Requirements Management Reports

Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

Closing the Communication Gap Between Dispersed Software Testing Teams
sponsored by WANdisco
EGUIDE: In this e-guide, learn how social media giant Twitter effectively improved communications amongst their dispersed engineering team to streamline software testing. Plus, discover what 20-year software development veteran Yvette Francino has to say about communication within distributed Agile teams.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

WANdisco

Preparation for Negotiating Software Sourcing Strategy
sponsored by Miro Consulting, Inc.
EGUIDE: You rarely have every stakeholder involved in a software contract negotiation, and the process is often rushed through. Forrester's Mark Bartrick reveals how to execute a coherent software negotiation strategy in this expert e-guide.
Posted: 25 Jul 2016 | Published: 05 Jul 2016

Miro Consulting, Inc.

Agile in the enterprise - Meet the requirement for transparency and visibility
sponsored by Hewlett Packard Enterprise
WHITE PAPER: To foster innovation and accelerate release, organizations are moving to Agile development practices -- but much of this work still happens in isolation. True business agility requires collaboration of various Agile teams across the entire organization.
Posted: 20 Nov 2013 | Published: 30 Sep 2013

Hewlett Packard Enterprise

Market Snapshot™ Report: Service Virtualization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Increasing customer and business demands are forcing organizations to rethink the way they develop and delivery business-critical applications. One of the most innovative strategies developed to streamline application delivery is service virtualization, which reduces constraints that impact cost, quality, and schedule.
Posted: 20 Feb 2014 | Published: 11 Dec 2012

Hewlett Packard Enterprise

Webinar: When is Application Security Done?
sponsored by Veracode, Inc.
TRANSCRIPT: Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

Continuous Delivery and Integration Yield Improved, Disciplined DevOps
sponsored by TechTarget Software Quality
EBOOK: Trying to move your enterprise into the Agile and DevOps world? This handbook looks at continuous delivery (CD) and integration (CI) strategies to speed up the process. Hear from industry experts on accelerating your CI and CD pipeline, 6 steps to disciplined DevOps software delivery, Lean business models, and more.
Posted: 09 Nov 2016 | Published: 31 Oct 2016

TechTarget Software Quality

Software Lifecycle Integration: Six Reasons Not to Delay
sponsored by Tasktop
WHITE PAPER: Access this resource to learn 6 reasons why you may be costing your organization by waiting to integrate your software lifecycle.
Posted: 23 Jul 2015 | Published: 14 Dec 2015

Tasktop

Case Study : Virgin Media enhances productivity by consolidating testing tools
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This case study looks at how Virgin Media developed a set of transparent, efficient, and unified software testing tools to speed development, and increase quality.
Posted: 07 Nov 2013 | Published: 03 Sep 2012

Hewlett-Packard Enterprise

Webinar: Why Benchmark Application Security?
sponsored by Veracode, Inc.
TRANSCRIPT: Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.