New Early adopter or innovator? InfoQ has been working on some new features for you. Learn more

  • Followers

    The Indian Banking Community Cloud

    by Lalit Sangavarapu Follow 0 Followers , Shakti Mishra Follow 0 Followers , Abraham Williams Follow 0 Followers , G.R. Gangadharan Follow 0 Followers on  Mar 28, 2015

    In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services exclusively to Indian banks to address the financial sector's growing demand for secure cloud-based services.

  • Followers

    Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

    by Aaron Beuhring Follow 0 Followers , Kyle Salous Follow 0 Followers on  Mar 17, 2015 1

    In this article, authors discuss the security vulnerabilities in software applications and how whitelisting approach has advantages over blacklisting. They also talk about how to implement the whitelisting security policies and cost involved with it.

  • Followers

    Cloud Security Auditing: Challenges and Emerging Approaches

    by Jungwoo Ryoo Follow 0 Followers , Syed Rizvi Follow 0 Followers , William Aiken Follow 0 Followers , John Kissell Follow 0 Followers on  Mar 08, 2015 1

    Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. They talk about the challenges in the areas of transparency, encryption and colocation and domain-tailored audits as ideal solution in the new model.


Employing Enterprise Architecture for Applications Assurance

Posted by Walter Houser Follow 0 Followers on  Feb 26, 2015

In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls.


How Well Do You Know Your Personae Non Gratae?

Posted by Jane Cleland-Huang Follow 0 Followers on  Nov 27, 2014

In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.


Simulation-Based Embedded Agile Development

Posted by Jason Ard Follow 0 Followers , Kristine Davidsen Follow 0 Followers , Terril Hurst Follow 0 Followers on  Nov 16, 2014

In this article, authors discuss how using simulation as an integral part of the development process can improve product quality, reduce cost, and deliver reliable working code.


Is Bitcoin a Decentralized Currency?

Posted by Arthur Gervais Follow 0 Followers , Ghassan O. Karame Follow 0 Followers , Vedran Capkun Follow 0 Followers , Srdjan Capkun Follow 0 Followers on  Nov 01, 2014

Bitcoin currency is getting more attention than any other digital currency model. In this article, authors analyze Bitcoin's decentralized model and discuss solutions to enhance its decentralization. 2


Embedding Reflection and Learning into Agile Software Development

Posted by Jeffry Babb Follow 0 Followers , Rashina Hoda Follow 0 Followers , Jacob Nørbjerg Follow 0 Followers on  Oct 26, 2014

In this article, authors discuss the Reflective Agile Learning Model (REALM) that embeds reflective practice into the iterative and agile software engineering development cycle.


Collaborative Software Development Platforms for Crowdsourcing

Posted by Xin Peng Follow 0 Followers , Muhammad Ali Babar Follow 0 Followers , Christof Ebert Follow 0 Followers on  Aug 17, 2014

In this IEEE article, authors provide an overview of current technologies for crowdsourcing in software development. They talk about the current practice and trends in collaborative platforms.


A Large-Scale Empirical Study on Software Reuse in Mobile Apps

Posted by Israel J. Mojica Follow 0 Followers , Bram Adams Follow 0 Followers , Meiyappan Nagappan Follow 0 Followers , Steffen Dienst Follow 0 Followers , Thorsten Berger Follow 0 Followers , Ahmed E. Hassan Follow 0 Followers on  Jul 20, 2014

In this article, authors discuss a case study of several Android mobile apps to analyze software reuse in terms of inheritance and code reuse as well as framework reuse of whole apps.


Twenty Years of Patterns’ Impact

Posted by Gregor Hohpe Follow 0 Followers , Rebecca Wirfs-Brock Follow 0 Followers , Joseph W. Yoder Follow 0 Followers , Olaf Zimmermann Follow 0 Followers on  Apr 19, 2014

In this article, authors talk about the impact of pattern languages on software design community over past 20 years. 1


Measuring Architecture Sustainability

Posted by Heiko Koziolek Follow 0 Followers , Dominik Domis Follow 0 Followers , Thomas Goldschmidt Follow 0 Followers , Philipp Vorst Follow 0 Followers on  Mar 20, 2014

In this article, authors discuss Morphosis, a multi-perspective measuring approach for architecture sustainability that includes compliance checking and tracking of architecture-level code metrics.

Login to InfoQ to interact with what matters most to you.

Recover your password...


Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.


More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.


Stay up-to-date

Set up your notifications and don't miss out on content that matters to you