“We’re all using the same material” – lessons from the Automotive Cyber Security Summit

by Jeff Hildreth • No Comments

“We’re all using the same material” – lessons from the Automotive Cyber Security...

Jeff Hildreth attended the Automotive Cybersecurity Summit in Detroit last week and realized that we're all banging the same drum for no reason. Here's what happened...

Read More »

Application importance continues to rise, while security remains a problem

by Chris Bubinas • No Comments

Application importance continues to rise, while security remains a problem

Application development will become more prevalent and more important as 2015 wears on, making security a critical focus for countless companies...

Read More »

When a good algorithm fails, do you trust it?

by Wendy Hou • No Comments

When a good algorithm fails, do you trust it?

Algorithm aversion affects us all. Learn why this phenomenon occurs and how overcoming it can lead to faster and better decision-making...

Read More »

Embedded World recap – the scope of things

by Roy Sarkar • No Comments

Embedded World recap – the scope of things

This year's Embedded World 2015 presented significant trends for software development and a few surprising observations. Find out what happened and what we learned...

Read More »

Teenager hacks car with homemade equipment

by Chris Bubinas • No Comments

Teenager hacks car with homemade equipment

A teenager managed to shock the experts by successfully hacking a vehicle using only a handful of homemade equipment...

Read More »

BMW security flaw shows automotive hacking is real

by Jessica Jaclin • No Comments

BMW security flaw shows automotive hacking is real

BMW was forced to address a security flaw that left millions of its cars vulnerable to hackers. How can static code analysis help...

Read More »

Static Analysis

Teenager hacks car with homemade equipment

March 2, 2015, Chris Bubinas - No Comments

Teenager hacks car with homemade equipment

A teenager managed to shock the experts by successfully hacking a vehicle using only a handful of homemade equipment...

Software Security

“We’re all using the same material” – lessons from the Automotive Cyber Security Summit

April 10, 2015, Jeff Hildreth - No Comments

“We’re all using the same material” – lessons from...

Jeff Hildreth attended the Automotive Cybersecurity Summit in Detroit last week and realized that we're all banging the same drum for no reason....

Coding Standards

Application security increasingly difficult to achieve

January 2, 2015, Chris Bubinas - No Comments

Application security increasingly difficult to achieve

More effective strategies and tools, such as static code analysis and code refactoring solutions, are absolutely essential if firms are to protect their apps in an increasingly fraught environment...

High Performance Computing

HPC’s value grows, but the right approach is key

January 28, 2015, Chris Bubinas - No Comments

HPC’s value grows, but the right approach is key

HPC has expanded into new markets, but best practices are essential for companies eager to utilize these resources. ...

Open Source

Two sides of the same coin: open source security

February 23, 2015, Rod Cope - No Comments

Two sides of the same coin: open source security

More organizations are opening up their code to developer communities but they also need to consider how they pursue open source solutions internally...

Embedded Software

Embedded World recap – the scope of things

March 17, 2015, Roy Sarkar - No Comments

Embedded World recap – the scope of things

This year's Embedded World 2015 presented significant trends for software development and a few surprising observations. Find out what happened and...

Analytics & Data Mining

When a good algorithm fails, do you trust it?

March 23, 2015, Wendy Hou - No Comments

When a good algorithm fails, do you trust it?

Algorithm aversion affects us all. Learn why this phenomenon occurs and how overcoming it can lead to faster and better decision-making...

Scroll to top