ComputerWeekly.com Research Library

Powered by Bitpipe.com

Code Management Research

  • Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert

    Sponsored by: Symantec Corporation

    This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.

  • 11 Best Practices for Peer Code Review

    Sponsored by: SmartBear Software

    Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.

  • Can I Really Roll-out a Code Review Process That Doesn’t Suck?

    Sponsored by: SmartBear Software

    This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more.

  • Five Ways to Prepare for SharePoint 2013: Choose Code-Free Customisation

    Sponsored by: Dell Software

    Access this helpful source to learn how to utilize upgradable tools and techniques to avoid the challenges of migrating custom code to PointShare 2013

  • Best Kept Secrets of Peer Code Review: Modern Approach Practical Advice

    Sponsored by: SmartBear Software

    This insightful e-book provides in-depth best practices and advice on how to catch code errors before they are able to cause bigger problems within your organization. Read more inside to uncover new tools designed to make the QA process faster and easier.

  • Using ICD-10 Codes and Electronic Health Records to Achieve Value

    Sponsored by: DellEMC and Intel®

    This white paper demonstrates how adopting ICD-10 and EHRs can provide information that would be useful to streamlining administrative burdens that plague both health plans and providers.

  • Tools to unit test your JavaScript

    Sponsored by: IBM

    While unit testing your JavaScript can be challenging, developers agree that it is becoming an increasingly important task. This white paper reviews three popular tools that you can leverage to ease the testing process and mitigate common challenges.

  • Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets

    Sponsored by: McCabe Software, Inc.

    Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.

  • How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems

    Sponsored by: McCabe Software, Inc.

    Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.

  • Software Agitation:Your Own Personal Code Reviewer

    Sponsored by: Agitar Software

    Exercising Java code is a painstaking yet critical process for developers. This white paper explains how you can free up time by implementing a testing tool designed to detect coding errors as you write Java classes, and even after they have been reviewed.

  • Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments

    Sponsored by: CollabNet

    Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex.

  • Handling handoffs the Agile development way

    Sponsored by: IBM

    Many organizations would like to become more agile, but sometimes it is hard to see the way forward. There is an excellent approach to becoming more agile that any organization can implement: improve the speed and efficiency of the handoffs within the organization's existing development processes. Read this expert tip guide to learn more.

  • Software complexity, integration drive business rules automation adoption trend

    Sponsored by: IBM

    Business rules can bring additional insight, transparency and efficiency to case management, provided the approaches are combined and implemented properly. In this Tip Guide, learn how to prepare for and implement rules in case management, and where business rules and case management trends seem to be heading.

  • Expert Insight into Powershell's Scripting

    Sponsored by: Dell Compellent

    To fully leverage Microsoft PowerShell, you must be aware of all the benefits this new technology offers. This expert e-guide, brought to you by SearchWindowsServer.com provides a deeper understanding of PowerShell and describes various approaches to scripting and Hyper-V management.

  • Securing your Private Keys as Best Practice for Code Signing Certificates

    Sponsored by: VeriSign EMEA

    This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.

  • Top Data Integration Trends and Best Practices

    Sponsored by: Talend

    Data integration software is now much more than just ETL tools - it encompasses a wide range of platforms and technologies supporting real-time integration as well as traditional batch-oriented approaches. In this e-book, learn about the trends and emerging best practices that are shaping the data integration process at leading-edge organizations.

  • A Practical Guide to Identifying Slow Code During Development

    Sponsored by: Micro Focus, Ltd

    Many seemingly innocent coding practices can cause code to execute slowly. It’s far better for software quality, and less costly for the business, to find slow code before it becomes a business problem. This white paper examines the main causes and provides a practical guide to identifying them.

  • Application Note: Structured Testing - The Path to Thorough Code Coverage

    Sponsored by: McCabe Software, Inc.

    Basis path testing, also known as Structured Testing, is the primary code-based testing strategy recommended by McCabe Software and supported by McCabe IQ. The main idea behind this testing is that decision outcomes within a software function should be tested independently. This article provides an overview of the benefits of basis path testing.

  • Software Agitation: Your Own Personal Code Reviewer

    Sponsored by: Agitar Software

    Agitator helps you debug your code while you write it - a benefit that no other existing Java Testing tool can claim. Agitator can also be extremely beneficial when run on legacy code - even code that has been reviewed by other developers and deemed to be “sufficient” and “properly written.” Learn how Agitar can be your own personal code reviewer.

  • The Full Team Approach to Managing Requirements

    Sponsored by: SERENA Software, Inc.

    Software development teams are often faced with requirements to add new features to an existing code base. For many reasons, this sort of work can entail a lot of risk. This Expert Tip examines mistakes in managing the requirements process and how by looking at requirements from the perspective of all team members, these mistakes can be avoided.

  • Top Five Reasons to Choose Toad® Over SQL Developer

    Sponsored by: Dell Software

    Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.

  • Presentation Transcript: Path to a Secure Application

    Sponsored by: IBM

    This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.

  • Using Cyclomatic Path Analysis to Detect Security Vulnerabilities

    Sponsored by: McCabe Software, Inc.

    The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.

  • SearchSAP.com E-Book: SAP upgrade tips and best Practices

    Sponsored by: datango AG

    SAP upgrades are a perennial challenge - especially for organizations with many instances or customizations. The struggling economy has also made it all the more difficult to make a case for a technical SAP ERP upgrade. But maintaining upgrade best practices and avoiding mistakes can help avoid costly downtime and issues during upgrade projects.

  • Deliver Robust Products at Reduced Cost by Linking Model-Driven Software Testing to Quality Management

    Sponsored by: IBM

    Your customers expect the highest quality in the products you deliver. Discover how a comprehensive, integrated, automated requirements centric model and code based test environment managed with an extensible quality management system can increase market acceptance, ensure customer loyalty and deliver superior outcomes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.