Colin Harrington warns that application security is not a concern that we can ignore. Vulnerabilities come from various angles, but it is important to stay aware so we can recognize and thwart threats
David Syer explores the new features in Spring OAuth2, providing guidance on what to use and when, and showing how easy they are to enable quickly.
Scott Smerchek presents the benefits of using a nonprofit web project to learn Rails and what he learned while building LoveKC.org, introducing various Rails topics.
Josh Long introduces some of the latest Spring features supporting HATEOAS-compliant and OAuth-secured REST services, NoSQL and Big Data, Websockets, OAuth, open-web security and mobile.
Paul Fremantle discusses using WSO2 Identity Server for a federated identity for the Internet of Things.
Chris Risner demos an Android app built with Azure Mobile Services using structured data stored in the cloud, GCM push notifications with a single line of code, authentication, security and others.
Paul Simmonds discusses the importance of identity and attribute information that will define how access to the functionality and how data is governed by applications in the near future.
The role of API management infrastructure in API Security, API Access Control and API Federation and its interaction with enterprise infrastructure, social identity and application developers.
Justin Kobel introduces claims-based authentication, what are claims, their life cycle, explaining how to consume them in .NET through a number of demoes.
Chas Emerick explains how to implement multi-factor authentication, role-based authorization and phishing prevention with Friend.
Derek Parham discloses details of the largest and most complicated user migration and code refactoring in Google’s history when all their services were made available to Google Apps users.
Ganesh Prasad discusses the essentials of the loosely-coupled identity management approach called LIMA,