IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Software Code Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Code Management Reports
 
GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation
sponsored by Linoma Software
CASE STUDY: In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

Software complexity, integration drive business rules automation adoption trend
sponsored by IBM
EGUIDE: Business rules can bring additional insight, transparency and efficiency to case management, provided the approaches are combined and implemented properly. In this Tip Guide, learn how to prepare for and implement rules in case management, and where business rules and case management trends seem to be heading.
Posted: 21 Nov 2011 | Published: 17 Nov 2011

IBM

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software

Toad™ for Oracle® Tips and Tricks
sponsored by Dell Software
WHITE PAPER: Toad™ for Oracle is a staple for database developers, but regardless of your role in an organization, if you use Oracle, then there's something Toad can offer you. In this comprehensive white paper, explore some of the Toad fundamentals as well as the features and capabilities of the individual Toad editions and modules.
Posted: 25 Feb 2014 | Published: 08 Jul 2013

Dell Software

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

SmartBear Software

HTML5: A Good Fit For Mobile Development?
sponsored by Telerik
EGUIDE: In this e-guide, learn how to structure a mobile team and harness HTML5 for mobile application development success. Read on as experts outline four key technology and cultural shifts occurring as mobile app development moves into the enterprise, and learn why HTML5 is the perfect mobile development framework prescription.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Telerik

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

Driving Business Agility via a Software Supply Chain
sponsored by Black Duck Software
WHITE PAPER: The purpose of this white paper is to lay out software development "supply chain" strategies, to nurture community culture, and to discuss techniques to improve code usage as software creation evolves toward greater complexity.
Posted: 13 Oct 2008 | Published: 01 Jul 2008

Black Duck Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement