In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services exclusively to Indian banks to address the financial sector's growing demand for secure cloud-based services.
In this article, authors discuss the security vulnerabilities in software applications and how whitelisting approach has advantages over blacklisting. They also talk about how to implement the whitelisting security policies and cost involved with it.
In this article, authors discuss the software engineering practices in startup companies and provide empirical software engineering sources related to their engineering practices. They talk about the process management being agile, evolutionary, and opportunistic.
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.
In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.
In this article, authors discuss how using simulation as an integral part of the development process can improve product quality, reduce cost, and deliver reliable working code.
Bitcoin currency is getting more attention than any other digital currency model. In this article, authors analyze Bitcoin's decentralized model and discuss solutions to enhance its decentralization. 2
In this article, authors discuss the Reflective Agile Learning Model (REALM) that embeds reflective practice into the iterative and agile software engineering development cycle.
In this IEEE article, authors provide an overview of current technologies for crowdsourcing in software development. They talk about the current practice and trends in collaborative platforms.
In this article, authors discuss a case study of several Android mobile apps to analyze software reuse in terms of inheritance and code reuse as well as framework reuse of whole apps.
In this article, authors talk about the impact of pattern languages on software design community over past 20 years. 1