Source Code Management Reports

AppDynamics Lite
sponsored by AppDynamics
TRIAL SOFTWARE: AppDynamics Lite troubleshoots java performance problems in production environments. It organizes an application into business transactions, helping identify slow, stalled, and failed transactions. The application is free. Download now.
Posted: 28 Jul 2010 | Premiered: 16 Jul 2010

AppDynamics

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Presentation Transcript: Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges
sponsored by Panaya, Inc.
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Critical Lessons to Help You Deal with the Top Six SAP ERP 6.0 Upgrade Challenges” explores the top challenges of an SAP ERP 6.0 upgrade and provides must-know advice, real-world examples, technical tips and other tricks to help you solve them.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Panaya, Inc.

Resources for iOS developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
Posted: 24 Apr 2013 | Published: 05 Mar 2013

Microsoft

A Practical Guide to Identifying Slow Code During Development
sponsored by Micro Focus, Ltd
WHITE PAPER: Many seemingly innocent coding practices can cause code to execute slowly. It’s far better for software quality, and less costly for the business, to find slow code before it becomes a business problem. This white paper examines the main causes and provides a practical guide to identifying them.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

Micro Focus, Ltd

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Avoid Human Error with AWS CodeDeploy
sponsored by Splunk
EGUIDE: Want to avoid human error in code deployment? This e-guide covers how you can effectively use AWS CodeDeploy to automate code deployment to your servers and committing avoid manual errors.
Posted: 18 May 2017 | Published: 11 May 2017

Splunk

Software Agitation:Your Own Personal Code Reviewer
sponsored by Agitar Software
WHITE PAPER: Exercising Java code is a painstaking yet critical process for developers. This white paper explains how you can free up time by implementing a testing tool designed to detect coding errors as you write Java classes, and even after they have been reviewed.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

Agitar Software

Mastering the Iteration : The Heartbeat of Agile Development
sponsored by Rally Software
WHITE PAPER: This white paper is an excerpt from the book "Scaling Software Agility: Best Practices for Large Enterprises", and describes the iteration pattern and activities that a team engages in to create tested, value-delivered code in a short time box.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Rally Software

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork