BT
Older rss
  • DevOps Follow 970 Followers

    Increasing Security with a Service Mesh: Christian Posta Explores the Capabilities of Istio

    by Christian Posta Follow 3 Followers on  Aug 16, 2018

    Istio attempts to solve some particularly difficult challenges when running applications in a cloud platform: application networking, reliability, and observability and (the focus of this article) security. With Istio, communication between services in the mesh is secure and encrypted by default. Istio can also help with "origin" or "end-user" JWT identity token verification.

  • Architecture & Design Follow 2396 Followers

    The Ethics of Security

    by Anne Currie Follow 1 Followers on  Aug 13, 2018

    Like security, tech ethics is about trying to prevent our systems from hurting users or anyone else.

  • Culture & Methods Follow 798 Followers

    Q&A on the Book Testing in the Digital Age

    by Ben Linders Follow 28 Followers , Tom van de Ven Follow 0 Followers on  Jul 19, 2018

    The Book Testing in the Digital Age by Tom van de Ven, Rik Marselis, and Humayun Shaukat, explains the impact that developments like robotics, artificial intelligence, internet of things, and big data are having in testing. It explores the challenges and possibilities that the digital age brings us when it comes to testing software systems.

DevOps Follow 970 Followers

Q&A on the Book Accelerate: Building and Scaling High Performance Technology Organizations

Posted by Dr. Nicole Forsgren Follow 0 Followers , Jez Humble Follow 12 Followers , Ben Linders Follow 28 Followers on  Jun 07, 2018

The book Accelerate explores the factors that impact software delivery performance and describes capabilities and practices that help to achieve higher levels of throughput, stability, and quality.

Development Follow 683 Followers

How to Deal with Open Source Vulnerabilities

Posted by Rami Sass Follow 0 Followers on  May 30, 2018

Modern applications comprise 60-80% open source code. How can one detect vulnerabilities in such components in order to keep products secure?

Development Follow 683 Followers

Mastering Blockchain: Book Review and Author Q&A

Posted by Sergio De Simone Follow 18 Followers on  Apr 03, 2018

Packt Publishing Mastering Blockchain aims to provide a comprehensive introduction to Blockchain, which is claimed to be able to revolutionize our society. InfoQ has spoken with author Imran Bashir.

DevOps Follow 970 Followers

GDPR for Operations

Posted by Jon Topper Follow 0 Followers on  Mar 10, 2018

With GDPR, taking care of personal data is an organisation-wide responsibility, but in the operations we can provide a lot of supporting tools to help deal with the multiple facets of this problem. 1

Cloud Follow 328 Followers

Serverless Security: What's Left to Protect?

Posted by Guy Podjarny Follow 5 Followers on  Feb 23, 2018

This article aims to provide a broad understanding of security in the Serverless world. We'll consider the ways in which Serverless improves. changes, and hurts security.

Architecture & Design Follow 2396 Followers

What Should Software Engineers Know about GDPR?

Posted by Arto Santala Follow 0 Followers on  Dec 10, 2017

EU General Data Protection Regulation (GDPR) is moving out of the transition period next summer to become enforceable. As a software developer, this will affect you. This is what you need to know. 4

Mobile Follow 175 Followers

Cryptocurrency and Online Multiplayer Games

Posted by Anton Telitsyn Follow 0 Followers on  Nov 30, 2017

The cryptocurrency gaming segment is very young and there are several pros and cons to be taken into account before entering this new and volatile field.

AI, ML & Data Engineering Follow 989 Followers

User Anonymity on Twitter

Posted by Sai Teja Peddinti Follow 0 Followers , Keith W Ross Follow 0 Followers , Justin Cappos Follow 0 Followers on  Oct 12, 2017

This article explores whether it is possible to build automated classifiers to detect sensitive Twitter accounts.

DevOps Follow 970 Followers

A 4-Step Guide to Building Continuous Security into Container Deployment

Posted by Fei Huang Follow 2 Followers on  Sep 30, 2017

Containers face security risks at every stage, from building to shipping to the run-time production phases. Securing them requires a layered strategy throughout the stack and the deployment process.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT