BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Infrastructure Content on InfoQ

  • Creating a Mobile Development Strategy for 2015

    Now that 2015 is underway, it’s imperative to consider a mobile strategy framework for a prosperous year and beyond. We will be discussing some key points to consider as you plan your strategy for the year, and how they can help you usher in a successful future. These topics include visual development environments , Bimodal IT, cloud-based mobile development and the HTML5 vs. native debate.

  • Probabilistic Project Sizing Using Randomized Branch Sampling (RBS)

    Analyzing all the stories in a project requires significant time. How can we estimate the size of a project without prior identification and analysis of every single user story? If you don't want to analyze all user stories in your project in order to estimate its size then Randomized Branch Sampling is an approach you can use for portfolio related decisions and quotations on prospect projects.

  • The Indian Banking Community Cloud

    In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services exclusively to Indian banks to address the financial sector's growing demand for secure cloud-based services.

  • Q&A with Gene Kim on the State of DevOps Survey

    The 4th edition of the State of DevOps survey is out. InfoQ talked to the survey's co-author Gene Kim to understand what are the goals for this edition, how the data is analysed and what have we learned so far from past surveys.

  • The Microservice Revolution: Containerized Applications, Data and All

    Microservice architectures and container-based virtualization have taken the software development community by storm in recent months. This article will describe the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures.

  • Yes, Hardware Can Be Agile!

    “You can’t do 2-week iterations with hardware!” This is the first thing you’ll hear when talk turns to Agile methods in hardware-software product development. A mix of existing robust hardware development ideas, plus a few newly taken from Agile software are being used now by real teams, even to get around - or through - the challenge of doing fast iterations.

  • Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

    In this article, authors discuss the security vulnerabilities in software applications and how whitelisting approach has advantages over blacklisting. They also talk about how to implement the whitelisting security policies and cost involved with it.

  • How to Start With Security

    Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it. It will help get you started or hopefully give you some new ideas if you're already doing some security work.

  • Q&A on Agile! The Good, the Hype and the Ugly

    The book "Agile! The Good, the Hype and the Ugly" by Bertrand Meyer provides a review of agile principles, techniques and tools. It explores the agile methods Extreme Programming, Lean Software, Scrum and Crystal and provides suggestions on what to use or not to use from them, based on software engineering principles and research and personal experience of the book author.

  • Cloud Security Auditing: Challenges and Emerging Approaches

    Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors. They talk about the challenges in the areas of transparency, encryption and colocation and domain-tailored audits as ideal solution in the new model.

  • Go for the Money! JSR 354 Adds First Class Money and Currency Support to Java

    First class money and currency support in Java are almost here. In this article Credit Suisse's Anatole Tresch JSR 354 spec lead, discusses the shortcomings of the legacy currency and money support, motivation for the new APIs, and lots of examples.

  • Employing Enterprise Architecture for Applications Assurance

    In this article, authors discuss how enterprise, software, and security architects can improve software assurance by using the enterprise architecture to promulgate the software security controls. They also talk about other security model components like threat modeling, attack trees, secure design patterns, and misuse cases.

BT