ComputerWeekly.com Research Library

Powered by Bitpipe.com

Source Code Control White Papers

  • Infographic: The Total Economic Impact of WANdisco SVN MultiSite

    Sponsored by: WANdisco

    A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.

  • Challenging Some of the Myths About Static Code Analysis

    Sponsored by: Klocwork

    This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.

  • The Total Economic Impact of WANdisco SVN MultiSite

    Sponsored by: WANdisco

    This Forrester Total Economic Impact™ report unveils how one solution provides LAN-speed collaboration between distributed teams, giving them the feeling that they're all working in the same room. View now to uncover how this solution helped one global software engineering company enjoy a 357% ROI with a payback period of less than two months.

  • Agile ALM Trends In SCCS, Requirements Management

    Sponsored by: Hewlett Packard Enterprise

    Did you know that the latest innovations for source code control systems (SCCS) and requirements management tools can not only help you enable a more agile software development process but also reap better returns on your application lifecycle management (ALM) investments? Read this expert e-zine to learn more.

  • How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems

    Sponsored by: McCabe Software, Inc.

    Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.

  • Deutsche Post DHL Case Study Enterprise Agility through DevOps

    Sponsored by: CollabNet

    Read this brief case study to discover how global company Deutsche Post DHL leveraged an agile application lifecycle management (ALM) platform to implement better IT governance, streamline collaboration and sharing software modules, automate and standardize application delivery, and gain visibility into source code and software partner information.

  • HTML5: Painting with Canvas

    Sponsored by: Intel

    With the newly introduced canvas element in HMTL5, all you need to do is put an element on your page and paint anything you want by creating scriptable graphics with JavaScript. Read this article to learn how to paint on a page with HTML5's canvas element through a simple painting application example.

  • Handling handoffs the Agile development way

    Sponsored by: IBM

    Many organizations would like to become more agile, but sometimes it is hard to see the way forward. There is an excellent approach to becoming more agile that any organization can implement: improve the speed and efficiency of the handoffs within the organization's existing development processes. Read this expert tip guide to learn more.

  • SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI

    Sponsored by: IBM

    Read this expert Tip Guide for workable, profitable embedded software development best practices.

  • Magic Quadrant for Static Application Security Testing

    Sponsored by: Veracode, Inc.

    In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.

  • E-Book: Technical Guide on Application Security: Secure Development

    Sponsored by: IBM

    When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.

  • Using Cyclomatic Path Analysis to Detect Security Vulnerabilities

    Sponsored by: McCabe Software, Inc.

    The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.

  • Introducing the Agile Desktop: Achieve high velocity with the Klocwork C/C++ developer's desktop

    Sponsored by: Klocwork

    As Agile is embraced by development organizations everywhere, the need to produce clean, maintainable software quickly is great. To achieve development agility, developers must maintain velocity, eliminate bug debt, and focus on peer interaction. Read this paper to learn how to automate time consuming development activities to boost productivity.

  • Expert Ebook: Mastering PCI

    Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

    This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.

  • The Case for Application Security: How Real Is the Threat and What Are Your Options

    Sponsored by: Fortify Software

    This white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.