IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Source Code Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold. Source code consists of statements created with a text editor or visual programming tool and then saved in a file. The source code is the most permanent form of a program, even though the program may later be modified, improved or upgraded.Source  … 
Definition continues below.
Source Code Management White Papers (View All Report Types)
 
Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Getting the Most Out of Windows PowerShell
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses the myriad of benefits Windows PowerShell offers and discusses how your IT team can best take advantage of the software.
Posted: 13 Aug 2015 | Published: 13 Aug 2015

Global Knowledge

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

SmartBear Software

Objects, Databases and the Myth of Serialization
sponsored by Versant Corp.
WHITE PAPER: Authors quite commonly, and incorrectly, refer to the process of serialization as part of what is happening when an object database stores an object or object graph. This white paper debunks that misperception, and sets the record straight about the efficiency of object databases as brought about by the avoidance of serialization.
Posted: 10 Aug 2010 | Published: 10 Aug 2010

Versant Corp.

Software Agitation:Your Own Personal Code Reviewer
sponsored by Agitar Software
WHITE PAPER: Exercising Java code is a painstaking yet critical process for developers. This white paper explains how you can free up time by implementing a testing tool designed to detect coding errors as you write Java classes, and even after they have been reviewed.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

Agitar Software

Master Data Management Projects in Practice - An Information Difference Research Study
sponsored by Talend
WHITE PAPER: Organizations are often turning to Master Data Management as a key enabler in improving the timeliness, quality and reliability of BI with the ultimate goal of improving business performance. This survey report presents recommendations on the "do and don't" of MDM as well as some findings on the use of open source and manual coding in MDM projects.
Posted: 16 Mar 2010 | Published: 01 Dec 2009

Talend

Minimizing Code Defects to Improve Software Quality and Lower Development Costs
sponsored by IBM
WHITE PAPER: This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

IBM

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Driving Business Agility via a Software Supply Chain
sponsored by Black Duck Software
WHITE PAPER: The purpose of this white paper is to lay out software development "supply chain" strategies, to nurture community culture, and to discuss techniques to improve code usage as software creation evolves toward greater complexity.
Posted: 13 Oct 2008 | Published: 01 Jul 2008

Black Duck Software
 
 
SOURCE CODE MANAGEMENT DEFINITION (continued): …  code analysis can be either static or dynamic. In static analysis, debugging is done by examining the code without actually executing the program. This can reveal errors at an early stage in program development, often eliminating the need for multiple revisions later. After static analysis has been done, dynamic analysis is performed in an effort to uncover more subtle defects or vulnerabilities. Dynamic analysis consists of real-time program testing. A major advantage of this method is the fact that it does not require developers to make educated guesses at situations likely to produce errors. … 
Source Code Management definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement