InfoQ recently sat down with Adrian Mouat, author of “Using Docker”, and explored the motivations for writing the book, his thoughts on the reasons why Docker has captured the IT industry’s attention such as short time span, and how containers can be best utilised within a typical software development lifecycle.
Security has evolved to be pretty good at granting and managing access to confidential information - by people. But automation is taking over, requiring a shift in how we secure our infrastructure.
Sourcing Security Superheroes: Part II: How Policy Can Enhance, Rather Than Hinder, Breach Detection
In theory, security policies protect organizations, stakeholders, and users. But in practice, organizations become more concerned with meeting these standards than protecting the business.
This is the first article of a two article series in which we try to work from an abstract level of IoT reference architectures towards a concrete architecture and implementation for actual use cases. 8
Boyan Mihaylov covers his experience when working with both traditional waterfall software architectures and agile ones. 11
This article focuses on why DevOps is needed, what concepts and values should support it, as well as how we implemented it at Seamless, what results we obtained and the challenges we faced.
Enterprise security teams are charged with maintaining the “perfect” set of security policies. In their pursuit of the perfect security policy, they are often the department of slow. 1
The authors discuss an approach that uses TCP SYN packets for OS ﬁngerprinting to detect the presence of unauthorized OSs in an enterprise. 3
This article discusses the key questions to be contemplated by your enterprise in determining whether Git is right for you and what you need to consider in moving to Git.
Tathagat Varma, shares his experience of working as an individual contributor at a deeper leadership level. This post explains how to lead without authority. 2
The Design and Implementation of the FreeBSD Operating System is a long awaited update to a successful and authorative guide to the FreeBSD kernel that covers all major new features up to FreeBSD 11.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Introducing Intel® SGX - Hardware Assisted Security for the Application Layer.
Numecent, Bromium, and wolfSSL employ Intel® Software Guard Extensions (Intel® SGX) to create more secure, next-generation solutions.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.
Protect Application Code, Data, & Secrets from Attack.
CPU-enhanced Application Security Product Brief.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.