This article features highlights from interviews with release engineers on the state of the practice and challenges in release engineering space. The interview questions cover topics like release engineering metrics, continuous delivery's benefits and limitations.
In this article, authors examine architectural languages (ALs) and model-driven engineering (MDE) as means for improving the architecture design. They review a framework of AL requirements, which includes Architectural Language definition, features and architecture tools. They also talk about MDE as a technological solution for supporting the AL requirements framework.
Data analytics play a central role in the healthcare system by improving outcomes and quality of life while helping to control costs. In this article, author describes the role analytics can play with the emerging wearable technologies with biophysical interfaces, physiological sensors, and embedded diagnostic tools.
In this article, based on a research study, author presents big data as service-oriented and evolutionary case of disruptive IT-enabled services (IESs) rather than as datasets.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies. 1
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.
In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.
In this article, authors discuss how using simulation as an integral part of the development process can improve product quality, reduce cost, and deliver reliable working code.
Bitcoin currency is getting more attention than any other digital currency model. In this article, authors analyze Bitcoin's decentralized model and discuss solutions to enhance its decentralization. 2