BT
  • A Reference Architecture for the Internet of Things

    by Daniel Karzel, Hannelore Marginean, Tuan-Si Tran on  Jan 29, 2016 8

    This is the first article of a two article series in which we try to work from the abstract level of IoT reference architectures towards the concrete architecture and implementation for selected use cases. This first article will cover the definition of a more concrete and comprehensible architecture whereas the second part will then apply this architecture to actual use cases.

  • Towards an Agile Software Architecture

    by Boyan Mihaylov on  Dec 28, 2015 11

    Boyan Mihaylov covers his experience when working with both traditional waterfall software architectures and agile ones. He depicts the similarities and differences between these with a focus on three areas: the specifics of the software architect role, the timespan of the software architecture, and the output of the software architecture.

  • DevOps at Seamless: The Why, How, and What

    by Tomek Pająk on  Nov 29, 2015

    The key thing about DevOps is understanding under which circumstances it should be introduced to your organization. Organizations that adopt DevOps go through a change that affects both processes and culture. This article focuses on why DevOps is needed, what concepts and values should support it, as well as how we implemented it at Seamless, what results we obtained and the challenges we faced.

The Mathematics of Adaptive Security

Posted by Matthew Glenn on  Nov 01, 2015

Enterprise security teams are charged with maintaining the “perfect” set of security policies. In their pursuit of the perfect security policy, they are often the department of slow. 1

Packet Inspection for Unauthorized OS Detection in Enterprises

Posted by Rohit Tyagi, Tuhin Paul, B.S. Manoj, B. Thanudas on  Oct 10, 2015

The authors discuss an approach that uses TCP SYN packets for OS fingerprinting to detect the presence of unauthorized OSs in an enterprise. 3

Version Control, Git, and your Enterprise

Posted by Bob Jenkins on  Aug 18, 2015

This article discusses the key questions to be contemplated by your enterprise in determining whether Git is right for you and what you need to consider in moving to Git.

Author Q&A on Leading without Authority

Posted by Savita Pahuja on  Aug 16, 2015

Tathagat Varma, shares his experience of working as an individual contributor at a deeper leadership level. This post explains how to lead without authority. 2

The Design and Implementation of the FreeBSD Operating System, Review and Q&A with Authors

Posted by Sergio De Simone on  Aug 13, 2015

The Design and Implementation of the FreeBSD Operating System is a long awaited update to a successful and authorative guide to the FreeBSD kernel that covers all major new features up to FreeBSD 11.

An Overview of ANONIZE: A Large-Scale Anonymous Survey System

Posted by Susan Hohenberger, Steven Myers, Rafael Pass, Abhi Shelat on  Jul 26, 2015

In this article, authors discuss ad hoc anonymous & secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.

From a Project to a Product Approach Using LeSS at Agfa Healthcare

Posted by Jurgen De Smet on  Jul 01, 2015

By changing the inner workings from a project perspective to a product perspective Agfa Healthcare established a less complicated process using a single backlog for the entire organisation.

Probabilistic Project Planning Using Little’s Law

Posted by Dimitar Bakardzhiev on  Jun 21, 2015

Little’s Law helps teams that use user stories for planning and tracking project execution, with a project buffer to manage inherent uncertainty of a fixed-bid project and protect its delivery date. 4

High Tech, High Sec.: Security Concerns in Graph Databases

Posted by George Hurlburt on  May 23, 2015

Graph NoSQL databases support data models with connected data. In this article, author discusses security implications of graph databases in use cases like graph discovery and knowledge management.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT

We notice you’re using an ad blocker

We understand why you use ad blockers. However to keep InfoQ free we need your support. InfoQ will not provide your data to third parties without individual opt-in consent. We only work with advertisers relevant to our readers. Please consider whitelisting us.