BT
  • Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

    by Aaron Beuhring and Kyle Salous on  Mar 17, 2015

    In this article, authors discuss the security vulnerabilities in software applications and how whitelisting approach has advantages over blacklisting. They also talk about how to implement the whitelisting security policies and cost involved with it.

  • How to Start With Security

    by Rémon (Ray) Sinnema on  Mar 14, 2015

    Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it. It will help get you started or hopefully give you some new ideas if you're already doing some security work.

  • Q&A on Agile! The Good, the Hype and the Ugly

    by Ben Linders on  Mar 13, 2015 4

    The book "Agile! The Good, the Hype and the Ugly" by Bertrand Meyer provides a review of agile principles, techniques and tools. It explores the agile methods Extreme Programming, Lean Software, Scrum and Crystal and provides suggestions on what to use or not to use from them, based on software engineering principles and research and personal experience of the book author.

Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.

Go for the Money! JSR 354 Adds First Class Money and Currency Support to Java

Posted by Anatole Tresch on  Mar 03, 2015

First class money & currency support in Java are almost here. JSR 354 spec lead Credit Suisse's Anatole Tresch discusses previous shortcomings, motivation for the new APIs, & lots of examples. 1

Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.

Visual Portfolio Management: Collaboratively Aligning Your Company

Posted by Markus Andrezak on  Feb 23, 2015

The three-horizons model explains how companies can work on the right things to ensure sustainable growth. Visual portfolio management can integrate the different types of work into a coherent system. 2

Metadata Driven Design - An Agile Bridge Between Design and Development

Posted by Aaron Kendall on  Feb 19, 2015

Aaron Kendall of Barnes & Noble discusses an Agile method they have been using that combines the design of the overall architecture and implementation. 1

Highly Distributed Computations Without Synchronization

Posted by Christopher Meiklejohn on  Feb 17, 2015

In this article, Basho Sr. Software Engineer Chris Meiklejohn explores the basic building blocks for crafting deterministic applications that guarantee convergence of data without synchronization. 1

Big Data Processing with Apache Spark – Part 1: Introduction

Posted by Srini Penchikala on  Jan 30, 2015

Apache Spark is an open source big data framework built around speed, ease of use, and sophisticated analytics. In this article, Srini Penchikala discusses how Spark helps with big data processing. 3

Evo: The Agile Value Delivery Process, Where ‘Done’ Means Real Value Delivered; Not Code

Posted by Tom Gilb & Kai Gilb on  Jan 26, 2015

This article describes what ‘Evo’ is at core, and how it is different from other Agile practices, and why ‘done’ should mean ‘value delivered to stakeholders’. 1

Building a Mars Rover Application with DynamoDB

Posted by Daniela Miao, Kenta Yasukawa on  Jan 25, 2015

This article shows how to use Amazon DynamoDB to create a Mars Rover application. You can use the same concepts described in this post to build your own web application. 1

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2015 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT