IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Code Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Source Code Management, Software Code Management
DEFINITION: Code review is a phase in the software development process in which the authors of code, peer reviewers, and perhaps quality assurance (QA) testers get together to review code. Finding and correcting errors at this stage is relatively inexpensive and tends to reduce the more expensive process of handling, locating, and fixing bugs during later stages of development or after programs are delivered to  … 
Definition continues below.
Code ManagementReports
1 - 25 of 80 Matches Previous Page  | Next Page
Living with open source software
sponsored by Hewlett-Packard Company
VIDEOCAST: This expert webcast highlights the risks of open source code in software projects, and explains why applications are vulnerable to attack from the moment they go live on the internet.
Posted: 07 Oct 2014 | Premiered: Sep 29, 2014

Hewlett-Packard Company

Ready, Aim, HP Fortify!
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, discover how the U.S. Army uses a particular software to help prevent attacks to the TAMIS system.
Posted: 10 Sep 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

SAP uses HP Fortify to help produce Secure Applications
sponsored by Hewlett-Packard Company
CASE STUDY: In this case study, examine how SAP embarks on a journey to perform static analysis on application code in order to identify and mitigate vulnerabilities early on.
Posted: 10 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

SAP Case Study
sponsored by Hewlett-Packard Company
CASE STUDY: With the escalating number and increasing sophistication of cyber-attacks, perimeter defenses are no longer enough. Companies who used HP Fortify on Demand—a cloud-based solution—saw results and achieved time to value faster. Read the report to learn how.
Posted: 04 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

App Security: Decompiling Android APK Files
sponsored by CDW Corporation
EGUIDE: In this informative e-guide, expert Andrew Hogg takes you through the steps of reverse-engineering Android applications for the purpose of scoping out security weaknesses.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

CDW Corporation

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

IBM WebSphere and JRebel: All the Java EE Goodness Without Redeployment
sponsored by ZeroTurnaround
WHITE PAPER: Many developers rely on IBM WebSphere application server (WAS) due to its high availability, scalability, and solid support for Java EE. However, many WAS users cite redeployment as a huge pain point. This white paper introduces a way to continue using Java EE and WebSphere, but eliminate the downtime due to redeployments.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

ZeroTurnaround

Java Profiler Enables Continuous Testing in Development
sponsored by ZeroTurnaround
WEBCAST: What if you could catch and fix errors as you code -- before applications go into production? View this webcast to learn about a Java profiler that enables you to do just that, providing real-time alerts to potential issues.
Posted: 10 Jul 2014 | Premiered: Jul 3, 2014

ZeroTurnaround

A Computer Weekly buyer's guide to testing and code quality
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Major software delivery lifecycle improvements with SDK
sponsored by Borland, Micro Focus
CASE STUDY: Check out this case study to learn how AQS leveraged a software development kit (SDK) to improve the consistency of source code management, automate change processes for data files, and increase efficiency in the overall build process.
Posted: 22 Apr 2014 | Published: 31 Dec 2012

Borland, Micro Focus

Software company mathematically proves JRebel helps deliver software 40% faster
sponsored by ZeroTurnaround
CASE STUDY: In this brief case study, learn how NetworkedAssets improved their development productivity and experienced a 40% increase in velocity by leveraging a technology that enables you to instantly view code changes, eliminating turnaround time.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

ZeroTurnaround

E-Learning Provider Reduces Liferay Development Time with Jrebel
sponsored by ZeroTurnaround
CASE STUDY: In this case study, learn how MS Learning & Consulting was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

ZeroTurnaround

What Developers Want: The End of Application Redeploys
sponsored by ZeroTurnaround
WHITE PAPER: For developers, turnaround time due to application redeployments and restarts after code changes is a huge waste of time. In this white paper, discover how you can eliminate the need to redeploy Java applications after making code changes, including while adding new features or fixing bugs.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

ZeroTurnaround

Write Java code 17% faster by eliminating app server restarts
sponsored by ZeroTurnaround
WHITE PAPER: Software development is an iterative process, meaning that developing a single component can result in cycles of code change, deploy, and test. However, multiple deployments and restarts to different application servers can be time-consuming. Fortunately, this white paper introduces a way for developers to instantly see the results of code changes.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

ZeroTurnaround

Code with Java simpler, faster, and easier
sponsored by ZeroTurnaround
WHITE PAPER: Java developers know that testing code changes can be a huge pain, and waiting for an application to redeploy after a code fix can take an eternity. Wouldn't it be great if you could see your code changes immediately, fine-tune, debug, explore and deploy code without waiting for ages?
Posted: 28 Mar 2014 | Published: 31 Dec 2012

ZeroTurnaround

Inspiring disruption: Tech Trends 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

ComputerWeekly.com

Toad™ for Oracle® Tips and Tricks
sponsored by Dell Software
WHITE PAPER: Toad™ for Oracle is a staple for database developers, but regardless of your role in an organization, if you use Oracle, then there's something Toad can offer you. In this comprehensive white paper, explore some of the Toad fundamentals as well as the features and capabilities of the individual Toad editions and modules.
Posted: 25 Feb 2014 | Published: 08 Jul 2013

Dell Software

Hands-on Oracle Application Express security
sponsored by ComputerWeekly.com
BOOK: This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

ComputerWeekly.com

Infographic: The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

WANdisco

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork
1 - 25 of 80 Matches Previous Page    1 2 3 4    Next Page
 
CODE MANAGEMENT DEFINITION (continued): …  users. Reviewers read the code line by line to check for: Flaws or potential flawsConsistency with the overall program design The quality of comments Adherence to coding standards. Code review may be especially productive for identifying security vulnerabilities. Specialized application programs are available that can help with this process. Automated code reviewing facilitates systematic testing of source code for potential trouble such as buffer overflows, race conditions, memory leakage, size violations, and duplicate statements. Code review is also commonly done to test the quality of … 
Code Management definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement