In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services exclusively to Indian banks to address the financial sector's growing demand for secure cloud-based services.
Microservice architectures and container-based virtualization have taken the software development community by storm in recent months. This article will describe the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures.
In this article, authors discuss the security vulnerabilities in software applications and how whitelisting approach has advantages over blacklisting. They also talk about how to implement the whitelisting security policies and cost involved with it.
In this article, authors discuss the software engineering practices in startup companies and provide empirical software engineering sources related to their engineering practices. 1
A Technical Leader should demonstrate capability in three main areas which are often overlooked:Team Support, Technical Excellence, and Innovation. Read more about these capabilities in this article. 4
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.
When developers become Tech Leads they have to find a balance between leading teams and continuing to do technical work. A book of stories on situations, challenges and approaches for leading teams.
First class money & currency support in Java are almost here. JSR 354 spec lead Credit Suisse's Anatole Tresch discusses previous shortcomings, motivation for the new APIs, & lots of examples. 1
At then recent Agile Singapore conference James Grenning presented two technically focused talks - one on the importance of technical excellence and the other teaching test driven development. 3
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.
All teams eventually face technical debt. In this article Jeremy gives see a useful metaphor for understanding technical debt, explaining it to stakeholders, and dealing with it in an efficient way. 4