Top White Papers

Software security begins with flaw-free, standards-compliant code

Research shows that improving code security starts with developers.

Continue Reading Here

Security in practice: Creating bulletproof software

The ramifications of a security lapse are well known to business executives. Many of the largest brands in the world have paid a heavy price for failing to protect customer information.

Continue Reading Here

The business case for earlier software defect detection and compliance

Regardless of the industry your business operates in, software is likely all around it. Software powers our cars, airplanes, and even the medical devices we rely on to diagnose and treat illness...

Continue Reading Here

Four strategies to reduce your open source risk

Try to think of a single system in the world that hasn’t been touched by open source software...

Continue Reading Here

White Papers

Increase system availability by leveraging Apache Tomcat clustering

Open source is the dominant force in software development today, with over 80 percent of developers now using open source in their software. With an increase in use of open source software (OSS), support and knowledge of these packages becomes critical to companies. Apache Tomcat is one of the most popular open source software implementations in the industry, and one of the most requested support packages to Rogue Wave OSS support experts. Support requests related to Apache Tomcat cover many aspects of the software, but a popular topic is always high-reliability and clustering.

Continue Reading Here

Tech tutorial: Embedding analytics into a database using JMSL

Responding to the many challenges of Big Data means coming up with specific tactics and tools for specific problems, such as using Hadoop and the MapReduce framework for storing and processing very large data sets. Hadoop embodies one of the fundamental changes in Big Data, bringing the algorithms to the data instead of separating the analysis from the storage.

One specific tactic to bring the algorithms to the data is to embed analytics into the database. This paper presents a walkthrough, with code samples, of how to embed JMSL predictive analytics into an Oracle 12c database, using the Naive Bayes classifier algorithm and an example test data set. The complete Java code for this exercise is presented in the appendix.

Continue Reading Here

See it for yourself: Analytics in IMSL C# vs. R

Statistical analysis and desktop modeling are often performed with software such as the well-known R Project yet sometimes a more robust and fully-featured framework is required. It's also common for statisticians and programmers to spend time re-implementing functions and not realize that they already exist elsewhere.

Using this MSDN article as a starting point, this paper offers up an alternative way of deploying statistical analysis: the IMSL.NET Numerical Library (C#). By walking through the examples presented in the article, you will see how the same numerical results are achieved in less time and with less complexity than trying to do it in R.

Continue Reading Here

Using JMSL in Hadoop MapReduce applications

The excitement around big data is the expectation of better results and new insights as we take more accurate measurements of our world. Among the many important considerations to help reach this potential is deciding how to perform efficient mathematical and statistical analysis on the data when traditional storage methods are no longer feasible, reasonable, or possible. The answer is to combine Hadoop MapReduce with JMSL Numerical Libraries.

Learn more by walking through a few technical examples and code of how to use JMSL Numerical Libraries in Hadoop MapReduce applications.

Continue Reading Here

Top 3 strategies to reduce risk in automotive / in-vehicle software development

Developing in-vehicle embedded applications is a safety, security, and quality challenge. Given that cars and trucks are increasingly connected to each other and to the devices around them, it’s becoming harder and harder to ensure that software is functional and free from risk. Development teams, especially the managers who are ultimately responsible, face incredible challenges when building such applications, and are learning that team members need to do more than just catch code defects during verification and validation testing. The new imperative: Identify and address security and compliance concerns earlier in the lifecycle, all while delivering innovative and differentiating features.

Continue Reading Here

Rogue Wave tools and libraries for big data

Big data applications are among the fastest-growing and demanding in the business and research communities, encompassing a range of workloads in real-time analytics, data mining, complex event processing, MapReduce applications, and visualization. Besides the need for high performance, big data applications must also handle data complexity, varying data properties, and optimizing storage capacity.

In this report, senior analyst Michael Feldman from Intersect360 Research discusses these challenges in the big data developer market and presents an analysis of how unique tools and libraries from Rogue Wave Software increase developer productivity and reduce deployment and maintenance costs.

Continue Reading Here

Rogue Wave tools and libraries for financial services

Financial services is the second largest vertical market of high performance computing, including high-frequency trading, risk management, securities and derivatives pricing, and economic analytics. With increased competition, a growing skills gap, and stronger regulations, it's more challenging than ever to deliver applications that meet demanding performance requirements.

In this report, senior analyst Michael Feldman from Intersect360 Research discusses the current financial services developer market and presents an analysis of how unique tools and libraries from Rogue Wave Software increase developer productivity and reduce deployment and maintenance costs.

Continue Reading Here

Software as a process

Today’s software products are the result of many suppliers, vendors, open source repositories, and legacy code coming together in a mix of different processes, standards, and cultures. Each input offers a chance to introduce safety, security, or performance-related errors.

This paper explains the challenges of this polyglot environment and how strategies and tools proven in a number of industries can be applied to your organization to reduce defects, meet requirements, and minimize costs.

Continue Reading Here

Coding to standards and quality: supply-chain application development

The monolithic codebase is dead. Modern applications are built of code from a variety of sources including employees, partners, and contractors from different geographies, with different skill levels, and working on a number of platforms. Application development is a supply chain, with dependencies supported by a network of systems ranging from greenfield development to legacy integrations, and utilizing a patchwork of code from custom, open-source, and commercial third-party sources. Ensuring consistency, security, and standards in such an environment can be challenging, but is essential for maintaining reputation, relationships, and customers.

Continue Reading Here

Displaying results 1-10 (of 94)
 |<  < 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10  >  >|