Clemens Szyperski (Microsoft), Martin Petitclerc (IBM), and Roger Barga (Amazon Web Services) answer three questions: What major challenges do you face when building scalable, big data systems? How do you address these challenges? Where should the research community focus its efforts to create tools and approaches for building highly reliable, scalable, big data systems?
The emerging DevOps movement emphasizes development and operations staff working together as early as possible--sharing tools, processes, and practices that smooth the production path. This article is part of a theme issue on DevOps.
Crypto-currency remains controversial, and Bitcoin, a leading open source initiative to create an alternative form of currency, is at the center of this controversy. Here, the author provides an update on the state of Bitcoin in particular, and examines the future of crypto-currency in general.
Because code analysis alone is insufficient to prevent attacks in today's typical large-scale deployment, certain mitigations should be done throughout the entire software life cycle.
When adopting inner source, organizations should consider nine factors pertaining to product, process, and organization.
Francisco Torres shares from experience why it is important to define a software’s operating range: the set of quality properties in which a software system can successfully run.
The authors have concluded after analyzing 15 years of ATAM data that modifiability, performance, availability, interoperability, and deployability are key quality attributes for Agile practitioners.
The authors discuss an approach that uses TCP SYN packets for OS ﬁngerprinting to detect the presence of unauthorized OSs in an enterprise. 3
Authors discuss modularity and projectional editing concepts used to design programming languages, using a Language Workbench (LWB) tool like MPS from Jetbrains.
Author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure and the security infrastructure for IoT devices, like authentication & access policy enforcement. 1
In this article, authors discuss ad hoc anonymous & secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.
This article features highlights from interviews on the state of practice and challenges in release engineering space. Interview questions cover topics like metrics, continuous delivery's benefits. 2