Development Kits White Papers

(View All Report Types)
Improve Your Mobile Application Security
sponsored by IBM
WHITE PAPER: Mobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself.
Posted: 06 May 2014 | Published: 31 Oct 2012

IBM

Tools and Frameworks for Collaborative Development Communities in the Enterprise A New Model for Distributed Teams
sponsored by CollabNet
WHITE PAPER: Collaboration has become an operational necessity for organizations. To succeed in today’s intensely competitive markets, an enterprise must enable collaboration among all members of its global development organization. This requires new tools and processes. Read this paper for insight into deploying an enterprise-class ALM platform.
Posted: 05 Oct 2010 | Published: 04 Oct 2010

CollabNet

Agile Application Development on System z — Is It Keeping Up with Your Business?
sponsored by IBM
WHITE PAPER: In this informative analyst paper, explore how to implement an Agile development and DevOps-based strategy in an IBM System Z environment. Discover the tools you'll need to foster automation, collaboration, quality, and testing, and the processes that will help you achieve continuous development.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

IBM

Why Use Meister and Not Ant or Maven?
sponsored by OpenMake Software
WHITE PAPER: To control and standardize the build and deploy process across teams and throughout the entire lifecycle, you need the right tools. In this insightful white paper, compare three build automation tools: OpenMake Meister, Apache Maven, and Apache Ant.
Posted: 27 May 2014 | Published: 27 May 2014

OpenMake Software

Mobile Strategy in 4 Easy Steps
sponsored by Appcelerator
WHITE PAPER: Read this white paper to discover four important steps to take to create an effective mobile strategy and learn how successful companies are making the most of the latest tools and processes.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

Appcelerator

Agile Transformation Strategy
sponsored by CollabNet
WHITE PAPER: The CollabNet Agile Coaches have observed patterns and key milestones in the way organizations adopt and scale Agile. "Agile Transformation Strategy," by Angela Druckman, CollabNet Certified Scrum Trainer and Agile Transformational Coach, outlines a sound strategy and transformational "blueprint" to help guide organizations on the path to Agility.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

CollabNet

Behavior Driven Development: Agile Testing with Red Hat JBoss BRMS
sponsored by Red Hat
WHITE PAPER: In this resource, discover how a software development process known as behavior-driven development, combined with a tool that integrates business rules management, business process management (BPM), and complex event processing (CEP), enables you to speed up and improve the application delivery lifecycle.
Posted: 08 Aug 2013 | Published: 30 Jun 2013

Red Hat

Best Practices for Delivering Better Software Faster with ALM
sponsored by IBM
WHITE PAPER: This paper outlines the steps that organizations must take to improve their systems and software development processes, including key best practices. It discusses solutions for unifying fractured, global development groups with existing infrastructures.
Posted: 17 Mar 2010 | Published: 17 Dec 2009

IBM

5 things your Development Teams should be doing now
sponsored by CollabNet
WHITE PAPER: In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. In this paper, find five tested and proven software development practices your team should be utilizing to accelerate software delivery.
Posted: 11 Nov 2011 | Published: 08 Nov 2011

CollabNet

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork