Top Stories

TOCdance

This is how you enterprise Scrum

It’s been almost 20 years since the term “enterprise Scrum” was coined, but despite the years of practice, organizations still don’t quite understand what it is or how to implement it. “There are a lot of users out there doing the technique, but unfortunately there is a large percentage that still doesn’t understand what it …

AUG15-0729-OPINION-GUESTVIEW-BALLINGER

Guest View: UX metrics: Bringing mobile app quality to the boardroom

Executives understand that mobile application quality matters. They realize that employees and consumers have a wide range of choices, and that they are willing to abandon apps at the first sign of poor performance. They may even know that 22% of apps are only used once, and 60% of users who don’t return to an …

AUG15-0729-COLUMN-CODEWATCH

Code Watch: The best programming book of the decade

“Exercises in Programming Style” by Cristina Videira Lopes is the best programming book to come along in many years. Casting back over many decades, the only book I can compare it to in terms of actionable value is Steve McConnell’s “Code Complete,” and in terms of approachability and sheer fun, it reminds me of Ted …

Latest News

0729.sdt-news

Nokia enters the VR market, iOS support coming to AWS Device Farm, and Google on deep learning—SD Times news digest: July, 29 2015

Nokia is entering the virtual reality world. The company officially confirmed it has a VR product in the work: OZO, a VR camera designed for professional content creators. “OZO aims to advance the next wave of innovation in VR by putting powerful tools in the hands of professionals who will create amazing experiences for people …

windows 10

Microsoft releases Windows 10

Windows 10 is now available as a free upgrade in 190 countries worldwide. Available today for Windows Insiders, Microsoft’s next-gen operating system will be rolled out in stages to Microsoft PC and tablet consumers over the next few days. The free Windows 10 Mobile upgrade will be released later this year. (Related: A preview of …

ADCfloor

Android Developer Conference kicks off

Call it the digital sword of Damocles: Like some torturous situation out of an Edgar Allan Poe story, the entire world’s population of Android users is currently waiting with baited breath for Joshua Drake (Jduck) to release his claimed super exploit for Android. The famous security researcher claims his exploit can take advantage of 95% …

iot

IBM launches IoT community

IBM is making an effort to ease the path for developers working on Internet of Things projects. IBM’s developerWorks Recipe site is filled with templates and tutorials designed to help developers build not only Internet of Things applications, but also the intelligent logic behind those devices. The new developerWorks Recipe site includes many tutorials on …

TOCbug

NoSQL: It really is all in the name

For most of the 1990s, databases were the most boring tool in the shed. The rise of the Web over the aughts changed the demands placed on databases, but did not meaningfully change the form of the data stores we so know and love in our day-to-day application work. The constraints placed on applications to …

0728.sdt-ai-weapons

Top industry leaders warn against autonomous weapons

The Future of Life Institute is continuing its quest to save the human race from artificial intelligence. In an open letter published by the organization, top leaders are teaming up to ask for a ban on autonomous weapons. The letter already has hundreds of signatures, including prominent names such as Steven Hawking, Elon Musk, Steve …

0728.sdt-news

Google’s Customer-Supplied Encryption Keys, NSA phone surveillance ending, and Microsoft’s Android launcher—SD Times news digest: July 28, 2015

Google is enabling developers to use their own encryption keys on its cloud platform. The company recently announced that Customer-Supplied Encryption Keys for Google Compute Engine, which allows developers to bring their own encryption key to encrypt resources, is in beta. “You create and hold the keys, you determine when data is active or at …

Futuristic woman in night city

What makes wearables work for consumers

Regina Dugan, former director of the U.S. Defense Advanced Research Projects Agency, paced the stage, about to unveil a dizzying array of technologies developed by her new employer, Google’s Advanced Technology and Project group (ATAP). But first, attendees at the 2015 Google I/O conference needed a little background. “We’ve been talking about wearables for two …

0727.sdt-mit-slam

Researches use SLAM to improve object recognition

Researchers from MIT’s department of mechanical engineering are working on improving object recognition for robots. The researchers have developed a monocular Simultaneous Localization And Mapping (SLAM) object recognition system designed to provide better performance than traditional object recognition methods. “The goal is for a robot to build a map, and [to] use that map to …

0727.sdt-blog-patch

SD Times Blog: Batten down the patches

It’s that time of year again: Black Hat and Defcon are upon us! That means your systems are all in danger, and your applications should be afraid. Not only will there be (and has already been) an endless stream of new exploits dropped at the shows, but the weekend of Defcon is, effectively, open season …

0727.sdt-android-short

Android vulnerability puts 95% of devices at risk, researcher says

Researchers say they have found the biggest Android security flaws known to date. The vulnerabilities, nestled inside Android’s media playback library Stagefright, are said to affect 950 million Android devices, which amounts to 95% of them. Mobile security researcher Joshua J. Drake, vice president of platform research and exploitation at Zimperium zLabs, discovered the vulnerabilities …

Learning Center

  • White Papers

    Real-World Hadoop

    How do you win with big data? Lots of people are turning to Apache Hadoop, Apache HBase and related NoSQL technology as a cost-effective way to quickly get value from their data. But just deciding to adopt these new tools isn’t enough to guarantee your success. Read this book to: Find out why so many …

  • White Papers

    Why companies need to integrate the software lifecycle

    The teams and disciplines involved in the software delivery process have always used the technologies that make the most sense for them. This is entirely appropriate and should not change; it allows each team to use its preferred tools to do the best possible work within its specific discipline. But what’s best for each individual …

  • White Papers

    Software Lifecycle Integration: Six Reasons Not to Delay

    Each time you receive an email that describes a defect, or send one asking about a requirement, it costs a little bit of time and money, and introduces the opportunity for errors and omissions. Multiply that by the vast number of emails your teams use to stay on track, and you have a major drain …

  • White Papers

    Making the Leap from Server to Cloud

    Are you considering a move to Microsoft SharePoint in the cloud to take advantage of benefits like always having the latest features and security updates, reducing management costs without having to maintain costly hardware infrastructure and more predictable expenses with a subscription model? Maybe so. But how do you migrate your SharePoint environment if you …

  • White Papers

    SECURITY CONFIDENCE IN THE CLOUD

    The cloud is here to stay and many SharePoint IT Managers are moving to the cloud to reduce costs, improve access for external partners, an increased mobility. But the problem remains: how do you do this securely? The White Paper gives you 4 critical tips on how to move to the cloud securely, including: Managing …

  • White Papers

    2015 State of Application Security: Closing the Gap

    As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. Both builders and defenders of apps are well aware that these new types of applications—and the languages and frameworks they are developed in—pose substantial, complex risks. Download this SANS whitepaper, based on its 2015 State of Application …

Upcoming Events

AnDevCon

Jul 29 - 31, 2015
Click here for details

SPTechCon

Aug 24 - 27, 2015
Click here for details

InterDrone

Sep 9 - 11, 2015
Click here for details

Ad will close in seconds
Continue to site
HTML Snippets Powered By : XYZScripts.com