IT Management  >   Systems Design and Development  >   Application Development  >   Programming  >  

Source Code Management

RSS Feed   
DEFINITION: Source code analysis is the automated testing of source code for the purpose of debugging a computer program or application before it is distributed or sold. Source code consists of statements created with a text editor or visual programming tool and then saved in a file. The source code is the most permanent form of a program, even though the program may later be modified, improved or upgraded.Source  … 

Source Code Management definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Source Code Management Reports
 
Coding for Kids
sponsored by ComputerWeekly.com
BOOK: Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

ComputerWeekly.com

Top Five Reasons to Choose Toad® Over SQL Developer
sponsored by Dell Software
WHITE PAPER: Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Dell Software

Infographic: The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

WANdisco

Reduce CPU Usage with 'SMART' SQL
sponsored by BMC Software, Inc.
WHITE PAPER: This paper discusses how and why to design SQL that will reduce the number of times calls are made to DB2. We'll look at how to write SMART applications rather than writing applications that act like generic I/O modules to DB2, properly tune SMART SQL, and how to exploit SQL and application features in DB2 on z/OS version 8 and 9.
Posted: 30 Nov 2009 | Published: 30 Nov 2009

BMC Software, Inc.

Presentation Transcript: Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges
sponsored by Panaya, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges” explores the top challenges of an SAP ERP 6.0 upgrade and provides must-know advice, real-world examples, technical tips and other tricks to help you solve them.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Panaya, Inc.

Putting the Ops in DevOps
sponsored by Cherwell
EGUIDE: Production IT takes up just as much namespace as the development side of DevOps, but is often left out of the actual movement. This e-guide covers what it takes for your organization to incorporate your production IT team into your DevOps operations and discover why it has been ignored for so long.
Posted: 19 May 2017 | Published: 16 May 2017

Cherwell

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Composable Infrastructure Overview
sponsored by VeriStor
EGUIDE: Composable infrastructure, or disaggregation, undoes traditional resource grouping, enabling you to mix and match resources as needed to meet specific workload demands. Access this e-guide to learn how composable infrastructure, its limitations, and the type of impact it will have on your organization.
Posted: 08 Aug 2017 | Published: 02 Aug 2017

VeriStor

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments
sponsored by CollabNet
EGUIDE: Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

CollabNet
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement