Software Code Management Reports

A Computer Weekly Buyer's Guide to Hyperautomation and Bots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The advantages of bots are only multiplying for businesses across the globe. In this 15-page buyer's guide, Computer Weekly looks at how robotic process automation is evolving, the benefits it brings for coders and the ways artificial intelligence can enhance customer service.
Posted: 30 Apr 2021 | Published: 30 Apr 2021

TechTarget ComputerWeekly.com

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

MicroScope - January 2020: SMEs and managed services
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Can I Really Roll-out a Code Review Process That Doesn’t Suck?
sponsored by SmartBear Software
WEBCAST: This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

SmartBear Software

Five Ways to Prepare for SharePoint 2013: Choose Code-Free Customisation
sponsored by Dell Software
WHITE PAPER: Access this helpful source to learn how to utilize upgradable tools and techniques to avoid the challenges of migrating custom code to PointShare 2013
Posted: 23 Aug 2012 | Published: 22 Aug 2012

Dell Software

Top Data Integration Trends and Best Practices
sponsored by Talend
EBOOK: Data integration software is now much more than just ETL tools - it encompasses a wide range of platforms and technologies supporting real-time integration as well as traditional batch-oriented approaches. In this e-book, learn about the trends and emerging best practices that are shaping the data integration process at leading-edge organizations.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Talend

Handling handoffs the Agile development way
sponsored by IBM
EGUIDE: Many organizations would like to become more agile, but sometimes it is hard to see the way forward. There is an excellent approach to becoming more agile that any organization can implement: improve the speed and efficiency of the handoffs within the organization's existing development processes. Read this expert tip guide to learn more.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork