Software Code Management Reports

MicroScope - January 2020: SMEs and managed services
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

Success with Static Analysis for Security: Why Code Audits Fail
sponsored by Parasoft Corporation
WHITE PAPER: This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

Parasoft Corporation

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

AppDynamics Lite
sponsored by AppDynamics
TRIAL SOFTWARE: AppDynamics Lite troubleshoots java performance problems in production environments. It organizes an application into business transactions, helping identify slow, stalled, and failed transactions. The application is free. Download now.
Posted: 28 Jul 2010 | Premiered: 16 Jul 2010

AppDynamics

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

Composable Infrastructure Overview
sponsored by VeriStor
EGUIDE: Composable infrastructure, or disaggregation, undoes traditional resource grouping, enabling you to mix and match resources as needed to meet specific workload demands. Access this e-guide to learn how composable infrastructure, its limitations, and the type of impact it will have on your organization.
Posted: 08 Aug 2017 | Published: 02 Aug 2017

VeriStor

Tip Guide: Strategies for Scaling Agile Beyond Simple Code and Deploy Environments
sponsored by CollabNet
EGUIDE: Read this expert article to find best practices for keeping your iteration and release cycles in sync even as your Agile development projects becoming increasingly complex.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

CollabNet

A Computer Weekly buyer's guide to secure coding
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.
Posted: 07 Jul 2023 | Published: 07 Jul 2023

TechTarget ComputerWeekly.com

HTML5: A Good Fit For Mobile Development?
sponsored by Telerik
EGUIDE: In this e-guide, learn how to structure a mobile team and harness HTML5 for mobile application development success. Read on as experts outline four key technology and cultural shifts occurring as mobile app development moves into the enterprise, and learn why HTML5 is the perfect mobile development framework prescription.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Telerik

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM