In this article, author discusses three techniques to defend against malicious users in software systems. These techniques includes creating personas to think strategically about the mischief a malicious user might attempt, misuse cases used to determine how the software should respond to unintended use, and activity diagrams annotated with security concerns.
Neuroscience tell us that humans are wired to connect with each other says Jenni Jepsen. Results from neuroscience research can be used in our daily work to strengthen relationships in the workplace and improve collaboration between agile teams and their stakeholders.
Chris Haddad explains why one should create a roadmap for an API, providing advice on avoiding common API pitfalls, creating business value and monetizing API assets.
This InfoQ article series is focused on the fast-changing world of Mobile technology. This tehnology will influence the way we design, develop and test software in the coming years.
As part of our ongoing series on Web APIs Mike Amundsen talks to Mike Kelly about his reasons for creating HAL and his experiences over the last three years with web developers and the API community 3
With tens of thousands of production Java servers running in the enterprise, many engineers lack the skills to keep their servers greased. In this article InfoQ studies methods for tuning Java servers
Mobile channels are getting more and more important - consequently, the concepts of website optimization and customer behavior analysis are being transferred to field of mobile applications.
Application Lifecycle Management has traditionally been difficult for databases. Ben Rees, explains why the road ahead is now clear for Database Lifecycle Management.
“Infrastructure as Code” is a tenet of the DevOps community. We’ll make a brief introdution to Chef, a well-known IT automation tool, and use it to illustrate the state of the art.
All too often we that the business people we deal with do not know what they want, Michael presents some ideas on how to talk to them and how to explore their needs.
Many apps fail to make full use of the capabilities of the JIT compiler. In this article we investigate some simple tricks to identify issues that may be making your application unfriendly to JIT.