x Take the InfoQ Survey !
Older rss

Your Thing is Pwnd: Security Challenges for the Internet of Things

Posted by Paul Fremantle  on  Jun 28, 2015

Paul Fremantle explores the challenges of security for IoT, including reviewing some existing attacks and predicting others, hardware, software, network and cloud attacks.


My Other Internet is a Mirage

Posted by Anil Madhavapeddy  on  Jan 14, 2014 1

Anil Madhavapeddy suggests a different approach to building Internet services avoiding the complexity of today's services which incorporate many policies and security mechanisms.


Surviving in a Feudal Security World

Posted by Bruce Schneier  on  Jun 28, 2013

Bruce Schneier puts security in the context of today's allegiance to cloud and SaaS providers, the recent news about PRISM and the lack of privacy for us as citizens.


River Trail – Parallel Programming in JavaScript

Posted by Stephan Herhut  on  Mar 29, 2013

Stephan Herhut introduces Intel's Parallel JavaScript (formerly known as "River Trail"), a new parallel programming API designed for JavaScript.


Building a Cloud Ecosystem Architecture

Posted by Chris Haddad  on  Mar 05, 2013

Chris Haddad discusses cloud computing, PaaS, multi-tenancy, cloud ecosystems, cloud aware APIs from the perspective and the benefits it can provide to the business.

Certifying Your Car with Erlang

Posted by John Hughes  on  Sep 20, 2012 2

John Hughes explains how Quviq tests embedded ECU software for AUTOSAR compliance using QuickCheck.

Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security

Posted by Robert Winch  on  Aug 03, 2012 3

Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.

Securing the Cloud: Identity Management and Network Security in the Cloud

Posted by Mark Ryland  on  Aug 02, 2012

Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.

Keynote: MythBusters 2.0 - Mission Critical Cloud Computing @ NASA

Posted by Khawaja Shams  on  Jul 26, 2012 2

Khawaja Shams presents how NASA’s JPL uses cloud computing, and evaluates some of the existing cloud computing myths in the MythBusters style.

Lock-free Algorithms

Posted by Martin Thompson and Michael Barker  on  Apr 30, 2012 1

Martin Thompson and Michael Barker explain how Intel x86_64 processors and their memory model work along with low-level techniques that help creating lock-free software.

Cloud Security or: How I Learned to Stop Worrying and Love the Cloud

Posted by Alon Hazay & Jakob Illeborg Pagter  on  Jan 20, 2012

Cloud security, according to IDC (2010), is the main worry for companies. Alon Hazy and Jakob Illeborg Pagter look at the threat landscape, and examine secure cloud solutions today and in the future.

SOA Security in Practice

Posted by Nicolai Josuttis  on  Feb 07, 2011

Nicolai M. Josuttis discusses various issues encountered when implementing SOA security: heterogeneity and debugging are problematic, ESB plays an important role, and costs involved.

General Feedback
Marketing and all content copyright © 2006-2015 C4Media Inc. hosted at Contegix, the best ISP we've ever worked with.
Privacy policy