BT
Older rss

Fifteen Years of Service-Oriented Architecture at Credit Suisse

Posted by Stephan Murer, Claus Hagen on  Apr 03, 2015

In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 2

The Indian Banking Community Cloud

Posted by Lalit Sangavarapu, Shakti Mishra, Abraham Williams, G.R. Gangadharan on  Mar 28, 2015

In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.

Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

Posted by Aaron Beuhring and Kyle Salous on  Mar 17, 2015

In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.

What Do We Know about Software Development in Startups?

Posted by Carmine Giardino, Michael Unterkalmsteiner, Nicolò Paternoster, Tony Gorschek, Pekka Abrahamsson on  Mar 12, 2015

In this article, authors discuss the software engineering practices in startup companies and provide empirical software engineering sources related to their engineering practices. 1

Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.

Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.

Service-Oriented Architecture and Legacy Systems

Posted by Nicolas Serrano, Josune Hernantes, Gorka Gallardo on  Feb 20, 2015

In this article, authors provide an overview of current SOA technologies and incremental transition to SOA in legacy environments. They also discuss web services & enterprise application integration. 3

How Well Do You Know Your Personae Non Gratae?

Posted by Jane Cleland-Huang on  Nov 27, 2014

In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.

Simulation-Based Embedded Agile Development

Posted by Jason Ard, Kristine Davidsen, Terril Hurst on  Nov 16, 2014

In this article, authors discuss how using simulation as an integral part of the development process can improve product quality, reduce cost, and deliver reliable working code.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2015 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT