In this article, authors discuss an ad hoc anonymous and secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.
This article features highlights from interviews with release engineers on the state of the practice and challenges in release engineering space. The interview questions cover topics like release engineering metrics, continuous delivery's benefits and limitations.
In this article, authors examine architectural languages (ALs) and model-driven engineering (MDE) as means for improving the architecture design. They review a framework of AL requirements, which includes Architectural Language definition, features and architecture tools. They also talk about MDE as a technological solution for supporting the AL requirements framework.
In this article, author describes the role of data analytics in healthcare space with emerging wearable technologies like biophysical interfaces, physiological sensors and embedded diagnostic tools.
In this article, based on a research study, author presents big data as service-oriented and evolutionary case of disruptive IT-enabled services (IESs) rather than as datasets.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies. 1
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.
In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.
In this article, authors discuss how using simulation as an integral part of the development process can improve product quality, reduce cost, and deliver reliable working code.