BT
Older Newer rss
40:21

Reflections on Mistrusting Trust: How Policy & Technical People Use the T-word in Opposite Senses

Posted by Caspar Bowden  on  Jun 17, 2014

Caspar Bowden discusses about duplicity, the impact of Snowden's revelations on the society and what can be done about trust today.

53:23

Risk Management is Project Management for Grown-Ups

Posted by Tim Lister  on  Jun 12, 2014

Tim Lister presents the advantages—and the dangers—of practicing risk management in an adult-like fashion, offering a process for tailoring an organization and discussing how an organization can grow up.

46:22

Understanding & Managing Your Digital Footprint

Posted by Robin Wilton  on  Jun 11, 2014

Robin Wilton wonders what are the real costs, risks and economics of digital footprints, and what - if anything - can be done about it? This session examines these issues and makes some practical recommendations about how to understand and manage one's digital footprints.

40:33

Chrome Security

Posted by Parisa Tabriz  on  Apr 09, 2014

Parisa Tabriz presents current online threats and some of the ways Chrome protects users, along with Chrome's philosophies, successes, and ongoing challenges to doing security in a browser.

01:17:30

Plugging the Users in - Extend Your Application with Pluggable Groovy DSL

Posted by Baruch Sadogursky  on  Mar 12, 2014

Baruch Sadogursky discusses creating DSLs which support plugins written both in Groovy or Java, addressing good public API design practices, security, and classpath isolation.

01:30:44

Application Security Pitfalls

Posted by Mike Wiesner  on  Mar 12, 2014

Mike Wiesner advises on dealing with security tradeoffs when creating Servlet Container, Spring MVC or Spring Integration type of applications.

01:19:02

Case Study - Using Grails in the Real World

Posted by Greg Turnquist  on  Feb 13, 2014

Greg Turnquist demoes using Spring Mail, Security, REST, GridFS, Bootstrap and jQuery in a production grade Grails application.

01:28:08

Uncle Sam's Guide to Grails Security

Posted by Joe Rinehart  on  Jan 31, 2014

Joe Rinehart discusses some of the essential security topics for Grails (and Java) Web applications, showing how Grails can make life easier and the pitfalls of attempting to secure highly dynamic code.

29:24

Common Security Pitfalls for Mobile Apps in the Enterprise

Posted by Kevin Watkins, Steve Hanna  on  Jan 29, 2014

Watkins and Hanna discuss the top 5 security mistakes made by developers, examining them in detail by looking at the code and highlighting the risks from both the consumer and developer perspective.

53:16

My Other Internet is a Mirage

Posted by Anil Madhavapeddy  on  Jan 14, 2014 1

Anil Madhavapeddy suggests a different approach to building Internet services avoiding the complexity of today's services which incorporate many policies and security mechanisms.

45:25

One Backend Per User: 100% Data Privacy / 0 Scaling Issues

Posted by Michiel B. de Jong  on  Jan 06, 2014

Michiel de Jong suggests solving the data privacy and scalability issues by enabling mobile apps to connect to user's preferred back-end using Dropbox.js, GDrive JS, NimbusBase, remoteStorage.io, etc.

48:44

API Security and Federation Patterns

Posted by Francois Lascelles  on  Dec 23, 2013

Francois Lascelles examines the role of API management infrastructure in API Security, API Access Control and API Federation and its interaction with enterprise infrastructure, social identity and application developers.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2014 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT