Rogue Wave Tackles Software Risk Mitigation
Analysis toolchain for deep software risk assessment and mitigation
View ArticleHybrid Version Control Across Git and Perforce
Combo solution still looks after security and agility needs of enterprise DevOps
View ArticleAtego Vantage's Triple Model Combination
Solution for iterative and common product development
View ArticleJava SE 8 Beyond Lambdas: The Big Picture
In addition to Lambdas, Java 8 features changes to the way annotations are handled, array processing, VM size, garbage collection, and so much more.
View ArticleSUSE kGraft Live Patches Linux Kernel
Company pledges to submit kGraft upstream for standard live patching solution
View ArticleCMMI Extends Framework For Security
Verification and validation updates feature in CMMI for Development V1.3
View ArticleFree Microsoft Threat Modeling Tool 2014
A systematic way to find design-level security and privacy weaknesses in systems
View ArticleAfter Heartbleed: A Look at Languages that Support Provability
The open-source SPARK 2014 language can prove that code correctly matches specs. This capability closes off vulnerabilities and illuminates logic errors in code.
View ArticleEnterprise Java Development For Internet of Things
IoT-Ready Kaazing Gateway 4.0 JMS Edition
View ArticleOracle Mobile Application Framework Arrives
Mobile-centric integration for back end services and security
View ArticleDovecot Gmail API Compatible REST API
Open source and complementary to existing email IMAP and POP3 protocols
View ArticleCRC: The C Stands for Confusion
Because it is so often abstracted, people don't always make smart choices about selecting and specifying CRCs.
View ArticleTooling Up for the Marriage of the Internet of Things, Big Data, and Cloud...
Finding tools that will bridge IoT, machine-to-machine, and big data is no simple task. But some integrated solutions are beginning to appear.
View ArticleSecurity Issues in Swift: What the New Language Did Not Fix
The security issues that existed in Objective-C have been only partially addressed in Swift. What to watch out for?
View ArticleThe Internet of Overhyped Things
Vendors and analysts would have us believe that the Internet of Things is imminent. But, in fact, it will be years before the obstacles it faces can be surmounted.
View ArticleIEEE: Top Ten Software Security Design Flaws
The IEEE Center for Secure Design cybersecurity initiative has released a report titled "Avoiding the Top 10 Software Security Design Flaws"
View ArticleScanning Critical Security Defects In C# Open Source
OWASP and C# capabilities in scan service expanded
View Article5 Steps to Protect Mobile Apps from Attacks
Mobile apps are important gateways to malicious attacks, just like Web apps. It's high time to begin thinking about mobile security as a top development priority. Where to begin?
View ArticleFree Microsoft Threat Modeling Tool 2014
A systematic way to find design-level security and privacy weaknesses in systems
View ArticleOkta Identity Management Selection Pack For Developers
Ingredients: secure authentication, single sign-on, multi-factor authentication — may contain nuts
View ArticleDr. Dobb's Archive
On this site is archived all the content from Dr. Dobb's that was published on the Web through December 31, 2014.
View Article