Archive for August, 2012

  • Hacking an automobile: When software security is life-critical

    on Aug 21, 12 • by Brendan Harrison • with 1 Comment

    Hacking an automobile: When software security is life-critical

    Software security assurance for embedded software is a big challenge. This article on embedded systems and automobile security summarizes it nicely: White hats are increasingly looking beyond PCs and data centres for security vulnerabilities that have plagued the computer industry for decades and focusing on products like cars, medical devices and electricity meters that run on tiny computers embedded in those products. For embedded software teams to become the target of hackers is a big change. While website owners and developers of cloud applications or PC software are used to all this attention from hackers,

    Read More »
  • An enterprise Apache Tomcat clustering guide – part 2

    on Aug 3, 12 • by Andrew Carr • with No Comments

    An enterprise Apache Tomcat clustering guide – part 2

    Part 2 of our series focusing on increasing your system's availability by leveraging Apache tomcat clustering.

    Read More »
Scroll to top