Source Code Management White Papers

(View All Report Types)
11 Best Practices for Peer Code Review
sponsored by SmartBear Software
WHITE PAPER: This white paper recommends best practices for efficient, lightweight peer code review that have been proven to be effective via scientific study and extensive field experience. Use the techniques discussed in this paper to ensure your code reviews improve your code and make the most of your developers' time.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

SmartBear Software

A Practical Guide to Identifying Slow Code During Development
sponsored by Micro Focus, Ltd
WHITE PAPER: Many seemingly innocent coding practices can cause code to execute slowly. It’s far better for software quality, and less costly for the business, to find slow code before it becomes a business problem. This white paper examines the main causes and provides a practical guide to identifying them.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

Micro Focus, Ltd

Success with Static Analysis for Security: Why Code Audits Fail
sponsored by Parasoft Corporation
WHITE PAPER: This paper explains why and how to apply static analysis tools in the context of a policy-based security process that not only prevents security vulnerabilities, but also focuses on SDLC productivity.
Posted: 01 Apr 2009 | Published: 01 Apr 2009

Parasoft Corporation

Software Agitation:Your Own Personal Code Reviewer
sponsored by Agitar Software
WHITE PAPER: Exercising Java code is a painstaking yet critical process for developers. This white paper explains how you can free up time by implementing a testing tool designed to detect coding errors as you write Java classes, and even after they have been reviewed.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

Agitar Software

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Improving Software Security by Identifying and Securing Path Linking Attack Surfaces to Attack Targets
sponsored by McCabe Software, Inc.
WHITE PAPER: Most companies do not have time to thoroughly investigate all of the potential attack targets inside an application. This white paper explains how the use of software security analysis (SSA) and path methodologies can help you identify vulnerable code and improve application security.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

Software Agitation: Your Own Personal Code Reviewer
sponsored by Agitar Software
WHITE PAPER: Agitator helps you debug your code while you write it - a benefit that no other existing Java Testing tool can claim. Agitator can also be extremely beneficial when run on legacy code - even code that has been reviewed by other developers and deemed to be “sufficient” and “properly written.” Learn how Agitar can be your own personal code reviewer.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Agitar Software

Deliver Robust Products at Reduced Cost by Linking Model-Driven Software Testing to Quality Management
sponsored by IBM
WHITE PAPER: Your customers expect the highest quality in the products you deliver. Discover how a comprehensive, integrated, automated requirements centric model and code based test environment managed with an extensible quality management system can increase market acceptance, ensure customer loyalty and deliver superior outcomes.
Posted: 02 Nov 2010 | Published: 01 Sep 2009

IBM

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA