Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. They talk about the challenges in the areas of transparency, encryption and colocation and domain-tailored audits as ideal solution in the new model.
When developers become Tech Leads they have to find a balance between leading teams and continuing to do technical work. The book Talking with Tech Leads contains stories from Tech Leads on situations, challenges and approaches for leading teams. It explores the role and activities of technical leaders, and provides suggestions how to deal with responsibilities that come with technical leadership.
At the recent Agile Singapore conference Lee Cunningham provided advice for Agile champions on how to align Agile with the goals and priorities of senior executives, to garner their support.
Mike McQuaid, Software Engineer at GitHub, has written "Git in Practice" which provides over 60 techniques for working with and managing Git projects. InfoQ caught up with Mike, and asked about it.
First class money & currency support in Java are almost here. JSR 354 spec lead Credit Suisse's Anatole Tresch discusses previous shortcomings, motivation for the new APIs, & lots of examples. 1
Book Review and QnA with authors of eBook "Perspectives on Agile Software Development".
In this (post)HTML5 series, we go beyond buzzwords and get practical insights from experts about what has actually worked for them.
Frequently developers cause and face regular frustration often due to a lack of consideration for those who come after them. This article explores collective code ownership to address this. 2
At then recent Agile Singapore conference James Grenning presented two technically focused talks - one on the importance of technical excellence and the other teaching test driven development. 2
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.