Skip to content

Software Development News: .NET, Java, PHP, Ruby, Agile, Databases, SOA, JavaScript, Open Source

Methods & Tools

Subscribe to Methods & Tools
if you are not afraid to read more than one page to be a smarter software developer, software tester or project manager!

Feed aggregator

Medtec Europe 2016

Intland Blog - Tue, 04/12/2016 - 11:00
12-14 April 2016 Messe Stuttgart, Germany As a staple event for those involved in the medical device industry, Medtec Europe is entering its 14th year in 2016. Medtec Europe offers a unique opportunity to meet and exchange ideas with over 6,000
Categories: Vendor

What Vulnerability Assessment Tools Miss

Black Duck Software Press Releases - Tue, 03/22/2016 - 18:00
Webinar

Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How can you ensure that you are protecting your networks and applications from newly disclosed vulnerabilities? Join Black Duck Software and (ISC)2 on March 22, 2016 at 1:00PM Eastern for a discussion on VA Tools, Open Source Assets and secure application developmen

What Vulnerability Assessment Tools Miss Asset Value:  Low value Redirect:  https://www.brighttalk.com/webcast/5385/189897
Categories: Vendor

REConf 2016

Intland Blog - Tue, 03/01/2016 - 11:00
The conference known as REConf is not only the leading conference on the topic of Requirements Management and Requirements Engineering in the german speaking world but is also the largest event of its kind in the whole of Europe. As
Categories: Vendor

Agile Requirements Management: Simplify Your Project Management

Intland Blog - Wed, 02/24/2016 - 17:00
Date and time: 24 Feb 2016, 4:00 PM (CET) / 10:00 AM (ET) Webinar duration: 30 min What you can learn: Requirements Management is often considered no more than necessary administration of the required documentation. Companies that neglect Requirements Management often
Categories: Vendor

Embedded World 2016

Intland Blog - Tue, 02/23/2016 - 11:00
The Embedded World Exhibition + Conference brings together the innovators in product design and development for both hardware and software. Extreme miniaturization and both embedded electronics and software are the core facilitators of a networked future often referred to as
Categories: Vendor

Black Duck & IBM Present: Application Security in the Age of Open Source

Black Duck Software Press Releases - Thu, 02/18/2016 - 17:00
Webinar

Whether you’re developing applications for internal use or for your customers, keeping them secure is no easy feat. After all, today's applications are a healthy mix of open source and custom code. Identifying and resolving security vulnerabilities in both requires the right tools and know-how. Join IBM and Black Duck for an educational webinar on what it takes to keep your apps safe.

Black Duck & IBM Present: Application Security in the Age of Open Source Asset Value:  Low value Redirect:  http://info.blackducksoftware.com/ibm-webinar-Feb18.html
Categories: Vendor

Embedded Meets Agile

Intland Blog - Tue, 02/16/2016 - 11:00
Munich, 16-18. February 2016 Agile software development and Agile management have become increasingly well established methods in the embedded industry. Both software and hardware development benefit from these methods and processes. Previous events such as ScrumMed in 2011 and AgileCars
Categories: Vendor

Lifecycle of Microservices | @CloudExpo #BigData #IoT #API #Microservices

Java Developer's Journal - 2 hours 40 min ago
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how developers and operators work together to streamline cohesive systems.

read more

Categories: Java, Media

The Industrial Case for IoT | @ThingsExpo #IoT #M2M #ML #InternetOfThings

Java Developer's Journal - 2 hours 40 min ago
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from disparate devices and applying data analytics ultimately, business logic to that data. Properly implemented, IoT can effectively deliver these business outcomes.

read more

Categories: Java, Media

Containers Make Their Mark in the Enterprise

eWeek - Application Development - 2 hours 45 min ago
NEWS ANALYSIS: Containers enable dev teams to move fast and make changes to apps on the run, and have shown enough progress to win over enterprise execs.
Categories: Media

Panel Debates Ideas Covered in 'Human Face of Big Data' Documentary

eWeek - Application Development - 2 hours 50 min ago
A TV show about big data? That may sound like something you’d find on a cable channel reserved for data scientists and academics, but it’s not.
Categories: Media

Big Data Analysis Makes Breaches a Greater Threat to Cyber-Security

eWeek - Application Development - 2 hours 53 min ago
NEWS ANALYSIS: While the theft of employee information is a problem for the staff at government agencies, the fact is that it's also a threat to national security once it's part of a big data research effort.
Categories: Media

