RecruitingBlogscom

Follow Us:

 

code tag

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
When it comes to cybersecurity, you can only defend what you can see. Organizations continue to suffer breaches, oftentimes because they do not have continuous, real-time visibility of all their critical assets. With more data and applications moving to the cloud, IoT and other emerging technologies, the attack surface continues to expand, giving adversaries more blind spots to leverage. Watch a webinar with SANS where we examine how to: Discover, classify and profile assets and network communications Detect threats and decode content in real-time at wire speed Hunt for unknown threats via rich, indexable metadata Alter your terrain and attack surface with deception to slow down attackers By knowing your cyber terrain and increasing the risk of detection and cost to the adversary, you can gain a decisive advantage.
Tags : 
    
Fidelis Cybersecurity
Published By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
    
CheckMarx
Published By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Today’s software and systems engineers are being challenged to balance speed of delivery with improving quality, reducing cost and minimizing risk. Managing changes to code and configurations through development, staging, user acceptance and production environments can be challenging. Having more “production-like” environments that can be controlled and serviced by the development team can add value, eliminate waste and speed delivery. Creating such environments can eliminate risk because more errors can be found well ahead of production deployment when they are less costly to fix. IBM can help you adopt agile methods improve your execution and deliver high-quality software for better business results
Tags : 
    
Group M_IBM Q3'19
Published By: Menlo Security     Published Date: Jun 01, 2018
"Multi-stage attacks are an increasingly popular approach used by cybercriminals. By sending a malicious attachment in a phishing email that contains an embedded URL, with no malevolent code, attackers can evade existing security solutions, like sandboxes and AV. How do you prevent these attacks before they happen? Download this white paper to find out: *How Menlo Security Labs recently isolated a multi-stage document attack *What tools, techniques and procedures ( TTPs ) are attackers using to infect victims’ devices *How Isolation can foil the attack before it can even start "
Tags : 
    
Menlo Security
Published By: Klocwork     Published Date: May 11, 2011
This white paper provides specific recommendations on how organizations can implement a simple, effective code review process that takes advantage of the latest tools and technologies.
Tags : 
klocwork, code review process, software development cycle
    
Klocwork
Published By: Zebra Technologies     Published Date: May 02, 2018
Up to 14% of medical records include inaccurate, potentially dangerous patient data as a direct result of failures in patient identification. Often, errors can be attributed to outdated manual processes, such as oral verification or written wristbands, which can impact the standard of care delivered. In this white paper Zebra Technologies outlines the benefits of an automated barcode wristband solution, including insight into: Reducing common Patient ID errors The advantages of automated Patient ID processes over manual The best automated barcoding options
Tags : 
patient, identification, streamline, hospital, processes, optimization, zebra
    
Zebra Technologies
Published By: Riverbed     Published Date: Nov 02, 2016
"Performance issues today are compounded by increasingly complex infrastructures that IT teams must contend with when delivering applications. As a result detecting and fixing performance problems is hard. Sluggish end-user transactions may present themselves as being slow due to the code. However, that slowness is often not the root cause, but rather a symptom of an underlying infrastructural issue hidden from view. Examine common, yet elusive application performance problems that reveal themselves only when you look at them from the right vantage point. Get the field guide today!"
Tags : 
    
Riverbed
Published By: IBM     Published Date: Oct 09, 2009
"Recently, Open Source Software has been gaining in popularity due to the ability it provides users to view and modify source code. Another attraction is the perceived cost savings. Read the white paper that takes a look at the truth about those savings. Initially, deployment environments like JBoss have an advantage-zero initial software acquisition costs. However, the white paper will show how, over time, IBM WebSphere Application Server (WAS) and IBM WebSphere Application Server Network Deployment (WAS ND) win the TCO battle. Learn more."
Tags : 
open source, ibm, tco, total cost ownership, roi, return on investment, application development, jboss, was nd, websphere
    
IBM
Published By: Tealium     Published Date: Dec 15, 2011
Tags slow down web sites. Tag management systems provide a solution using a number of methodologies ranging from asynchronous tagging, conditional loading and tag killing to improve site performance.
Tags : 
tag management, tag management system, universal tag, container tag, pixel management, site performance, web analytics, web analytics implementation, marketing attribution, integrated marketing, digital marketing, page tag, site tag, site speed, tagging, page code, tracking code, omniture, google analytics, webtrends
    
Tealium
Published By: Tealium     Published Date: Dec 15, 2011
In the market for tag management systems? The "Buyer's Guide to Tag Management Systems" reveals the challenges associated with tagging, benefits provided by tag management systems, and features to consider when looking for such solutions.
Tags : 
tag management, tag management system, universal tag, container tag, pixel management, site performance, web analytics, web analytics implementation, marketing attribution, integrated marketing, digital marketing, page tag, site tag, site speed, tagging, page code, tracking code, omniture, google analytics, webtrends
    
Tealium
Published By: Domino     Published Date: Jan 24, 2018
For manufacturers of baked goods and snacks, the need for flexible, high-quality coding and marking solutions has never been greater. The wide array of packaging types and materials already in use today — combined with the SKU proliferation driven by consumer demands — means manufacturers have to print expiration codes and lot numbers on multiple substrates in multiple areas/orientations on their packaging lines. These codes need to be clear, precise and readable by both humans and machines to ensure customer safety and satisfaction. They must also provide traceability in the event of a recall. This white paper from Domino looks at the types of printing technology available today and discusses their various advantages and disadvantages in bakery line applications.
Tags : 
    
Domino
Published By: Symantec     Published Date: Dec 28, 2015
Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Tags : 
code signing, wireless networks, transferring code, content distribution, security
    
Symantec
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag, web logs, log files, server logs, server log files, log-file analysis, web metrics, on demand reporting, real time data, real-time reporting, data collection, statistics analysis, business metrics
    
VisiStat
Published By: Distributive Management     Published Date: Nov 09, 2010
Peer reviews, or inspections of software source code, can significantly raise the quality of a software product by removing defects at an early stage.
Tags : 
software quality, peer review, datadrill, code collaborator
    
Distributive Management
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top