IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Code Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Source Code Management, Software Code Management
DEFINITION: Code review is a phase in the software development process in which the authors of code, peer reviewers, and perhaps quality assurance (QA) testers get together to review code. Finding and correcting errors at this stage is relatively inexpensive and tends to reduce the more expensive process of handling, locating, and fixing bugs during later stages of development or after programs are delivered to  … 
Definition continues below.
Code Management Reports
1 - 25 of 79 Matches Previous Page  |  Next Page
Code-it Cody
sponsored by ComputerWeekly.com
BOOK: The first two chapters from Code-it Cody by The Clever Tykes Books. When the Computer Club competition is announced, Cody and his friends must put their coding skills into action. Cody begins a quest to research current computer games before creating the prototype of his very own.
Posted: 14 Jul 2015 | Published: 14 Jul 2015

ComputerWeekly.com

5 Reasons to Adopt Business Rules
sponsored by Progress
WHITE PAPER: This white paper presents five reasons why you should think about using a Business Rules Management System in your business. Read now to free up time to start focusing on high priority IT projects.
Posted: 06 Jul 2015 | Published: 19 Mar 2015

Progress

Simplify Development and Maintenance for Multiple Mobile Platforms
sponsored by Carrington Associates
WHITE PAPER: This white paper chronicles how one systems integrator was able to use a single code to support multiple platforms. Read on to learn about the benefits the company was able to reap including a 60% reduction in development costs, simplified application management, and more.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

Carrington Associates

Breaking the Rules in BRMS Technology
sponsored by Progress
WHITE PAPER: Read this technology spotlight to examine the key benefits and use cases for business rules engines and learn about a specific offering and its contribution to the BRMS market.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Progress

Big Data Integration: Hadoop without the coding
sponsored by Hortonworks
RESOURCE: Learn how your organization can get fast data analytics, without performance tuning or benchmarking.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Hortonworks

Secure Code and the Role of Software Assurance
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores why application security has not kept pace with changes in the threat landscape and why companies struggle to create secure code.
Posted: 12 May 2015 | Published: 15 Apr 2015

Hewlett-Packard Company

Coding for Kids
sponsored by ComputerWeekly.com
BOOK: Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

ComputerWeekly.com

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Application Server Goodness Without Misconfiguration
sponsored by ZeroTurnaround
WHITE PAPER: Developers like to write software, not fight with their tools. What are the various woes of different application servers? Get the low-down inside this resource, so you can turn your current frustrations into actionable, informed decisions.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

ZeroTurnaround

A Computer Weekly buyer's guide to testing and code quality
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Case study: How One Company Delivered Software 40% Faster
sponsored by ZeroTurnaround
CASE STUDY: Learn how NetworkedAssets' developers were able to change code, and framework resources and instantly view and test their changes without the need to delay projects.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

ZeroTurnaround

Case Study: How One Company Saved More than 50% of Development Time
sponsored by ZeroTurnaround
CASE STUDY: In this case study, learn how MS Learning & Consulting was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management.
Posted: 02 Apr 2014 | Published: 31 Dec 2013

ZeroTurnaround

Eliminate Interruptions with App Restarts and Focus on Writing Code
sponsored by ZeroTurnaround
WHITE PAPER: For developers, turnaround time due to application redeployments and restarts after code changes is a huge waste of time. In this white paper, discover how you can eliminate the need to redeploy Java applications after making code changes, including while adding new features or fixing bugs.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

ZeroTurnaround

Stop Redeploying and View Code Changes Instantly
sponsored by ZeroTurnaround
WHITE PAPER: Software development is an iterative process, meaning that developing a single component can result in cycles of code change, deploy, and test. However, multiple deployments and restarts to different application servers can be time-consuming. Fortunately, this white paper introduces a way for developers to instantly see the results of code changes.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

ZeroTurnaround

Code with Java Simpler, Faster, and Easier
sponsored by ZeroTurnaround
WHITE PAPER: Java developers know that testing code changes can be a huge pain. Wouldn't it be great if you could see your code changes immediately, fine-tune, debug, explore and deploy code without waiting for ages? Learn about the JRebel Java plugin here and get started on your two week free trial.
Posted: 28 Mar 2014 | Published: 31 Dec 2012

ZeroTurnaround

Inspiring disruption: Tech Trends 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

ComputerWeekly.com

Hands-on Oracle Application Express security
sponsored by ComputerWeekly.com
BOOK: This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

ComputerWeekly.com

Infographic: The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

WANdisco

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Toad™ for Oracle® Tips and Tricks
sponsored by Dell Software
WHITE PAPER: Toad™ for Oracle is a staple for database developers, but regardless of your role in an organization, if you use Oracle, then there's something Toad can offer you. In this comprehensive white paper, explore some of the Toad fundamentals as well as the features and capabilities of the individual Toad editions and modules.
Posted: 25 Feb 2014 | Published: 08 Jul 2013

Dell Software

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork
1 - 25 of 79 Matches Previous Page    1 2 3 4    Next Page
 
CODE MANAGEMENT DEFINITION (continued): …  users. Reviewers read the code line by line to check for: Flaws or potential flawsConsistency with the overall program design The quality of comments Adherence to coding standards. Code review may be especially productive for identifying security vulnerabilities. Specialized application programs are available that can help with this process. Automated code reviewing facilitates systematic testing of source code for potential trouble such as buffer overflows, race conditions, memory leakage, size violations, and duplicate statements. Code review is also commonly done to test the quality of … 
Code Management definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement