Top Stories

security313

Stop fighting yesterday’s software security wars!

In its 2015 report, the Open Web Application Security Project (OWASP) identified SQL injection and cross-site scripting among its Top 10 software vulnerabilities. Again. If it feels as if you’ve been reading this same story for the last decade, it’s because you have. So why is it that we can build intelligent robots, fling unmanned …

MAY15-0424-OPINION-GUESTVIEW-MARKWARD

Guest View: Traditional Ops is no more

Almost 10 years ago, Amazon CTO Werner Vogels famously revealed how the company had moved away from traditional department-led Web operations to developers deploying their own code. “The traditional model is that you take your software to the wall that separates development and operations, and throw it over and then forget about it. Not at …

0424.sdt-news

Replacing the password, Amazon’s first quarter financial results, and Qt 3.4—SD Times news digest: April 24, 2015

A PayPal executive wants to change the way we think about and use passwords. In a presentation by Jonathan LeBlanc, head of global developer advocacy at PayPal, he detailed a variety of ways to replace the password, from biometrics to wearables. “As long as passwords remain the standard methods for identifying your users on the …

Latest News

0424.sdt-github

SD Times GitHub Project of the Week: OSv

Cloud-based virtual machines are proliferating like mad, so it’s about time there was an operating system for them. Created by Cloudius Systems, OSv is a new open-source operating system for virtual machines, designed to execute a single application atop a hypervisor. Written in C/C++, the cloud OS runs Linux applications on hypervisors such as VMware …

0423.odp-mapr

MapR declines Open Data Platform invitation

Hadoop distribution provider MapR announced it has declined its invitation to participate in the Open Data Platform (ODP). In a blog post MapR laid out its main criticisms of ODP, including calling it redundant with Apache Software Foundation governance, purporting that its core standard is poorly defined and “vendor-biased,” and that the platform is “solving …

0423.sdt-versionone

VersionOne 2015 Spring Release promotes best practices for agile

VersionOne is aiming to help organizations make better decisions, improve planning, and successfully implement agile. The company recently announced its 2015 Spring Release with new features that promote best practices and provide easy access to key metrics. (Related: How to sustain your agile transition) “VersionOne is committed to continuing to enhance our platform to help …

0423.redhat

Red Hat updates tools for developer productivity

Red Hat is updating its open-source development tools with a focus on developer productivity and production stability. The company has announced the availability of Red Hat Developer Toolset 3.1, a selection of stable C and C++ compilers and development tools. (Related: Other Red Hat news, this time about Linux containers) “Across the open hybrid cloud, …

MAY15-0423-COLUMN-ANALYSTWATCH

Analyst Watch: Ten reasons why open-source software will eat the world

I recently attended Facebook’s F8 developer conference in San Francisco, where I had a revelation on why it is going to be impossible to succeed as a technology vendor in the long run without deeply embracing open source. Of the many great presentations I listened to, I was most captivated by the ones that explained …

0423.sdt-news

Dice’s top trending technology skills, Box Developer Edition, and Microsoft’s bug bounty expansion—SD Times news digest: April 23, 2015

Dice has released its latest analysis of its online job postings, which revealed the fastest-growing technology skills. The Top 10 trending skills, according to Dice, are Cloudera Impala, Adobe Experience Manager, Ansible, Xamarin, OnCue, Laravel, RStudio, Unified Functional Testing, Pascal and Apache Kafka. (Related: Five key skills for Linux job seekers) “Skills rise and fall …

0423.sdt-csharp7

C# 7: The features you will and won’t see

C# 6.0 is on track for release along with the upcoming Visual Studio 2015, but developers won’t see C# 7 for quite a while. That doesn’t mean Microsoft isn’t already planning it out, though. C# and Roslyn compiler program manager Mads Torgersen has posted a working list of C# 7 features on GitHub detailing the …

Image courtesy of Reuters

BlackBerry unveils a mobile and IoT security initiative

BlackBerry does not want to be forgotten. Although the company may have fallen off most mobile phone users’ radars, the company is trying to make sure it stays relevant in today’s mobile world. The company announced it has launched a new initiative to help improve the security of mobile and Internet of Things (IoT) devices. …

0422.sdt-kubernetes

Google’s Kubernetes Project reaches Mesosphere

Users of Apache Mesos and the Mesosphere Data Center Operating System will be pleased to hear that they can begin integrating Google’s Project Kubernetes into their containerized cloud environments. Mesosphere today announced that it would begin including Kubernetes as a standard feature of its Mesosphere DCOS. Kubernetes, which was first announced publicly by Google last …

Image courtesy of wellandgood.com

Guest View: Five focus points to take your application performance to peak levels

The online retail marketplace continues to get more competitive every year, and end users are connected around the clock by desktop, smartphone or tablet wherever they are, including in the store. Because our world is now omnichannel and always-on, application developers, testers and production teams need to be on top of their game to keep …

0422.sdt-news

IBM’s cyber threat analytics in the cloud, and Google’s new Web protocol—SD Times news digest: April 22, 2015

IBM has announced it is bringing its cyberthreat analytics to the cloud in order to provide organizations with a way to prioritize threats and fight cyber attacks. The new cloud services include IBM security intelligence and intelligent log management. With security intelligence, organizations can gain insight into security-related events from more than 500 supported data …

Learning Center

  • White Papers

    NoSQL Databases: A Comparison

    As the data that organizations need to stay competitive grows — and now includes unstructured as well as structured data — managing that data and getting at it in a timely way are critical. This study looks at the differences in performance between two of the leading NoSQL databases in the market. SEE THE FINDINGS …

  • White Papers

    Software as a process

    Today’s software products are the result of many suppliers, vendors, open source repositories, and legacy code coming together in a mix of different processes, standards, and cultures. Each input offers a chance to introduce safety, security, or performance-related errors. This paper explains the challenges of this polyglot environment and how strategies and tools proven in a number …

  • White Papers

    Can Connected Cars Be Secure Cars?

    We’re at a tipping point. Innovation no longer starts and ends with a car’s mechanical components; software has now taken over as the kingpin of the automobile industry, not because software in cars is a new development, but because of the sheer volume of code powering cars and the resulting complexity. Today’s cars can easily …

  • White Papers

    12 Expert Tips for Enterprise Document Sharing, Mobility & Control

    You want your IT organization to be agile, flexible, and fast in responding to the technology demands of your workforce. You also want to control risk and keep enterprise content secure. Today, business is more personal than ever with workers adopting new technologies to stay connected and productive at home, the office, anywhere. Enterprise information …

  • White Papers

    The form that SHOULD have shipped with SharePoint

    Forms are the basic staple for virtually everything you can do in SharePoint, and yet the out-of-the box forms regularly come up short. Easily the biggest problem with building SharePoint forms is, well, it’s hard. To complicate matters, the native capabilities of SharePoint require the person filling out the form to have write permissions to …

  • White Papers

    8 Patterns of Secure Agile Teams

    Developing secure products in an agile environment can be challenging. Application vulnerabilities and coding issues are typically time-consuming to find, document, and fix with traditional testing tools. Short agile sprints don’t lend themselves to these long processes; however, there are ways to effectively integrate secure development with agile methods. …

Upcoming Events

Print

Apr 26 - 28, 2015
Click here for details

AnDevCon

Jul 29 - 31, 2015
Click here for details

SPTechCon

Aug 24 - 27, 2015
Click here for details

Ad will close in seconds
Continue to site
HTML Snippets Powered By : XYZScripts.com