BT

Key Takeaway Points and Lessons Learned from QCon London 2015

Posted by Abel Avram on  Apr 01, 2015

This article summarizes the key takeaways and highlights from QCon London 2015 as blogged and tweeted by attendees.

Hologram - Finally, AWS Key Distribution that Makes Sense

Posted by Arian Adair on  Mar 31, 2015

Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram. Adair details the process, design and main features.

Creating a Mobile Development Strategy for 2015

Posted by Fima Katz on  Mar 30, 2015

Now that 2015 is underway, it’s time to consider a mobile strategy framework for a prosperous year. We will be discussing some key points to consider as you plan your strategy for a successful future.

The Indian Banking Community Cloud

Posted by Lalit Sangavarapu, Shakti Mishra, Abraham Williams, G.R. Gangadharan on  Mar 28, 2015

In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.

Q&A with Gene Kim on the State of DevOps Survey

Posted by Manuel Pais on  Mar 26, 2015

The 2015 State of DevOps survey is out. Survey's co-author Gene Kim explains what are the goals for this edition, how the data is analysed and what have we learned so far from past surveys.

The Microservice Revolution: Containerized Applications, Data and All

Posted by Luke Marsden on  Mar 19, 2015

This article describes the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures. 7

Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

Posted by Aaron Beuhring and Kyle Salous on  Mar 17, 2015

In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.

Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.

Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2015 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT