As a C, C++, or Fortran developer, you want easy access to supported versions of the latest and greatest tools, features and standards support. You also want to write and test your application once for deployment to multiple versions of Red Hat Enterprise Linux.
Continue reading Come and hear about Developer Toolset at Red Hat Summit and Developer Exchange
With Red Hat’s many successful product level developer programs for JBoss, OpenShift, Red Hat Enterprise Linux, etc., plus a bunch more available with upstream communities, we’re working on complementing these offerings with an all-Red Hat developer program that introduces developers, ISV and SaaS players, and others to Red Hat’s robust developer portfolio.
Continue reading Red Hat Developer Program
A new video focused on the “Security Mentality” in the secure programming series has been released. Some interesting things are covered about how developers think about security and why they accidentally introduce security flaws into their systems. As a corollary to Bruce Schneier’s law, Josh offers “Any developer can build an application so secure that he or she cannot exploit it.” Please watch the videos for some ideas about cheating and about how to avoid the biases in your own thinking. As a bonus, you can find out a number of ways to hide 100 digits of Pi :). Also, there is a surprise quiz in this video, remember to think “outside the box!” Part 1 and Part 2.
WebSockets are a rising technology that solves one of the great needs of web development – full duplex communication between a browser (or a different client) and a server.
Let’s imagine a simple scenario – live web chat. In the past, you’d probably use AJAX and polling to make new posts appear in realtime. The downside is that implementing all that is not entirely easy and it tends to put a lot of strain on the server.
This article will show you how to implement a simple web chat using WebSockets, thus eliminating the above problems. We will be using the Tornado web server with the Flask framework, producing a pure Python solution. To get the maximum out of Python 2.x, we will utilize the python27 Software Collection (SCL). We will also need a newer version of Firefox that supports WebSocket technology, so that we can test from the RHEL 6 machine that we’re developing on.
Continue reading “Unleashing Power of WebSockets on RHEL 6”
Authorization and Authentication are both important aspects to secure development. Come check out our latest video in the secure development series and learn about often overlooked authorization events in your applications. The video also discusses Cross-Site Request Forgeries (CSRF), what they are and how to avoid them (e.g. OWASP CSRF Prevention Cheat Sheet).
The next secure development video is out! Come check out a quick video on the impact of numeric errors during your development process. The video covers such problems as Integer Overflows, and Array Index Errors (like Bounds Checking and Index Checking). You can also find more information about overflows and security in general at The Open Web Application Security Project (OWASP).
Continue reading Secure Development Series: Numeric Errors
As I stare at this blank screen to start writing my first blog entry I have that same feeling that so many developers have when starting with an unfamiliar programming language or application. The developers in our group realize that it is not easy starting from nothing and we strive to make it easier to productively use SystemTap to investigate performance problems.
Continue reading Starting with SystemTap
Software Developers always know they are supposed to be paying attention to security when they program. However, developers also know that without regular reminders both of the things they know and new threats, secure development practices can suffer.
Continue reading New Secure Development Video Series
Unfortunately, not every application is packaged for every distribution. What do you do when you can’t find it packaged for Red Hat Enterprise Linux? If you are like most people, you give up or attempt to install it from source. What happens when installing from source goes badly? If you are like most people, you definitely give up. How do you keep up with application improvements or, perhaps more importantly, security fixes? If you are like most people, you periodically try and check on the application status (especially when your version stops working 🙂 ), and then try and rebuild it. What is the solution to all of these issues? Proper packaging. Well, this post is meant to help you get started.
Continue reading “Getting Started with RPMs”