In this article, authors discuss an ad hoc anonymous and secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.
This article features highlights from interviews with release engineers on the state of the practice and challenges in release engineering space. The interview questions cover topics like release engineering metrics, continuous delivery's benefits and limitations.
In this article, authors examine the enterprise cloud market and technologies and provide guidance for choosing the right cloud solution. They also discuss the cloud computing best practices such as elastic architecture, design for failure, high availability, performance, security, and monitoring.
In this article, authors examine architectural languages (ALs) and model-driven engineering (MDE) as means for improving architecture design. They review a framework for AL definition and tools.
In this article, author describes the role of data analytics in healthcare space with emerging wearable technologies like biophysical interfaces, physiological sensors and embedded diagnostic tools.
In this article, based on a research study, author presents big data as service-oriented and evolutionary case of disruptive IT-enabled services (IESs) rather than as datasets.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.
In this article, authors discuss the software engineering practices in startup companies and provide empirical software engineering sources related to their engineering practices. 1
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.