Blog

  • Governments, corporations, and cyber security experts are still reeling after getting a taste of the most widespread ransomware attack to date. This past weekend, over 200,000 computers in 99 countries were hit by the unprecedented “Wanna” ransomware attack, also known as WannaCry, WCry, WanaCrypt and WanaCrypt0r. The British National Health Service was the first to…



    Read More
  • Does your organization have a cyber security policy in place? Can you name three practices that you and your team observe as part of this policy? Results from an IBM Security study show that while 65% of C-suite executives are highly confident that their cyber security plans are well established, only 17% are actually demonstrating…



    Read More
  • We already know that most if not all enterprises and organizations rely on open source software to develop their offerings. As organizations continuously extend their open source usage, we decided to look at our data to learn more about the most popular open source projects. Our research team analyzed our database, which includes over 3M…



    Read More
  • Have you ever had to comply with the chicken dance license? For me, the WTFPL is a better option any day:   How many of those are out there? Is it possible that somewhere deep in one of your projects lies a license that requests you treat the coder to a beer? Can I create…



    Read More
  • Continuous Integration has become a fundamental process in the software development environment, and we’re all familiar with the popular CI tools in the market, but with over 50 Continuous Integration tools out there, how do you decide which one of them will work best for your organization? Choosing which one to work with for the…



    Read More
  • Our Hunt for the Best Coding Easter Eggs

    13 April 2017

    By Sivan Michaeli

    Easter Sunday is nearly here, and we thought we’d take the time for an Easter Egg hunt. We’re not talking about the traditional hunt for pastel-colored eggs or chocolate egg treats – we’re talking about finding some of the stand-out tech Easter eggs that we’ve heard about. In case you have yet to discover the…



    Read More
  • Organizations and individuals have been using the wisdom of the crowds to elicit ideas, promote their vision or push their products forward since the 18th century. Jeff Howe coined the term crowdsourcing in Wired in 2006, defining it in his  blog as “The application of Open Source principles to fields outside of software.” Wait –…



    Read More
  • MISRA ISO 26262

    Easter vacation is just around the corner, and everyone around me is dreaming about vacation. Are you? Let’s play a little game:

    How will you plan your trip? How will you arrange your travels? Rent a car? Buy airplane or train tickets? Reserve the coolest accommodation?

    If you answered “Online” to any of the above questions: congratulations! Like all of us, you are deeply embedded in the Internet of Things. What many of us don’t realize is that beyond the aspects of reservations and online reviews, all our transportation: planes, trains, and automobiles – is also deeply embedded with software.

    We know that the space and defense industries have been at the forefront of technology since the middle of the previous century. What we need to understand is that air and land transportation is catching up. Every form of travel today involves thousands and thousands of lines of complex code for navigation, entertainment, communication, and everything else that will help us get from point A to point B as quickly and safely as possible.



    Read More
  • We all constantly face the challenge of reducing time-to-market to ensure our company will not lose market share. This challenge has made time the most valuable resource for every software development team leader and manager. We all try to meet the crazy timelines for product releases and in order to meet this goal, we always…



    Read More
  • Another open source security vulnerability was discovered in a popular open source project. This time its Apache Struts 2 and this is yet another Remote Code Execution (RCE) vulnerability that adds up to a long list of severe vulnerabilities in Apache Struts. What makes things worse, is that this vulnerability has been actively exploited in…



    Read More