[session] Harness IoT and Predictive Analytics | @ThingsExpo #IoT

Java Developer's Journal - 3 hours 10 min ago
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.

read more

Categories: Java, Media

API Security Lessons from Fisher-Price’s Smart Toy Bear Security Flaw By @RyanPinkham | @ThingsExpo #IoT

Earlier this week it was reported that researchers at Boston-based security company, Rapid7, identified several security flaws in an app connected to a new toy from Mattel's Fisher-Price brand. The news of the security vulnerability caught our attention for a few reasons: The name of the toy - Smart Toy Bear - is strangely close to the name of our company SmartBear Software. More importantly, the story caught our attention because the security vulnerability brought up an important reminder about the important issue of security in today's connected world

read more

Categories: Media, RIA

RocksDB from Facebook By @JnanDash | @ThingsExpo #IoT

I attended a HIVE-sponsored Meetup yesterday evening titled, “Rocking the database world with RocksDB”. Since I had never heard of RocksDB, I was curious to learn how it is rocking the database world. Facebook built this key value store storage layer originally to use for MySQL (instead of InnoDB), as MySQL is used heavily at Facebook. They claim that was not the only motivation. Then in 2013, they decided to open source RocksDB. Last evening’s speaker in an earlier post on November, 2013 had said, “Storing and accessing hundreds of petabytes of data is a huge challenge, and we’re constantly improving and overhauling our tools to make this as fast and efficient as possible. Today, we are open-sourcing RocksDB, an embeddable, persistent key-value store for fast storage that we built and use here at Facebook.”

read more

Categories: Media, RIA

Cloud Security Industry to Register Impressive Growth | @CloudExpo #Cloud

In a recent market study offering by Transparency Market Research (TMR), the global cloud security market is projected to grow at a CAGR of 12.80% from 2015 to 2022. The report, titled "Cloud Security Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2014 - 2022", states that the global cloud security market will reach a valuation of US$11.8 bn by 2022 increasing from its 2014 valuation of US$4.5 bn.According to the report, factors such as the rapid proliferation of handheld devices, the increasing trend of CYOD and BYOD policies in corporate organizations, increasing use of cloud-based computing by small and medium scale businesses, and ease of use of cloud security services are driving the cloud security market.

read more

Categories: Media, RIA

How to Ensure Your Testing Team and Website Perform Like Joe Montana | @DevOpsSummit #DevOps

Super Bowl 50 is upon us and while millions tune in for the faceoff between the Broncos and Panthers this Sunday, software testers will hold their breaths as these same fans flock to promoted web and mobile applications in droves. To the players, Super Bowl Sunday presents two paths: one to glory and one to crushing disappointment. Obviously, vying for victory is a team effort. But sometimes, just sometimes, the difference between winning and losing falls to one individual. With the biggest game of the year on the line and everyone watching, the final play commences.

read more

Categories: Media, RIA

Managing Remote Operations Teams | @CloudExpo #BigData #DevOps #IoT

Java Developer's Journal - 5 hours 10 min ago
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., focused on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what doesn’t. He covered proper training and integration of these teams into the corporate structure, and the most effective ways to introduce them to customers. He also discussed proper vetting of third-party teams should these functions be outsourced.

read more

Categories: Java, Media

Three Levels of Network Monitoring for DevOps By @Wall_Dirk | @DevOpsSummit #DevOps

Java Developer's Journal - 5 hours 40 min ago
Network communications are a top priority for DevOps teams working in support of modern globally-distributed systems and microservices. But basic network interface statistics like received and sent traffic aren’t as useful as they once were because multiple microservices may share the same network interface. For meaningful analysis, you need to dig deeper and correlate network-traffic metrics with individual processes. This is however just the beginning … In this article, I’ll show you how deep the network monitoring rabbit hole goes. The types of meaningful analysis that DevOps engineers have been waiting for are finally available.

read more

Categories: Java, Media

Secure the Power of the Cloud | @CloudExpo @ISC2 #Cloud

Java Developer's Journal - 6 hours 10 min ago
Recognizing the need to identify and validate information security professionals’ competency in securing cloud services, the two leading membership organizations focused on cloud and information security, the Cloud Security Alliance (CSA) and (ISC)^2, joined together to develop an international cloud security credential that reflects the most current and comprehensive best practices for securing and optimizing cloud computing environments.

read more

Categories: Java, Media