Source Code Management Reports

Computer Weekly – 3 October 2023: Where next for quantum computing?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the head of Amazon's Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now.
Posted: 02 Oct 2023 | Published: 03 Oct 2023

TechTarget ComputerWeekly.com

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

SmartBear Software

Five Ways to Prepare for SharePoint 2013: Choose Code-Free Customisation
sponsored by Dell Software
WHITE PAPER: Access this helpful source to learn how to utilize upgradable tools and techniques to avoid the challenges of migrating custom code to PointShare 2013
Posted: 23 Aug 2012 | Published: 22 Aug 2012

Dell Software

Application Note: Structured Testing - The Path to Thorough Code Coverage
sponsored by McCabe Software, Inc.
WHITE PAPER: Basis path testing, also known as Structured Testing, is the primary code-based testing strategy recommended by McCabe Software and supported by McCabe IQ. The main idea behind this testing is that decision outcomes within a software function should be tested independently. This article provides an overview of the benefits of basis path testing.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

McCabe Software, Inc.

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Reduce CPU Usage with 'SMART' SQL
sponsored by BMC Software, Inc.
WHITE PAPER: This paper discusses how and why to design SQL that will reduce the number of times calls are made to DB2. We'll look at how to write SMART applications rather than writing applications that act like generic I/O modules to DB2, properly tune SMART SQL, and how to exploit SQL and application features in DB2 on z/OS version 8 and 9.
Posted: 30 Nov 2009 | Published: 30 Nov 2009

BMC Software, Inc.

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.