BT

Creating a Mobile Development Strategy for 2015

Posted by Fima Katz on  Mar 30, 2015

Now that 2015 is underway, it’s time to consider a mobile strategy framework for a prosperous year. We will be discussing some key points to consider as you plan your strategy for a successful future.

The Indian Banking Community Cloud

Posted by Lalit Sangavarapu, Shakti Mishra, Abraham Williams, G.R. Gangadharan on  Mar 28, 2015

In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.

Q&A with Gene Kim on the State of DevOps Survey

Posted by Manuel Pais on  Mar 26, 2015

The 2015 State of DevOps survey is out. Survey's co-author Gene Kim explains what are the goals for this edition, how the data is analysed and what have we learned so far from past surveys.

The Microservice Revolution: Containerized Applications, Data and All

Posted by Luke Marsden on  Mar 19, 2015

This article describes the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures. 7

Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

Posted by Aaron Beuhring and Kyle Salous on  Mar 17, 2015

In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.

Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.

Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.

Config Management Camp Panel: Next Steps in Configuration Management

Posted by Carlos Sanchez on  Feb 22, 2015

Patrick Debois ran the Config Management Camp panel "Next Steps in Configuration Management", featuring Luke Kanies, John Keiser, Thomas Hatch and Mark Phillips.

Service-Oriented Architecture and Legacy Systems

Posted by Nicolas Serrano, Josune Hernantes, Gorka Gallardo on  Feb 20, 2015

In this article, authors provide an overview of current SOA technologies and incremental transition to SOA in legacy environments. They also discuss web services & enterprise application integration. 6

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2015 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT