Data analytics play a central role in the healthcare system by improving outcomes and quality of life while helping to control costs. In this article, author describes the role analytics can play with the emerging wearable technologies with biophysical interfaces, physiological sensors, and embedded diagnostic tools.
In this article, based on a research study, author presents big data as a service-oriented and evolutionary case of disruptive IT-enabled services (IESs) rather than as datasets. Big data services emerge from combining diverse resources from an ecosystem of technologies, market needs, social actors, and other institutional contexts.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and patterns and the organization's transition from using tightly integrated mainframe programs to open SOA services with emphasis on the importance of interface contracts and service governance.
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies. 1
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. 1
In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.
In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.
In this article, authors discuss how using simulation as an integral part of the development process can improve product quality, reduce cost, and deliver reliable working code.
Bitcoin currency is getting more attention than any other digital currency model. In this article, authors analyze Bitcoin's decentralized model and discuss solutions to enhance its decentralization. 2
In this article, authors discuss the Reflective Agile Learning Model (REALM) that embeds reflective practice into the iterative and agile software engineering development cycle.
In this IEEE article, authors provide an overview of current technologies for crowdsourcing in software development. They talk about the current practice and trends in collaborative platforms.