Alex Batlin and Shane Williams explore the challenges faced maintaining the security of mobile apps and also take a look at the enterprise implications with the push for BYOD.
Charles Cai, Ashwani Roy discuss a robust, cost effective, hypothetical solution to address extreme challenges in financial institutions, from decision making support to pricing and risk management.
Derek Parham discloses details of the largest and most complicated user migration and code refactoring in Google’s history when all their services were made available to Google Apps users.
Chris Haddad discusses cloud computing, PaaS, multi-tenancy, cloud ecosystems, cloud aware APIs from the perspective and the benefits it can provide to the business.
Dan North discusses the need to embrace uncertainty of scope, technology, effort and structure, expecting the unexpectable and anticipating ignorance.
Elonka Dunin reviews the CIA Kryptos’ history, going over the parts that have been solved, and discussing efforts to crack the famous unsolved section, K4.
Ganesh Prasad discusses the essentials of the loosely-coupled identity management approach called LIMA,
Mike Andrews discusses architecting for failure even you when don’t know what might fail.
John Hughes explains how Quviq tests embedded ECU software for AUTOSAR compliance using QuickCheck.
Vitaly Osipov shares 7 product security lessons learned at Atlassian related to why security incidents happen, what we would like to do about them and what can be done.