IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Source Code Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold. Source code consists of statements created with a text editor or visual programming tool and then saved in a file. The source code is the most permanent form of a program, even though the program may later be modified, improved or upgraded.Source  … 
Definition continues below.
Source Code Management Reports
Expanding Active Decision-Making: The Power Of Integrating Business Rules And Events
sponsored by Red Hat
WHITE PAPER: This resource describes how business rules management systems (BRMS) can help you incorporate real-time awareness into your applications and implement high levels of automation, while also simplifying application development, shortening development cycles, and more.
Posted: 25 Feb 2013 | Published: 31 Dec 2012

Red Hat

Code with Java Simpler, Faster, and Easier
sponsored by ZeroTurnaround
WHITE PAPER: Java developers know that testing code changes can be a huge pain. Wouldn't it be great if you could see your code changes immediately, fine-tune, debug, explore and deploy code without waiting for ages? Learn about the JRebel Java plugin here and get started on your two week free trial.
Posted: 28 Mar 2014 | Published: 31 Dec 2012


Can I Really Roll-out a Code Review Process That Doesn’t Suck?
sponsored by SmartBear Software
WEBCAST: This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

SmartBear Software

sponsored by CriticalBlue
WHITE PAPER: This application note provides a detailed tutorial of how to use the features of the MIPS Core PSP within Prism. End users who are either considering migrating existing software applications onto the 34K or 1004K core, or who already use those cores but wish to optimize their operation are the target audience for this paper.
Posted: 19 Aug 2010 | Published: 17 Jun 2010


Top Data Integration Trends and Best Practices
sponsored by Talend
EBOOK: Data integration software is now much more than just ETL tools - it encompasses a wide range of platforms and technologies supporting real-time integration as well as traditional batch-oriented approaches. In this e-book, learn about the trends and emerging best practices that are shaping the data integration process at leading-edge organizations.
Posted: 11 Apr 2011 | Published: 11 Apr 2011


Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013


The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Resources for Android developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you're an Android developer looking to get started creating apps for Windows 8, look no further than this resource center made just for you. You'll get tools on how to build Windows Store apps using a variety of programming languages, including blog posts, coding road maps, and much more.
Posted: 23 Apr 2013 | Published: 05 Mar 2013


Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Seven Practical Steps to Delivering More Secure Software
sponsored by Fortify Software
WHITE PAPER: This paper provides seven practical steps that help to effectively secure your company's software and shows you how to quickly evaluate the current state of software security and create a plan for dealing with it throughout the development life-cycle.
Posted: 07 May 2007 | Published: 01 Dec 2006

Fortify Software
SOURCE CODE MANAGEMENT DEFINITION (continued): …  code analysis can be either static or dynamic. In static analysis, debugging is done by examining the code without actually executing the program. This can reveal errors at an early stage in program development, often eliminating the need for multiple revisions later. After static analysis has been done, dynamic analysis is performed in an effort to uncover more subtle defects or vulnerabilities. Dynamic analysis consists of real-time program testing. A major advantage of this method is the fact that it does not require developers to make educated guesses at situations likely to produce errors. … 
Source Code Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement