Source Code Control Research
-
Infographic: The Total Economic Impact of WANdisco SVN MultiSite
Sponsored by: WANdiscoA recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.
-
Challenging Some of the Myths About Static Code Analysis
Sponsored by: KlocworkThis paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
-
The Total Economic Impact of WANdisco SVN MultiSite
Sponsored by: WANdiscoThis Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months.
-
Agile ALM Trends In SCCS, Requirements Management
Sponsored by: Hewlett Packard EnterpriseDid you know that the latest innovations for source code control systems (SCCS) and requirements management tools can not only help you enable a more agile software development process but also reap better returns on your application lifecycle management (ALM) investments? Read this expert e-zine to learn more.
-
How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems
Sponsored by: McCabe Software, Inc.Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
-
Deutsche Post DHL Case Study Enterprise Agility through DevOps
Sponsored by: CollabNetRead this brief case study to discover how global company Deutsche Post DHL leveraged an agile application lifecycle management (ALM) platform to implement better IT governance, streamline collaboration and sharing software modules, automate and standardize application delivery, and gain visibility into source code and software partner information.
-
HTML5: Painting with Canvas
Sponsored by: IntelWith the newly introduced canvas element in HMTL5, all you need to do is put an element on your page and paint anything you want by creating scriptable graphics with JavaScript. Read this article to learn how to paint on a page with HTML5's canvas element through a simple painting application example.
-
Handling handoffs the Agile development way
Sponsored by: IBMMany organizations would like to become more agile, but sometimes it is hard to see the way forward. There is an excellent approach to becoming more agile that any organization can implement: improve the speed and efficiency of the handoffs within the organization's existing development processes. Read this expert tip guide to learn more.
-
SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI
Sponsored by: IBMRead this expert Tip Guide for workable, profitable embedded software development best practices.
-
Agile Development with IBM Rational Synergy and IBM Rational Team Concert
Sponsored by: IBMSee how to take advantage of these RTC and Jazz features with Synergy and Change source control and change management.
-
Magic Quadrant for Static Application Security Testing
Sponsored by: Veracode, Inc.In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.
-
E-Book: Technical Guide on Application Security: Secure Development
Sponsored by: IBMWhen security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
-
IBM Rational Team Concert Express-C Edition - FREE for up to 10 developers . Download Now!
Sponsored by: IBMRational Team Concert enables Agile development teams to track work items, control source code, create and manage defects, and manage the lifecycle of software projects. Download now and get RTC-Express-C free for up to 10 developers or get your hands dirty in our live sandbox with no download required.
-
Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
Sponsored by: McCabe Software, Inc.The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
-
Introducing the Agile Desktop: Achieve high velocity with the Klocwork C/C++ developer's desktop
Sponsored by: KlocworkAs Agile is embraced by development organizations everywhere, the need to produce clean, maintainable software quickly is great. To achieve development agility, developers must maintain velocity, eliminate bug debt, and focus on peer interaction. Read this paper to learn how to automate time consuming development activities to boost productivity.
-
Expert Ebook: Mastering PCI
Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and UtimacoThis eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
-
The Case for Application Security: How Real Is the Threat and What Are Your Options
Sponsored by: Fortify SoftwareThis white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.