Yet Another Compiler Compiler White Papers

(View All Report Types)
Agile Application Development on System z — Is It Keeping Up with Your Business?
sponsored by IBM
WHITE PAPER: In this informative analyst paper, explore how to implement an Agile development and DevOps-based strategy in an IBM System Z environment. Discover the tools you'll need to foster automation, collaboration, quality, and testing, and the processes that will help you achieve continuous development.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

IBM

The Information Paradigm Shift: Redefine Your Competitive Advantage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Explore research done by Gartner to find out how in-memory computing will impact ERP during the next 5 years, so businesses can plan accordingly.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

Hewlett Packard Enterprise

Improve Your Mobile Application Security
sponsored by IBM
WHITE PAPER: Mobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself.
Posted: 06 May 2014 | Published: 31 Oct 2012

IBM

Toshiba Launches Smart Social Infrastructure Through a Flexible, Scalable Cloud Solution
sponsored by IBM
WHITE PAPER: To advance its initiative, Toshiba required a more flexible, scalable cloud solution capable of supporting a wide range of complex projects. This whitepaper highlights the cloud software Toshiba implemented to provide an extensible cloud management framework.
Posted: 10 Dec 2014 | Published: 30 Apr 2014

IBM

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Agile Portfolio Management: Getting Images Gains Visibility and Alignment with Kanban Portfolios
sponsored by Rally Software
WHITE PAPER: Few organizations have succeeded in moving beyond static, up-front development timelines to the more dynamic process of working with agile teams. In this case study, discover how Getty Images managed to become one of the few agile champions after struggling with the transition to lean and agile development.
Posted: 26 Jun 2013 | Published: 31 Dec 2011

Rally Software

Acronis Backup & Recovery® 11.5 Virtual Edition for Hyper-V®
sponsored by Acronis
WHITE PAPER: Check out this exclusive white paper to find out the ins and outs of Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V, and how it will provide top-notch protection for your Hyper-V environment.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

Acronis

Design Matters! Enabling better collaboration
sponsored by IBM
WHITE PAPER: This resource describes how Design Management capabilities can help you reduce development timeframes, lower costs, and more. Discover common design challenges and see how Design Management can facilitate development success by reading on now.
Posted: 27 Mar 2014 | Published: 30 Nov 2011

IBM

Software Lifecycle Integration: Integrate Your SDLC Tools and Accelerate Your Business
sponsored by Tasktop
WHITE PAPER: Learn how you can improve usage of the tools you already have while streamlining software development and delivery. Explore how you can overcome collaboration problems using software lifecycle integration, which enables you to connect all software development and delivery tools, synchronize information across disciplines, and more.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Tasktop

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.