IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Code Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Source Code Management, Software Code Management
DEFINITION: Code review is a phase in the software development process in which the authors of code, peer reviewers, and perhaps quality assurance (QA) testers get together to review code. Finding and correcting errors at this stage is relatively inexpensive and tends to reduce the more expensive process of handling, locating, and fixing bugs during later stages of development or after programs are delivered to  … 
Definition continues below.
Code Management Reports
1 - 25 of 79 Matches Previous Page  |  Next Page
Building a Stronger Agile Enterprise with Subversion
sponsored by CollabNet
WHITE PAPER: This white paper explores how the open source software development tool Subversion complements the coding and version control demands of Agile. Read on to learn how Subversion can address common issues that may be impeding the speed and quality of your development projects.
Posted: 06 Oct 2015 | Published: 23 Oct 2013


DevOps Unplugged Part 3: Codification
sponsored by Hewlett Packard Enterprise
WEBCAST: In this webcast, a panel of IT professionals discusses DevOps codification and how to find the right process for your organization. Watch this webcast now to learn more about infrastructure as code, source code control, and more.
Posted: 04 Sep 2015 | Premiered: Jul 16, 2015

Hewlett Packard Enterprise

Your Guide to Embedded BI
sponsored by TIBCO Software Inc.
WHITE PAPER: This guide covers the multiple ways in which reporting and other BI components can be embedded in your applications. Discover the key to seamless integration with a range of applications and the capability to easily add custom functionalities.
Posted: 24 Aug 2015 | Published: 31 Dec 2013

TIBCO Software Inc.

Improving Business Agility with Red Hat Jboss BRMS
sponsored by Red Hat
WHITE PAPER: This white paper explains how a BRMS abstracts the rules from the underlying code so that rules can freely and independently be changed, deployed, and executed without redeploying entire applications. Read now to learn to improve business agility and make intelligent decisions.
Posted: 03 Aug 2015 | Published: 31 Aug 2014

Red Hat

From Project to Product
sponsored by Red Hat
WHITE PAPER: Software developed by an open source community with testing, certification, documentation, training and support can help IT organizations experience lower middleware with total cost of ownership and risk. Read this white paper to learn about the benefits of open source technology.
Posted: 03 Aug 2015 | Published: 31 Dec 2014

Red Hat

Code-it Cody
sponsored by
BOOK: The first two chapters from Code-it Cody by The Clever Tykes Books. When the Computer Club competition is announced, Cody and his friends must put their coding skills into action. Cody begins a quest to research current computer games before creating the prototype of his very own.
Posted: 14 Jul 2015 | Published: 14 Jul 2015

Coding for Kids
sponsored by
BOOK: Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Memory corruption attacks
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

Application Server Goodness Without Misconfiguration
sponsored by ZeroTurnaround
WHITE PAPER: What are the various woes of different application servers? Get the low-down inside this resource, so you can turn your current frustrations into actionable, informed decisions.
Posted: 18 Jul 2014 | Published: 18 Jul 2014


A Computer Weekly buyer's guide to testing and code quality
sponsored by
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

Case study: How One Company Delivered Software 40% Faster
sponsored by ZeroTurnaround
CASE STUDY: Learn how NetworkedAssets' developers were able to change code, and framework resources and instantly view and test their changes without the need to delay projects.
Posted: 02 Apr 2014 | Published: 02 Apr 2014


Case Study: How One Company Saved More than 50% of Development Time
sponsored by ZeroTurnaround
CASE STUDY: In this case study, learn how MS Learning & Consulting was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management.
Posted: 02 Apr 2014 | Published: 31 Dec 2013


Eliminate Interruptions with App Restarts and Focus on Writing Code
sponsored by ZeroTurnaround
WHITE PAPER: For developers, turnaround time due to application redeployments and restarts after code changes is a huge waste of time. In this white paper, discover how you can eliminate the need to redeploy Java applications after making code changes, including while adding new features or fixing bugs.
Posted: 31 Mar 2014 | Published: 31 Mar 2014


Stop Redeploying and View Code Changes Instantly
sponsored by ZeroTurnaround
WHITE PAPER: Software development is an iterative process, meaning that developing a single component can result in cycles of code change, deploy, and test. However, multiple deployments and restarts to different application servers can be time-consuming. Fortunately, this white paper introduces a way for developers to instantly see the results of code changes.
Posted: 31 Mar 2014 | Published: 31 Mar 2014


Code with Java Simpler, Faster, and Easier
sponsored by ZeroTurnaround
WHITE PAPER: Java developers know that testing code changes can be a huge pain. Wouldn't it be great if you could see your code changes immediately, fine-tune, debug, explore and deploy code without waiting for ages? Learn about the JRebel Java plugin here and get started on your two week free trial.
Posted: 28 Mar 2014 | Published: 31 Dec 2012


Inspiring disruption: Tech Trends 2014
sponsored by
ESSENTIAL GUIDE: This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

Toad for Oracle Tips and Tricks
sponsored by Dell Software
WHITE PAPER: In this comprehensive white paper, you'll learn how Oracle's solution for database development and administration can help you to work and collaborate with accuracy and ease. The resource explores the functionality that Toad can bring to app developers, PL/SQL developers, and database administrators alike.
Posted: 25 Feb 2014 | Published: 08 Jul 2013

Dell Software

Hands-on Oracle Application Express security
sponsored by
BOOK: This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Infographic: The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.
Posted: 02 Jul 2014 | Published: 02 Jul 2014


Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013


Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013


Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013


Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013


Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

1 - 25 of 79 Matches Previous Page    1 2 3 4    Next Page
CODE MANAGEMENT DEFINITION (continued): …  users. Reviewers read the code line by line to check for: Flaws or potential flawsConsistency with the overall program design The quality of comments Adherence to coding standards. Code review may be especially productive for identifying security vulnerabilities. Specialized application programs are available that can help with this process. Automated code reviewing facilitates systematic testing of source code for potential trouble such as buffer overflows, race conditions, memory leakage, size violations, and duplicate statements. Code review is also commonly done to test the quality of … 
Code Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement