Study shows open-source code quality steadily improving
IDG News Service - The overall number of defects in open-source software projects is dropping, according to a new study by San Francisco-based vendor Coverity Inc.
Coverity, a maker of tools for analyzing programming code, received a contract in 2006 from the U.S. Department of Homeland Security to help boost the quality of open-source software, which is increasingly being used by government agencies for critical applications.
The vendor set up a Web site where open-source developers can submit code to be analyzed. A project is ranked on a scale of "rungs," based on how many defects have been resolved.
"Defect density" has dropped 16% over the past three years among the projects scanned through the site, and 11,200 defects have been eliminated, according to Coverity's latest report.
Four projects have been awarded the top-level Rung 3 status for resolving defects discovered in the previous stages: Samba, Tor, OpenPAM and Ruby.
Coverity's Scan site so far has analyzed more than 60 million unique lines of code from 280 projects.
The company's scanning service uses static analysis, which checks code for security or performance problems without having to run an application. "Static analysis [tools] won't tell you that your business process is working correctly ... but they will tell you that the code itself is technically solid and follows the kind of programming best practices you'd expect to see from code that has gone through a proper code review," said Forrester Research Inc. analyst Jeffrey Hammond, via e-mail.
He said the tools are most helpful for finding structural problems, such as memory leaks and buffer overflows, caused by poor programming practices, as well as more exotic conditions like errors caused by parallel execution of code in a multicore CPU environment.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts