IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Software Code Management

RSS Feed    Add to Google    Add to My Yahoo!
Software Code ManagementReports
 
Major software delivery lifecycle improvements with SDK
sponsored by Borland, Micro Focus
CASE STUDY: Check out this case study to learn how AQS leveraged a software development kit (SDK) to improve the consistency of source code management, automate change processes for data files, and increase efficiency in the overall build process.
Posted: 22 Apr 2014 | Published: 31 Dec 2012

Borland, Micro Focus

Expanding Active Decision-Making: The Power Of Integrating Business Rules And Events
sponsored by Red Hat
WHITE PAPER: This resource describes how business rules management systems (BRMS) can help you incorporate real-time awareness into your applications and implement high levels of automation, while also simplifying application development, shortening development cycles, and more.
Posted: 25 Feb 2013 | Published: 31 Dec 2012

Red Hat

Seven Practical Steps to Delivering More Secure Software
sponsored by Fortify Software
WHITE PAPER: This paper provides seven practical steps that help to effectively secure your company's software and shows you how to quickly evaluate the current state of software security and create a plan for dealing with it throughout the development life-cycle.
Posted: 07 May 2007 | Published: 01 Dec 2006

Fortify Software

Resources for iOS developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
Posted: 24 Apr 2013 | Published: 05 Mar 2013

Microsoft

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Tools to unit test your JavaScript
sponsored by IBM
WHITE PAPER: While unit testing your JavaScript can be challenging, developers agree that it is becoming an increasingly important task. This white paper reviews three popular tools that you can leverage to ease the testing process and mitigate common challenges.
Posted: 24 Apr 2012 | Published: 10 Apr 2012

IBM

How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems
sponsored by McCabe Software, Inc.
CASE STUDY: Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement