Application Configuration Management Reports

How to Select DevSecOps Tools for Secure Software Delivery
sponsored by Palo Alto Networks
GARTNER RESEARCH REPORT: This Gartner report defines the concrete security needs across the software development lifecycle and explains how to select the most suitable DevSecOps tools. Read the report to review the tooling options at your disposal.
Posted: 02 May 2024 | Published: 02 May 2024

Palo Alto Networks

Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
Posted: 08 Feb 2021 | Published: 13 Jun 2017

TechTarget ComputerWeekly.com

Software licensing – battleground or crucible?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?
Posted: 08 Feb 2021 | Published: 17 Aug 2017

TechTarget ComputerWeekly.com

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

5 things your Development Teams should be doing now
sponsored by CollabNet
WHITE PAPER: In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. In this paper, find five tested and proven software development practices your team should be utilizing to accelerate software delivery.
Posted: 11 Nov 2011 | Published: 08 Nov 2011

CollabNet

Collaboration in Agile development: Requirements analysis is a team effort
sponsored by Micro Focus
EGUIDE: Agile development roles are no longer set in stone. The most successful and efficient teams work together, each adding their own perspective. This featured article uncovers why testers should participate in requirement analysis and how organizations are getting their whole team more involved in Agile projects.
Posted: 02 May 2012 | Published: 02 May 2012

Micro Focus

Reduce IT Costs and Complexity with Effective Application Problem Management
sponsored by BMC Software, Extending Value with Identify Software
WHITE PAPER: Learn the benefits of automating problem management through problem detection, isolation and resolution. Discover how IT organizations can reduce IT costs and complexity with effective application problem management.
Posted: 26 Mar 2007 | Published: 01 Nov 2006

BMC Software, Extending Value with Identify Software

Testing and Quality Management - Best Practices
sponsored by SAP America, Inc.
WHITE PAPER: Read this white paper to learn the best practices for testing and configuration that Aberdeen's best-in-class designated organizations used to reduce operating costs by 26% and improve process efficiencies by 41% so you can adopt them to create a streamlined, stable IT environment for your business.
Posted: 07 May 2012 | Published: 28 Feb 2010

SAP America, Inc.

Corporate Culture Can Determine ALM Software Choices
sponsored by TechTarget Software Quality
EBOOK: Not all ALM platforms were made the same, so this expert handbook offers advice on how to select the right tools to suit the size and culture of your organization.
Posted: 02 Feb 2016 | Published: 29 Feb 2016

TechTarget Software Quality

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.