Older rss
  • DevOps Follow 705 Followers

    Q&A on the Book Accelerate: Building and Scaling High Performance Technology Organizations

    by Jez Humble Follow 11 Followers , Ben Linders Follow 20 Followers , Dr. Nicole Forsgren Follow 0 Followers on  Jun 07, 2018

    The book Accelerate: Building and Scaling High Performance Technology Organizations by Nicole Forsgren, Jez Humble, and Gene Kim, explores the factors that impact software delivery performance and describes capabilities and practices that help to achieve higher levels of throughput, stability, and quality.

  • Development Follow 544 Followers

    How to Deal with Open Source Vulnerabilities

    by Rami Sass Follow 0 Followers on  May 30, 2018

    Despite the shockwaves following the Equifax hack in September 2017, the industry still has a long way to go in protecting their products. A key area to focus on is the open source components that comprise 60-80% of the code base in modern applications. Learn how to detect vulnerable open source components and keep your products secure.

  • Development Follow 544 Followers

    Mastering Blockchain: Book Review and Author Q&A

    by Sergio De Simone Follow 12 Followers on  Apr 03, 2018

    Blockchain was invented in 2008 for Bitcoin to solve the main issue with digital currencies, i.e., the possibility that a token be spent more than once by duplicating it. Packt Publishing Mastering Blockchain by Imran Bashir aims to provide a comprehensive introduction to Blockchain, a technology that is claimed to be able to revolutionise our society and impact every industry.

DevOps Follow 705 Followers

GDPR for Operations

Posted by Jon Topper Follow 0 Followers on  Mar 10, 2018

With GDPR, taking care of personal data is an organisation-wide responsibility, but in the operations we can provide a lot of supporting tools to help deal with the multiple facets of this problem. 1

Cloud Follow 251 Followers

Serverless Security: What's Left to Protect?

Posted by Guy Podjarny Follow 2 Followers on  Feb 23, 2018

This article aims to provide a broad understanding of security in the Serverless world. We'll consider the ways in which Serverless improves. changes, and hurts security.

Architecture & Design Follow 1870 Followers

What Should Software Engineers Know about GDPR?

Posted by Arto Santala Follow 0 Followers on  Dec 10, 2017

EU General Data Protection Regulation (GDPR) is moving out of the transition period next summer to become enforceable. As a software developer, this will affect you. This is what you need to know. 4

Mobile Follow 133 Followers

Cryptocurrency and Online Multiplayer Games

Posted by Anton Telitsyn Follow 0 Followers on  Nov 30, 2017

The cryptocurrency gaming segment is very young and there are several pros and cons to be taken into account before entering this new and volatile field.

AI, ML & Data Engineering Follow 760 Followers

User Anonymity on Twitter

Posted by Justin Cappos Follow 0 Followers , Sai Teja Peddinti Follow 0 Followers , Keith W Ross Follow 0 Followers on  Oct 12, 2017

This article explores whether it is possible to build automated classifiers to detect sensitive Twitter accounts.

DevOps Follow 705 Followers

A 4-Step Guide to Building Continuous Security into Container Deployment

Posted by Fei Huang Follow 1 Followers on  Sep 30, 2017

Containers face security risks at every stage, from building to shipping to the run-time production phases. Securing them requires a layered strategy throughout the stack and the deployment process.


Cloud Data Auditing Techniques with a Focus on Privacy and Security

Posted by Saied M. Abd El-atty Follow 0 Followers , Mosleh M. Abu-Alhaj Follow 0 Followers , Manjur Kolhar Follow 0 Followers on  Jul 30, 2017

The authors provide a systematic guide to the current literature regarding comprehensive auditing methodologies. They identify the different approaches to cloud data integrity and privacy.

Mobile Follow 133 Followers

Security Implications of Permission Models in Smart-Home Application Frameworks

Posted by Atul Prakash Follow 0 Followers , Jaeyeon Jung Follow 0 Followers , Earlence Fernandes Follow 0 Followers , Amir Rahm Follow 0 Followers on  Jun 07, 2017

An analysis of a popular programming framework, SmartThings, reveals that many smart-home apps are automatically overprivileged, leaving users at risk for remote attacks.

Mobile Follow 133 Followers

A Roadmap to the Programmable World

Posted by Tommi Mikkonen Follow 0 Followers , Antero Taivalsaari Follow 0 Followers on  May 27, 2017

The emergence of millions of remotely programmable devices in our surroundings will pose significant challenges for software developers that haven’t received enough attention yet.

Login to InfoQ to interact with what matters most to you.

Recover your password...


Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.


More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.


Stay up-to-date

Set up your notifications and don't miss out on content that matters to you