Open source and medical devices

by Andrew Pomponio • No Comments on How pacemaker vulnerabilities raise the stakes for ransomware

How pacemaker vulnerabilities raise the stakes for ransomware

It's critical that technology designed for medical devices takes into account the ultimate security vulnerability...life...

Read More »

come-in-were-open-sign

by Roy Sarkar • No Comments on What does enterprise open source support mean?

What does enterprise open source support mean?

Open source can be supported just as effectively as commercial software in the enterprise—here's how we do it...

Read More »

The_Linux_Foundation

by Mike Hagan • No Comments on Linux Foundation courses offered by open source experts

Linux Foundation courses offered by open source experts

Linux Foundation certifications give you a way to differentiate yourself in a job market. We’ve partnered with them to offer courses to help prepare you...

Read More »

Checklist

by Alan McKellar • No Comments on Software security vs. safety: A simple question?

Software security vs. safety: A simple question?

Dispel the historical confusion around software security and safety by taking a look at the modern usage of the terms and practices...

Read More »

Embedded Software

No CI, please, we’re embedded!

November 8, 2016, Steve Howard - No Comments on No CI, please, we’re embedded!

No CI, please, we’re embedded!

Is true continuous integration (CI) steadily making its way into embedded software development? ...

Analytics & Data Mining

Data mining's impact continues to expand

October 6, 2016, Ed Stewart - No Comments on An update to BCPOL

An update to BCPOL

An example of using the BCPOL function, an implementation of a direct search complex algorithm, and how to fine tune it...

Scroll to top