When a good algorithm fails, do you trust it?

by Wendy Hou • No Comments

When a good algorithm fails, do you trust it?

Algorithm aversion affects us all. Learn why this phenomenon occurs and how overcoming it can lead to faster and better decision-making...

Read More »

Embedded World recap – the scope of things

by Roy Sarkar • No Comments

Embedded World recap – the scope of things

This year's Embedded World 2015 presented significant trends for software development and a few surprising observations. Find out what happened and what we learned...

Read More »

Teenager hacks car with homemade equipment

by Chris Bubinas • No Comments

Teenager hacks car with homemade equipment

A teenager managed to shock the experts by successfully hacking a vehicle using only a handful of homemade equipment...

Read More »

BMW security flaw shows automotive hacking is real

by Jessica Jaclin • No Comments

BMW security flaw shows automotive hacking is real

BMW was forced to address a security flaw that left millions of its cars vulnerable to hackers. How can static code analysis help...

Read More »

GHOST busting

by Rod Cope • No Comments

GHOST busting

How proactive open source notifications keep you up-to-date and secure with timely information about the latest releases and security patches, such as the GHOST vulnerability...

Read More »

CES highlights the growing danger of automotive hacking

by Jessica Jaclin • No Comments

CES highlights the growing danger of automotive hacking

At the recent Consumer Electronics Show in Las Vegas, automotive manufacturers focused a lot of attention on the new, improved computers they will be installing in their cars in the coming years. This will make upcoming models far more...

Read More »

Static Analysis

Teenager hacks car with homemade equipment

March 2, 2015, Chris Bubinas - No Comments

Teenager hacks car with homemade equipment

A teenager managed to shock the experts by successfully hacking a vehicle using only a handful of homemade equipment...

Software Security

Embedded World recap – the scope of things

March 17, 2015, Roy Sarkar - No Comments

Embedded World recap – the scope of things

This year's Embedded World 2015 presented significant trends for software development and a few surprising observations. Find out what happened and...

Coding Standards

Application security increasingly difficult to achieve

January 2, 2015, Chris Bubinas - No Comments

Application security increasingly difficult to achieve

More effective strategies and tools, such as static code analysis and code refactoring solutions, are absolutely essential if firms are to protect their apps in an increasingly fraught environment...

High Performance Computing

HPC’s value grows, but the right approach is key

January 28, 2015, Chris Bubinas - No Comments

HPC’s value grows, but the right approach is key

HPC has expanded into new markets, but best practices are essential for companies eager to utilize these resources. ...

Open Source

Two sides of the same coin: open source security

February 23, 2015, Rod Cope - No Comments

Two sides of the same coin: open source security

More organizations are opening up their code to developer communities but they also need to consider how they pursue open source solutions internally...

Embedded Software

Embedded World recap – the scope of things

March 17, 2015, Roy Sarkar - No Comments

Embedded World recap – the scope of things

This year's Embedded World 2015 presented significant trends for software development and a few surprising observations. Find out what happened and...

Analytics & Data Mining

When a good algorithm fails, do you trust it?

March 23, 2015, Wendy Hou - No Comments

When a good algorithm fails, do you trust it?

Algorithm aversion affects us all. Learn why this phenomenon occurs and how overcoming it can lead to faster and better decision-making...

Scroll to top