All Resources

OpenLogic overview

Leverage the power of open source without adding risk to your development cycle times, adding unknown license obligations, or introducing security risks. Know, inventory, use, and resolve all aspects of open source software within your organization with this enterprise-class set of management and scanning tools coupled with the only guaranteed SLA first-line support for hundreds of open source software packages.

Continue Reading Here

Rogue Wave tools and libraries for big data

Big data applications are among the fastest-growing and demanding in the business and research communities, encompassing a range of workloads in real-time analytics, data mining, complex event processing, MapReduce applications, and visualization. Besides the need for high performance, big data applications must also handle data complexity, varying data properties, and optimizing storage capacity.

In this report, senior analyst Michael Feldman from Intersect360 Research discusses these challenges in the big data developer market and presents an analysis of how unique tools and libraries from Rogue Wave Software increase developer productivity and reduce deployment and maintenance costs.

Continue Reading Here

Rogue Wave tools and libraries for financial services

Financial services is the second largest vertical market of high performance computing, including high-frequency trading, risk management, securities and derivatives pricing, and economic analytics. With increased competition, a growing skills gap, and stronger regulations, it's more challenging than ever to deliver applications that meet demanding performance requirements.

In this report, senior analyst Michael Feldman from Intersect360 Research discusses the current financial services developer market and presents an analysis of how unique tools and libraries from Rogue Wave Software increase developer productivity and reduce deployment and maintenance costs.

Continue Reading Here

Software as a process

Today’s software products are the result of many suppliers, vendors, open source repositories, and legacy code coming together in a mix of different processes, standards, and cultures. Each input offers a chance to introduce safety, security, or performance-related errors.

This paper explains the challenges of this polyglot environment and how strategies and tools proven in a number of industries can be applied to your organization to reduce defects, meet requirements, and minimize costs.

Continue Reading Here

Reduce your open source security risk: Strategies, tactics, and tools

Open source software is here to stay but that doesn't mean that developers can use it without considering the vulnerabilities and security issues they may introduce into their development projects. The fact is, there’s no such thing as bulletproof, bug-free, automatically license compliant, and easily auditable software. Not in the open source world and not in the commercial off the shelf (COTS) world.

Learn how to employ new strategies, tactics, tools, and services to reduce your open source security risk.
 

Continue Reading Here

Create more secure software code: 5 key steps

Software security, or rather the lack thereof, has become commonplace and an all too frequently recurring story in media around the world. Ultimately, all software security failures can be traced back to unsound application code or business processes and a general feeling that "we haven’t had a problem with security, so it’s not an issue for us."

By providing development teams with the right strategies, tools, and mindset, improving software security doesn't have to be a burden. This paper outlines five steps towards building security into the development process and into the minds of developers.
 

Continue Reading Here

Open source software - security risks and best practices

Third-party applications, including open source software (OSS), make up an increasing proportion of enterprise applications. By some estimates, up to 80 percent of the source code in many new commercial applications is open source. It is easy to understand why. OSS allows developers to build applications faster, adding functionality without writing source code from scratch. Open source communities provide new features, shortening time to market and helping organizations gain competitive advantage.
Open source can also introduce risk to organizations through security vulnerabilities in the libraries. This paper examines steps organizations can take to mitigate these risks. These measures require engineering and security teams to understand the risks associated with OSS, and work together to build and enforce best practices in the selection, use, and monitoring of open source components.

Continue Reading Here

Displaying results 1-10 (of 12)
 |<  < 1 - 2  >  >| 
Category Tags
academic aerospace agile development Akana case study Akana datasheet Akana Lifecycle Manager Akana Platform Akana video Akana white paper API analytics API development API Gateway API management API microservices API portal API security Apigility automotive brochure brochures case study CentOS cloud CodeDynamics CodeDynamics video coding standards continuous delivery continuous integration data sheet datasheet debugging defect detection developer productivity DevOps digital media dynamic analysis ecommerce Elixir embedded analytics energy & environment enterprise php Expressive Family finance government HostAccess how-to HydraExpress IBM i IBM WebSphere DataPower IMSL IMSL C Library IMSL Family IMSL Fortran Library IMSL Java Library IMSL NET Library infographic insurance JMSL JViews Klocwork language: c language: java legal & compliance license life sciences & healthcare manufacturing MemoryScape MISRA mobile network and telecom equipment NoSQL OAuth OEM & ISV open banking open source Open Source Audit open source management open source support OpenLogic Other Industries php presentation product publishing PV-WAVE PyIMSL Studio Python real estate ReplayEngine research REST retail scanning & governance security Semantics Manager services SmartRank SOA SOAP software policy software quality software security software verification SOLA source code analysis SourcePro static analysis static code analysis Stingray Studio supply chain support support & services survey results telecom TotalView training transportation video Views Visualization web development white paper Zend Zend case study Zend datasheet Zend Framework Zend Guard Zend Server Zend Studio Zend video Zend white paper Z-Ray