Top Resources

CAS complex simulations case study

Wyle’s CAS Group reduces development cycles, costs, and experiences significant performance gains...

Continue Reading Here

Software supply chain series part 1: Three ways to secure your software supply chain

Organizations are really concerned with cyber-attacks, but not all organizations know the best way to address the issue...

Continue Reading Here

Introduction to continuous integration with Klocwork

Learn how you can use continuous integration within Klocwork to find and fix defects faster.

Continue Reading Here

From false positives to trust: A story of SCA adoption

Elektrobit is at the heart of embedded, supplying HMI technologies, navigation, electronic control units, and software for over 70 million vehicles and over 1 billion embedded devices.

Continue Reading Here

All Resources

Revealed: Automotive sector isn't cut out to secure connected cars

Cars rely very heavily on software. In fact, electronic components can add up to half of cars' manufacturing costs.

New research from Rogue Wave reveals 90 percent of software developers working in the automotive space think it’s difficult to truly secure cars, and over half don’t even think their company has the necessary training/technology.

This is all pointing towards an automotive security crisis.

Continue Reading Here

Automotive industry: Welcome to the software business

​Remember when a car was just a car? The automotive industry was all about how fast, how far, how safe, and how reliable their cars were. And, they got very good at it, having decades of expertise in developing and promoting safety standards and performance benchmarks to ensure the safety — and loyalty — of their customers.

Enter the connected car. Now, the automotive industry finds itself at a crossroads.

Continue Reading Here

Top automotive security vulnerabilities

Trying to build connected automotive software that’s both bulletproof and secure is a big task; knowing where to focus time and energy can be half the challenge. According to research conducted by CX3 Marketing on behalf of Rogue Wave Software, nearly 90 percent of all detected security holes can be traced back to just ten types of vulnerabilities.

In this paper we’ll explore the ten most common vulnerabilities for 2015, with examples from actual source code, and look at what changes can be made to coding style or processes to avoid them.

Continue Reading Here

2016 Open Source Support Report

Open source software (OSS) is the dominant force in software development today, driving technical innovation, enabling productivity gains, and touching everything from big data and cloud to mobile and embedded. Despite its importance and reach, there’s little infrastructure and even less knowledge on how to effectively support OSS.

This report takes real support data from the top OSS packages across different organizations to analyze the statistics, realities, and results of open source in the field.

For more recent data download the 2017 Open Source Support Report.

Continue Reading Here

Be the disruptor – The digital API value chain

There will be 150 billion connected devices by 2020. New digital businesses have already disrupted value chains across every industries. APIs are at the center of the digital business. You need to understand what assets you have that can be exposed digitally, what their digital value chain is, and how to create an effective business model around that value chain to compete in this economy. No enterprise can be complacent and not engage in the digital economy. Learn how to be the disruptor and not the disruptee.

Continue Reading Here

ACCESS Co., Ltd.

“We found a 20 percent improvement in the cost of correcting bugs over the previous tool.” Mr. Yohei Fujiwara, chief assurance engineer in the smart device division, ACCESS
 
ACCESS Co., Ltd. is an independent software company that has provided advanced IT solutions based on mobile and network software technology since 1984. The Internet of Things (IoT) era is here in earnest, as more devices and systems connect to the internet. ACCESS provides integrated cloud-based solutions that make it easier and more efficient for customers to develop devices supporting the growing IoT.  
 
ACCESS compared the tools they had with multiple new tools available for static code analysis, including Klocwork, against functional performance and overall cost effectiveness. Once the evaluation was complete, they decided to deploy Klocwork throughout the organization.
 

Continue Reading Here

Displaying results 51-60 (of 358)
 |<  <  2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11  >  >|