The white paper "9 Myths of Software Requirements Gathering" is no longer available on; However we invite you to explore the related content below.

Additional content from our sponsors:

  • Capturing the business value of Compliant Database DevOps

    This whitepaper outlines how DevOps practices can be extended to the IT team to deliver value to the business. It highlights the cultural shift required to capture the business value of Compliant Database DevOps, how to achieve this, and provides global metrics for measuring success.

  • The Ultimate Guide to Open Source Security

    This technical paper breaks down the risks posed by vulnerable open source components, how vulnerabilities are discovered and reported and how to address issues with technologies for more efficient remediation.

  • Managing Feature Flags - Download the eBook (By O’Reilly)

    Learn how teams can successfully apply feature flags—aka toggles, flips, gates, or switches—to accelerate software delivery. You’ll also learn about different types of feature flags, and explore critical code-level techniques to keep your feature flagging code manageable. Download the eBook.

  • The Forrester Wave: Software Composition Analysis 2019

    Forrester states that one in eight open source component downloads contained a known security vulnerability and security pros now have less time to identify and remediate them. This report shows how 10 providers measure up and helps security professionals select the right vendor for their needs.

  • Manage Your Toolchain Before it Manages You

    Learn about the main challenges for dev and ops teams due to toolchain complexity, and how out-of the-box toolchain management systems combine tactical solutions with strategic benefits,. Get key advice on how you can further optimize software delivery and quality - Download the report.

  • What Are The Most Secure Programming Languages?

    This research report focuses on open source security vulnerabilities in C, Java, JavaScript, Python, Ruby, PHP, and C++, to find out which programming languages are most secure, which vulnerability types (CWEs) are most common in each language, and why.


Is your profile up-to-date? Please take a moment to review and update.

Note: If updating/changing your email, a validation request will be sent

Company name:
Company role:
Company size:
You will be sent an email to validate the new email address. This pop-up will close itself in a few moments.