Is software the differentiator?

by Martin Bakal • No Comments

Is software the differentiator?

Where should the focus be for the IoT, if it's not the "Internet" or "Things"...

Read More »

What you need to know about DROWN

by Andrew Pomponio • No Comments

What you need to know about DROWN

A brief summary of what DROWN is and how you can protect yourself...

Read More »

Growth of the HPC industry

by Martin Bakal • No Comments

Growth of the HPC industry

From ScicomP last month, to HP-CAST, ISC, and Forum Ter@tec this month - HPC is everywhere. The growth and innovation we see around HPC is very exciting...

Read More »

How to extend ISC DHCP to serve over 14.1 million IPs

by Rich Alloway • No Comments

How to extend ISC DHCP to serve over 14.1 million IPs

There are very few scenarios that would require a DHCP server to offer over 14.1 million IPs, but if you happen to encounter one, we can help...

Read More »

Secure as ever – PV-WAVE 12.0 released

by Don Boughey • No Comments

Secure as ever – PV-WAVE 12.0 released

What do you do when a severe security vulnerability announcement is made – regarding the code you’ve embedded in your product – days before your scheduled product release? Read on to see what we did...

Read More »

Is Agile dead?

by Ted Smith • No Comments

Is Agile dead?

A detailed refutation of any thoughts that Agile is dead, from Ted Smith, VP engineering. It may actually be growing...

Read More »

Static Analysis

Tools, tools, and more tools – Klocwork 2016.1 released

May 25, 2016, Walter Capitani - No Comments

Tools, tools, and more tools – Klocwork 2016.1 released

Why use two tools when one will do? The latest release of Klocwork provides the answer...

Software Security

Where the world talks security – RSA 2016 recap

March 15, 2016, Larry Edelstein - No Comments

Where the world talks security – RSA 2016 recap

It seems that everyone attending RSA was looking for ways to mitigate their security vulnerabilities and keep their products, employees, customers,...

Coding Standards

Application security increasingly difficult to achieve

January 2, 2015, Chris Bubinas - No Comments

Application security increasingly difficult to achieve

More effective strategies and tools, such as static code analysis and code refactoring solutions, are absolutely essential if firms are to protect their apps in an increasingly fraught environment...

High Performance Computing

Thoughts on GPUTech 2016

April 29, 2016, Martin Bakal - No Comments

Thoughts on GPUTech 2016

Marty Bakal, dynamic analysis product manager, tells us what he saw at GPUTech 2016 recently...

Open Source

Meet the OSS experts – Andrew C.

June 23, 2016, Amanda Boughey - No Comments

Meet the OSS experts – Andrew C.

Interested in knowing who's on the other end of the line when you call our support? Meet our OSS experts... ...

Software Testing

Defeating testing is ultimately self-defeating

September 23, 2015, Roy Sarkar - No Comments

Defeating testing is ultimately self-defeating

The Volkswagen emissions scandal reminds us of an important question: is independent testing good enough...

Embedded Software

Recap: Embedded World 2016

March 8, 2016, Amanda Boughey - No Comments

Recap: Embedded World 2016

We had a great week exploring and speaking with visitors at Embedded World 2016. Here are a few of our key takeaways from the show...

Analytics & Data Mining

Calling Java from Scala is as easy as it seems (part 2)

May 31, 2016, Ed Stewart - No Comments

Calling Java from Scala is as easy as it...

In part 2, we look at how user-defined functions are used to create solutions to unique problems and how the charting functionality in JMSL lets you...

Scroll to top