Checklist

by Alan McKellar • No Comments on Software security vs. safety: A simple question?

Software security vs. safety: A simple question?

Dispel the historical confusion around software security and safety by taking a look at the modern usage of the terms and practices...

Read More »

Klocwork 2017

by Walter Capitani • No Comments on Klocwork 2017.2: Eliminating the software quality gap

Klocwork 2017.2: Eliminating the software quality gap

Klocwork 2017.2 introduces the Quality Standard, a built-in set of rules designed for fast and easy verification of code quality...

Read More »

stateofsecurity

by Alan McKellar • No Comments on How to promote security for customers and developers

How to promote security for customers and developers

You need to build security into your products from the start, not test for security after development. ...

Read More »

not peyta featured image

by Andrew Pomponio • No Comments on NotPetya and what to do about it

NotPetya and what to do about it

A ransomware virus affecting huge amounts of users over in Europe, specifically in Russia and the Ukraine, and how to fix it...

Read More »

Malware

by Andrew Pomponio • No Comments on Malware roundup: WannaCry, DoublePulsar, and EternalRocks

Malware roundup: WannaCry, DoublePulsar, and EternalRocks

The world of software security vulnerabilities provides endless news topics to cover and this past week is no different than any other...

Read More »

Embedded Software

No CI, please, we’re embedded!

November 8, 2016, Steve Howard - No Comments on No CI, please, we’re embedded!

No CI, please, we’re embedded!

Is true continuous integration (CI) steadily making its way into embedded software development? ...

Analytics & Data Mining

Data mining's impact continues to expand

October 6, 2016, Ed Stewart - No Comments on An update to BCPOL

An update to BCPOL

An example of using the BCPOL function, an implementation of a direct search complex algorithm, and how to fine tune it...

Scroll to top