SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER:
This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007
|
|
|
Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER:
Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007
|
|
|
Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007
|
|
|
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007
|
|
|
Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER:
Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER:
This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006
|
|
|
Overcoming the Challenge of Protecting Secrets in the SDLC
sponsored by Legit Security
WHITE PAPER:
Secrets in the SDLC pose a serious risk, with an average of 12 live secrets per 100 repositories. Discover how to protect your organization by implementing robust secret scanning across your entire software development lifecycle. Read the white paper to learn more.
Posted: 04 Dec 2024 | Published: 04 Dec 2024
|
|
|
Unknown SDLC Risks Legit Uncovers
sponsored by Legit Security
WHITE PAPER:
Uncover the top 6 unknown risks in your software development lifecycle, including exposed secrets, unknown build assets, and misconfigured infrastructure. Learn how to secure your software factory from end to end. Read the full White Paper.
Posted: 04 Dec 2024 | Published: 04 Dec 2024
|
|
|
Accelerate Modernization with AI Driven Software Development Lifecycle
sponsored by AWS
EGUIDE:
Accelerate your software development modernization with AI-driven efficiency and automation. Learn how LTIMindtree Genie can streamline over 30 SDLC use cases, deliver code and docs 3x faster, and reduce costs - all while ensuring high accuracy and quality. Read the full white paper to discover the benefits.
Posted: 09 Dec 2024 | Published: 09 Dec 2024
|
|
|
Without Shift-Left Security Testing, Your Customers Are Vulnerable. Make Your Move Now
sponsored by Qualitest Group
BLOG:
Traditional security testing often comes too late, leaving customers vulnerable. Shift left security testing earlier in the SDLC can identify and fix vulnerabilities faster. Learn how to build an effective shift-left security testing strategy in this article.
Posted: 03 Jul 2024 | Published: 03 Jul 2024
|
|
|
Platform Engineering: The Key to Successful Transformation for the Enterprise
sponsored by CircleCI
WEBCAST:
More and more enterprises looking to balance productivity and reliability are turning to internal developer platforms (IDP), which offer greater productivity via standardization of tools and processes. In this webinar, you will discover an intro to platform engineering and a demo of CircleCI and its features.
Posted: 24 Sep 2024 | Premiered: Sep 24, 2024
|
|
|
Top DevSecOps certifications for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
Posted: 25 May 2022 | Published: 25 May 2022
|
|
|
Generative AI’s Role in Secure Software Development
sponsored by Veracode, Inc.
WHITE PAPER:
In this white paper that features insights from Chief Product Officer at Veracode, Brian Roche, learn how generative AI can help developers deliver secure code quickly.
Posted: 05 Sep 2024 | Published: 13 Sep 2024
|
|
|
A New Approach to Application Security
sponsored by Legit Security
EBOOK:
As software development speeds up and becomes more complex, security teams struggle with visibility and alignment across the software factory. This white paper introduces a new approach to application security, offering centralized visibility, contextual prioritization, and alignment to mitigate risks from code to cloud. Read to learn more.
Posted: 04 Dec 2024 | Published: 04 Dec 2024
|
|
|
Digital.ai Intelligence Product Brief
sponsored by Digital.ai
PRODUCT OVERVIEW:
Discover how Digital.ai Intelligence's AI-powered analytics can align software delivery with business strategy, streamline value streams, and increase application reliability. Get the insights you need to drive continuous agility. Read the full research content to learn more.
Posted: 18 Jul 2024 | Published: 18 Jul 2024
|
|
|
Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
EBOOK:
Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.
Posted: 17 Mar 2021 | Published: 17 Mar 2021
|
|
|
Sample Enterprise Code Signing Policy
sponsored by DigiCert
RESOURCE:
The tools exist to quickly and easily protect code. Many developers are surprised to discover that software security, like signing, scanning, and SBOMs, not only guard software against malware and other threats, but also speed time-to-delivery without hindering production or innovation.
Posted: 06 Nov 2024 | Published: 07 Nov 2024
|
|
|
Practical DevSecOps : Reduce Risk and Go to Market Faster
sponsored by Veracode, Inc.
EBOOK:
Discover how to implement a successful DevSecOps approach and secure your software development lifecycle. Learn practical steps to integrate security early, automate processes, and reduce risk. Read the full e-book to get started.
Posted: 05 Sep 2024 | Published: 05 Sep 2024
|
|
|
The DevSecOps Playbook Practical Steps for Producing Secure Software
sponsored by Veracode, Inc.
EBOOK:
What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.
Posted: 05 Sep 2024 | Published: 09 Sep 2024
|
|
|
Software Security is a Team Sport Become an Elite Organization with Secure Cloud Development Collaboration
sponsored by Veracode, Inc.
EBOOK:
In this 18-page e-book, learn why secure software development is a team sport, how to integrate security into development in 6 steps, and more.
Posted: 05 Sep 2024 | Published: 19 Sep 2024
|
|
|
Application security: Five principles for ‘Shifting smart’
sponsored by Contrast Security
EBOOK:
Optimize your application security testing by shifting smart, not just left. Learn five principles to secure your apps, including hardening your software stack and testing what matters most. Download this e-book to improve your application security strategy.
Posted: 12 Sep 2024 | Published: 12 Sep 2024
|
|
|
Application security: Five principles for ‘Shifting smart’
sponsored by Contrast Security
EBOOK:
Optimize your application security testing by shifting smart, not just left. Learn five principles to secure your apps, including hardening your software stack and testing what matters most. Download this e-book to improve your application security strategy.
Posted: 18 Dec 2024 | Published: 18 Dec 2024
|
|
|
Understanding Modern Software Development
sponsored by Veracode, Inc.
RESOURCE:
Download this resource to learn about how software development tools and processes changed recently, challenges developers run into while trying to balance these new tools and processes, and what security professionals can do to get developers fully on board with security.
Posted: 17 Mar 2021 | Published: 17 Mar 2021
|
|
|
GenAI: Empowering enterprises and engineering for the future
sponsored by Virtusa
WHITE PAPER:
Discover how generative AI (genAI) is transforming enterprises and engineering. Learn about leveraging GenAI to build new revenue streams, boost productivity, and enhance data engineering. Explore the enterprise readiness of AI tools and Virtusa's perspective on empowering the future. Read the white paper to learn more.
Posted: 27 Aug 2024 | Published: 27 Aug 2024
|
|
|
Focus: Telecoms of the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The telecoms sector in 2017 finds itself increasingly challenged as operators and end-users respond to multiple challenges, such as the emergence of software-based networks, the steady erosion of voice revenues, and the growth of 'free' communications services.
Posted: 08 Feb 2021 | Published: 11 Aug 2017
|
|
|
Securing Containers And Infrastructure As Code For Cloud-Native Software: The Why And The How
sponsored by Veracode
EBOOK:
Along with highlighting 3 prevalent risks to container and IaC (infrastructure as code) security, this e-book instructs readers on how to mitigate those risks with a holistic approach to security. Continue on to unlock these insights.
Posted: 08 Jun 2023 | Published: 08 Jun 2023
|
|
|
SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE:
If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021
|
|
|
The 17th State of Agile Report
sponsored by Digital.ai
RESEARCH CONTENT:
Small organizations continue to report that Agile is a powerful productivity framework showing obvious benefits; larger companies, however, are seeing substantive barriers to organization-wide adoption. Explore research on the State of Agile in 2023 to better understand how to leverage and empower Agile as a medium-sized or large business.
Posted: 19 Jan 2024 | Published: 20 Jan 2024
|
|
|
HOW TO KEEP UP WITH THE RAPIDLY EXPANDING SCOPE OF THE OWASP TOP TEN
sponsored by Contrast Security
EBOOK:
The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
Posted: 01 Feb 2022 | Published: 01 Feb 2022
|
|
|
How to Keep Up with the Rapidly Expanding Scope of the OWASP Top Ten
sponsored by Contrast Security
EBOOK:
The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast's observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
Posted: 17 Dec 2024 | Published: 17 Dec 2024
|
|
|
Focus: Mobility, virtualisation and desktop
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we share details of how mobility and virtualisation has helped organisations in the publishing and manufacturing industries meet their business objectives, while taking a look at some of the broader industry trends playing out in these technological areas.
Posted: 08 Feb 2021 | Published: 21 Aug 2017
|
|