IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Software Code Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Code Management Reports
 
Challenging Some of the Myths About Static Code Analysis
sponsored by Rogue Wave Software
WHITE PAPER: This guide provides 4 common myths about static code analysis (SCA), which serve mostly to distort the true value static analysis can bring to your software development lifecycle. Read on to learn about the truths to these myths, and how easily you can write code that you'll be proud of.
Posted: 02 Dec 2014 | Published: 30 Nov 2013

Rogue Wave Software

Defend Against Injection-Based Attacks
sponsored by Rogue Wave Software
WHITE PAPER: In this informative paper, discover some of the most common security vulnerabilities currently plaguing the software development industry, and learn how static code analysis (SCA) can detect them.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Rogue Wave Software

IBM WebSphere and JRebel: All the Java EE Goodness Without Redeployment
sponsored by ZeroTurnaround
WHITE PAPER: Many developers rely on IBM WebSphere application server (WAS) due to its high availability, scalability, and solid support for Java EE. However, many WAS users cite redeployment as a huge pain point. This white paper introduces a way to continue using Java EE and WebSphere, but eliminate the downtime due to redeployments.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

ZeroTurnaround

Analyst report: 6 predictions for the future of BPM
sponsored by K2
WHITE PAPER: To help you navigate the coming shift to customer-centric BPM, read this Forrester Research, Inc. report that highlights 6 predictions for how the BPM market will unfold in 2015.
Posted: 26 Nov 2014 | Published: 06 Nov 2014

K2

Software company mathematically proves JRebel helps deliver software 40% faster
sponsored by ZeroTurnaround
CASE STUDY: In this brief case study, learn how NetworkedAssets improved their development productivity and experienced a 40% increase in velocity by leveraging a technology that enables you to instantly view code changes, eliminating turnaround time.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

ZeroTurnaround

A Computer Weekly buyer's guide to testing and code quality
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Toad for Oracle 10.5
sponsored by Dell Software
WHITE PAPER: Toad for Oracle v10.5 adds new features and enhances many existing ones. These changes are designed to save you time, increase accuracy and give you better visibility of your work environment - whether you’re a developer working in an unfamiliar database or maintaining legacy code, or a DBA trying to manage multiple databases.
Posted: 20 Jul 2010 | Published: 20 Jul 2010

Dell Software

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Symantec Corporation

HTML5: A Good Fit For Mobile Development?
sponsored by Telerik
EGUIDE: In this e-guide, learn how to structure a mobile team and harness HTML5 for mobile application development success. Read on as experts outline four key technology and cultural shifts occurring as mobile app development moves into the enterprise, and learn why HTML5 is the perfect mobile development framework prescription.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Telerik

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement