Source Code Management Reports

Computer Weekly – 13 June 2023: The most influential people in UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal the 13th annual UKtech50 list, with this year's most influential person award shared by secretaries of state for science, innovation and technology Michelle Donelan and Chloe Smith. Also, we examine mounting legal challenges faced by the emergence of generative AI tools such as ChatGPT. Read the issue now.
Posted: 12 Jun 2023 | Published: 13 Jun 2023

TechTarget ComputerWeekly.com

Mastering the Iteration : The Heartbeat of Agile Development
sponsored by Rally Software
WHITE PAPER: This white paper is an excerpt from the book "Scaling Software Agility: Best Practices for Large Enterprises", and describes the iteration pattern and activities that a team engages in to create tested, value-delivered code in a short time box.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Rally Software

Reduce CPU Usage with 'SMART' SQL
sponsored by BMC Software, Inc.
WHITE PAPER: This paper discusses how and why to design SQL that will reduce the number of times calls are made to DB2. We'll look at how to write SMART applications rather than writing applications that act like generic I/O modules to DB2, properly tune SMART SQL, and how to exploit SQL and application features in DB2 on z/OS version 8 and 9.
Posted: 30 Nov 2009 | Published: 30 Nov 2009

BMC Software, Inc.

Deliver Robust Products at Reduced Cost by Linking Model-Driven Software Testing to Quality Management
sponsored by IBM
WHITE PAPER: Your customers expect the highest quality in the products you deliver. Discover how a comprehensive, integrated, automated requirements centric model and code based test environment managed with an extensible quality management system can increase market acceptance, ensure customer loyalty and deliver superior outcomes.
Posted: 02 Nov 2010 | Published: 01 Sep 2009

IBM

Resources for iOS developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
Posted: 24 Apr 2013 | Published: 05 Mar 2013

Microsoft

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

SmartBear Software

Toad for Oracle Tips and Tricks
sponsored by Dell Software
WHITE PAPER: In this comprehensive white paper, you'll learn how Oracle's solution for database development and administration can help you to work and collaborate with accuracy and ease. The resource explores the functionality that Toad can bring to app developers, PL/SQL developers, and database administrators alike.
Posted: 25 Feb 2014 | Published: 08 Jul 2013

Dell Software

Toad for Oracle 10.5
sponsored by Dell Software
WHITE PAPER: Toad for Oracle v10.5 adds new features and enhances many existing ones. These changes are designed to save you time, increase accuracy and give you better visibility of your work environment - whether you’re a developer working in an unfamiliar database or maintaining legacy code, or a DBA trying to manage multiple databases.
Posted: 20 Jul 2010 | Published: 20 Jul 2010

Dell Software

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork