BT
Older rss
53:16

My Other Internet is a Mirage

Posted by Anil Madhavapeddy  on  Jan 14, 2014 1

Anil Madhavapeddy suggests a different approach to building Internet services avoiding the complexity of today's services which incorporate many policies and security mechanisms.

53:01

Surviving in a Feudal Security World

Posted by Bruce Schneier  on  Jun 28, 2013

Bruce Schneier of the famed Schneier on Security blog puts security in the context of our allegiances to cloud and SaaS providers, the recent news about PRISM and the lack of privacy for us as citizens.

41:51

River Trail – Parallel Programming in JavaScript

Posted by Stephan Herhut  on  Mar 29, 2013

Stephan Herhut introduces Intel's Parallel JavaScript (formerly known as "River Trail"), a new parallel programming API designed for JavaScript.

34:19

Building a Cloud Ecosystem Architecture

Posted by Chris Haddad  on  Mar 05, 2013

Chris Haddad discusses cloud computing, PaaS, multi-tenancy, cloud ecosystems, cloud aware APIs from the perspective and the benefits it can provide to the business.

Certifying Your Car with Erlang

Posted by John Hughes  on  Sep 20, 2012 2

John Hughes explains how Quviq tests embedded ECU software for AUTOSAR compliance using QuickCheck.

Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security

Posted by Robert Winch  on  Aug 03, 2012 3

Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.

Securing the Cloud: Identity Management and Network Security in the Cloud

Posted by Mark Ryland  on  Aug 02, 2012

Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.

Keynote: MythBusters 2.0 - Mission Critical Cloud Computing @ NASA

Posted by Khawaja Shams  on  Jul 26, 2012 2

Khawaja Shams presents how NASA’s JPL uses cloud computing, and evaluates some of the existing cloud computing myths in the MythBusters style.

Lock-free Algorithms

Posted by Martin Thompson and Michael Barker  on  Apr 30, 2012 1

Martin Thompson and Michael Barker explain how Intel x86_64 processors and their memory model work along with low-level techniques that help creating lock-free software.

Cloud Security or: How I Learned to Stop Worrying and Love the Cloud

Posted by Alon Hazay & Jakob Illeborg Pagter  on  Jan 20, 2012

While Cloud Computing offers increased business agility and reduced cost, many are worried about security: loss of control and lack of confidentiality. Presented by Alon Hazy and Jakob Illeborg Pagter, this talk looks at the threat landscape, then examines how to secure cloud solutions today and in the future.

Architecting the Ultimate Control-Point-Advanced Cyber-Threat Mitigation

Posted by Blake Dournaee  on  Dec 08, 2010

Blake Dournaee presents Intel’s Service Gateway, a security control point meant to secure on-premise and in the cloud .NET or Java platforms from various security threats like spoofing, tampering, repudiation, information disclosure, DoS, elevation of privilege, all of that in the context of today’s REST or SOAP web services.

SOA Governance: Where the Rubber Meets the Runtime

Posted by Harold van Aalst  on  Apr 01, 2010 1

Harold van Aalst explains the need to use proper governance for SOA implementations by defining the rules, policies and standards to follow and having a tool to monitor them at runtime in order to discover when they are broken to be able to act on time. Beside the usual design-time governance, Aalst details on Development, Deployment and Runtime Governance.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT