New Early adopter or innovator? InfoQ has been working on some new features for you. Learn more

  • Big Data Follow 21 Followers

    Garage Door Openers: An Internet of Things Case Study

    by Jonathan Margulies Follow 0 Followers on  Sep 13, 2015 1

    In this article, author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure. He talks about cloud service authentication and security improvements offered by networked openers, like two-factor authentication (2FA). He also discusses security infrastructure for IoT devices, which includes user authentication, access policy creation & enforcement.

  • Followers

    An Overview of ANONIZE: A Large-Scale Anonymous Survey System

    by Susan Hohenberger Follow 0 Followers , Steven Myers Follow 0 Followers , Rafael Pass Follow 0 Followers , Abhi Shelat Follow 0 Followers on  Jul 26, 2015

    In this article, authors discuss an ad hoc anonymous and secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.

  • Followers

    The Practice and Future of Release Engineering

    by Bram Adams Follow 0 Followers , Stephany Bellomo Follow 0 Followers , Christian Bird Follow 0 Followers , Tamara Marshall-Keim Follow 0 Followers , Foutse Khomh Follow 0 Followers , Kim Moir Follow 0 Followers on  Jul 19, 2015 2

    This article features highlights from interviews with release engineers on the state of the practice and challenges in release engineering space. The interview questions cover topics like release engineering metrics, continuous delivery's benefits and limitations.


The Road Ahead for Architectural Languages

Posted by Patricia Lago Follow 0 Followers , Ivano Malavolta Follow 0 Followers , Henry Muccini Follow 0 Followers , Patrizio Pelliccione Follow 0 Followers , Antony Tang Follow 0 Followers on  Jun 28, 2015

In this article, authors examine architectural languages (ALs) and model-driven engineering (MDE) as means for improving architecture design. They review a framework for AL definition and tools.


The Promise of Healthcare Analytics

Posted by Seth Earley Follow 0 Followers on  Jun 21, 2015

In this article, author describes the role of data analytics in healthcare space with emerging wearable technologies like biophysical interfaces, physiological sensors and embedded diagnostic tools.


Big Data and IT-Enabled Services: Ecosystem and Coevolution?

Posted by Bongsug (Kevin) Chae Follow 0 Followers on  Jun 13, 2015

In this article, based on a research study, author presents big data as service-oriented and evolutionary case of disruptive IT-enabled services (IESs) rather than as datasets.


Fifteen Years of Service-Oriented Architecture at Credit Suisse

Posted by Stephan Murer Follow 0 Followers , Claus Hagen Follow 0 Followers on  Apr 03, 2015

In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4


The Indian Banking Community Cloud

Posted by Lalit Sangavarapu Follow 0 Followers , Shakti Mishra Follow 0 Followers , Abraham Williams Follow 0 Followers , G.R. Gangadharan Follow 0 Followers on  Mar 28, 2015

In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.


Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

Posted by Aaron Beuhring Follow 0 Followers , Kyle Salous Follow 0 Followers on  Mar 17, 2015

In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies. 1


Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo Follow 0 Followers , Syed Rizvi Follow 0 Followers , William Aiken Follow 0 Followers , John Kissell Follow 0 Followers on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1


Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser Follow 0 Followers on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.


How Well Do You Know Your Personae Non Gratae?

Posted by Jane Cleland-Huang Follow 0 Followers on  Nov 27, 2014

In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.

Login to InfoQ to interact with what matters most to you.

Recover your password...


Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.


More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.


Stay up-to-date

Set up your notifications and don't miss out on content that matters to you