IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Software Code Management

RSS Feed   
Software Code Management Reports
 
Coding for Kids
sponsored by ComputerWeekly.com
BOOK: Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

ComputerWeekly.com

Integrating Content Services into Low-Code Applications
sponsored by Hyland
RESOURCE: Low-code applications were initially focused on improving ECM capabilities. Now, low-code’s reach has spread to other areas needing automation. As we move forward, we have to keep these new functions and areas served by low-code in mind. Luckily, AIIM’s survey results provide some insight. Read the results now to stay up to date.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

TOPICS:  Code Management
Hyland

Eliminate Infrastructure as Code Vulnerabilities at the Source
sponsored by Concourse Labs
DATA SHEET: Download this brief for the key risks associated with Infrastructure as Code (IaC) and get practical tips for demonstrating your cloud security and compliance posture, at every point in time.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Infographic: The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

WANdisco

How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems
sponsored by McCabe Software, Inc.
CASE STUDY: Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

The Right Tools Smooth the DevOps Transition
sponsored by Splunk
EGUIDE: Before your DevOps team jumps on board with AWS, you need a full array of tools from either AWS or third parties. This e-guide covers how to avoid errors in releasing code in AWS, how to select the right combination of AWS and third party tools for your business needs, and more.
Posted: 16 May 2017 | Published: 12 May 2017

Splunk

Resources for iOS developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
Posted: 24 Apr 2013 | Published: 05 Mar 2013

Microsoft

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Symantec Corporation

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info