BT
Older rss
  • Operational - the Forgotten Architectural View

    by Eoin Woods on  Feb 15, 2017

    The emerging DevOps movement emphasizes development and operations staff working together as early as possible--sharing tools, processes, and practices that smooth the production path. This article is part of a theme issue on DevOps.

  • Might the Blockchain Outlive Bitcoin?

    by George Hurlburt on  Jan 26, 2017 1

    Crypto-currency remains controversial, and Bitcoin, a leading open source initiative to create an alternative form of currency, is at the center of this controversy. Here, the author provides an update on the state of Bitcoin in particular, and examines the future of crypto-currency in general.

  • Analysis and Mitigation of NoSQL Injections

    by Aviv Ron Alexandra-Shulman-Peleg Anton Puzanov on  Jan 18, 2017

    NoSQL data storage systems lack the security measures and awareness that are required for data protection. Because code analysis alone is insufficient to prevent attacks in today's typical large-scale deployment, certain mitigations should be done throughout the entire software life cycle.

Inner Source—Adopting Open Source Development Practices in Organizations

Posted by Klaas-Jan Stol Brian Fitzgerald on  Jun 02, 2016

When adopting inner source, organizations should consider nine factors pertaining to product, process, and organization.

Context is King: What's your Software's Operating Range?

Posted by Francisco Torres on  Nov 04, 2015

Francisco Torres shares from experience why it is important to define a software’s operating range: the set of quality properties in which a software system can successfully run.

Toward Agile Architecture: Insights from 15 Years of ATAM Data

Posted by Stephany Bellomo Ian Gorton Rick Kazman on  Oct 17, 2015

The authors have concluded after analyzing 15 years of ATAM data that modifiability, performance, availability, interoperability, and deployability are key quality attributes for Agile practitioners.

Packet Inspection for Unauthorized OS Detection in Enterprises

Posted by Rohit Tyagi Tuhin Paul B.S. Manoj B. Thanudas on  Oct 10, 2015

The authors discuss an approach that uses TCP SYN packets for OS fingerprinting to detect the presence of unauthorized OSs in an enterprise. 3

Projecting a Modular Future

Posted by Markus Voelter Jos Warmer Bernd Kolb on  Sep 27, 2015

Authors discuss modularity and projectional editing concepts used to design programming languages, using a Language Workbench (LWB) tool like MPS from Jetbrains.

Garage Door Openers: An Internet of Things Case Study

Posted by Jonathan Margulies on  Sep 13, 2015

Author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure and the security infrastructure for IoT devices, like authentication & access policy enforcement. 1

An Overview of ANONIZE: A Large-Scale Anonymous Survey System

Posted by Susan Hohenberger Steven Myers Rafael Pass Abhi Shelat on  Jul 26, 2015

In this article, authors discuss ad hoc anonymous & secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.

The Practice and Future of Release Engineering

Posted by Bram Adams Stephany Bellomo Christian Bird Tamara Marshall-Keim Foutse Khomh Kim Moir on  Jul 19, 2015

This article features highlights from interviews on the state of practice and challenges in release engineering space. Interview questions cover topics like metrics, continuous delivery's benefits. 2

The Road Ahead for Architectural Languages

Posted by Patricia Lago Ivano Malavolta Henry Muccini Patrizio Pelliccione Antony Tang on  Jun 28, 2015

In this article, authors examine architectural languages (ALs) and model-driven engineering (MDE) as means for improving architecture design. They review a framework for AL definition and tools.

BT