SDLC White Papers

(View All Report Types)
SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Accelerate Modernization with AI Driven Software Development Lifecycle
sponsored by AWS
EGUIDE: Accelerate your software development modernization with AI-driven efficiency and automation. Learn how LTIMindtree Genie can streamline over 30 SDLC use cases, deliver code and docs 3x faster, and reduce costs - all while ensuring high accuracy and quality. Read the full white paper to discover the benefits.
Posted: 09 Dec 2024 | Published: 09 Dec 2024

AWS

Machine Identity Security Architecture
sponsored by CyberArk
WHITE PAPER: As apps and their architectures have evolved, so have machine identities. The result? Such identities have proliferated in number and type, necessitating a modern machine identity security architecture. Unlock 10 pages of guidance in this white paper.
Posted: 02 Jan 2025 | Published: 27 Dec 2024

TOPICS:  .NET
CyberArk

Secure Coding Practices – Growing Success or Zero-Day Epidemic?
sponsored by Security Journey
ANALYST REPORT: This research report examines how organizations tackle secure software development. Key findings include the importance of integrating security planning and validation into the development lifecycle and the high ROI of secure coding training. Download the full report to learn how to improve your application security.
Posted: 08 Jan 2024 | Published: 16 Jan 2025

Security Journey

Top DevSecOps certifications for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
Posted: 25 May 2022 | Published: 25 May 2022

TechTarget ComputerWeekly.com

Your business deserves effective test automation services
sponsored by Qualitest Group
LANDING PAGE: Qualitest offers comprehensive test automation services to help you achieve faster, more accurate testing. Leverage their AI-powered tools and frameworks for efficient regression testing, continuous testing, and customized automation solutions. Read the full details.
Posted: 10 Jan 2025 | Published: 11 Jan 2025

Qualitest Group

2025 State Of Software Security a New View Of Maturity
sponsored by Veracode, Inc.
RESEARCH CONTENT: This report analyzes software security trends, showing progress and challenges. OWASP Top 10 pass rates improved, but fix times increased. It examines flaw prevalence, fix capacity, and security debt in organizations. Key metrics benchmark performance and guide improvement. Read the full report for insights on enhancing your security program.
Posted: 06 Mar 2025 | Published: 07 Mar 2025

Veracode, Inc.

Generative AI’s Role in Secure Software Development
sponsored by Veracode, Inc.
WHITE PAPER: In this white paper that features insights from Chief Product Officer at Veracode, Brian Roche, learn how generative AI can help developers deliver secure code quickly.
Posted: 05 Sep 2024 | Published: 13 Sep 2024

Veracode, Inc.

Digital.ai Intelligence Product Brief
sponsored by Digital.ai
PRODUCT OVERVIEW: Discover how Digital.ai Intelligence's AI-powered analytics can align software delivery with business strategy, streamline value streams, and increase application reliability. Get the insights you need to drive continuous agility. Read the full research content to learn more.
Posted: 18 Jul 2024 | Published: 18 Jul 2024

Digital.ai

Endpoint Protection Isn’t Enough: Defend Your Software Development Lifecycle from Open Source Malware
sponsored by Sonatype
EBOOK: Open source malware infiltrates software development lifecycles, exploiting trusted components and bypassing protection. This e-book explores the dangers of open source malware, recent attacks, and strategies to protect your software supply chain. Learn why traditional security falls short and how to safeguard your development process.
Posted: 15 Mar 2025 | Published: 15 Mar 2025

Sonatype

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
EBOOK: Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

TOPICS:  Cybersecurity
Veracode, Inc.

Enabling embedded solutions through container technology
sponsored by Wind River
WHITE PAPER: This white paper examines container technology in embedded solutions, focusing on security challenges and opportunities. It covers the role of SBOMs, digital twins, and open-source solutions in boosting security and efficiency. Discover how containerization is transforming IT. Read the full white paper for detailed insights and strategies.
Posted: 27 Feb 2025 | Published: 27 Feb 2025

Wind River

Trusted Software Supply Chains In Government
sponsored by Red Hat
WHITE PAPER: This white paper explores how government agencies can build trusted software supply chains to comply with Executive Order 14028. It outlines Red Hat's approach, including tools for vulnerability detection, SBOM generation, and continuous monitoring. Enhance security, boost productivity, and create a modern software factory by reading the paper.
Posted: 14 Mar 2025 | Published: 14 Mar 2025

Red Hat

Practical DevSecOps : Reduce Risk and Go to Market Faster
sponsored by Veracode, Inc.
EBOOK: Discover how to implement a successful DevSecOps approach and secure your software development lifecycle. Learn practical steps to integrate security early, automate processes, and reduce risk. Read the full e-book to get started.
Posted: 05 Sep 2024 | Published: 05 Sep 2024

Veracode, Inc.

The DevSecOps Playbook Practical Steps for Producing Secure Software
sponsored by Veracode, Inc.
EBOOK: What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.
Posted: 05 Sep 2024 | Published: 09 Sep 2024

Veracode, Inc.

Software Security is a Team Sport Become an Elite Organization with Secure Cloud Development Collaboration
sponsored by Veracode, Inc.
EBOOK: In this 18-page e-book, learn why secure software development is a team sport, how to integrate security into development in 6 steps, and more.
Posted: 05 Sep 2024 | Published: 19 Sep 2024

Veracode, Inc.

Application security: Five principles for ‘Shifting smart’
sponsored by Contrast Security
EBOOK: Optimize your application security testing by shifting smart, not just left. Learn five principles to secure your apps, including hardening your software stack and testing what matters most. Download this e-book to improve your application security strategy.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Understanding Modern Software Development
sponsored by Veracode, Inc.
RESOURCE: Download this resource to learn about how software development tools and processes changed recently, challenges developers run into while trying to balance these new tools and processes, and what security professionals can do to get developers fully on board with security.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Veracode, Inc.

Securing Containers And Infrastructure As Code For Cloud-Native Software: The Why And The How
sponsored by Veracode
EBOOK: Along with highlighting 3 prevalent risks to container and IaC (infrastructure as code) security, this e-book instructs readers on how to mitigate those risks with a holistic approach to security. Continue on to unlock these insights.
Posted: 08 Jun 2023 | Published: 08 Jun 2023

TOPICS:  .NET
Veracode

Focus: Telecoms of the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The telecoms sector in 2017 finds itself increasingly challenged as operators and end-users respond to multiple challenges, such as the emergence of software-based networks, the steady erosion of voice revenues, and the growth of 'free' communications services.
Posted: 08 Feb 2021 | Published: 11 Aug 2017

TechTarget ComputerWeekly.com

Leveraging Control-M To Exploit Cloud Technology And Devops Methodology
sponsored by BMC Software
WHITE PAPER: Control-M helps enterprises leverage cloud technology and DevOps by streamlining workflow management across traditional and multi-cloud environments. It eliminates workflow rework, accelerates cloud app development, and offers a single platform for managing workflows. Read this white paper to see how companies use Control-M for cloud transitions.
Posted: 13 Mar 2025 | Published: 13 Mar 2025

BMC Software

SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE: If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

HOW TO KEEP UP WITH THE RAPIDLY EXPANDING SCOPE OF THE OWASP TOP TEN
sponsored by Contrast Security
EBOOK: The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
Posted: 01 Feb 2022 | Published: 01 Feb 2022

TOPICS:  .NET
Contrast Security

How to Keep Up with the Rapidly Expanding Scope of the OWASP Top Ten
sponsored by Contrast Security
EBOOK: The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast's observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
Posted: 17 Dec 2024 | Published: 17 Dec 2024

Contrast Security

Focus: Mobility, virtualisation and desktop
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we share details of how mobility and virtualisation has helped organisations in the publishing and manufacturing industries meet their business objectives, while taking a look at some of the broader industry trends playing out in these technological areas.
Posted: 08 Feb 2021 | Published: 21 Aug 2017

TechTarget ComputerWeekly.com

The Paved Path To Balancing Security And Innovation
sponsored by Atlassian
WHITE PAPER: Discover in this white paper how business leaders are dealing with the complexities and increased security risks resulting from remote and hybrid teams, growing cloud adoption, the macroeconomic environment, and more.
Posted: 29 Jul 2023 | Published: 29 Jul 2023

TOPICS:  .NET
Atlassian