Adobe Flex developers – have you tried Elixir Enterprise?

by Claude Martin • No Comments

Adobe Flex developers – have you tried Elixir Enterprise?

Use the collection of interactive components in Elixir Enterprise 2016 to understand information quickly, react faster, and make better decisions...

Read More »

Using parallelization to reduce test times

by Scott Mills • No Comments

Using parallelization to reduce test times

Learn how the Klocwork test and verification team sped up testing using the winning project from their last Hackathon...

Read More »

Python coding tips #1: with statements

by Trevor Reid • No Comments

Python coding tips #1: with statements

A cool thing that is a bit underused in Python applications base is the usage of the with statement...

Read More »

Open source support: The facts behind the myth

by Rod Cope • No Comments

Open source support: The facts behind the myth

When your open source doesn't work, you don't either. Read this blog to learn the facts you'll need to start using OSS support within your organization...

Read More »

Java deserialization vulnerability — Could you be at risk?

by Andrew Pomponio • No Comments

Java deserialization vulnerability — Could you be at risk?

An explanation and mitigation strategy for the Java deserialization vulnerability...

Read More »

Your top 10 topics in 2015

by Roy Sarkar • No Comments

Your top 10 topics in 2015

From software cybersecurity to open source support to Hadoop, find out what people were talking about and reading this year...

Read More »

Static Analysis

Hackathon 2: Time lapse analysis of Unreal Engine 4

November 5, 2015, Michail Greshishchev - 2 Comments

Hackathon 2: Time lapse analysis of Unreal Engine 4

A Klocwork developer is inspired to run an analysis of the popular Unreal Engine 4 game engine. Here's the entire story, from install to analysis to...

Software Security

Java deserialization vulnerability — Could you be at risk?

January 5, 2016, Andrew Pomponio - No Comments

Java deserialization vulnerability — Could you be at risk?

An explanation and mitigation strategy for the Java deserialization vulnerability...

Coding Standards

Application security increasingly difficult to achieve

January 2, 2015, Chris Bubinas - No Comments

Application security increasingly difficult to achieve

More effective strategies and tools, such as static code analysis and code refactoring solutions, are absolutely essential if firms are to protect their apps in an increasingly fraught environment...

High Performance Computing

Supercomputing 2015: Where the HPC community meets

November 30, 2015, Martin Bakal - No Comments

Supercomputing 2015: Where the HPC community meets

Not only was this a big year for the Supercomputing community but also it was the launching pad for our newest product CodeDynamics and a fresh...

Open Source

Open source support: The facts behind the myth

January 12, 2016, Rod Cope - No Comments

Open source support: The facts behind the myth

When your open source doesn't work, you don't either. Read this blog to learn the facts you'll need to start using OSS support within your...

Software Testing

Defeating testing is ultimately self-defeating

September 23, 2015, Roy Sarkar - No Comments

Defeating testing is ultimately self-defeating

The Volkswagen emissions scandal reminds us of an important question: is independent testing good enough...

Embedded Software

Embedded World recap – the scope of things

March 17, 2015, Roy Sarkar - No Comments

Embedded World recap – the scope of things

This year's Embedded World 2015 presented significant trends for software development and a few surprising observations. Find out what happened and...

Analytics & Data Mining

Beyond the tools of the data scientist

November 12, 2015, Jennifer Locke - No Comments

Beyond the tools of the data scientist

We all have a favorite tool to use, so how does your tool help you face the prototype to production challenge...

Scroll to top