Tim Lister talks about his keynote at the Agile 2013 conference, reflecting on his 40 years in the software industry, the new release of the book Peopleware, risk management in software projects and how teams form.
The Content Security Policy specification is a mechanism web applications can use to mitigate a broad class of content injection vulnerabilities, such as cross-site scripting (XSS). Content Security Policy is a declarative policy that lets web developers inform the client about the sources from which the application expects to load resources.
Mike Amundsen talks about API management, versioning, and discovery. He compares RESTFul and CRUD-style APIs, discusses the notion of 'affordance,' and introduces hypermedia APIs. He examines documentation modelling frameworks for APIs - like Swagger - and also provides his thoughts on API governance, OAuth 2.0, and web single sign-on.
Martijn Verburg discusses his new start-up jClarity, which offers performance tooling for the Cloud. He also provides an update on the Adopt a JSR and Adopt OpenJDK programs.
Ward Cunningham talks about the continuing appeal of OOP and dynamic languages, asynchronous programming, and much more. Also: Ward explains the ideas behind his latest project Federated Wiki.
Bob Lee explains the popularity of Java, future language features like Lambdas, DI with Guice vs. the Dagger framework, the role of Java vs. Ruby at Square, hiring at Square, security and much more.
In this interview recorded at QCon NY 2012 Conference, Spring Security project lead Robert Winch discusses the new features of Spring Security 3.1 version and design strategies for multi-tenant cloud applications.
Ganesh Prasad explains how the contribution of SOA is the management of dependencies between systems, how SOA is a design aspect and not a technological one, and much more.
Graham Lee discusses how to design and write secure (mobile) applications, the concept of sandboxing in general and on OS X, Objective-C and Smalltalk, and much more.
Dennis Stevens discusses ways to identify and focus on business value and risk mitigation in Agile projects. As a contributor to the Agile Extension to the BABOK, and in his work on the ICAgile Business Analysis & Value Management area, and how to identify, prioritize and mitigate risk in software development projects.
As web applications have evolved away from the old client-server model, so have the security threads. In this interview Tyler Close talks about common security challenges and how these are affected by the new HTML5 APIs and Ecmascript 5.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Introducing Intel® SGX - Hardware Assisted Security for the Application Layer.
Numecent, Bromium, and wolfSSL employ Intel® Software Guard Extensions (Intel® SGX) to create more secure, next-generation solutions.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.
Protect Application Code, Data, & Secrets from Attack.
CPU-enhanced Application Security Product Brief.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.