Software Developer's Kits White Papers

(View All Report Types)
Making Desktop Virtualization Part of Your Windows 7 Migration
sponsored by Dell Software
WHITE PAPER: This paper explains how adopting desktop virtualization can simplify the Windows 7 migration, and additionally reduce costs, improve efficiency and enhance security around the desktop infrastructure. It’s like “killing two birds with one stone.”
Posted: 14 Apr 2011 | Published: 12 Apr 2011

Dell Software

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Big Data in Big Companies
sponsored by Red Hat
WHITE PAPER: Explore the following white paper to join analytics pioneer, Tom Davenport, as he reveals the findings of how big data fits into the data and analytics infrastructure of 20 large organizations. Find out how these companies are handling big data, the tools and skill sets used to maximize ROI, and what the future holds with analytics 3.0.
Posted: 17 Apr 2014 | Published: 21 Apr 2014

Red Hat

Seven best practices for building applications that meet business requirements
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Today's agile development processes and distributed environments have only increased the complexity of tracking software project requirements. Read this white paper to understand why requirements are slipping through the cracks and discover tools and best practices that can help you create traceability across your modern development organization.
Posted: 20 Mar 2012 | Published: 31 Oct 2011

Hewlett Packard Enterprise

Eliminate SLDC bottlenecks with a DevOps approach
sponsored by IBM
WHITE PAPER: In this resource, explore the bottlenecks that slow down software delivery and learn how you can overcome them by creating better collaboration through DevOps. Get an in-depth look at how to achieve the continuous release and deployment adoption path to DevOps, with specific examples of each step in the process.
Posted: 27 Mar 2014 | Published: 31 May 2013

IBM

Embracing Enterprise Mobility: Choosing the Right Application Development Platform
sponsored by IBM
WHITE PAPER: Extending your enterprise with mobile applications and device isn't an option anymore -- it's a necessity. But choosing the right platform for mobile application development isn't simple, when there are so many options on the market. Download this buyer's checklist for mobile application platforms to help you with your decision.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

IBM

Mobile Strategy in 4 Easy Steps
sponsored by Appcelerator
WHITE PAPER: Read this white paper to discover four important steps to take to create an effective mobile strategy and learn how successful companies are making the most of the latest tools and processes.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

Appcelerator

Improving Traceability and Auditability Across the Development Lifecycle
sponsored by IBM
WHITE PAPER: This white paper explores how IBM® Rational® software integrated offerings can help gain the traceability you need to ensure overall product quality.
Posted: 19 Mar 2010 | Published: 17 Dec 2009

IBM

5 Unsung Tools of DevOps
sponsored by New Relic
WHITE PAPER: Forward-thinking organizations have already hopped on the DevOps bandwagon for streamlined software development and delivery. A key aspect of successful DevOps is constant improvement of tools -- but improvement doesn't need to mean replacement. Are you overlooking some of the most valuable DevOps tools?
Posted: 18 Feb 2014 | Published: 31 Oct 2013

New Relic

Improve Your Mobile Application Security
sponsored by IBM
WHITE PAPER: Mobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself.
Posted: 06 May 2014 | Published: 31 Oct 2012

IBM