IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Source Code Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold. Source code consists of statements created with a text editor or visual programming tool and then saved in a file. The source code is the most permanent form of a program, even though the program may later be modified, improved or upgraded.Source  … 
Definition continues below.
Source Code Management Reports
 
Challenging Some of the Myths About Static Code Analysis
sponsored by Rogue Wave Software
WHITE PAPER: This guide provides 4 common myths about static code analysis (SCA), which serve mostly to distort the true value static analysis can bring to your software development lifecycle. Read on to learn about the truths to these myths, and how easily you can write code that you'll be proud of.
Posted: 02 Dec 2014 | Published: 30 Nov 2013

Rogue Wave Software

Defend Against Injection-Based Attacks
sponsored by Rogue Wave Software
WHITE PAPER: In this informative paper, discover some of the most common security vulnerabilities currently plaguing the software development industry, and learn how static code analysis (SCA) can detect them.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Rogue Wave Software

A Computer Weekly buyer's guide to testing and code quality
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012

SmartBear Software

MIPS Core PSP
sponsored by CriticalBlue
WHITE PAPER: This application note provides a detailed tutorial of how to use the features of the MIPS Core PSP within Prism. End users who are either considering migrating existing software applications onto the 34K or 1004K core, or who already use those cores but wish to optimize their operation are the target audience for this paper.
Posted: 19 Aug 2010 | Published: 17 Jun 2010

CriticalBlue

The Full Team Approach to Managing Requirements
sponsored by SERENA Software, Inc.
EGUIDE: Software development teams are often faced with requirements to add new features to an existing code base. For many reasons, this sort of work can entail a lot of risk. This Expert Tip examines mistakes in managing the requirements process and how by looking at requirements from the perspective of all team members, these mistakes can be avoided.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SERENA Software, Inc.

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

SearchSAP.com E-Book: SAP upgrade tips and best Practices
sponsored by datango AG
EBOOK: SAP upgrades are a perennial challenge - especially for organizations with many instances or customizations. The struggling economy has also made it all the more difficult to make a case for a technical SAP ERP upgrade. But maintaining upgrade best practices and avoiding mistakes can help avoid costly downtime and issues during upgrade projects.
Posted: 03 Nov 2010 | Published: 03 Nov 2010

datango AG
 
 
SOURCE CODE MANAGEMENT DEFINITION (continued): …  code analysis can be either static or dynamic. In static analysis, debugging is done by examining the code without actually executing the program. This can reveal errors at an early stage in program development, often eliminating the need for multiple revisions later. After static analysis has been done, dynamic analysis is performed in an effort to uncover more subtle defects or vulnerabilities. Dynamic analysis consists of real-time program testing. A major advantage of this method is the fact that it does not require developers to make educated guesses at situations likely to produce errors. … 
Source Code Management definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement