Software Code Management Reports

MicroScope - January 2020: SMEs and managed services
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of MicroScope, we look at the channel opportunity in the SME customer base as they look for managed services support, our roundtable discussion looks at the transformative appeal of unified communications, and consider why software development houses are switching to no-code. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Hyperautomation and Bots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The advantages of bots are only multiplying for businesses across the globe. In this 15-page buyer's guide, Computer Weekly looks at how robotic process automation is evolving, the benefits it brings for coders and the ways artificial intelligence can enhance customer service.
Posted: 30 Apr 2021 | Published: 30 Apr 2021

TechTarget ComputerWeekly.com

Resources for iOS developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
Posted: 24 Apr 2013 | Published: 05 Mar 2013

Microsoft

Composable Infrastructure Overview
sponsored by VeriStor
EGUIDE: Composable infrastructure, or disaggregation, undoes traditional resource grouping, enabling you to mix and match resources as needed to meet specific workload demands. Access this e-guide to learn how composable infrastructure, its limitations, and the type of impact it will have on your organization.
Posted: 08 Aug 2017 | Published: 02 Aug 2017

VeriStor

Top Five Reasons to Choose Toad® Over SQL Developer
sponsored by Dell Software
WHITE PAPER: Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Dell Software

Expert Insight into Powershell's Scripting
sponsored by Dell Compellent
EGUIDE: To fully leverage Microsoft PowerShell, you must be aware of all the benefits this new technology offers. This expert e-guide, brought to you by SearchWindowsServer.com provides a deeper understanding of PowerShell and describes various approaches to scripting and Hyper-V management.
Posted: 23 Sep 2011 | Published: 22 Sep 2011

Dell Compellent

Toad for Oracle Tips and Tricks
sponsored by Dell Software
WHITE PAPER: In this comprehensive white paper, you'll learn how Oracle's solution for database development and administration can help you to work and collaborate with accuracy and ease. The resource explores the functionality that Toad can bring to app developers, PL/SQL developers, and database administrators alike.
Posted: 25 Feb 2014 | Published: 08 Jul 2013

Dell Software

Software Agitation:Your Own Personal Code Reviewer
sponsored by Agitar Software
WHITE PAPER: Exercising Java code is a painstaking yet critical process for developers. This white paper explains how you can free up time by implementing a testing tool designed to detect coding errors as you write Java classes, and even after they have been reviewed.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

Agitar Software

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Securing your Private Keys as Best Practice for Code Signing Certificates
sponsored by VeriSign EMEA
WHITE PAPER: This paper examines recent security breaches such as Stuxnet, and offers best practice measures, especially for the Windows platform, that can help to safeguard private keys so that your company doesn't become tools of malicious hackers.
Posted: 29 Jul 2011 | Published: 28 Jul 2011

VeriSign EMEA