The value of security hardened images

by Mike Hagan • No Comments

The value of security hardened images

The what and why of security hardened CentOS images and the value they provide to your systems...

Read More »

How open source is used in e-commerce, PaaS, and HPC machine learning environments

by Kara Howson • No Comments

How open source is used in e-commerce, PaaS, and HPC machine learning environments

A recap of our recent webinar on real-world uses for open source...

Read More »

Raspberry Pi in the enterprise (part 1)

by Andrew Pomponio • No Comments

Raspberry Pi in the enterprise (part 1)

While this little piece of hardware is popular among hobbyists, it actually does have valid enterprise uses that can be paired with a variety of open source software projects...

Read More »

Will big data engulf relational databases?

by Vikas Mehta • 1 Comment

Will big data engulf relational databases?

Relational databases have trouble handling the scale and performance of today's data needs, so let's see if NoSQL or polyglot persistence are the solutions...

Read More »

Is software the differentiator?

by Martin Bakal • No Comments

Is software the differentiator?

Where should the focus be for the IoT, if it's not the "Internet" or "Things"...

Read More »

What you need to know about DROWN

by Andrew Pomponio • No Comments

What you need to know about DROWN

A brief summary of what DROWN is and how you can protect yourself...

Read More »

Static Analysis

Klocwork 2016.2: Analysis improved

July 14, 2016, Walter Capitani - No Comments

Klocwork 2016.2: Analysis improved

An example of how Klocwork 2016.2 improves the performance of our continuous static code analysis engine ...

Software Security

Where the world talks security – RSA 2016 recap

March 15, 2016, Larry Edelstein - No Comments

Where the world talks security – RSA 2016 recap

It seems that everyone attending RSA was looking for ways to mitigate their security vulnerabilities and keep their products, employees, customers,...

Coding Standards

Application security increasingly difficult to achieve

January 2, 2015, Chris Bubinas - No Comments

Application security increasingly difficult to achieve

More effective strategies and tools, such as static code analysis and code refactoring solutions, are absolutely essential if firms are to protect their apps in an increasingly fraught environment...

High Performance Computing

Thoughts on GPUTech 2016

April 29, 2016, Martin Bakal - No Comments

Thoughts on GPUTech 2016

Marty Bakal, dynamic analysis product manager, tells us what he saw at GPUTech 2016 recently...

Open Source

Top issues in the top enterprise packages: ActiveMQ, PostgreSQL, JBoss/Wildfly

July 28, 2016, Kara Howson - No Comments

Top issues in the top enterprise packages: ActiveMQ, PostgreSQL,...

A recap of our recent webinar on top issues seen in ActiveMQ, PostgreSQL, and JBoss/Wildfly...

Software Testing

Defeating testing is ultimately self-defeating

September 23, 2015, Roy Sarkar - No Comments

Defeating testing is ultimately self-defeating

The Volkswagen emissions scandal reminds us of an important question: is independent testing good enough...

Embedded Software

Recap: Embedded World 2016

March 8, 2016, Amanda Boughey - No Comments

Recap: Embedded World 2016

We had a great week exploring and speaking with visitors at Embedded World 2016. Here are a few of our key takeaways from the show...

Analytics & Data Mining

Will big data engulf relational databases?

July 7, 2016, Vikas Mehta - 1 Comment

Will big data engulf relational databases?

Relational databases have trouble handling the scale and performance of today's data needs, so let's see if NoSQL or polyglot persistence are the...

Scroll to top