IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Code Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Source Code Management, Software Code Management
DEFINITION: Code review is a phase in the software development process in which the authors of code, peer reviewers, and perhaps quality assurance (QA) testers get together to review code. Finding and correcting errors at this stage is relatively inexpensive and tends to reduce the more expensive process of handling, locating, and fixing bugs during later stages of development or after programs are delivered to  … 
Definition continues below.
Code Management Reports
1 - 25 of 81 Matches Previous Page  |  Next Page
Rules in a Microservices Architecture
sponsored by Vizuri
VIDEO: Discover how to update business rule management for microservices-based app development. Plus, learn how to streamline development cycles with the JBoss BRMS platform and OpenShift containers.
Posted: 11 Oct 2017 | Premiered: 09 Oct 2017

Vizuri

Build Your Business Apps on SAP Data
sponsored by K2
WEBCAST: Discover how to simplify and extend the use of SAP data across your organization by delivering apps that help you make the most of SAP data and surrounding systems with visual, low-code app development tools.
Posted: 10 Oct 2017 | Premiered: Oct 6, 2017

K2

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Using the Pipeline Plugin to Accelerate Continuous Delivery
sponsored by Cloudbees
WHITE PAPER: Uncover an introduction and step-by-step guide for using the Jenkins Pipeline plugin to automate the software lifecycle and achieve continuous delivery. Access tips for everything from installing and creating a pipeline to scaling and securing it.
Posted: 18 Jul 2017 | Published: 31 Dec 2016

Cloudbees

Transform IT with Codeless Configuration
sponsored by Cherwell
WHITE PAPER: In order to keep up with rapid market fluctuations, IT has been looking for non-labor-intensive tools to help with software changes. This white paper explores how codeless software solutions are favorable to those that require customization with a focus on future-proofing, reduced administration overhead, and increased flexibility.
Posted: 14 Jun 2017 | Published: 31 Dec 2015

Cherwell

Putting the Ops in DevOps
sponsored by Cherwell
EGUIDE: Production IT takes up just as much namespace as the development side of DevOps, but is often left out of the actual movement. This e-guide covers what it takes for your organization to incorporate your production IT team into your DevOps operations and discover why it has been ignored for so long.
Posted: 19 May 2017 | Published: 16 May 2017

Cherwell

Secure Agile Development: Why Can't We All Get Along?
sponsored by Veracode, Inc.
WEBCAST: As developers turn to Agile methodologies to accelerate development, app security can often get left in the dust. This webcast explores strategies for increasing collaboration between development and security teams. Learn how to bring security testing up to speed to ensure software quality in Agile development environments.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

How to Automate Security into Your DevOps Pipeline
sponsored by Veracode, Inc.
WHITE PAPER: Manual penetration testing and on-premise tools help prevent breaches, but they're too slow for an increasingly fast-paced, mobile-first world. Discover how to accelerate time-to-market without sacrificing app compliance by integrating security into your existing toolchains and DevOps pipelines.
Posted: 01 May 2017 | Published: 01 May 2017

Veracode, Inc.

Mobile Low-Code Development Platforms, Q1 2017
sponsored by Mendix
ANALYST REPORT: This Forrester report compares 11 leading mobile low-code development platform providers. Inside, you will learn how to assess platforms for yourself based on what the experts look for and see where other vendors stand on relation to market leaders.
Posted: 04 Apr 2017 | Published: 27 Mar 2017

Mendix

Code-it Cody
sponsored by ComputerWeekly.com
BOOK: The first two chapters from Code-it Cody by The Clever Tykes Books. When the Computer Club competition is announced, Cody and his friends must put their coding skills into action. Cody begins a quest to research current computer games before creating the prototype of his very own.
Posted: 14 Jul 2015 | Published: 14 Jul 2015

ComputerWeekly.com

Coding for Kids
sponsored by ComputerWeekly.com
BOOK: Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

ComputerWeekly.com

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

A Computer Weekly buyer's guide to testing and code quality
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Inspiring disruption: Tech Trends 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

ComputerWeekly.com

Composable Infrastructure Overview
sponsored by VeriStor
EGUIDE: Composable infrastructure, or disaggregation, undoes traditional resource grouping, enabling you to mix and match resources as needed to meet specific workload demands. Access this e-guide to learn how composable infrastructure, its limitations, and the type of impact it will have on your organization.
Posted: 08 Aug 2017 | Published: 02 Aug 2017

VeriStor

Avoid Human Error with AWS CodeDeploy
sponsored by Splunk
EGUIDE: Want to avoid human error in code deployment? This e-guide covers how you can effectively use AWS CodeDeploy to automate code deployment to your servers and committing avoid manual errors.
Posted: 18 May 2017 | Published: 11 May 2017

Splunk

The Right Tools Smooth the DevOps Transition
sponsored by Splunk
EGUIDE: Before your DevOps team jumps on board with AWS, you need a full array of tools from either AWS or third parties. This e-guide covers how to avoid errors in releasing code in AWS, how to select the right combination of AWS and third party tools for your business needs, and more.
Posted: 16 May 2017 | Published: 12 May 2017

Splunk

Implementing the 5 Levels of Embedded BI
sponsored by TIBCO Software Inc.
WHITE PAPER: This comprehensive guide for solution architects and programmers explores how to implement embedded BI for end-user apps. Discover how to achieve the 5 levels of embedded BI: static reporting, managed interactive reports, highly interactive reports and dashboards, self-service reporting and analysis, and advanced analytics.
Posted: 24 Aug 2015 | Published: 31 Dec 2013

TIBCO Software Inc.

Infographic: The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

WANdisco

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Case study: How One Company Increased App Development Velocity by 40%
sponsored by ZeroTurnaround
CASE STUDY: Access this brief case study to learn about the strategy that allowed the application developers at NetworkedAssets to cut down on downtime from redeploys and increase their team velocity by 40%. Discover how to instantly view and test your code changes without the need for any delays.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

ZeroTurnaround

Toad for Oracle Tips and Tricks
sponsored by Dell Software
WHITE PAPER: In this comprehensive white paper, you'll learn how Oracle's solution for database development and administration can help you to work and collaborate with accuracy and ease. The resource explores the functionality that Toad can bring to app developers, PL/SQL developers, and database administrators alike.
Posted: 25 Feb 2014 | Published: 08 Jul 2013

Dell Software

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
1 - 25 of 81 Matches Previous Page    1 2 3 4    Next Page
 
CODE MANAGEMENT DEFINITION (continued): …  users. Reviewers read the code line by line to check for: Flaws or potential flawsConsistency with the overall program design The quality of comments Adherence to coding standards. Code review may be especially productive for identifying security vulnerabilities. Specialized application programs are available that can help with this process. Automated code reviewing facilitates systematic testing of source code for potential trouble such as buffer overflows, race conditions, memory leakage, size violations, and duplicate statements. Code review is also commonly done to test the quality of … 
Code Management definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement