BT
x Your opinion matters! Please fill in the InfoQ Survey about your reading habits!
Older rss
  • Shadow IT Risk and Reward

    by Chris Haddad on  Oct 08, 2014

    Chris Haddad explains in this article what Shadow IT is, what role it plays in the enterprise and why Enterprise IT needs to embrace it, adapt and address Shadow IT requirements, autonomy, and goals.

  • Q&A with Barry Boehm and Richard Turner on The Incremental Commitment Spiral Model

    by Ben Linders on  Aug 27, 2014

    The Incremental Commitment Spiral Model describes a process model generator. InfoQ interviewed the authors about the principles underlying the Incremental Commitment Spiral Model (ICSM), applying the ICSM, benefits that organization can get from it, and how organizations can use the ICSM to determine under what conditions to use software-intensive agile frameworks like Scrum, DSDM, SAFe, or DAD.

  • Article Series: Automation in the Cloud and Management at Scale

    by Richard Seroter on  Jun 23, 2014

    Cloud computing is more than just fast self-service of virtual infrastructure. Developers and admins are looking for ways to provision and manage at scale. This InfoQ article series will focus on automation tools and ideas for maintaining dynamic pools of compute resources.

A Pragmatic Approach to Scaling Security in the Cloud

Posted by Mark Nunnikhoven on  Jun 06, 2014

Security. Cloud. Two words that are almost always together but rarely happily. Learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud. 3

From MDM to MDM: From Managing Devices to Apps to Data

Posted by Jesus Rodriguez on  May 22, 2014

Mobile operations management is one of the top priorities of modern enterprise and after establishing solutions for device management, the next challenge is to manage and secure mobile business data.

How to Protect Valuable or Personal Data on PC, Hard Drive and Flash Drive

Posted by Sergey Solomatin on  Mar 28, 2014

Approximately 60% of all computers sold worldwide today are portable, making them an easy target for criminals. How can your personal data be protected? With one word - encryption! 2

Answering Common Cloud Security Questions from CIOs

Posted by Gilad Parran-Nissany on  Feb 12, 2014

With the news stories of possible data breaches at enterprises like Target, and companies migrating to cloud environments, CIOs have been asking hard questions about cloud security. 2

Big Data Analytics for Security

Posted by Alvaro A. Cárdenas, Pratyusa K. Manadhata, Sreeranga P. Rajan on  Feb 11, 2014

In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to process data for security analysis.

Beyond Piracy: Software Publishers Battle Greater Threats to Their Intellectual Property

Posted by Michelle Nerlinger on  Jan 07, 2014

Software piracy emerged in the 1980s and has since spread beyond the software industry. Today software products are becoming more susceptible to incidences of code tampering, not just outright theft.

Preparing for Your First MongoDB Deployment: Backup and Security

Posted by Mat Keep on  Jan 05, 2014

This article we focuses on the database backup tools and security policies when deploying MongoDB NoSQL databases. Cloud backup with MongoDB Management Service (MMS) is covered. 1

Tracking Schedule Progress in Agile

Posted by Yuval Yeret on  Jan 01, 2014

Tracking projects is challenging when enterprises adopt agile in product development. Smaller work items and lower work in process improves risk management and supports agile execution and learning. 3

Securing Servers in the Cloud: An Interview With Trend Micro

Posted by Richard Seroter on  Nov 13, 2013

What’s the best way to protect servers in the cloud? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT