IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Source Code Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold. Source code consists of statements created with a text editor or visual programming tool and then saved in a file. The source code is the most permanent form of a program, even though the program may later be modified, improved or upgraded.Source  … 
Definition continues below.
Source Code ManagementReports
 
Understanding Avaya IP Office Short Codes
sponsored by Global Knowledge
WHITE PAPER: This white paper provides a road map to understanding the programming and use of short codes in an Avaya IP Office system. It is based primarily on the codes used with the IPO 8.1 U-Law system with the Essential, Preferred, or Advanced Edition system licenses.
Posted: 17 Jun 2013 | Published: 01 May 2013

Global Knowledge

Toad™ for Oracle® Tips and Tricks
sponsored by Dell Software
WHITE PAPER: Toad™ for Oracle is a staple for database developers, but regardless of your role in an organization, if you use Oracle, then there's something Toad can offer you. In this comprehensive white paper, explore some of the Toad fundamentals as well as the features and capabilities of the individual Toad editions and modules.
Posted: 25 Feb 2014 | Published: 08 Jul 2013

Dell Software

Hardware Security Module (HSM) Product Brief
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Luna SA, made for enterprises requiring strong cryptographic security for paper-to-digital initiatives, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.
Posted: 15 Dec 2014 | Published: 09 Apr 2013

SafeNet, Inc.

Analyst report: 6 predictions for the future of BPM
sponsored by K2
WHITE PAPER: To help you navigate the coming shift to customer-centric BPM, read this Forrester Research, Inc. report that highlights 6 predictions for how the BPM market will unfold in 2015.
Posted: 26 Nov 2014 | Published: 06 Nov 2014

K2

Memory corruption attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems
sponsored by McCabe Software, Inc.
CASE STUDY: Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity

Tools to unit test your JavaScript
sponsored by IBM
WHITE PAPER: While unit testing your JavaScript can be challenging, developers agree that it is becoming an increasingly important task. This white paper reviews three popular tools that you can leverage to ease the testing process and mitigate common challenges.
Posted: 24 Apr 2012 | Published: 10 Apr 2012

IBM

Using ICD-10 Codes and Electronic Health Records to Achieve Value
sponsored by Dell, Inc.
WHITE PAPER: This white paper demonstrates how adopting ICD-10 and EHRs can provide information that would be useful to streamlining administrative burdens that plague both health plans and providers.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation
sponsored by Linoma Software
CASE STUDY: In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software
 
 
SOURCE CODE MANAGEMENT DEFINITION (continued): …  code analysis can be either static or dynamic. In static analysis, debugging is done by examining the code without actually executing the program. This can reveal errors at an early stage in program development, often eliminating the need for multiple revisions later. After static analysis has been done, dynamic analysis is performed in an effort to uncover more subtle defects or vulnerabilities. Dynamic analysis consists of real-time program testing. A major advantage of this method is the fact that it does not require developers to make educated guesses at situations likely to produce errors. … 
Source Code Management definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement