In this article, authors summarize the information published in "Tools of the Trade" column series in IEEE Software magazine for last ten years. Tools and best practices are organized into categories like design, developing code, tooling, builds, and operations.
With the emergence of the WebRTC API standard, telecom’s control of communications is changing. This standard enables developers without any experience in telecommunications technology and protocols to easily integrate real-time comms into their applications. This ease of access will spawn new innovative use cases that will change the way that we communicate, exchange information and interact.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and patterns and the organization's transition from using tightly integrated mainframe programs to open SOA services with emphasis on the importance of interface contracts and service governance.
This article summarizes the key takeaways and highlights from QCon London 2015 as blogged and tweeted by attendees.
Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram. Adair details the process, design and main features.
Now that 2015 is underway, it’s time to consider a mobile strategy framework for a prosperous year. We will be discussing some key points to consider as you plan your strategy for a successful future.
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.
The 2015 State of DevOps survey is out. Survey's co-author Gene Kim explains what are the goals for this edition, how the data is analysed and what have we learned so far from past surveys.
This article describes the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures. 7
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.