BT

10 tips on how to prevent business value risk

Posted by Chris Matts and Olav Maassen on  Feb 07, 2012

One category of risk that project teams need to ensure they address is business value failure – delivering a product that fails to provide value for the business investor. 3

Software Engineering Meets Services and Cloud Computing

Posted by Stephen S. Yau and Ho G. An on  Jan 04, 2012

In this IEEE article, authors Stephen Yau and Ho An talk about the advantages and challenges in application development using service-oriented architecture and cloud computing technologies. 2

Regulatory Compliant Cloud Computing: Rethinking web application architectures for the cloud

Posted by Arshad Noor on  Dec 16, 2011

This article presents a web application architecture that leverages cloud resources and an enterprise key-management infrastructure to lower costs while proving compliance to data-security regulations 8

Introduction to Cloud Security Architecture from a Cloud Consumer's Perspective

Posted by Subra Kumaraswamy on  Dec 07, 2011

Security concerns plague cloud consumers so how should these concerns be addressed? This article introduces the basic principles and patterns that should guide a cloud security architecture.

Comparison of Intrusion Tolerant System Architectures

Posted by Quyen L. Nguyen and Arun Sood on  Nov 25, 2011

In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system architectures and their efficiency for intrusion tolerance and survivability. 3

Virtual Panel: Security Considerations in Accessing NoSQL Databases

Posted by Srini Penchikala on  Nov 15, 2011

NoSQL databases have been getting lot of attention lately but NoSQL data security is not given much emphasis. This article focuses on the security considerations in accessing NoSQL databases. 4

Developer-Driven Threat Modeling

Posted by Danny Dhillon on  Nov 11, 2011

In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats based on the dataflow diagrams for assessing and mitigating the security risks. 3

Mobile Attacks and Defense

Posted by Charlie Miller on  Oct 17, 2011

In this IEEE article, author Charlie Miller talks about mobile security vulnerabilities. He discusses how iOS and Android phones can be attacked using mobile malware and drive-by downloads.

Agile is at a crossroad: Scale or fail?

Posted by Chris Matts and Olav Maassen on  Oct 14, 2011

Risk management is a crucial discipline for projects, and finding ways to do effective risk management on agile projects will spell the difference between Agile scaling into the enterprise or failing. 5

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2013 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT