Application Development Sample Clauses

Application Development. A. Where applicable, Contractor shall have a comprehensive secure development lifecycle System in place consistent with industry standard best practices, including policies, training, audits, testing, emergency updates, proactive management, and regular updates to the secure development lifecycle System itself.
AutoNDA by SimpleDocs
Application Development a. Stack provides software as a solution. In developing the software provided as the Service, Stack shall adopt secure coding practices that address at a minimum the Open Web Application Security Project (OWASP) top ten vulnerabilities.
Application Development. Contractor agrees that it will not engage in any application development without or until it has demonstrated compliance with the provisions of these General Conditions and Exhibit B and Exhibit C.
Application Development. Data exports; Maintenance plans Inc. Data Cleansing; Configuration Management; Change Management; Release Management; Problem Management; Process Design; forms; documents; templates; alerts; optional settings; tray management.
Application Development. The application and associated databases must validate all input fields for positive and negative bounds defined. • Implement safeguards against attacks (e.g., sniffing, password cracking, defacing, backdoor exploits) • Protect the data by using a least privilege and a defense-in-depth layered strategy tocompartmentalize the data. • Handle errors and faults by always failing securely without providing non-essential information during error handling. • Log data to support general troubleshooting, success and failure of audit trail investigative requirements, andregulatory requirements, with support for centralized monitoring where appropriate. • Built-in security controls – built-in access controls, security auditing features, fail- overfeatures, etc. • Prevent buffer overflows. • Avoid arithmetic errors. • Implement an error handling scheme. Error messages should not provide information that could be used to gain unauthorized access. • Test data used during development must be non-production simulated data. • Implement protocols (TCP/IP, HTTP, etc.) without deviation from standards.
Application Development. Contractor must utilize State technology stack to complete development.
Application Development. Application developers must ensure that their programs contain the following security precautions:
AutoNDA by SimpleDocs
Application Development. Application Development is the development of new applications which may be server, network-based, cloud-based, web-based or a combination and may require interfaces to existing applications. Application Maintenance and Support includes troubleshooting, modifying, maintaining, improving security, and enhancing legacy systems and applications which may be running in a production environment. Examples may include: • Designing, developing, and deploying custom software applications to meet our specific business needs. • Creating user-friendly interfaces and intuitive user experiences. • Ensuring scalability, performance, and security of the applications. • Utilizing modern development frameworks and technologies. • Enhancing and maintaining existing applications to meet evolving business needs. • Conducting thorough testing, debugging, and documentation of applications. Doc2u.SignAEpnpvelilocpaetiIDon: AMF66a2inE1te3-nCa6nEc3e-40a0nFd-91S8uFp-8p5o7Er3tE–EA7BpDpAl5ication Maintenance and Support includes troubleshooting, modifying, maintaining, improving security, and enhancing legacy systems and applications which may be running in a production environment. Examples may include: • Providing ongoing maintenance and support services for our existing applications. • Conducting regular monitoring and enhancements to ensure optimal performance. • Offering timely response and resolution to reported issues and incidents. • Performing routine updates, bug fixes, and troubleshooting. • Ensuring the availability, responsiveness, performance, and security of applications. • Applying industry best practices and proactive measures to minimize downtime. Doc3u.SignDEantvaelMopeaInDa: gAeFm66e2En1t3, -AC6nEa3l-y4t0i0cFs-,9a18nFd-8A57uEt3oEmE7aBtDioAn5 – A data warehouse collects, organizes and makes data available for the purpose of analysis and gives organizations the ability to access and analyze information about its business. The function of the data warehouse is to consolidate and reconcile information from across disparate business units and IT systems and provide a context for reporting and analysis. Road mapping for a data warehouse initiative may include assessment of technology and infrastructure, as-is documentation, business requirements gathering, use case development, and reporting requirements analysis. Examples may include: • Developing robust data management strategies to handle large volumes of structured and unstructured data. • Designing and implementing ...
Application Development. The application and associated databases must validate all input. ▪ Implement safeguards against attacks (e.g. sniffing, password cracking, defacing, backdoor exploits) ▪ Protect the data by using a least privilege and a defense-in-depth layered strategy to compartmentalize the data. ▪ Handle errors and faults by always failing securely without providing non-essential information during error handling. ▪ Log data to support general troubleshooting, audit trail investigative requirements, and regulatory requirements, with support for centralized monitoring where appropriate. ▪ Built-in security controls – built-in access controls, security auditing features, fail-over features, etc. ▪ Prevent buffer overflows. ▪ Avoid arithmetic errors. ▪ Implement an error handling scheme. Error messages should not provide information that could be used to gain unauthorized access. ▪ Test data used during development must be non-production simulated data. ▪ Implement protocols (TCP/IP, HTTP, etc.) without deviation from standards.
Application Development partially covered by SOIS - The need is located at Execution Platform level - PUS Services already provide standardization elements - A lot of different applications from various missions can already be plugged on a single Execution Platform ⇒ In the frame of MetOp SG, as precursor, Airbus Defence and Space made available interfaces of the Execution Platform (PIM SW), which is opening the applicative market
Time is Money Join Law Insider Premium to draft better contracts faster.