BT

Your opinion matters! Please fill in the InfoQ Survey!

Older rss
  • Data Science Follow 340 Followers

    User Anonymity on Twitter

    by Sai Teja Peddinti Follow 0 Followers , Keith W Ross Follow 0 Followers , Justin Cappos Follow 0 Followers on  Oct 12, 2017

    This article explores how it is possible to measure how many Twitter users adopted anonymous pseudonyms, the correlation between content sensitivity and user anonymity, and whether it would be possible to build automated classifiers that would detect sensitive Twitter accounts.

  • DevOps Follow 310 Followers

    The Top 10 Adages in Continuous Deployment

    by Chris Parnin Follow 0 Followers , Eric Helms Follow 0 Followers , Chris Atlee Follow 0 Followers , Harley Boughton Follow 0 Followers , Mark Ghattas Follow 0 Followers , Andy Glover Follow 0 Followers , James Holman Follow 0 Followers , John Micco Follow 0 Followers , Brendan Murphy Follow 0 Followers , Tony Savor Follow 0 Followers , Michael Stumm Follow 0 Followers , Shari Whitaker Follow 0 Followers , Laurie Williams Follow 0 Followers on  Sep 19, 2017

    On the basis of discussions at the Continuous Deployment Summit, researchers derived 10 adages about continuous-deployment practices. These adages represent a working set of approaches and beliefs that guide current practice and establish a tangible target for empirical validation.

  • Data Science Follow 340 Followers

    The Problem with AI

    by Seth Earley Follow 0 Followers on  Sep 13, 2017

    AI depends on "data janitorial" work, as opposed to science work, and there is a gulf between prototype and sandbox, and innovation and production.

Data Science Follow 340 Followers

How Much Should We Trust Artificial Intelligence

Posted by George Hurlburt Follow 1 Followers on  Sep 08, 2017

Considerable buzz surrounds AI, and, indeed, AI is all around us. The author examines how we determine whether AI is sufficiently reliable to do its job and how much we should trust its outcomes.

Mobile Follow 68 Followers

Model-Based Software Engineering to Tame the IoT Jungle

Posted by Brice Morin Follow 0 Followers , Nicolas Harrand Follow 1 Followers , Franck Fleurey Follow 0 Followers on  Jul 05, 2017

The ThingML approach addresses the challenges of distribution and heterogeneity in IoT. This model-driven, generative approach has been continuously evolved and applied to cases in different domains.

Mobile Follow 68 Followers

Key Abstractions for IoT-Oriented Software Engineering

Posted by Franco Zambonelli Follow 0 Followers on  Jun 02, 2017

An overview of the key characteristics of complex IoT systems and applications. Based on them, the author identifies the software abstractions at the basis of IoT-oriented software engineering.

Architecture & Design Follow 809 Followers

Operational - the Forgotten Architectural View

Posted by Eoin Woods Follow 0 Followers on  Feb 15, 2017

The emerging DevOps movement emphasizes development and operations staff working together as early as possible-sharing tools, processes, and practices that smooth the production path.

Architecture & Design Follow 809 Followers

Might the Blockchain Outlive Bitcoin?

Posted by George Hurlburt Follow 1 Followers on  Jan 26, 2017

Crypto-currency remains controversial, and Bitcoin is at the center of this controversy. Here is an update on the state of Bitcoin in particular, and examines the future of crypto-currency in general. 1

Culture & Methods Follow 236 Followers

Inner Source—Adopting Open Source Development Practices in Organizations

Posted by Klaas-Jan Stol Follow 0 Followers , Brian Fitzgerald Follow 0 Followers , Follow 0 Followers on  Jun 02, 2016

When adopting inner source, organizations should consider nine factors pertaining to product, process, and organization. 2

Architecture & Design Follow 809 Followers

Context is King: What's your Software's Operating Range?

Posted by Francisco Torres Follow 0 Followers on  Nov 04, 2015

Francisco Torres shares from experience why it is important to define a software’s operating range: the set of quality properties in which a software system can successfully run.

Culture & Methods Follow 236 Followers

Toward Agile Architecture: Insights from 15 Years of ATAM Data

Posted by Stephany Bellomo Follow 0 Followers , Ian Gorton Follow 0 Followers , Rick Kazman Follow 0 Followers on  Oct 17, 2015

The authors have concluded after analyzing 15 years of ATAM data that modifiability, performance, availability, interoperability, and deployability are key quality attributes for Agile practitioners.

Followers

Packet Inspection for Unauthorized OS Detection in Enterprises

Posted by Rohit Tyagi Follow 0 Followers , Tuhin Paul Follow 0 Followers , B.S. Manoj Follow 0 Followers , B. Thanudas Follow 0 Followers on  Oct 10, 2015

The authors discuss an approach that uses TCP SYN packets for OS fingerprinting to detect the presence of unauthorized OSs in an enterprise. 3

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT