• Architecture & Design Follow 1632 Followers

    Projecting a Modular Future

    by Markus Voelter Follow 0 Followers , Jos Warmer Follow 0 Followers , Bernd Kolb Follow 0 Followers on  Sep 27, 2015

    In this article, the authors discuss modularity and projectional editing concepts used to design programming languages, using a language workbench (LWB) like Jetbrains' MPS. They discuss how they used these techniques in three different domains: embedded-software development, requirements engineering, and insurance rules.

  • Big Data Follow 98 Followers

    Garage Door Openers: An Internet of Things Case Study

    by Jonathan Margulies Follow 0 Followers on  Sep 13, 2015 1

    In this article, author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure. He talks about cloud service authentication and security improvements offered by networked openers, like two-factor authentication (2FA). He also discusses security infrastructure for IoT devices, which includes user authentication, access policy creation & enforcement.

  • Followers

    An Overview of ANONIZE: A Large-Scale Anonymous Survey System

    by Susan Hohenberger Follow 0 Followers , Steven Myers Follow 0 Followers , Rafael Pass Follow 0 Followers , Abhi Shelat Follow 0 Followers on  Jul 26, 2015

    In this article, authors discuss an ad hoc anonymous and secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.


The Practice and Future of Release Engineering

Posted by Bram Adams Follow 0 Followers , Stephany Bellomo Follow 0 Followers , Christian Bird Follow 0 Followers , Tamara Marshall-Keim Follow 0 Followers , Foutse Khomh Follow 0 Followers , Kim Moir Follow 0 Followers on  Jul 19, 2015

This article features highlights from interviews on the state of practice and challenges in release engineering space. Interview questions cover topics like metrics, continuous delivery's benefits. 2


The Road Ahead for Architectural Languages

Posted by Patricia Lago Follow 0 Followers , Ivano Malavolta Follow 0 Followers , Henry Muccini Follow 0 Followers , Patrizio Pelliccione Follow 0 Followers , Antony Tang Follow 0 Followers on  Jun 28, 2015

In this article, authors examine architectural languages (ALs) and model-driven engineering (MDE) as means for improving architecture design. They review a framework for AL definition and tools.


The Promise of Healthcare Analytics

Posted by Seth Earley Follow 0 Followers on  Jun 21, 2015

In this article, author describes the role of data analytics in healthcare space with emerging wearable technologies like biophysical interfaces, physiological sensors and embedded diagnostic tools.


Big Data and IT-Enabled Services: Ecosystem and Coevolution?

Posted by Bongsug (Kevin) Chae Follow 0 Followers on  Jun 13, 2015

In this article, based on a research study, author presents big data as service-oriented and evolutionary case of disruptive IT-enabled services (IESs) rather than as datasets.


Fifteen Years of Service-Oriented Architecture at Credit Suisse

Posted by Stephan Murer Follow 0 Followers , Claus Hagen Follow 0 Followers on  Apr 03, 2015

In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4


The Indian Banking Community Cloud

Posted by Lalit Sangavarapu Follow 0 Followers , Shakti Mishra Follow 0 Followers , Abraham Williams Follow 0 Followers , G.R. Gangadharan Follow 0 Followers on  Mar 28, 2015

In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.


Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

Posted by Aaron Beuhring Follow 0 Followers , Kyle Salous Follow 0 Followers on  Mar 17, 2015

In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies. 1


Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo Follow 0 Followers , Syed Rizvi Follow 0 Followers , William Aiken Follow 0 Followers , John Kissell Follow 0 Followers on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1


Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser Follow 0 Followers on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.

Login to InfoQ to interact with what matters most to you.

Recover your password...


Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.


More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.


Stay up-to-date

Set up your notifications and don't miss out on content that matters to you