Older rss
  • DevOps Follow 525 Followers

    GDPR for Operations

    by Jon Topper Follow 0 Followers on  Mar 10, 2018

    With GDPR, taking care of personal data is an organisation-wide responsibility, but in the operations we can provide a lot of supporting tools to help deal with the multiple facets of this problem.

  • Cloud Follow 196 Followers

    Serverless Security: What's Left to Protect?

    by Guy Podjarny Follow 1 Followers on  Feb 23, 2018

    This article aims to provide a broad understanding of security in the Serverless world. We'll consider the ways in which Serverless improves security, the areas where it changes security, and the security concerns it hurts.

  • Mobile Follow 109 Followers

    A Roadmap to the Programmable World

    by Antero Taivalsaari Follow 0 Followers , Tommi Mikkonen Follow 0 Followers on  May 27, 2017

    The emergence of millions of remotely programmable devices in our surroundings will pose significant challenges for software developers. This article proposes a roadmap from today’s cloud-centric, data-centric Internet of Things systems to the Programmable World highlights those challenges that haven’t received enough attention yet.

Cloud Follow 196 Followers

Taking an Application-Oriented Approach to Cloud Adoption

Posted by Amit Kumar Follow 0 Followers on  May 09, 2017

Taking an infrastructure-centric approach to cloud adoption can lead to unrealized benefits. Architect Amit Kumar outlines eleven principles to consider when adopting cloud services. 3

Cloud Follow 196 Followers

A Security Approach for a Cloudy World: An Interview with Pete Cheslock

Posted by Richard Seroter Follow 4 Followers on  Mar 17, 2017

Does your approach to application and data center security change when adopting cloud services? InfoQ reached out to Pete Cheslock, from Threat Stack to learn more.

DevOps Follow 525 Followers

Respect Your Organisational Monoliths

Posted by Margo Cronin Follow 0 Followers on  Aug 18, 2016

There is a lot of information about DevOp out there but little on tackling DevOps in financial organisations. This article presents lessons learnt rolling out DevOps in a large insurance organization.

Culture & Methods Follow 439 Followers

Towards an Agile Software Architecture

Posted by Boyan Mihaylov Follow 0 Followers on  Dec 28, 2015

Boyan Mihaylov covers his experience when working with both traditional waterfall software architectures and agile ones. 11


Hologram - Finally, AWS Key Distribution that Makes Sense

Posted by Arian Adair Follow 0 Followers on  Mar 31, 2015

Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram. Adair details the process, design and main features.


Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo Follow 0 Followers , Syed Rizvi Follow 0 Followers , William Aiken Follow 0 Followers , John Kissell Follow 0 Followers on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1


A Pragmatic Approach to Scaling Security in the Cloud

Posted by Mark Nunnikhoven Follow 0 Followers on  Jun 06, 2014

Security. Cloud. Two words that are almost always together but rarely happily. Learn why that isn’t the case and what you need to known about securing your critical infrastructure in the cloud. 3


Securing Servers in the Cloud: An Interview With Trend Micro

Posted by Richard Seroter Follow 4 Followers on  Nov 13, 2013

What’s the best way to protect servers in the cloud? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro.


Automating Data Protection Across the Enterprise

Posted by Arshad Noor Follow 0 Followers on  Feb 07, 2013

This article defines a Data Encryption Infrastructure (DEI) which encompasses technology components and an application architecture that governs the protection of sensitive data within an enterprise. 1

Login to InfoQ to interact with what matters most to you.

Recover your password...


Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.


More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.


Stay up-to-date

Set up your notifications and don't miss out on content that matters to you