BT
Older rss
  • High Tech, High Sec.: Security Concerns in Graph Databases

    by George Hurlburt on  May 23, 2015

    Graph NoSQL databases support data models with connected data and relationships. In this article, author discusses the security implications of graph database technology. He talks about the privacy and security concerns in use cases like graph discovery, knowledge management, and prediction.

  • Continuous Delivery: Huge Benefits, but Challenges Too

    by Lianping Chen on  Apr 30, 2015

    This article explains why Paddy Power adopted continuous delivery (CD), describes the resulting CD capability, and reports the huge benefits and challenges involved. This information can help practitioners plan their adoption of CD and help researchers form their research agendas.

  • Driving Agile Architecting with Cost and Risk

    by Eltjo R. Poort on  Apr 19, 2015 1

    In this article, author Eltjo R. Poort discusses an architecture approach called Risk and Cost Driven Architecture that helps architects become more effective in an agile world. It's based on the use of risk and cost to determine the architectural significance of concerns.

Software Development Tooling: Information, Opinion, Guidelines, and Tools

Posted by Diomidis Spinellis, Stephanos Androutsellis-Theotokis on  Apr 10, 2015

In this article, authors summarize the information published in "Tools of the Trade" column series in IEEE Software magazine for last ten years.

Fifteen Years of Service-Oriented Architecture at Credit Suisse

Posted by Stephan Murer, Claus Hagen on  Apr 03, 2015

In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4

The Indian Banking Community Cloud

Posted by Lalit Sangavarapu, Shakti Mishra, Abraham Williams, G.R. Gangadharan on  Mar 28, 2015

In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.

Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

Posted by Aaron Beuhring and Kyle Salous on  Mar 17, 2015

In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.

What Do We Know about Software Development in Startups?

Posted by Carmine Giardino, Michael Unterkalmsteiner, Nicolò Paternoster, Tony Gorschek, Pekka Abrahamsson on  Mar 12, 2015

In this article, authors discuss the software engineering practices in startup companies and provide empirical software engineering sources related to their engineering practices. 1

Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.

Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.

Service-Oriented Architecture and Legacy Systems

Posted by Nicolas Serrano, Josune Hernantes, Gorka Gallardo on  Feb 20, 2015

In this article, authors provide an overview of current SOA technologies and incremental transition to SOA in legacy environments. They also discuss web services & enterprise application integration. 4

How Well Do You Know Your Personae Non Gratae?

Posted by Jane Cleland-Huang on  Nov 27, 2014

In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2015 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT