ComputerWeekly.com Research Library

Powered by Bitpipe.com

Software Development Life Cycles Research

  • Mobile App Dev: Cut Through the Noise With a Sustainable Strategy

    Sponsored by: IBM

    Access these in-depth webcasts to evaluate whether your current application development practices are sustainable. View now to find the technical and vendor capabilities required to support 5-star mobile application development.

  • Key opportunities and pitfalls on the road to continuous delivery

    Sponsored by: Coverity by Synopsys

    This e-guide presents tips and suggestions for a continuous delivery strategy to accelerate software development cycles, as well as five lessons to simplify continuous integration to lessen obstacles.

  • The Impact of Data Breaches: Why Application Security is a Business Imperative

    Sponsored by: Veracode, Inc.

    64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.

  • 5 Unsung Tools of DevOps

    Sponsored by: New Relic

    Forward-thinking organizations have already hopped on the DevOps bandwagon for streamlined software development and delivery. A key aspect of successful DevOps is constant improvement of tools -- but improvement doesn't need to mean replacement. Are you overlooking some of the most valuable DevOps tools?

  • Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing

    Sponsored by: Tasktop

    This paper explores how leveraging data from disparate systems will give software testing teams the unique opportunity to become the hub of organizational quality. Uncover 5 best practices that will help expose critical issues, enable Agile development, create a more holistic view of the software development lifecycle, and more.

  • Building a Strong Application Security Program

    Sponsored by: Onapsis

    What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.

  • Comcast Implements Service Virtualization & DevOps to Improve App Testing

    Sponsored by: Parasoft Corporation

    Access this featured resource to find out how Comcast found reliability through a DevOps strategy built around service virtualization. Find out how this massive company was able to virtualize 98% of test interfaces, and enjoys a 65% reduction in the amount of time to create and maintain test data.

  • Mobile Design Patterns: Push, Don't Pull

    Sponsored by: IBM

    Is it better to wait for users to request, or "pull," the content they need, or to "push" content updates when you think users need them? This resource weighs in on the "push vs. pull" design model debate, describing key advantages of the push model in the mobile space.

  • Why Integrating a Hybrid Environment is Now a CIO Core Competency

    Sponsored by: Attenda

    In this expert e-guide, we explore how various CIOs have successfully architected efficient hybrid IT environments. Discover how they leveraged APIs to integrate legacy apps and processes, used master data management to move data between systems, and more.

  • IoT Poses New Problems for Developers

    Sponsored by: TheServerSide.com

    This expert handbook addresses three major issues posed by the IoT: security, analytics, and application testing. Uncover key insights on how to overcome these challenges and deliver secure, trustworthy, and valuable IoT devices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.