BT
Older rss
  • How Well Do You Know Your Personae Non Gratae?

    by Jane Cleland-Huang on  Nov 27, 2014

    In this article, author discusses three techniques to defend against malicious users in software systems. These techniques includes creating personas to think strategically about the mischief a malicious user might attempt, misuse cases used to determine how the software should respond to unintended use, and activity diagrams annotated with security concerns.

  • The Resurrection of Product Risk Analysis

    by Chris Schotanus on  Nov 19, 2014

    Product risk analysis (PRA) is not only useful in testing but is also applicable during the various phases of sequential or agile system development. This article introduces a different application of PRA that elevates it from project level to domain level. It shows how you can go from risk and requirement-based testing to risk and requirement-based development.

  • Testing the Internet of Things: The Human Experience

    by Gerie Owen on  Nov 09, 2014

    Mobile and embedded devices, more than any other technology, are an integral part of our lives and have the potential to become a part of us. This article discusses what “human experience” testing is and is not, and uses concepts from human computer interaction design theory to establish a framework for developing “human experience” test scenarios.

Shadow IT Risk and Reward

Posted by Chris Haddad on  Oct 08, 2014

Chris Haddad explains in this article what Shadow IT is, what role it plays in the enterprise and why Enterprise IT needs to embrace it, adapt and address Shadow IT requirements, autonomy, and goals.

Q&A with Barry Boehm and Richard Turner on The Incremental Commitment Spiral Model

Posted by Ben Linders on  Aug 27, 2014

The Incremental Commitment Spiral Model: Principles and Practices for Successful Systems and Software describes a process model generator. InfoQ interviewed the authors Barry Boehm and Richard Turner.

Article Series: Automation in the Cloud and Management at Scale

Posted by Richard Seroter on  Jun 23, 2014

This InfoQ article series focuses on automation tools and ideas for maintaining dynamic pools of compute resources.

A Pragmatic Approach to Scaling Security in the Cloud

Posted by Mark Nunnikhoven on  Jun 06, 2014

Security. Cloud. Two words that are almost always together but rarely happily. Learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud. 3

From MDM to MDM: From Managing Devices to Apps to Data

Posted by Jesus Rodriguez on  May 22, 2014

Mobile operations management is one of the top priorities of modern enterprise and after establishing solutions for device management, the next challenge is to manage and secure mobile business data.

How to Protect Valuable or Personal Data on PC, Hard Drive and Flash Drive

Posted by Sergey Solomatin on  Mar 28, 2014

Approximately 60% of all computers sold worldwide today are portable, making them an easy target for criminals. How can your personal data be protected? With one word - encryption! 2

Answering Common Cloud Security Questions from CIOs

Posted by Gilad Parran-Nissany on  Feb 12, 2014

With the news stories of possible data breaches at enterprises like Target, and companies migrating to cloud environments, CIOs have been asking hard questions about cloud security. 2

Big Data Analytics for Security

Posted by Alvaro A. Cárdenas, Pratyusa K. Manadhata, Sreeranga P. Rajan on  Feb 11, 2014

In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to process data for security analysis.

Beyond Piracy: Software Publishers Battle Greater Threats to Their Intellectual Property

Posted by Michelle Nerlinger on  Jan 07, 2014

Software piracy emerged in the 1980s and has since spread beyond the software industry. Today software products are becoming more susceptible to incidences of code tampering, not just outright theft.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT