Older Newer rss

The Five Elements of IoT Security, Open Source to the Rescue!

Posted by Julien Vermillard  on  May 08, 2015

Julien Vermillard discusses challenges in IoT security regarding hardware, upgrade, transport, credentials, and cloud.


Release Testing Is Risk Management Theatre

Posted by Steve Smith  on  May 07, 2015

Steve Smith discusses why Release Testing is an anti-pattern, and offers an alternative risk reduction strategy.


Design Goals of the Smallest Federated Wiki

Posted by Ward Cunningham  on  May 07, 2015

Ward Cunningham discusses the designs goals of a federated wiki.


Simplify Project and Portfolio Planning with "Real Options"

Posted by Matt Barcomb  on  Apr 29, 2015

Matt Barcomb shares practical ideas for generating and validating projects as Real Options, using value models and risk consideration to create a framework for prioritization and decision-making.


Great Single Page Apps Need Great Back-ends

Posted by Adib Saikali  on  Apr 25, 2015 2

Adib Saikali describes the best practices for building back-end services to support sophisticated single page apps using Spring 4. It contains demo code examples.


Java 9 and Beyond

Posted by Mark Reinhold  on  Apr 23, 2015

Mark Reinhold keynotes on Java 9’s impact and features –platform module system, security, performance, maintenance-, and speculates on what might come after that, including the Java VM.


Too Big to Fail: Running A/B Experiments When You're Betting the Bank

Posted by Andrea Burbank  on  Mar 01, 2015

Andrea Burbank discusses the risks, benefits, and lessons from running a single huge experiment with hundreds of moving parts, and with long-term engagement as the metric of success.


Spring Boot for the Web Tier

Posted by Dave Syer,Phil Webb  on  Feb 13, 2015

This talk shows what Spring Boot has to offer the web developer out of the box: content negotiation, internationalization, view templates, security, messaging with websockets, etc.


Software Security - A Study in Technology Transfer

Posted by Gary McGraw  on  Feb 01, 2015

Gary McGraw keynotes on the internal forces and relationships active inside companies that drive them to success by managing to take ideas and transform them into technologies.


Securing Your Grails App - Beyond Authentication & Authorization

Posted by Colin Harrington  on  Jan 25, 2015

Colin Harrington warns that application security is not a concern that we can ignore. Vulnerabilities come from various angles, but it is important to stay aware so we can recognize and thwart threats


The Big Data Imperative: Discovering & Protecting Sensitive Data in Hadoop

Posted by Jeremy Stieglitz  on  Dec 21, 2014

Jeremy Stieglitz discusses best practices for a data-centric security , compliance and data governance approach, with a particular focus on two customer use cases.


From 0 to Spring Security 4.0

Posted by Rob Winch  on  Dec 20, 2014

Rob Winch shows how to incrementally build security into an application, highlighting the new features in Spring Security 4 along the way.

General Feedback
Marketing and all content copyright © 2006-2015 C4Media Inc. hosted at Contegix, the best ISP we've ever worked with.
Privacy policy