Top Resources

CAS complex simulations case study

Wyle’s CAS Group reduces development cycles, costs, and experiences significant performance gains...

Continue Reading Here

Software supply chain series part 1: Three ways to secure your software supply chain

Organizations are really concerned with cyber-attacks, but not all organizations know the best way to address the issue...

Continue Reading Here

Reduce your open source security risk: Strategies, tactics, and tools

Open source software is here to stay but that doesn't mean that developers can use it without considering the vulnerabilities and security issues they may introduce into their development projects.

Continue Reading Here

3 part series by Forrester Research: How businesses can succeed in the age of the customer

In this three part series, Kurt Bittner, principal analyst with Forrester Research talks about how businesses can succeed in the age of the customer, and why developers matter now, more than ever.

Continue Reading Here

All Resources

Increase system availability by leveraging Apache Tomcat clustering

Open source is the dominant force in software development today, with over 80 percent of developers now using open source in their software. With an increase in use of open source software (OSS), support and knowledge of these packages becomes critical to companies. Apache Tomcat is one of the most popular open source software implementations in the industry, and one of the most requested support packages to Rogue Wave OSS support experts. Support requests related to Apache Tomcat cover many aspects of the software, but a popular topic is always high-reliability and clustering.

Continue Reading Here

Tech tutorial: Embedding analytics into a database using JMSL

Responding to the many challenges of Big Data means coming up with specific tactics and tools for specific problems, such as using Hadoop and the MapReduce framework for storing and processing very large data sets. Hadoop embodies one of the fundamental changes in Big Data, bringing the algorithms to the data instead of separating the analysis from the storage.

One specific tactic to bring the algorithms to the data is to embed analytics into the database. This paper presents a walkthrough, with code samples, of how to embed JMSL predictive analytics into an Oracle 12c database, using the Naive Bayes classifier algorithm and an example test data set. The complete Java code for this exercise is presented in the appendix.

Continue Reading Here

See it for yourself: Analytics in IMSL C# vs. R

Statistical analysis and desktop modeling are often performed with software such as the well-known R Project yet sometimes a more robust and fully-featured framework is required. It's also common for statisticians and programmers to spend time re-implementing functions and not realize that they already exist elsewhere.

Using this MSDN article as a starting point, this paper offers up an alternative way of deploying statistical analysis: the IMSL.NET Numerical Library (C#). By walking through the examples presented in the article, you will see how the same numerical results are achieved in less time and with less complexity than trying to do it in R.

Continue Reading Here

Security in practice: Creating bulletproof software

The ramifications of a security lapse are well known to business executives. Many of the largest brands in the world, from Sony to Target to The Home Depot, have paid a heavy price for failing to protect customer information.

Consumers may be growing accustomed to the reality that data breaches are just one cost of our increasingly connected and online world. But as more people interact with embedded systems like those found in automobiles and healthcare devices, for example, the perceived risk of a security flaw is bound to increase, as will the level of outrage from consumers, legislators, and regulators.

Continue Reading Here

Software security begins with flaw-free, standards-compliant code

In partnership with Open Systems Media and IQPC, Rogue Wave conducted two research surveys to measure organizations across multiple vertical industries and job titles on how they approach application security and how they provide developers with the education and tools necessary to bake in security at the earliest stages of software development.

Continue Reading Here

Displaying results 81-90 (of 364)
 |<  <  5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14  >  >|