Top Stories

dji-phantom-2-vision-remote-controller-640x360

Code Watch: Learning to be a multi-rotor hobbyist

The first thing you learn when you get into quadcopters and multi-rotors is that battery life is a huge deal. No, wait: The first thing you learn is that when talking to fellow hobbyists, instead of “drone,” you should say “quadcopter” or “multi-rotor” or “UAV” (unmanned aerial vehicle). The second thing you learn is that …

kong

Mashape open-sources Kong API management platform, Microsoft loses mobile patent lawsuit and Toshiba’s new wearables and IoT platforms—SD Times news digest: April 28, 2015

API marketplace and management platform Mashape has open-sourced Kong, its platform providing a centralized management layer for APIs and microservices. Kong enables developers to create plugins for authentication, rate limiting, transformations and other common utilities in Web, mobile and IoT applications. The platform uses NGINX as a proxy server, and supports single and multi-datacenter setups …

OGYr_m6J

The ASF announces Apache Parquet as a Top-Level Project

The Apache Software Foundation has announced Apache Parquet as a Top-Level Project. Apache Parquet, a columnar Hadoop storage format, is used across Big Data processing frameworks, data models and query engines from MapReduce and Apache Spark to Apache Hive, Impala and others. Parquet’s ascension to a Top-Level Project signifies the health and maturity of the …

Latest News

Mathei Zaharia, CTO of Databricks and creator of the Apache Spark Project

Spark ignites excitement at Big Data TechCon

Apache Spark stole the show at the Big Data TechCon in Boston this week. Thanks to a keynote address from Spark’s creator, and a number of tutorials focused on the project, attendees had plenty of Spark information on hand to learn at the event. While Spark was not the only Big Data topic being discussed …

hadoop313

Hadoop and beyond: A primer on Big Data for the little guy

Have you heard the news? A “data lake” overflowing with information about Hadoop and other tools, data science and more threatens to drown IT shops. What’s worse, some Big Data efforts may fail to stay afloat if they don’t prove their worth early on. “Here’s a credible angle on why Big Data could implode,” began …

unnamed

Nevron releases Open Vision for .NET 2015.1

.NET developer tool provider Nevron Software has announced the official release of Nevron Open Vision 2015.1, its cross-platform component suite for .NET application development. The Open Vision 2015.1 release adds a new NOV Diagram for .NET framework, enabling developers to create diagramming solutions in WinForms, WPF, Silverlight, Xamarin.Mac, MonoMac and ASP.NET environments. The framework offers …

0427.sdt-mit

MIT researchers are developing software to better diagnose cancer

Cancer is a scary thing, but it can be even scarier if doctors can’t properly diagnose the specific type of cancer a patient has. Researchers at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) want to solve this problem with a program that they said can help doctors better identify the disease. The researchers specifically …

Nokia evolucion

Nokia has no plans to return to the mobile phone market

Nokia made headlines last week with reports that the company was planning a mobile comeback in 2016. According to Re/code, sources said that Nokia was quietly planning to rejoin the phone market after its contracts with Microsoft ended, but—in a statement provided by the company—itshot down any plans to reemerge in the mobile market. Nokia …

0427.sdt-news

Google Glass made by Luxottica, NSA surveillance activities report, and Software AG to lead Predixion’s funding—SD Times news digest: April 27, 2015

Google Glass may be coming back to the market soon. According to the Wall Street Journal, eyewear maker Luxottica is currently developing a new version of Google’s augmented reality eyewear. Google shut down its Google Glass Explorer Program in January, but said it was still committed to launching it as a consumer product. A spokeswoman …

YouCantStopUs

From the Editors: Where’s the incentive to defeat hackers?

After reporting out this month’s feature on software security, it strikes us that there appear to be parallels between companies selling security solutions and those selling pharmaceuticals. Those who take to conspiracy theories have argued for years that the pharmaceutical companies have no incentive to eliminate, say, cancer, because they would lose the massive profits …

0427.sdt-blog-svs2e3

‘Silicon Valley’ Season 2, Episode 3: A big check with bigger strings

Richard was never going to take the Hooli buyout. There wouldn’t be a show if he had. Though to compete against Nucleus with a multi-million dollar intellectual property lawsuit hanging over its head, Pied Piper still needs a big chunk of money. Big chunks of money are everywhere for a hot startup in Silicon Valley, …

security313

Stop fighting yesterday’s software security wars!

In its 2015 report, the Open Web Application Security Project (OWASP) identified SQL injection and cross-site scripting among its Top 10 software vulnerabilities. Again. If it feels as if you’ve been reading this same story for the last decade, it’s because you have. So why is it that we can build intelligent robots, fling unmanned …

MAY15-0424-OPINION-GUESTVIEW-MARKWARD

Guest View: Traditional Ops is no more

Almost 10 years ago, Amazon CTO Werner Vogels famously revealed how the company had moved away from traditional department-led Web operations to developers deploying their own code. “The traditional model is that you take your software to the wall that separates development and operations, and throw it over and then forget about it. Not at …

0424.sdt-news

Replacing the password, Amazon’s first quarter financial results, and Qt 3.4—SD Times news digest: April 24, 2015

A PayPal executive wants to change the way we think about and use passwords. In a presentation by Jonathan LeBlanc, head of global developer advocacy at PayPal, he detailed a variety of ways to replace the password, from biometrics to wearables. “As long as passwords remain the standard methods for identifying your users on the …

Learning Center

  • White Papers

    NoSQL Databases: A Comparison

    As the data that organizations need to stay competitive grows — and now includes unstructured as well as structured data — managing that data and getting at it in a timely way are critical. This study looks at the differences in performance between two of the leading NoSQL databases in the market. SEE THE FINDINGS …

  • White Papers

    Software as a process

    Today’s software products are the result of many suppliers, vendors, open source repositories, and legacy code coming together in a mix of different processes, standards, and cultures. Each input offers a chance to introduce safety, security, or performance-related errors. This paper explains the challenges of this polyglot environment and how strategies and tools proven in a number …

  • White Papers

    Can Connected Cars Be Secure Cars?

    We’re at a tipping point. Innovation no longer starts and ends with a car’s mechanical components; software has now taken over as the kingpin of the automobile industry, not because software in cars is a new development, but because of the sheer volume of code powering cars and the resulting complexity. Today’s cars can easily …

  • White Papers

    12 Expert Tips for Enterprise Document Sharing, Mobility & Control

    You want your IT organization to be agile, flexible, and fast in responding to the technology demands of your workforce. You also want to control risk and keep enterprise content secure. Today, business is more personal than ever with workers adopting new technologies to stay connected and productive at home, the office, anywhere. Enterprise information …

  • White Papers

    The form that SHOULD have shipped with SharePoint

    Forms are the basic staple for virtually everything you can do in SharePoint, and yet the out-of-the box forms regularly come up short. Easily the biggest problem with building SharePoint forms is, well, it’s hard. To complicate matters, the native capabilities of SharePoint require the person filling out the form to have write permissions to …

  • White Papers

    8 Patterns of Secure Agile Teams

    Developing secure products in an agile environment can be challenging. Application vulnerabilities and coding issues are typically time-consuming to find, document, and fix with traditional testing tools. Short agile sprints don’t lend themselves to these long processes; however, there are ways to effectively integrate secure development with agile methods. …

Upcoming Events

AnDevCon

Jul 29 - 31, 2015
Click here for details

SPTechCon

Aug 24 - 27, 2015
Click here for details

InterDrone

Sep 9 - 11, 2015
Click here for details

Ad will close in seconds
Continue to site
HTML Snippets Powered By : XYZScripts.com