In this interview, Dr. Mercuri defines computer forensics, then discusses how forensics apply to criminal, civil, and intellectual property law. She addressed the challenges that technological advances, (e.g. RAID, cell phones, GPS devices, and Cloud Computing) increase the challenges faced by the forensic computer scientist. She also discusses appropriate actions if you suspect security issues.
Management consultant Johanna Rothman helps her clients manage risk: be it risk in a project's people, risk in how the people are managed, or the risk in the projects themselves. In this interview she talked about strategies for risk reduction, useful for teams in all stages of agility, contained in her new book "Manage It! Your Guide to Modern Pragmatic Project Management."
Zed Shaw and Matt Pelletier sat down with InfoQ's Obie Fernandez at RailsConf to explore some of the reasoning behind setting up the mongrel project, getting adoption in enterprise and dealing with developers who just aren't ready. Watch the interview to find out how much Shaw's Enterprise Mongrel product will cost, where the support contracts are and who'll come out on top when the vultures land.
ASP.NET authentication and authorization is essentially a solved problem in ASP.NET 2.0 according to .NET guru Josh Holmes. While the built in authorization providers offer 90% coverage, Josh also discusses when you should utilize a custom provider. Join Josh for ASP.NET tips and tricks in this interview done by David Totzke at VSLive Toronto.
InfoQ sits down Mohammad to discuss the myths of SOA, common pitfalls in designing for SOA, J2EE and .NET interoperability and injecting the Security Development Lifecycle into enterprise development lifecycles.