Waterfall and Agile methodologies each offer specific benefits when applied to the SDLC. Learn how your development team works in each approach.| Search Software Quality
Understanding the seven steps of the SDLC is essential for software developers. Learn the steps and important SDLC development models.| Search Software Quality
This definition explains rapid application development (RAD), a software-development approach designed to produce high-quality products quickly by using strategies such as prototyping and time boxing.| Search Software Quality
Iterative refers to the process of repeating coded instructions or designs until a specific end result and quality product are achieved. Learn more.| Search Software Quality
A sprint, in Agile project development, is a set amount of time to get specified work done. Learn how sprints are planned and executed and the benefits.| Search Software Quality
The joint application development (JAD) methodology offers a consistent, repeatable and effective process for software product development. Learn more here.| Search Software Quality
Learn what application performance monitoring is, why APM is important, how it works, its business benefits and more in this comprehensive guide.| Search Enterprise Desktop
Project management uses established best practices to guide a project from conception through completion. Learn about its benefits and challenges.| Search CIO
Learn how the trial and error process of the prototyping model contributes to successful systems and products.| Search CIO
New & Notable| www.techtarget.com
Learn how root cause analysis of software defects helps development teams identify and fix problems and prevent future performance issues in applications.| Search Software Quality
The all-pairs testing, also called pairwise testing, technique enables QA teams to discover defects by analyzing application inputs and outputs. If used correctly, it ensures high test coverage without long wait times for QA. Here's how to use it, with examples.| Search Software Quality
Explore how to combat the effects of software test redundancy by auditing test suites and enforcing guidelines around keeping, modifying or deleting tests.| Search Software Quality
In white box testing, the code structure is known and understood by the tester. In black box testing, the code structure is not known by the tester and in gray box testing, some code structure is known and some is not.| Search Software Quality
Regression testing determines if a code change adversely affects software. Learn how to create regression test cases and apply test management tools.| Search Software Quality
Learn about exception handling, what it is, how it's used and the different types. In addition, this definition compares Java and C++ exception handling.| Search Software Quality
Learn the types and stages of pen testing and how to perform a pen test. Explore the differences between pen testing and vulnerability assessments.| Search Security
Learn about HVAC systems, which control the ambient environment in a data center. Explore what they encompass and how HVAC differs from air conditioning.| Search Data Center
New & Notable| www.techtarget.com
Compare the different types of network cabling: coaxial, fiber optic, shielded twisted pair (STP) and unshielded twisted pair (UTP).| Search Networking
Attenuation has several applications, including in networking. Learn what attenuation is in networking and how to calculate and prevent signal loss.| Search Networking
Learn what causes electromagnetic interference, unwanted noise in an electrical path or circuit caused by outside sources. Explore types, how to prevent EMI.| Search Mobile Computing
Endpoint devices are computing components connected to a network. Find out how to effectively manage and secure them.| WhatIs
Learn the importance of quality of service, how it works, its parameters, benefits, implementation techniques, mechanisms and tools.| Search Unified Communications
The Internet Protocol is the basis of most telecommunications. Its newest version, IPv6, will enable growth to accommodate billions of connected devices.| Search Unified Communications
Routing IP traffic on an optical network poses management and service challenges. Learn why a new routed optical networking architecture shows promise.| Search Networking
Explore how telecommunications, the electronic transmission of voice, data and video over a network using land lines, cellular, satellites and more, works.| Search Networking
Packet loss occurs when data packets fail to reach their destination. Learn what causes packet loss, how to detect it, and ways to reduce it in your network.| Search Networking
Learn about the different components of a network packet and how it is used to transmit data efficiently in a packet-switched network.| Search Networking
Learn how network bandwidth is used to measure the maximum capacity of a wired or wireless communications link to transmit data in a given amount of time.| Search Networking
What is the difference between a circuit switching and packet switching? Our networking fundamentals expert gives examples of packet switching and circuit switching in this response.| Search Networking
Learn how internet service providers work, the different types of ISPs and examples of the services they offer. Also learn how to select an ISP.| WhatIs
Learn about the top IT security frameworks and standards available and get advice on choosing the ones that will help protect your company's data.| Search Security
Explore types of firewalls and the common vulnerabilities they mitigate. Learn about firewall best practices and the future of network security.| Search Security
Learn about infrastructure as a service (IaaS), how it works, how it differs from SaaS, PaaS and MaaS, the range of services it provides and future growth.| Search Cloud Computing
The widespread use of generative AI raises ethical issues and concerns for businesses and consumers. Learn the main areas people need to pay attention to.| Search Enterprise AI
Understanding wavelengths is necessary when working with wireless networks. Learn about the role wavelength and frequency play in wireless network planning.| Search Networking
Email is the method of exchanging messages from one system to another. Learn everything about email -- it's uses and advantages, as well as email security.| WhatIs
Microsoft Outlook, the preferred client for Microsoft Exchange Server, includes email, contacts and calendar. Learn about features and product versions.| SearchWindows Server
A computer worm is self-replicating malware that duplicates itself to spread to uninfected computers. Learn more about worms and how to defend against them.| Search Security
Learn about the perils posed by computer viruses, malicious code that attaches itself to a program or file and can spread across an infected system.| Search Security
Learn about the different types of software, what they do and how they function. Also take an in-depth look at software design, best practices and history.| Search App Architecture
Learn about four distinct filter applications in enterprise computing and how each is used.| WhatIs
Learn how you can use data validation to ensure the applications your organization uses are accessing complete, accurate and properly structured data.| Search Data Management
Get introduced to the five fundamental types of software architecture design worth knowing: Client-server, MVC, event driven, microkernel and microservices.| Search App Architecture
MVC and MVVM are two design patterns for applications that seek to separate front-end interfaces from back-end app components. MVC and MVVM foster componentization, modularity and independent testing. However, each pattern does so in a unique way. Learn about the differences in MVC vs. MVVM here.| Search App Architecture
Development and application management teams can use these five design patterns to assemble a dependably resilient software architecture.| Search App Architecture
Learn about the Waterfall model approach to the software development lifecycle, who uses it, advantages and disadvantages, tools and capabilities.| Search Software Quality
Planning to implement CI/CD? This comprehensive guide explores the stages of a CI/CD pipeline, its pros and cons, best practices and more.| Search Software Quality
Metadata is data that describes other data, providing a structured reference that helps to sort and identify attributes of the information it describes.| WhatIs
This comprehensive guide lays out the fundamentals of enterprise resource planning, its importance, and tips on choosing and implementing ERP products.| Search ERP
Content teams must understand why document version control is crucial for proper storage and collaboration. Discover its pros, cons and how to manage it.| Search Content Management
Deploying enterprise content management software can be daunting. Follow these steps to implement an effective ECM strategy and ensure a smooth rollout.| Search Content Management
Creating an enterprise content tagging taxonomy can improve the findability of items within an organization's content management system. Learn more here.| Search Content Management
Learn what information governance is and why it's important. Examine the different information governance frameworks, laws, regulations and software.| Search CIO
XML (Extensible Markup Language) is a text-based format used to share data on the World Wide Web, intranets and more. See the full XML definition here.| WhatIs
Explore the pros and cons, roles and KPIs involved in digital marketing, which promotes goods and services to consumers through electronic technologies.| Search Customer Experience
In digital asset management, version control differs from the same control in ECM strategies. Learn how DAM systems help marketers track asset versions.| Search Content Management
An enterprise content management certification can help business and IT professionals alike at any stage of their career. Explore the top certifications.| Search Content Management
Workflows are the activities needed to complete a task. Find out about the various types of workflows and how they're created, used, managed and automated.| Search CIO
Every computing device has a user interface where people interact with the device. Learn about the various types of UIs, how they work and how they evolved.| Search App Architecture
AI is rapidly proving its worth when it comes to cybersecurity, especially when it comes to AI pen testing. Learn how AI penetration testing -- aka breach and attack simulation, or BAS -- technologies make pen tests more accurate and free up IT professionals for other cybersecurity tasks.| Search Security
Vulnerability management tools can be an invaluable asset for enterprises. Here's how vulnerability management software works to close security gaps.| Search Security
Agentic AI applications and agent building are gaining traction in enterprises, along with agentic AI governance.| Search Enterprise AI
Network interruptions and brownouts are among the most persistent and damaging network performance issues, and the average cost of network downtime from them is drastic. Learn five calculations for organizations to assess and prevent lost revenue, employee productivity and customers from brownouts.| Search Networking
Learn what makes an application mission critical vs. business critical, how to avoid mission-critical app failures and the pros and cons of cloud hosting.| Search IT Operations
You've heard of RPO and RTO, but what about RLO? Find out how recovery level objective fits into the overall business continuity process in this tip.| Search Disaster Recovery
Explore the differences between disaster recovery and business continuity and the elements of a DR plan. Discover DR benefits and key providers.| Search Disaster Recovery
Continuous data protection (CDP) is a method of automatic data protection. Learn how it works, how to implement it and how it compares to other methods.| Search Storage
Natural disaster recovery is tailored to help organizations respond and resume business after physical disasters, such as floods, hurricanes and fires.| Search Disaster Recovery
Explore the various types of disasters and learn how to create a DRP. Examine how to test a DRP and explore examples of different DRP scenarios.| Search Disaster Recovery
In computing, a workload is a program or application using computing resources to accomplish tasks. Learn about the types of workloads and how they work.| Search Data Center
Backup scheduling is a key part of data protection. Learn essential elements that go into a schedule and how they improve availability and recovery.| Search Data Backup
Does your backup strategy need improvement? 3-2-1 backup and the cloud are a start, but these eight best practices are indispensable for enterprise backup.| Search Data Backup
Learn how backup storage devices can safely store copies of your company's data on local storage systems, at a remote site or using a cloud backup service.| Search Data Backup
Learn what data backup is, why it matters, types of backups, storage options and best practices for building a secure and reliable backup strategy.| Search Data Backup
IT teams trying to maximize AWS uptime can turn to a variety of tools, but evaluating and testing a BCP are critical steps in the process.| Search AWS
Storage area networks (SANs) connect servers and storage and help pool storage resources. Find out more about SANs, including their architectural components, benefits and drawbacks, vendors and products, and management best practices, with our comprehensive guide| Search Storage
Learn how data redundancy works, its benefits and drawbacks, as well as how it compares to backup and other alternatives.| Search Storage
Don't just assume software can recover from disruptions -- put together a disaster recovery testing plan and test it to make sure. Here's why disaster recovery testing is crucial, the metrics your team and organization should use, and the key criteria of a disaster recovery testing plan.| Search Software Quality
As more organizations attempt to automate DR failover, APIs are beginning to outpace GUI front ends. Here are six tips for utilizing APIs in automated failovers.| Search Disaster Recovery
Patching software is an everyday requirement for most organizations. Discover which software patch testing best practices are the most important.| Search Security
Establishing network perimeter security now requires the use of SDN to achieve deep segmentation. Learn how to put in place a software-defined perimeter.| Search Networking
Change management helps make sure that alterations to critical processes don't cause problems down the road. Learn how it fits into business continuity.| Search Disaster Recovery
This disaster recovery (DR) plan template offers step-by-step procedures to restore disrupted systems and applications to recover quickly from a disaster.| Search Disaster Recovery
A data center fire can be devastating. Learn how to protect your data center through mitigation, detection and suppression techniques.| Search Data Center
ASHRAE's data center temperature and humidity standards help admins determine what the environment of the facility should be for optimal performance.| Search Data Center
Learn how undertaking a business impact analysis might help your organization overcome the effects of an unexpected interruption to critical business systems.| Search Storage
Learn about risk assessments, their goals and how to use a risk assessment matrix. Examine how quantitative and qualitative assessments differ.| Search Security
Business continuity certifications demonstrate an IT professional's expertise in the BCDR field. Check out these six certification options.| Search Disaster Recovery
For organizations planning on building an alternate disaster recovery site, there are several factors to consider. Here are six common requirements.| Search Disaster Recovery
Disaster recovery plans and advice for making them vary widely. Here are some disaster recovery plan best practices that businesses of all types can use.| Search Disaster Recovery
These tips on business continuity and disaster recovery training for employees could be critical to the success of your emergency response plan.| Search Disaster Recovery
A crisis communications plan is critical in a disaster. Download our free template and follow these five tips to make sure your business is covered.| Search Disaster Recovery
Learn about DR sites, which are facilities for recovering/restoring technology infrastructure/operations when a primary data center becomes unavailable.| Search Disaster Recovery
A business continuity plan (BCP) is key to keeping an organization operating during an emergency. Find out why a BCP is important, and the steps involved.| Search Disaster Recovery
Learn about conversion rate optimization, how it benefits businesses by maximizing their existing traffic and how to calculate a conversion rate.| WhatIs
A CRO is a senior executive who manages and mitigates an organization's risks. Learn about a CRO's responsibilities, required skills and salary outlooks.| Search Security
Artificial intelligence (AI) is the ability of machines to perform tasks that typically require human intelligence. Learn about its history, types, real-world examples, and business applications.| Search Enterprise AI
Follow these six phases of the software testing lifecycle -- from requirements analysis to test reporting -- to ensure applications perform as expected.| Search Software Quality