Embedded CodesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Embedded Codes returned the following results.
RSS What is RSS?
Related Categories

 •   Embedded Application Development
 •   Application Lifecycle Management(ALM)
 •   Source Code Control
 •   Text and Code Editing
 •   Rapid Application Development (RAD)
 •   Application Management and Maintenance
 •   Application Security
 •   Testing and Analysis
 •   Application Integration
 •   Open Source

Related Searches
 •   Distributions Embedded Codes
 •   Embedded Charts
 •   Embedded Codes Contracts
 •   Embedded Codes Developments
 •   Embedded Codes Document
 •   Embedded Codes Manual
 •   Embedded Codes Report
 •   Embedded Codes White Papers
 •   Embedded Definitions
 •   Us Embedded Codes
Advertisement

ALL RESULTS
1 - 25 of 449 | Next Page

Countdown: Top 5 next-generation messaging attacks that antivirus can't catch by Symantec Hosted Services

April 17, 2007 - (Free Research)
Malicious messaging attacks; such as embedded code in Web pages, worms in downloads, PDFs and GIF images and more; are wreaking havoc on enterprise IT system. How do these attacks work and what can you do? 
(PODCAST) READ ABSTRACT |

Embedded Open Source Analysis by Klocwork

April 2008 - (Free Research)
This white paper explores the results from an analysis of multiple open source projects that are commonly used in embedded development. 
(WHITE PAPER) READ ABSTRACT |

Securing Embedded Software with Threat Modeling by Klocwork

September 2011 - (Free Research)
This presentation transcript explains threat modeling for embedded software and how it can be used as part of a strategy for creating more secure embedded software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI by IBM

September 2011 - (Free Research)
Read this expert Tip Guide for workable, profitable embedded software development best practices. 
(EGUIDE) READ ABSTRACT |

Five Steps to Secure Outsourced Application Development by Veracode, Inc.

May 2010 - (Free Research)
Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development. 
(WHITE PAPER) READ ABSTRACT |

Minimizing Code Defects to Improve Software Quality and Lower Development Costs by IBM

March 2009 - (Free Research)
This paper talks about why it's important to take a proactive approach to improving overall code quality using static and dynamic analysis. It then shows how IBM Rational Software Analyzer and IBM Rational PurifyPlus software can be used together to reduce the number of defects in your company's code. 
(WHITE PAPER) READ ABSTRACT |

A Computer Weekly buyer's guide to testing and code quality by ComputerWeekly.com

May 2014 - (Free Research)
Find out why agile software development is outstripping traditional testing practices, how to keep code in good shape during agile development and how to optimise the performance and security of web-based business applications in this 12 page guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Software Agitation:Your Own Personal Code Reviewer by Agitar Software

April 2012 - (Free Research)
<p>Exercising Java code is a painstaking yet critical process for developers. This white paper explains how you can free up time by implementing a testing tool designed to detect coding errors as you write Java classes, and even after they have been reviewed.</p> 
(WHITE PAPER) READ ABSTRACT |

ALM and Agile Strategies E-Zine Issue 1 by CA Technologies.

February 2012 - (Free Research)
Using modern-day Agile techniques such as automation and cloud hosting solutions, today’s IT leaders have opportunities to reap better returns on their ALM investments. In this issue, experts will share source code control system automation strategies, hosting options for code repositories and trends in requirements management tools. 
(EZINE) READ ABSTRACT |

Forrester Report: Development Testing: A New Era In Software by Coverity

November 2011 - (Free Research)
In August 2011, Forrester Consulting surveyed over 200 leading IT firms in North America and Europe to answer the question, “What are the implications of expanding testing in development, and what does it mean to development quality?”. Read this report to see the results. 
(WHITE PAPER) READ ABSTRACT |

Software Integrity for Agile Environments by Coverity

January 2011 - (Free Research)
While Agile development is designed to increase efficiency, it can also introduce risk as testing cycles get condensed and serious bugs can get overlooked. In this whitepaper, learn how Coverity can help you assure the quality, security and safety of your code in Agile or hybrid development environments. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Testing Embedded Systems: Do You Have the GuTs for It? by IBM Software Group

March 2008 - (Free Research)
This article is a general introduction to the testing of embedded systems, and will be followed over the course of the year by more articles focusing on some of the topics discussed. 
(WHITE PAPER) READ ABSTRACT |

SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI by IBM India Pvt. Ltd

September 2011 - (Free Research)
Read this Tip Guide to discover workable, profitable best practices for embedded software development. 
(EGUIDE) READ ABSTRACT |

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert by Symantec Corporation

February 2013 - (Free Research)
This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now. 
(EGUIDE) READ ABSTRACT |

Get the Coverity Scan 2010 Open Source Integrity Report featuring the Android Integrity Report by Coverity

January 2011 - (Free Research)
The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others. Read on to learn more about these results. 
(WHITE PAPER) READ ABSTRACT |

Tools to unit test your JavaScript by IBM

April 2012 - (Free Research)
While unit testing your JavaScript can be challenging, developers agree that it is becoming an increasingly important task. This white paper reviews three popular tools that you can leverage to ease the testing process and mitigate common challenges. 
(WHITE PAPER) READ ABSTRACT |

Open Source at Intel: Building with the Ecosystem by Intel

March 2010 - (Free Research)
To enable a broad spectrum of software environments and programs to run best on Intel processors and platforms, Intel offers deep technical expertise, makes significant contributions, and actively participates in standards bodies. Read on to learn more. 
(WHITE PAPER)

2010 Threat Report by Websense, Inc.

January 2011 - (Free Research)
Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats. 
(WHITE PAPER) READ ABSTRACT |

Handling handoffs the Agile development way by IBM

November 2011 - (Free Research)
Many organizations would like to become more agile, but sometimes it is hard to see the way forward. There is an excellent approach to becoming more agile that any organization can implement: improve the speed and efficiency of the handoffs within the organization's existing development processes. Read this expert tip guide to learn more. 
(EGUIDE) READ ABSTRACT |

JReport 9 by Jinfonet Software

June 2009 - (Free Research)
Enterprises rely on timely, accurate information to manage business operations, identify risk, improve productivity, and increase profitability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Updating Rules for COBOL Generated Code to Use CICS Channels and Containers by IBM

December 2010 - (Free Research)
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM Redpaper™ publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Technical Guide on Application Security: Secure Development by IBM

December 2010 - (Free Research)
When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization. 
(EBOOK)

Gaming Health Meter with CSS3 by Intel

December 2011 - (Free Research)
This article describes how game developers can use the power of CSS3 to design common game indicators, such as health, magic, ammo, money, etc. 
(TECHNICAL ARTICLE)

Getting Started: Learn to build Windows Store apps by Microsoft

April 2013 - (Free Research)
In this guide, discover all the fundamentals you need to get your first Windows app off the ground. Read on to explore everything from planning, selling, and packaging apps, to coding in XAML to HTML5 to C++, to concepts and architectures. 
(RESOURCE CENTER) READ ABSTRACT |

Unleash the business opportunity of modern apps – 9 business challenges and modern app scenarios by Intel

December 2012 - (Free Research)
Access this paper today to learn about the four of the biggest trends influencing modern apps and find nine business scenarios that cover three important aspects of modern apps. Also inside, discover your own business opportunities using modern apps. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 449 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts