System Design Reports

Software Integrity for Agile Environments
sponsored by Coverity by Synopsys
WHITE PAPER: While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Coverity by Synopsys

Reducing the risk of development failure with cost-effective capture and management of requirements
sponsored by IBM
WHITE PAPER: In this paper from Bloor research, explore the key success factors of effective requirements management, and discover some of the tools offered to help you achieve your goal. Learn the business value of these requirements management tools, and how your organization can enjoy some of the benefits that real-world companies experienced.
Posted: 08 Nov 2013 | Published: 31 Jul 2013

IBM

Agile in the Embedded World
sponsored by IBM
WHITE PAPER: Embedded systems development demands a method that can conform to the constraints and requirements, and that method is Agile development. Access this in-depth resource to learn more about Agile methodology and embedded systems development, as well as why the two work so well together.
Posted: 07 Nov 2013 | Published: 30 Jun 2013

IBM

Modern Developer Tools for IBM i and Power Systems
sponsored by IBM
WEBCAST: Join us for a demonstration of the Tools and ALM Solutions for the IBM I and Power Systems. Learn how these tools apply to your IT environment and how to identify and use the right tools and modernization strategy.
Posted: 19 Aug 2010 | Premiered: May 13, 2010

IBM

IT Project Management: Guide to estimating timescales and resources.
sponsored by TechTarget ComputerWeekly.com
BOOK: Learn how to estimate the effort and timescales required for IT projects with this extract from Project management for IT-related projects.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

TechTarget ComputerWeekly.com

Address System-on-Chip Development Challenges with Enterprise Verification Management
sponsored by IBM
WHITE PAPER: This white paper addresses the multidimensional challenges posed by verification management and offers a compelling solution known as enterprise verification management solution (EVMS) based on over a decade of development and in-house experience at IBM. 
Posted: 02 Nov 2010 | Published: 01 Sep 2009

IBM

Applying agile and lean principles to the governance of software and systems development
sponsored by IBM
WHITE PAPER: This paper presents eighteen best practices for leaner, more agile software development project governance.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

IBM

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
sponsored by Information Security Magazine
EZINE: November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010

Information Security Magazine

IBM Rational Workbench for Systems and Software Engineering
sponsored by IBM
WHITE PAPER: This white paper illustrates how proven methodologies and best-of-breed tools, such as Rational DOORS, Rational Rhapsody, Rational Team Concert, and Rational Quality Manager, can help you design high-quality products that meet customer requirements.
Posted: 07 Sep 2010 | Published: 30 Jun 2010

IBM

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle
sponsored by iTKO LISA
WHITE PAPER: This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

iTKO LISA