Top Resources

CAS complex simulations case study

Wyle’s CAS Group reduces development cycles, costs, and experiences significant performance gains...

Continue Reading Here

Software supply chain series part 1: Three ways to secure your software supply chain

Organizations are really concerned with cyber-attacks, but not all organizations know the best way to address the issue...

Continue Reading Here

Reduce your open source security risk: Strategies, tactics, and tools

Open source software is here to stay but that doesn't mean that developers can use it without considering the vulnerabilities and security issues they may introduce into their development projects.

Continue Reading Here

3 part series by Forrester Research: How businesses can succeed in the age of the customer

In this three part series, Kurt Bittner, principal analyst with Forrester Research talks about how businesses can succeed in the age of the customer, and why developers matter now, more than ever.

Continue Reading Here

All Resources

From Green Screen to Web - Rapid Modernization for IBM i

For many organizations running IBM i, the “green screen” is the common interface to back-end data, business logic, and services. In today’s browser-based world of rich user experiences, the demand for web-enabled technologies is very strong and IBM i developers are under increasing pressure to expose data and deliver interfaces closer to what users see elsewhere and further from their traditional skillsets.

Continue Reading Here

Top automotive security vulnerabilities

Trying to build connected automotive software that’s both bulletproof and secure is a big task; knowing where to focus time and energy can be half the challenge. According to research conducted by CX3 Marketing on behalf of Rogue Wave Software, nearly 90 percent of all detected security holes can be traced back to just ten types of vulnerabilities.

In this paper we’ll explore the ten most common vulnerabilities for 2015, with examples from actual source code, and look at what changes can be made to coding style or processes to avoid them.

Continue Reading Here

2016 Open Source Support Report

Open source software (OSS) is the dominant force in software development today, driving technical innovation, enabling productivity gains, and touching everything from big data and cloud to mobile and embedded. Despite its importance and reach, there’s little infrastructure and even less knowledge on how to effectively support OSS.

This report takes real support data from the top OSS packages across different organizations to analyze the statistics, realities, and results of open source in the field.

For more recent data download the 2017 Open Source Support Report.

Continue Reading Here

Be the disruptor – The digital API value chain

There will be 150 billion connected devices by 2020. New digital businesses have already disrupted value chains across every industries. APIs are at the center of the digital business. You need to understand what assets you have that can be exposed digitally, what their digital value chain is, and how to create an effective business model around that value chain to compete in this economy. No enterprise can be complacent and not engage in the digital economy. Learn how to be the disruptor and not the disruptee.

Continue Reading Here

ACCESS Co., Ltd.

“We found a 20 percent improvement in the cost of correcting bugs over the previous tool.” Mr. Yohei Fujiwara, chief assurance engineer in the smart device division, ACCESS
 
ACCESS Co., Ltd. is an independent software company that has provided advanced IT solutions based on mobile and network software technology since 1984. The Internet of Things (IoT) era is here in earnest, as more devices and systems connect to the internet. ACCESS provides integrated cloud-based solutions that make it easier and more efficient for customers to develop devices supporting the growing IoT.  
 
ACCESS compared the tools they had with multiple new tools available for static code analysis, including Klocwork, against functional performance and overall cost effectiveness. Once the evaluation was complete, they decided to deploy Klocwork throughout the organization.
 

Continue Reading Here

Reverse debugging on CodeDynamics with ReplayEngine

Join Rogue Wave senior director of product development, Bill Burns, as he highlights the dynamic analysis and debugging features of CodeDynamics in this video series.

In part 2, you will hear about the reverse debugging capabilities of CodeDynamics with ReplayEngine. ReplayEngine allows you step backwards and forwards in execution history, run backwards to breakpoints, and record files for later analysis. See a brief walk through of this unique feature that enables you to pinpoint and replay run-time issues for faster resolution.

Learn more about additional features of CodeDynamics in part 1 of this series – Introduction to CodeDynamics.
 

Continue Reading Here

Prototype to production with IMSL Numerical Libraries

In the development of software that requires advanced math, statistics, or analytics, there is often a disconnect early in the development process. This occurs at the transition from algorithm selection and testing to the beginning of coding in the actual compiled language. We refer to this as the prototype to production transition.

To address the disconnect during prototype to production, we are presenting a method to run IMSL Numerical Libraries routines in R or Matlab. The goal is not to replace the algorithm developer’s tool of choice but to run a compiled version of the code in parallel. Pitfalls can be caught early, and data discrepancies can be resolved quickly by running the script version and compiled version side by side.
 

Continue Reading Here

Deterministically troubleshooting network distributed applications

Debugging is all about understanding what your software is really doing. Computers are unforgiving readers; they never pay attention to what you mean, and always insist on doing what the code says.

Debugging happens naturally when actively developing code and troubleshooting a problem. The same kind of investigation is also a great way to learn about programs that are working just fine. It pays to look closely at what programs are really doing when you re-introduce yourself to code that you wrote a long time ago, or when you try to understand a new bit of code that you encounter for the first time.

Continue Reading Here

Displaying results 91-100 (of 441)
 |<  <  6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15  >  >| 
Category Tags
academic aerospace Akana case study Akana datasheet Akana Lifecycle Manager Akana Platform Akana video Akana white paper API analytics API development API Gateway API management API microservices API portal API security Apigility automotive brochure brochures case study CentOS cloud CodeDynamics CodeDynamics video coding standards continuous delivery continuous integration data sheet datasheet debugging developer productivity DevOps digital media dynamic analysis ecommerce Elixir energy & environment enterprise php Family finance government HostAccess how-to HydraExpress IBM i IBM WebSphere DataPower IMSL IMSL C Library IMSL Family IMSL Fortran Library IMSL Java Library IMSL NET Library infographic insurance JMSL JViews Klocwork language: c language: java legal & compliance license life sciences & healthcare M&A manufacturing MemoryScape MISRA mobile network and telecom equipment NoSQL OAuth OEM & ISV open banking open source Open Source Audit open source management open source support OpenLogic Other Industries php presentation product publishing PV-WAVE PyIMSL Studio Python real estate ReplayEngine research retail scanning & governance security Semantics Manager services SmartRank SOA software policy software quality software security software verification SOLA source code analysis SourcePro static analysis static code analysis Stingray Studio supply chain support support & services survey results telecom TotalView training transportation video Views Visualization web development white paper Zend Zend case study Zend datasheet Zend Framework Zend Guard Zend Server Zend Studio Zend video Zend white paper Z-Ray