Ransomware vulnerabilities – is your data secure?

by Andrew Pomponio • No Comments

Ransomware vulnerabilities – is your data secure?

Only a few weeks into January and already 2 massive vulnerabilities have been published. As the old saying goes, crime doesn’t take a day off...

Read More »

Rogue Wave releases Amazon Web Services CentOS 7.3 image

by Rich Alloway • No Comments

Rogue Wave releases Amazon Web Services CentOS 7.3 image

We recently published our support-included AWS image for CentOS 7.3 to the AWS Marketplace...

Read More »

Open source management in embedded software

by Rod Cope • No Comments

Open source management in embedded software

As we begin 2017, I took a moment to reflect on the key legal and practical concerns with using open source software and what organizations should watch for...

Read More »

Your top 10 for 2016

by Kara Howson • No Comments

Your top 10 for 2016

Here are your top ten articles blog articles from 2016, we hope you’ll come back and join the conversation in ...

Read More »

Rogue Wave Software + Akana: Strengthening the business of APIs

by Ian McLeod • No Comments

Rogue Wave Software + Akana: Strengthening the business of APIs

What the Rogue Wave Software acquisition of Akana means to customers and examples of how the combination fits into enterprise software development...

Read More »

ActiveMQ: Connection pooling with c3p0 and JDBC persistence

by Justin Reock • 2 Comments

ActiveMQ: Connection pooling with c3p0 and JDBC persistence

Walking through the steps necessary to create c3p0 connection pooling with a JDBC persistence store to achieve better performance...

Read More »

Static Analysis

One small step for Klocwork, one giant [productivity] leap for developers

November 15, 2016, Roy Sarkar - No Comments

One small step for Klocwork, one giant [productivity] leap...

How full MISRA documentation helps save compliance time when performing static code analysis...

Software Security

Where the world talks security – RSA 2016 recap

March 15, 2016, Larry Edelstein - No Comments

Where the world talks security – RSA 2016 recap

It seems that everyone attending RSA was looking for ways to mitigate their security vulnerabilities and keep their products, employees, customers,...

High Performance Computing

SC16: How we’re staying ahead of HPC trends

December 15, 2016, Martin Bakal - No Comments

SC16: How we’re staying ahead of HPC trends

Kids these days are learning that the future is all about code, understanding big data, and how to leverage that. Read how Rogue Wave is staying...

Open Source

Ransomware vulnerabilities – is your data secure?

January 18, 2017, Andrew Pomponio - No Comments

Ransomware vulnerabilities – is your data secure?

Only a few weeks into January and already 2 massive vulnerabilities have been published. As the old saying goes, crime doesn’t take a day off...

Software Testing

Defeating testing is ultimately self-defeating

September 23, 2015, Roy Sarkar - No Comments

Defeating testing is ultimately self-defeating

The Volkswagen emissions scandal reminds us of an important question: is independent testing good enough...

Embedded Software

No CI, please, we’re embedded!

November 8, 2016, Steve Howard - No Comments

No CI, please, we’re embedded!

Is true continuous integration (CI) steadily making its way into embedded software development? ...

Analytics & Data Mining

An update to BCPOL

October 6, 2016, Ed Stewart - No Comments

An update to BCPOL

An example of using the BCPOL function, an implementation of a direct search complex algorithm, and how to fine tune it...

Scroll to top