IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Source Code Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold. Source code consists of statements created with a text editor or visual programming tool and then saved in a file. The source code is the most permanent form of a program, even though the program may later be modified, improved or upgraded.Source  … 
Definition continues below.
Source Code ManagementReports
 
Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Ready, Aim, HP Fortify!
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, discover how the U.S. Army uses a particular software to help prevent attacks to the TAMIS system.
Posted: 10 Sep 2014 | Published: 01 Oct 2013

Hewlett-Packard Company

SAP Case Study
sponsored by Hewlett-Packard Company
CASE STUDY: With the escalating number and increasing sophistication of cyber-attacks, perimeter defenses are no longer enough. Companies who used HP Fortify on Demand—a cloud-based solution—saw results and achieved time to value faster. Read the report to learn how.
Posted: 04 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012

SmartBear Software

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork

Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments
sponsored by CollabNet
EGUIDE: Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

CollabNet

Toad™ for Oracle® Tips and Tricks
sponsored by Dell Software
WHITE PAPER: Toad™ for Oracle is a staple for database developers, but regardless of your role in an organization, if you use Oracle, then there's something Toad can offer you. In this comprehensive white paper, explore some of the Toad fundamentals as well as the features and capabilities of the individual Toad editions and modules.
Posted: 25 Feb 2014 | Published: 08 Jul 2013

Dell Software

AppDynamics Lite
sponsored by AppDynamics
TRIAL SOFTWARE: AppDynamics Lite troubleshoots java performance problems in production environments. It organizes an application into business transactions, helping identify slow, stalled, and failed transactions. The application is free. Download now.
Posted: 28 Jul 2010 | Premiered: 16 Jul 2010

AppDynamics

Expert Insight into Powershell's Scripting
sponsored by Dell Compellent
EGUIDE: To fully leverage Microsoft PowerShell, you must be aware of all the benefits this new technology offers. This expert e-guide, brought to you by SearchWindowsServer.com provides a deeper understanding of PowerShell and describes various approaches to scripting and Hyper-V management.
Posted: 23 Sep 2011 | Published: 22 Sep 2011

Dell Compellent

SharePoint E-Zine Volume 19: Time to Beef Up Code Retention Policies
sponsored by SearchWinIT
EZINE: When a separate team is tasked with patching your SharePoint servers, play it safe by adding code retention policies to your governance plan. In this month's issue, learn how to use governance policies effectively so you can respond quickly when a buggy patch puts SharePoint at risk.
Posted: 18 May 2010 | Published: 18 May 2010

SearchWinIT
 
 
SOURCE CODE MANAGEMENT DEFINITION (continued): …  code analysis can be either static or dynamic. In static analysis, debugging is done by examining the code without actually executing the program. This can reveal errors at an early stage in program development, often eliminating the need for multiple revisions later. After static analysis has been done, dynamic analysis is performed in an effort to uncover more subtle defects or vulnerabilities. Dynamic analysis consists of real-time program testing. A major advantage of this method is the fact that it does not require developers to make educated guesses at situations likely to produce errors. … 
Source Code Management definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement