Klocwork product documentation is available here.
The value of peer code review is undeniable. But despite this, it continues to be a much-maligned milestone in the software development cycle. Code reviews are difficult to implement consistently, the review is often ... More
As a manufacturer of medical electronics, meeting the FDA's rigorous safety and quality standards is crucial to Stockert. With the safety of their devices depending significantly on the quality of software they ... More
Developing software for mission-critical applications such as military, aerospace, and medical devices requires aggressive strategies for reducing risk throughout the development lifecycle. This brief webinar looks at three crucial components of an effective risk management strategy that can be achieved with source code analysis, including stabilizing code early in development, automating metrics and measurement, and creating a disciplined approach to producing maintainable code.
A good vulnerability management program includes tools, manual techniques, a security defect classification system and, most importantly, the knowledge to remediate vulnerabilities quickly and accurately. Watch this on-demand webinar to learn how to effectively combine these components and build more secure software with each release. Watch the On-Demand Webinar
Dave West, Senior Analyst, Forrester Research, Inc., reviews the findings of a recent code review study and discusses why it’s time for software development organizations to exploit modern technology to improve the code review process. Learn about the key challenges of code review and recommendations on ways to improve the process right from the analyst himself.
In this on-demand webinar hosted by Klocwork, learn where source code analysis can be used in your development process, the problems that it solves, and how the technology can be used to streamline a number of productivity bottlenecks in your development process.
Peer code reviews are a vital step in the software development cycle but everyone knows the challenges involved. Learn how a tools-based approach to peer code reviews can unleash the benefits of this important development milestone by incorporating social media concepts, enabling collaboration and communication amongst reviewers, and combining static analysis with code reviews.
During this web seminar you will see how easy it is to exploit security vulnerabilities caused by common software defects. Watch how a simple hack on an older version of FireFox enables a hacker to gain full access to a remote machine. More importantly, see how this same vulnerability could have been prevented through the use of static analysis.
We're setting a new standard for static analysis tools with the launch of Klocwork Insight 9.5. This new release offers on-the-fly static analysis that instantly underlines defects as code is written; drag and drop reporting that answers complex questions about the security and reliability of your code; and on-the-fly impact analysis that checks if a reported issue exists in other code bases, branches or builds.
The complexity of porting or developing for multicore or multiprocessor architectures can lead to increased project expenses and timelines. In this ready-to-watch webinar, learn about Klocwork's tools-oriented approach to overcoming these challenges which equips developers with a personal mentor to detail critical concurrency and endian incompatibility issues as they're introduced.
In an Agile context where software production is performed in short, feature-driven iterations, it's critical that bugs are found and removed from code as early as possible. In this session, we examine the evolution of source code analysis technology and discuss why and how it should be deployed for maximum benefit within an Agile development process.
Automating key steps in the development lifecycle - including defect detection, builds and deployments - offers important productivity benefits for development organizations. The ability to immediately assess the impact of changes, generate continuous feedback on product stability, and reduce the effort associated with fixing issues found late in the cycle allows development teams to focus on creating higher quality products in less time. Learn more in this webinar hosted by Klocwork and Urbancode.
To ensure your embedded software is secure, you must start by understanding the threats that can make it susceptible to attack and then establish appropriate counter measures. Designed for embedded software engineers and security specialists, this webinar identifies the characteristics of embedded software that make it vulnerable to security threats, discusses the importance of threat modeling, and provides specific mitigation activities all embedded teams should employ.