Top Resources

CAS complex simulations case study

Wyle’s CAS Group reduces development cycles, costs, and experiences significant performance gains...

Continue Reading Here

Software supply chain series part 1: Three ways to secure your software supply chain

Organizations are really concerned with cyber-attacks, but not all organizations know the best way to address the issue...

Continue Reading Here

Reduce your open source security risk: Strategies, tactics, and tools

Open source software is here to stay but that doesn't mean that developers can use it without considering the vulnerabilities and security issues they may introduce into their development projects.

Continue Reading Here

3 part series by Forrester Research: How businesses can succeed in the age of the customer

In this three part series, Kurt Bittner, principal analyst with Forrester Research talks about how businesses can succeed in the age of the customer, and why developers matter now, more than ever.

Continue Reading Here

All Resources

Revealed: Automotive sector isn't cut out to secure connected cars

Cars rely very heavily on software. In fact, electronic components can add up to half of cars' manufacturing costs.

New research from Rogue Wave reveals 90 percent of software developers working in the automotive space think it’s difficult to truly secure cars, and over half don’t even think their company has the necessary training/technology.

This is all pointing towards an automotive security crisis.

Continue Reading Here

Automotive industry: Welcome to the software business

​Remember when a car was just a car? The automotive industry was all about how fast, how far, how safe, and how reliable their cars were. And, they got very good at it, having decades of expertise in developing and promoting safety standards and performance benchmarks to ensure the safety — and loyalty — of their customers.

Enter the connected car. Now, the automotive industry finds itself at a crossroads.

Continue Reading Here

From Green Screen to Web - Rapid Modernization for IBM i

For many organizations running IBM i, the “green screen” is the common interface to back-end data, business logic, and services. In today’s browser-based world of rich user experiences, the demand for web-enabled technologies is very strong and IBM i developers are under increasing pressure to expose data and deliver interfaces closer to what users see elsewhere and further from their traditional skillsets.

Continue Reading Here

Top automotive security vulnerabilities

Trying to build connected automotive software that’s both bulletproof and secure is a big task; knowing where to focus time and energy can be half the challenge. According to research conducted by CX3 Marketing on behalf of Rogue Wave Software, nearly 90 percent of all detected security holes can be traced back to just ten types of vulnerabilities.

In this paper we’ll explore the ten most common vulnerabilities for 2015, with examples from actual source code, and look at what changes can be made to coding style or processes to avoid them.

Continue Reading Here

2016 Open Source Support Report

Open source software (OSS) is the dominant force in software development today, driving technical innovation, enabling productivity gains, and touching everything from big data and cloud to mobile and embedded. Despite its importance and reach, there’s little infrastructure and even less knowledge on how to effectively support OSS.

This report takes real support data from the top OSS packages across different organizations to analyze the statistics, realities, and results of open source in the field.

For more recent data download the 2017 Open Source Support Report.

Continue Reading Here

Be the disruptor – The digital API value chain

There will be 150 billion connected devices by 2020. New digital businesses have already disrupted value chains across every industries. APIs are at the center of the digital business. You need to understand what assets you have that can be exposed digitally, what their digital value chain is, and how to create an effective business model around that value chain to compete in this economy. No enterprise can be complacent and not engage in the digital economy. Learn how to be the disruptor and not the disruptee.

Continue Reading Here

Displaying results 91-100 (of 441)
 |<  <  6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15  >  >| 
Category Tags
academic aerospace agile development Akana case study Akana datasheet Akana Lifecycle Manager Akana Platform Akana video Akana white paper API analytics API development API Gateway API management API microservices API portal API security Apigility automotive brochure brochures case study CentOS cloud CodeDynamics CodeDynamics video coding standards continuous delivery continuous integration data sheet datasheet debugging defect detection developer productivity DevOps digital media dynamic analysis ecommerce Elixir embedded analytics energy & environment enterprise php Expressive Family finance government HostAccess how-to HydraExpress IBM i IBM WebSphere DataPower IMSL IMSL C Library IMSL Family IMSL Fortran Library IMSL Java Library IMSL NET Library infographic insurance JMSL JViews Klocwork language: c language: java legal & compliance license life sciences & healthcare manufacturing MemoryScape MISRA mobile network and telecom equipment NoSQL OAuth OEM & ISV open banking open source Open Source Audit open source management open source support OpenLogic Other Industries php presentation product publishing PV-WAVE PyIMSL Studio Python real estate ReplayEngine research REST retail scanning & governance security Semantics Manager services SmartRank SOA SOAP software policy software quality software security software verification SOLA source code analysis SourcePro static analysis static code analysis Stingray Studio supply chain support support & services survey results telecom TotalView training transportation video Views Visualization web development white paper Zend Zend case study Zend datasheet Zend Framework Zend Guard Zend Server Zend Studio Zend video Zend white paper Z-Ray