BT
Older Newer rss

Famous Unsolved Codes: Kryptos

Posted by Elonka Dunin  on  Jan 18, 2013

Elonka Dunin reviews the CIA Kryptos’ history, going over the parts that have been solved, and discussing efforts to crack the famous unsolved section, K4.

Faster, Cheaper Identity Management through Loose Coupling – the LIMA Approach

Posted by Ganesh Prasad  on  Jan 02, 2013

Ganesh Prasad discusses the essentials of the loosely-coupled identity management approach called LIMA,

Keynote: System, Heal Thyself

Posted by Mike Andrews  on  Oct 03, 2012

Mike Andrews discusses architecting for failure even you when don’t know what might fail.

Certifying Your Car with Erlang

Posted by John Hughes  on  Sep 20, 2012 2

John Hughes explains how Quviq tests embedded ECU software for AUTOSAR compliance using QuickCheck.

Security Vulnerabilities for Grown-ups

Posted by Vitaly Osipov  on  Sep 14, 2012

Vitaly Osipov shares 7 product security lessons learned at Atlassian related to why security incidents happen, what we would like to do about them and what can be done.

Hook-up to the Social Networks with OAuth 2.0

Posted by John Davies  on  Aug 31, 2012 1

John Davies discusses passwords, the need for multiple passwords and password managers, and how OAuth is providing SSO for multiple sites, including an OAuth demo app for the iPhone.

OAuth - Everything You Want to Know (Hopefully)

Posted by Pratap Chilukuri  on  Aug 17, 2012 1

Pratap Chilukuri explains what OAuth is and how it works, exemplifying using the protocol with an example.

Securing OAuth2-Enabled, Multi-Tenant Applications with Spring Security

Posted by Robert Winch  on  Aug 03, 2012 3

Robert Winch explains how to secure a multi-tenant application with Spring Security and how to enable OAuth 2.

Securing the Cloud: Identity Management and Network Security in the Cloud

Posted by Mark Ryland  on  Aug 02, 2012

Mark Ryland presents and demoes identity and access management concepts as used in the cloud and EC2 security groups and packet networking inside the Amazon AWS.

Keynote: MythBusters 2.0 - Mission Critical Cloud Computing @ NASA

Posted by Khawaja Shams  on  Jul 26, 2012 2

Khawaja Shams presents how NASA’s JPL uses cloud computing, and evaluates some of the existing cloud computing myths in the MythBusters style.

Fighting the 21st Century Fraudster

Posted by Kunal Bhasin  on  Jul 25, 2012

Kunal Bhasin discusses in-memory and Big Data computing techniques used for the detection of banking fraud in real time.

Accessing Real-World APIs from Clojure

Posted by Pat Patterson  on  Jul 23, 2012

Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT