ComputerWeekly.com Research Library

Powered by Bitpipe.com

Code Management Research

  • What SMBs Need to Know to Survive a Ransomware Attack

    Sponsored by: RSA Conference

    Ransomware is costly and can be catastrophic for businesses—but it doesn’t have to be. This webcast focuses on the cybersecurity needs of small to medium-sized businesses. Industry leaders walk you through the steps you can take (regardless of your budget) to ensure that your business survives a ransomware attack.

  • Crowd Machine GO Information Pack

    Sponsored by: Crowd Machine

    Crowd Machine GO is the fastest way to realize digital transformation of the enterprise. GO not only accelerates the creation of microservices, but also allows the business line to consume those microservices in the construction of self-assembled solutions.

  • Best Practices for Using Open Source Code

    Sponsored by: TechTarget

    A huge amount of applications are now built with open source components, but what affects does this open source code use have on your apps later on down the line? Take a look at this guide, Open Source Compliance, Security, & Risk Best Practices to learn how to monitor your open source code and make sure you're using it safely.

  • How Do Vulnerabilities Get into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • Integrating Content Services into Low-Code Applications

    Sponsored by: Hyland

    Low-code applications were initially focused on improving ECM capabilities. Now, low-code’s reach has spread to other areas needing automation. As we move forward, we have to keep these new functions and areas served by low-code in mind. Luckily, AIIM’s survey results provide some insight. Read the results now to stay up to date.

  • MicroScope - January 2020: SMEs and managed services

    Sponsored by: ComputerWeekly.com

    In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.

  • Seamless Application Security: Security at the Speed of DevOps

    Sponsored by: Micro Focus

    Download this guide to learn how developers can start to leverage integrations to make application security a more natural part of the lifecycle – without slowing down innovation.

  • 3 Business Challenges You Can Solve Using No/Low Code App Dev

    Sponsored by: ServiceNow

    Download this resource to learn how a no/low code development platform can help your developers quickly, build, test, and deploy applications without writing a line of code – saving time and money.

  • Securing Code with Advanced SAST

    Sponsored by: WhiteHat Security

    Download this white paper to learn how a static application security testing (SAST) tool, can help your teams ensure that app code is secure – from development to pre-production – through effective scanning and remediation of vulnerabilities.

  • Code-it Cody

    Sponsored by: ComputerWeekly.com

    The first two chapters from Code-it Cody by The Clever Tykes Books. When the Computer Club competition is announced, Cody and his friends must put their coding skills into action. Cody begins a quest to research current computer games before creating the prototype of his very own.

  • Coding for Kids

    Sponsored by: ComputerWeekly.com

    Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.

  • Memory corruption attacks

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series argues that the lack of diversity in software and operating systems has left a large number of computers vulnerable to memory program attacks.

  • A Computer Weekly buyer's guide to testing and code quality

    Sponsored by: ComputerWeekly.com

    Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide.

  • Inspiring disruption: Tech Trends 2014

    Sponsored by: ComputerWeekly.com

    This in depth study from Deloitte assesses the top 10 business technology trends in 2014 ranging from the role of the CIO to the impact pf wearable technology.

  • How We Build Risk Into Applications

    Sponsored by: Veracode, Inc.

    There are a number of ways you could be building risks into your applications from design to production. Download this infographic to find out how to avoid building risks into your apps in 3 steps.

  • Composable Infrastructure Overview

    Sponsored by: VeriStor

    Composable infrastructure, or disaggregation, undoes traditional resource grouping, enabling you to mix and match resources as needed to meet specific workload demands. Access this e-guide to learn how composable infrastructure, its limitations, and the type of impact it will have on your organization.

  • Avoid Human Error with AWS CodeDeploy

    Sponsored by: Splunk

    Want to avoid human error in code deployment? This e-guide covers how you can effectively use AWS CodeDeploy to automate code deployment to your servers and committing avoid manual errors.

  • The Right Tools Smooth the DevOps Transition

    Sponsored by: Splunk

    Before your DevOps team jumps on board with AWS, you need a full array of tools from either AWS or third parties. This e-guide covers how to avoid errors in releasing code in AWS, how to select the right combination of AWS and third party tools for your business needs, and more.

  • Infographic: The Total Economic Impact of WANdisco SVN MultiSite

    Sponsored by: WANdisco

    A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.

  • Open Source BPM Hits The Mark For Delivering New Class Of Process Apps

    Sponsored by: Red Hat

    In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.

  • Case study: How One Company Increased App Development Velocity by 40%

    Sponsored by: ZeroTurnaround

    Access this brief case study to learn about the strategy that allowed the application developers at NetworkedAssets to cut down on downtime from redeploys and increase their team velocity by 40%. Discover how to instantly view and test your code changes without the need for any delays.

  • Toad for Oracle Tips and Tricks

    Sponsored by: Dell Software

    In this comprehensive white paper, you'll learn how Oracle's solution for database development and administration can help you to work and collaborate with accuracy and ease. The resource explores the functionality that Toad can bring to app developers, PL/SQL developers, and database administrators alike.

  • Challenging Some of the Myths About Static Code Analysis

    Sponsored by: Klocwork

    This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.

  • Defend Against Injection-based Attacks

    Sponsored by: Klocwork

    This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.

  • Course: Improper Validation of Array Index (CWE-129)

    Sponsored by: Klocwork

    This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.