BT
Older Newer rss

Securing the Cloud: Identity Management and Network Security in the Cloud

Posted by Mark Ryland  on  Aug 02, 2012

Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.

Keynote: MythBusters 2.0 - Mission Critical Cloud Computing @ NASA

Posted by Khawaja Shams  on  Jul 26, 2012 2

Khawaja Shams presents how NASA’s JPL uses cloud computing, and evaluates some of the existing cloud computing myths in the MythBusters style.

Fighting the 21st Century Fraudster

Posted by Kunal Bhasin  on  Jul 25, 2012

Kunal Bhasin discusses in-memory and Big Data computing techniques used for the detection of banking fraud in real time.

Accessing Real-World APIs from Clojure

Posted by Pat Patterson  on  Jul 23, 2012

Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.

Mobile App Security Techniques and Traps

Posted by Graham Lee  on  Jul 19, 2012

Graham Lee discusses designing, building and testing a secure mobile app, detailing several vulnerabilities that can be found in such apps and ways to deal with them.

Progressive Architectures at the Royal Bank of Scotland

Posted by Ben Stopford, Farzad Pezeshkpour and Mark Atwell  on  Jun 26, 2012 4

Ben Stopford, Farzad Pezeshkpour and Mark Atwell discuss: the Manhattan processor – avoiding GC pauses-, beyond messaging with ODC, Risk, data virtualization and collaboration in banking.

Language-based Security as Extreme Modularity

Posted by Jonathan Shapiro, Dean Tribble, Marc Steigler, David Wagner and Mark S. Miller  on  Jun 19, 2012

Jonathan Shapiro, Dean Tribble, Marc Steigler, David Wagner and Mark S. Miller (moderator) present their view on achieving security while using modularity for building large systems.

Lock-free Algorithms

Posted by Martin Thompson and Michael Barker  on  Apr 30, 2012 1

Martin Thompson and Michael Barker explain how Intel x86_64 processors and their memory model work along with low-level techniques that help creating lock-free software.

Who are You? Who am I? Who is Anybody?

Posted by Paul Downey  on  Mar 01, 2012 3

Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.

Spring Social: For the New Web of APIs

Posted by Craig Walls  on  Feb 27, 2012

Craig Walls discusses the need for adding social features to applications, how to secure such applications and how Spring Social can help.

Remaining Hazards and Mitigating Patterns of Secure Mashups in ECMAScript 5

Posted by Mark S. Miller  on  Feb 27, 2012 3

Mark S. Miller explains how to create secure mashups with ECMAScript 5, emphasizing the security pitfalls to be avoided and patterns to use in order to stay clear of them.

Identity Management with Spring Security

Posted by David Syer  on  Feb 10, 2012 3

David Syer discusses identity management, SSO, security standards –SAML, OpenID, OAuth, SCIM, JWT-, how Spring Security can fit in, and demoing IdM as a service.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2013 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT