Top Stories

hadoop313

Hadoop and beyond: A primer on Big Data for the little guy

Have you heard the news? A “data lake” overflowing with information about Hadoop and other tools, data science and more threatens to drown IT shops. What’s worse, some Big Data efforts may fail to stay afloat if they don’t prove their worth early on. “Here’s a credible angle on why Big Data could implode,” began …

unnamed

Nevron releases Open Vision for .NET 2015.1

.NET developer tool provider Nevron Software has announced the official release of Nevron Open Vision 2015.1, its cross-platform component suite for .NET application development. The Open Vision 2015.1 release adds a new NOV Diagram for .NET framework, enabling developers to create diagramming solutions in WinForms, WPF, Silverlight, Xamarin.Mac, MonoMac and ASP.NET environments. The framework offers …

0427.sdt-mit

MIT researchers are developing software to better diagnose cancer

Cancer is a scary thing, but it can be even scarier if doctors can’t properly diagnose the specific type of cancer a patient has. Researchers at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) want to solve this problem with a program that they said can help doctors better identify the disease. The researchers specifically …

Latest News

Nokia evolucion

Nokia has no plans to return to the mobile phone market

Nokia made headlines last week with reports that the company was planning a mobile comeback in 2016. According to Re/code, sources said that Nokia was quietly planning to rejoin the phone market after its contracts with Microsoft ended, but—in a statement provided by the company—itshot down any plans to reemerge in the mobile market. Nokia …

0427.sdt-news

Google Glass made by Luxottica, NSA surveillance activities report, and Software AG to lead Predixion’s funding—SD Times news digest: April 27, 2015

Google Glass may be coming back to the market soon. According to the Wall Street Journal, eyewear maker Luxottica is currently developing a new version of Google’s augmented reality eyewear. Google shut down its Google Glass Explorer Program in January, but said it was still committed to launching it as a consumer product. A spokeswoman …

YouCantStopUs

From the Editors: Where’s the incentive to defeat hackers?

After reporting out this month’s feature on software security, it strikes us that there appear to be parallels between companies selling security solutions and those selling pharmaceuticals. Those who take to conspiracy theories have argued for years that the pharmaceutical companies have no incentive to eliminate, say, cancer, because they would lose the massive profits …

0427.sdt-blog-svs2e3

‘Silicon Valley’ Season 2, Episode 3: A big check with bigger strings

Richard was never going to take the Hooli buyout. There wouldn’t be a show if he had. Though to compete against Nucleus with a multi-million dollar intellectual property lawsuit hanging over its head, Pied Piper still needs a big chunk of money. Big chunks of money are everywhere for a hot startup in Silicon Valley, …

security313

Stop fighting yesterday’s software security wars!

In its 2015 report, the Open Web Application Security Project (OWASP) identified SQL injection and cross-site scripting among its Top 10 software vulnerabilities. Again. If it feels as if you’ve been reading this same story for the last decade, it’s because you have. So why is it that we can build intelligent robots, fling unmanned …

MAY15-0424-OPINION-GUESTVIEW-MARKWARD

Guest View: Traditional Ops is no more

Almost 10 years ago, Amazon CTO Werner Vogels famously revealed how the company had moved away from traditional department-led Web operations to developers deploying their own code. “The traditional model is that you take your software to the wall that separates development and operations, and throw it over and then forget about it. Not at …

0424.sdt-news

Replacing the password, Amazon’s first quarter financial results, and Qt 3.4—SD Times news digest: April 24, 2015

A PayPal executive wants to change the way we think about and use passwords. In a presentation by Jonathan LeBlanc, head of global developer advocacy at PayPal, he detailed a variety of ways to replace the password, from biometrics to wearables. “As long as passwords remain the standard methods for identifying your users on the …

0424.sdt-github

SD Times GitHub Project of the Week: OSv

Cloud-based virtual machines are proliferating like mad, so it’s about time there was an operating system for them. Created by Cloudius Systems, OSv is a new open-source operating system for virtual machines, designed to execute a single application atop a hypervisor. Written in C/C++, the cloud OS runs Linux applications on hypervisors such as VMware …

0423.odp-mapr

MapR declines Open Data Platform invitation

Hadoop distribution provider MapR announced it has declined its invitation to participate in the Open Data Platform (ODP). In a blog post MapR laid out its main criticisms of ODP, including calling it redundant with Apache Software Foundation governance, purporting that its core standard is poorly defined and “vendor-biased,” and that the platform is “solving …

0423.sdt-versionone

VersionOne 2015 Spring Release promotes best practices for agile

VersionOne is aiming to help organizations make better decisions, improve planning, and successfully implement agile. The company recently announced its 2015 Spring Release with new features that promote best practices and provide easy access to key metrics. (Related: How to sustain your agile transition) “VersionOne is committed to continuing to enhance our platform to help …

0423.redhat

Red Hat updates tools for developer productivity

Red Hat is updating its open-source development tools with a focus on developer productivity and production stability. The company has announced the availability of Red Hat Developer Toolset 3.1, a selection of stable C and C++ compilers and development tools. (Related: Other Red Hat news, this time about Linux containers) “Across the open hybrid cloud, …

Learning Center

  • White Papers

    NoSQL Databases: A Comparison

    As the data that organizations need to stay competitive grows — and now includes unstructured as well as structured data — managing that data and getting at it in a timely way are critical. This study looks at the differences in performance between two of the leading NoSQL databases in the market. SEE THE FINDINGS …

  • White Papers

    Software as a process

    Today’s software products are the result of many suppliers, vendors, open source repositories, and legacy code coming together in a mix of different processes, standards, and cultures. Each input offers a chance to introduce safety, security, or performance-related errors. This paper explains the challenges of this polyglot environment and how strategies and tools proven in a number …

  • White Papers

    Can Connected Cars Be Secure Cars?

    We’re at a tipping point. Innovation no longer starts and ends with a car’s mechanical components; software has now taken over as the kingpin of the automobile industry, not because software in cars is a new development, but because of the sheer volume of code powering cars and the resulting complexity. Today’s cars can easily …

  • White Papers

    12 Expert Tips for Enterprise Document Sharing, Mobility & Control

    You want your IT organization to be agile, flexible, and fast in responding to the technology demands of your workforce. You also want to control risk and keep enterprise content secure. Today, business is more personal than ever with workers adopting new technologies to stay connected and productive at home, the office, anywhere. Enterprise information …

  • White Papers

    The form that SHOULD have shipped with SharePoint

    Forms are the basic staple for virtually everything you can do in SharePoint, and yet the out-of-the box forms regularly come up short. Easily the biggest problem with building SharePoint forms is, well, it’s hard. To complicate matters, the native capabilities of SharePoint require the person filling out the form to have write permissions to …

  • White Papers

    8 Patterns of Secure Agile Teams

    Developing secure products in an agile environment can be challenging. Application vulnerabilities and coding issues are typically time-consuming to find, document, and fix with traditional testing tools. Short agile sprints don’t lend themselves to these long processes; however, there are ways to effectively integrate secure development with agile methods. …

Upcoming Events

Print

Apr 26 - 28, 2015
Click here for details

AnDevCon

Jul 29 - 31, 2015
Click here for details

SPTechCon

Aug 24 - 27, 2015
Click here for details

Ad will close in seconds
Continue to site
HTML Snippets Powered By : XYZScripts.com