Software Code Management Reports

Resources for iOS developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
Posted: 24 Apr 2013 | Published: 05 Mar 2013

Microsoft

Case study: How One Company Increased App Development Velocity by 40%
sponsored by ZeroTurnaround
CASE STUDY: Access this brief case study to learn about the strategy that allowed the application developers at NetworkedAssets to cut down on downtime from redeploys and increase their team velocity by 40%. Discover how to instantly view and test your code changes without the need for any delays.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

ZeroTurnaround

SearchSAP.com E-Book: SAP upgrade tips and best Practices
sponsored by datango AG
EBOOK: SAP upgrades are a perennial challenge - especially for organizations with many instances or customizations. The struggling economy has also made it all the more difficult to make a case for a technical SAP ERP upgrade. But maintaining upgrade best practices and avoiding mistakes can help avoid costly downtime and issues during upgrade projects.
Posted: 03 Nov 2010 | Published: 03 Nov 2010

datango AG

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

A Practical Guide to Identifying Slow Code During Development
sponsored by Micro Focus, Ltd
WHITE PAPER: Many seemingly innocent coding practices can cause code to execute slowly. It’s far better for software quality, and less costly for the business, to find slow code before it becomes a business problem. This white paper examines the main causes and provides a practical guide to identifying them.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

Micro Focus, Ltd

Five Ways to Prepare for SharePoint 2013: Choose Code-Free Customisation
sponsored by Dell Software
WHITE PAPER: Access this helpful source to learn how to utilize upgradable tools and techniques to avoid the challenges of migrating custom code to PointShare 2013
Posted: 23 Aug 2012 | Published: 22 Aug 2012

Dell Software

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

How We Build Risk Into Applications
sponsored by Veracode, Inc.
WHITE PAPER: There are a number of ways you could be building risks into your applications from design to production. Download this infographic to find out how to avoid building risks into your apps in 3 steps.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Can I Really Roll-out a Code Review Process That Doesn’t Suck?
sponsored by SmartBear Software
WEBCAST: This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

SmartBear Software

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.