TQM Reports

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

NAV CANADA Takes Advantage of IBM Rational AppScan Software to Address the Security and Compliance of Its Online Applications
sponsored by Logicalis
CASE STUDY: NAV CANADA helped enhance the security of its Web applications through best practices such as regular scanning and testing for vulnerabilities throughout the software development lifecycle.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Closed Loop Quality Management: Improving Customer Focus from Design to Delivery
sponsored by Apriso Corporation
ANALYST REPORT: Competing pressures to ensure customer satisfaction and reduce the cost of quality is driving many manufacturers to question the efficacy of their current quality management systems. This report provides actionable steps to begin to create a closed-loop enterprise system that aligns the entire value chain with a single view of quality execution.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Apriso Corporation

Agile tools: True support for ALM
sponsored by IBM
EGUIDE: This expert e-guide offers tips and tricks for putting yourself in the agile frame of mind when using ALM tools. Read this now and learn about the qualities and attributes that make development, testing, QA, requirements management, version control, security and other ALM process tools agile.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

IBM

Improved Software Testing Using McCabe IQ Coverage Analysis
sponsored by McCabe Software, Inc.
WHITE PAPER: This paper introduces coverage analysis as an important direction in the management of software testing. Specifically, this paper covers test assessment and improvement using McCabe IQ coverage analysis in the areas of functional testing, incremental testing, and unit level testing.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

McCabe Software, Inc.

Requirements-Driven Product Development
sponsored by IBM
WHITE PAPER: This document discusses the challenges in implementing DOORS in a rapidly evolving environment and the clear payoffs from using DOORS to integrate across diverse disciplines and to boost the collaborative effort.
Posted: 11 Dec 2009 | Published: 25 May 2009

IBM

Maximize asset productivity and operational performance
sponsored by IBM
WHITE PAPER: A "predictive maintenance" approach to enterprise asset management can help give you the visibility you need into your daily operations, reducing operational costs and minimizing asset downtime. In this resource, explore the ins and outs of predictive maintenance, and discover the benefits you could enjoy from this strategy.
Posted: 29 Aug 2013 | Published: 31 Jul 2013

IBM

Citrix XenApp 5.0: Preparing for a Successful Migration
sponsored by visionapp
WHITE PAPER: Citrix XenApp 5.0 offers new functionality: with preferential load balancing, preset values can now be applied to both specific users and particular applications.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

visionapp

Performance Testing Center of Excellence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: If application performance management isn't at the top of your businesses to-do list, it should be. No matter how well-designed your app is, if performance is sluggish end-users won't use it. Read on to learn about a performance management strategy top companies are leveraging, its business value, and more.
Posted: 17 Oct 2012 | Published: 17 Oct 2012

Hewlett Packard Enterprise

E-Guide: Avoiding Application Security Pitfalls
sponsored by TechTarget Security
EGUIDE: This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them.
Posted: 14 Jan 2011 | Published: 14 Jan 2011

TechTarget Security