BT
Older Newer rss
23:42

Eval Begone!: Semi-Automated Removal of Eval from JavaScript Programs

Posted by Gregor Richards  on  Mar 27, 2013

Gregor Richards introduces Evalorizer, a heuristics based tool which is meant to replace JavaScript eval constructs with safer JavaScript correspondents.

34:44

Google Apps' Identity Crisis

Posted by Derek Parham  on  Mar 18, 2013

Derek Parham discloses details of the largest and most complicated user migration and code refactoring in Google’s history when all their services were made available to Google Apps users.

34:19

Building a Cloud Ecosystem Architecture

Posted by Chris Haddad  on  Mar 05, 2013

Chris Haddad discusses cloud computing, PaaS, multi-tenancy, cloud ecosystems, cloud aware APIs from the perspective and the benefits it can provide to the business.

Keynote: Embracing Uncertainty

Posted by Dan North  on  Jan 22, 2013 3

Dan North discusses the need to embrace uncertainty of scope, technology, effort and structure, expecting the unexpectable and anticipating ignorance.

Famous Unsolved Codes: Kryptos

Posted by Elonka Dunin  on  Jan 18, 2013

Elonka Dunin reviews the CIA Kryptos’ history, going over the parts that have been solved, and discussing efforts to crack the famous unsolved section, K4.

Faster, Cheaper Identity Management through Loose Coupling – the LIMA Approach

Posted by Ganesh Prasad  on  Jan 02, 2013

Ganesh Prasad discusses the essentials of the loosely-coupled identity management approach called LIMA,

Keynote: System, Heal Thyself

Posted by Mike Andrews  on  Oct 03, 2012

Mike Andrews discusses architecting for failure even you when don’t know what might fail.

Certifying Your Car with Erlang

Posted by John Hughes  on  Sep 20, 2012 2

John Hughes explains how Quviq tests embedded ECU software for AUTOSAR compliance using QuickCheck.

Security Vulnerabilities for Grown-ups

Posted by Vitaly Osipov  on  Sep 14, 2012

Vitaly Osipov shares 7 product security lessons learned at Atlassian related to why security incidents happen, what we would like to do about them and what can be done.

Hook-up to the Social Networks with OAuth 2.0

Posted by John Davies  on  Aug 31, 2012 1

John Davies discusses passwords, the need for multiple passwords and password managers, and how OAuth is providing SSO for multiple sites, including an OAuth demo app for the iPhone.

OAuth - Everything You Want to Know (Hopefully)

Posted by Pratap Chilukuri  on  Aug 17, 2012 1

Pratap Chilukuri explains what OAuth is and how it works, exemplifying using the protocol with an example.

Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security

Posted by Robert Winch  on  Aug 03, 2012 3

Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT