Source Code Management Reports

A Computer Weekly Buyer's Guide to Hyperautomation and Bots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The advantages of bots are only multiplying for businesses across the globe. In this 15-page buyer's guide, Computer Weekly looks at how robotic process automation is evolving, the benefits it brings for coders and the ways artificial intelligence can enhance customer service.
Posted: 30 Apr 2021 | Published: 30 Apr 2021

TechTarget ComputerWeekly.com

Computer Weekly – 30 May 2023: Can the UK cash in on chips?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government has committed £1bn to the semiconductor sector – but can it ever compete with the US and China? The potential of 5G networking could transform manufacturing – we examine the implications. Read the issue now.
Posted: 26 May 2023 | Published: 30 May 2023

TechTarget ComputerWeekly.com

Computer Weekly – 3 October 2023: Where next for quantum computing?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the head of Amazon's Braket quantum computing services about how the technology is progressing. We go behind the scenes at an ethical hacker event to find out how bug bounty programmes work. And we analyse the offerings of the major players in software-defined storage. Read the issue now.
Posted: 02 Oct 2023 | Published: 03 Oct 2023

TechTarget ComputerWeekly.com

Handling handoffs the Agile development way
sponsored by IBM
EGUIDE: Many organizations would like to become more agile, but sometimes it is hard to see the way forward. There is an excellent approach to becoming more agile that any organization can implement: improve the speed and efficiency of the handoffs within the organization's existing development processes. Read this expert tip guide to learn more.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA

Five Ways to Prepare for SharePoint 2013: Choose Code-Free Customisation
sponsored by Dell Software
WHITE PAPER: Access this helpful source to learn how to utilize upgradable tools and techniques to avoid the challenges of migrating custom code to PointShare 2013
Posted: 23 Aug 2012 | Published: 22 Aug 2012

Dell Software

11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012

SmartBear Software

Best Kept Secrets of Peer Code Review: Modern Approach Practical Advice
sponsored by SmartBear Software
EBOOK: This insightful e-book provides in-depth best practices and advice on how to catch code errors before they are able to cause bigger problems within your organization. Read more inside to uncover new tools designed to make the QA process faster and easier.
Posted: 22 Aug 2012 | Published: 22 Aug 2012

SmartBear Software

The Next Generation of Static Analysis: Boolean Satisfiability and Path Simulation
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper will provide a brief overview of the history of static analysis and explain how the use of SAT in static analysis is enabling developers to improve the quality and security of their code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys