ui, flybe, case study, operations
    
Red Hat
White Paper Published By: Actuate     Published Date: May 19, 2014
A white paper providing a breakdown in five steps of embedding reports, dashboards and analytics.
Tags : 
embedding reports, dashboards, analytics, saas, actuate
    
Actuate
Webinar Published By: IBM     Published Date: May 09, 2014
Agile methods have become increasingly popular because they empower organizations to more quickly address emerging opportunities, to better ensure accurate fulfillment of functional requirements and to significantly enhance team productivity. Many organizations, however, are hesitant to employ agile methods for their safety-critical systems—since they have serious concerns about compromising those systems and thereby exposing themselves to completely unacceptable consequences.IBM Rational Chief Evangelist Bruce Powel Douglass explains how best practices for project management can assist organizations in experiencing all the benefits of agile development while continuing to maintain rigorous standards essential for successful delivery of safety-critical systems.
Tags : 
ibm, agile development, product development, agile methods, safety critical systems development
    
IBM
Webinar Published By: IBM     Published Date: May 09, 2014
Agile methods have a reputation for being fast and adaptive and can enhance both quality and team productivity. For these reasons they are attractive to software teams in many different domains - including safety-critical systems development. But how can agile methods be adapted to meet the needs of such a challenging domain? In the fourth episode of the series, IBM Rational Chief Evangelist, Bruce Powel Douglass discusses how agile practices can be adapted to meet the evidence needs of safety-critical projects.
Tags : 
ibm, agile development, agile methods, safety critical systems development, project management
    
IBM
White Paper Published By: IBM     Published Date: Apr 18, 2014
Infrastructure matters. Today’s business environment is increasingly dominated by mobile and cloud-based platforms, and by the skyrocketing volume of new data. And with 70 percent of the average organization's IT budget being spent on operations and maintenance, infrastructure must be simplified, adaptive and responsive. Those are the characteristics of the software defined environment: IBM’s optimized, customized, virtualized IT platform designed to replace systems that assign server, storage and network resources manually. This eBook serves as an essential introduction to SDEs: what they are, and why your organization needs them now more than ever.
Tags : 
ibm, software defined environments, sde, it infrastructure, workloads
    
IBM
White Paper Published By: IBM     Published Date: Apr 16, 2014
Instead of only managing projects, organizations do need to manage value! "Doing the right things" and "doing things right" are the essential ingredients for successful software and systems delivery. Unfortunately, with distributed delivery spanning multiple disciplines, geographies and time zones, many organizations struggle with teams working in silos, broken lines of communication, lack of collaboration, inadequate traceability, and poor project visibility. This often results in organizations "doing the wrong things" and "doing things wrong", with associated higher costs, project delays and lower quality.
Tags : 
ibm, software, systems, systems delivery, distributed delivery
    
IBM
White Paper Published By: IBM     Published Date: Apr 15, 2014
Confused by all the agile advice? Relax! With Agile for Dummies by your side you'll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.
Tags : 
ibm, agile, software, software development, scale
    
IBM
White Paper Published By: IBM     Published Date: Apr 15, 2014
Organizations developing products and systems in industries such as automotive, aerospace and defense, medical devices and consumer electronics are undergoing a transformation driven by the rapid growth in functionality delivered by software and electronics. This paper outlines an approach for using this shift to gain a competitive advantage.
Tags : 
ibm, product development, systems development, it engineering, business objectives
    
IBM
White Paper Published By: Cisco     Published Date: Apr 08, 2014
As the industry moves forward to meet the enormous demand for data with video, mobile, and cloud, the core networks need to transition from 10G to 100G and beyond.
Tags : 
cisco, 100g, data, video, mobile
    
Cisco
White Paper Published By: Cisco     Published Date: Apr 08, 2014
Service providers around the world share concerns about running out of bandwidth. Business challenges surrounding continued bandwidth growth, linked to video, mobility, and cloud applications, are significant. Service providers also report declining revenue from a cost-per-bit perspective, so not only does the network need to grow, it also needs to grow more cost effectively. Download this whitepaper to learn more!
Tags : 
cisco, 100g, data, video, mobile
    
Cisco
White Paper Published By: OutSystems     Published Date: Apr 01, 2014
This paper takes a look at reasons behind why IT is struggling to innovate and how you can fix this problem.
Tags : 
it innovation, inefficiency, new service, change requests, budget
    
OutSystems
White Paper Published By: OutSystems     Published Date: Apr 01, 2014
This paper takes a look at reasons behind why IT is struggling to innovate and how you can fix this problem.
Tags : 
innovation, applications, cost, outsystems, transformation
    
OutSystems
White Paper Published By: Symantec Corporation     Published Date: Mar 21, 2014
Symantec SSL certificates provide a secure bridge to trusted cloud hosting providers
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Mar 21, 2014
This paper examines algorithm agility, how it fits into the current and evolving security landscape and how your business can enhance online security through a more flexible, scalable approach to SSL certification.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
White Paper Published By: Symantec Corporation     Published Date: Mar 21, 2014
Adopting a managed approach to web security and regulatory compliance.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs
    
Symantec Corporation
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.