Graham Lee discusses how to design and write secure (mobile) applications, the concept of sandboxing in general and on OS X, Objective-C and Smalltalk, and much more.
Dennis Stevens discusses ways to identify and focus on business value and risk mitigation in Agile projects. As a contributor to the Agile Extension to the BABOK, and in his work on the ICAgile Business Analysis & Value Management area, and how to identify, prioritize and mitigate risk in software development projects.
As web applications have evolved away from the old client-server model, so have the security threads. In this interview Tyler Close talks about common security challenges and how these are affected by the new HTML5 APIs and Ecmascript 5.
In this interview, Subbu Allamaraju talks about real life issues of RESTful architectures. He also describes a pragmatic approach of adopting the Web as an integration platform and shares his opinion on OAuth.
Jon Brisbin discusses his experience with Virtualization and reasons why companies would use Private Clouds, eg. regulation compliance. Also: the future role of operations, monitoring, and more.
In this interview, Graeme Rocher and Guillaume Laforge of SpringSource talk about the present and future of the Grails framework and the Groovy language. Rocher talks about Grails 1.4 and some of its enhancements such as improvements to GORM. And Laforge discusses Groovy 1.8, which features new DSL authoring capabilities, among other things. They look at how Java’s future impacts their projects.
In this interview conducted at the SpringOne 2GX conference, Rod Johnson talks about the new advancements SpringSource is bringing to the enterprise Java space, including new cloud options. Johnson discusses open-source Java in general, including the flap over the direction of OpenJDK and Apache Harmony. And he delves into the new Code2Cloud effort from SpringSource and Tasktop, and much more.
Stefan Tilkov discusses REST (Representational State Transfer) and RESTful web services based upon work he has done for clients of his consultancy. Stefan talks about the shortcomings of the WS-* specs and says he sees little need for WS-* web services any more. Stefan also talks about how web development frameworks are beginning to map to the RESTful model, and the concept of REST and security.
Treb Ryan, CEO of OpSource, speaks on many cloud topics including security, SLA, policy compliance, advancing the cloud into the enterprise, the current need for hybrid solutions and the impact of cloud computing on the IT taskforce.
In this interview, Dr. Mercuri defines computer forensics, then discusses how forensics apply to criminal, civil, and intellectual property law. She addressed the challenges that technological advances, (e.g. RAID, cell phones, GPS devices, and Cloud Computing) increase the challenges faced by the forensic computer scientist. She also discusses appropriate actions if you suspect security issues.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Introducing Intel® SGX - Hardware Assisted Security for the Application Layer.
Numecent, Bromium, and wolfSSL employ Intel® Software Guard Extensions (Intel® SGX) to create more secure, next-generation solutions.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.
Protect Application Code, Data, & Secrets from Attack.
CPU-enhanced Application Security Product Brief.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.