Support vector machines in JMSL (part 1)

by Ed Stewart • No Comments

Support vector machines in JMSL (part 1)

Walk through some examples of SVM in JMSL with a focus on classification, starting with the textbook examples part of most SVM resources...

Read More »

Why isn’t the future of Star Trek beyond today?

by Roy Sarkar • No Comments

Why isn’t the future of Star Trek beyond today?

Star Trek has taught us a lot of things but when it comes to application security, what can we teach the universe of Star Trek Beyond...

Read More »

The HPC industry is going through some major shifts

by Martin Bakal • No Comments

The HPC industry is going through some major shifts

A look at the convergence between HPC and big data...

Read More »

The value of security hardened images

by Mike Hagan • No Comments

The value of security hardened images

The what and why of security hardened CentOS images and the value they provide to your systems...

Read More »

How open source is used in e-commerce, PaaS, and HPC machine learning environments

by Kara Howson • No Comments

How open source is used in e-commerce, PaaS, and HPC machine learning environments

A recap of our recent webinar on real-world uses for open source...

Read More »

Raspberry Pi in the enterprise (part 1)

by Andrew Pomponio • No Comments

Raspberry Pi in the enterprise (part 1)

While this little piece of hardware is popular among hobbyists, it actually does have valid enterprise uses that can be paired with a variety of open source software projects...

Read More »

Static Analysis

Why isn’t the future of Star Trek beyond today?

August 9, 2016, Roy Sarkar - No Comments

Why isn’t the future of Star Trek beyond today?

Star Trek has taught us a lot of things but when it comes to application security, what can we teach the universe of Star Trek Beyond...

Software Security

Where the world talks security – RSA 2016 recap

March 15, 2016, Larry Edelstein - No Comments

Where the world talks security – RSA 2016 recap

It seems that everyone attending RSA was looking for ways to mitigate their security vulnerabilities and keep their products, employees, customers,...

Coding Standards

Application security increasingly difficult to achieve

January 2, 2015, Chris Bubinas - No Comments

Application security increasingly difficult to achieve

More effective strategies and tools, such as static code analysis and code refactoring solutions, are absolutely essential if firms are to protect their apps in an increasingly fraught environment...

Open Source

Meet the OSS experts – Mike

August 16, 2016, Amanda Boughey - No Comments

Meet the OSS experts – Mike

Interested in knowing who's on the other end of the line when you call our support? Meet our OSS experts...

Software Testing

Defeating testing is ultimately self-defeating

September 23, 2015, Roy Sarkar - No Comments

Defeating testing is ultimately self-defeating

The Volkswagen emissions scandal reminds us of an important question: is independent testing good enough...

Embedded Software

Recap: Embedded World 2016

March 8, 2016, Amanda Boughey - No Comments

Recap: Embedded World 2016

We had a great week exploring and speaking with visitors at Embedded World 2016. Here are a few of our key takeaways from the show...

Analytics & Data Mining

Support vector machines in JMSL (part 1)

August 25, 2016, Ed Stewart - No Comments

Support vector machines in JMSL (part 1)

Walk through some examples of SVM in JMSL with a focus on classification, starting with the textbook examples part of most SVM resources...

Scroll to top