As web applications have evolved away from the old client-server model, so have the security threads. In this interview Tyler Close talks about common security challenges and how these are affected by the new HTML5 APIs and Ecmascript 5.
In this interview, Subbu Allamaraju talks about real life issues of RESTful architectures. He also describes a pragmatic approach of adopting the Web as an integration platform and shares his opinion on OAuth.
Jon Brisbin discusses his experience with Virtualization and reasons why companies would use Private Clouds, eg. regulation compliance. Also: the future role of operations, monitoring, and more.
In this interview, Graeme Rocher and Guillaume Laforge of SpringSource talk about the present and future of the Grails framework and the Groovy language. Rocher talks about Grails 1.4 and some of its enhancements such as improvements to GORM. And Laforge discusses Groovy 1.8, which features new DSL authoring capabilities, among other things. They look at how Java’s future impacts their projects.
In this interview conducted at the SpringOne 2GX conference, Rod Johnson talks about the new advancements SpringSource is bringing to the enterprise Java space, including new cloud options. Johnson discusses open-source Java in general, including the flap over the direction of OpenJDK and Apache Harmony. And he delves into the new Code2Cloud effort from SpringSource and Tasktop, and much more.
Stefan Tilkov discusses REST (Representational State Transfer) and RESTful web services based upon work he has done for clients of his consultancy. Stefan talks about the shortcomings of the WS-* specs and says he sees little need for WS-* web services any more. Stefan also talks about how web development frameworks are beginning to map to the RESTful model, and the concept of REST and security.
Treb Ryan, CEO of OpSource, speaks on many cloud topics including security, SLA, policy compliance, advancing the cloud into the enterprise, the current need for hybrid solutions and the impact of cloud computing on the IT taskforce.
In this interview, Dr. Mercuri defines computer forensics, then discusses how forensics apply to criminal, civil, and intellectual property law. She addressed the challenges that technological advances, (e.g. RAID, cell phones, GPS devices, and Cloud Computing) increase the challenges faced by the forensic computer scientist. She also discusses appropriate actions if you suspect security issues.
Management consultant Johanna Rothman helps her clients manage risk: be it risk in a project's people, risk in how the people are managed, or the risk in the projects themselves. In this interview she talked about strategies for risk reduction, useful for teams in all stages of agility, contained in her new book "Manage It! Your Guide to Modern Pragmatic Project Management."
Zed Shaw and Matt Pelletier sat down with InfoQ's Obie Fernandez at RailsConf to explore some of the reasoning behind setting up the mongrel project, getting adoption in enterprise and dealing with developers who just aren't ready. Watch the interview to find out how much Shaw's Enterprise Mongrel product will cost, where the support contracts are and who'll come out on top when the vultures land.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Introducing Intel® SGX - Hardware Assisted Security for the Application Layer.
Numecent, Bromium, and wolfSSL employ Intel® Software Guard Extensions (Intel® SGX) to create more secure, next-generation solutions.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.
Protect Application Code, Data, & Secrets from Attack.
CPU-enhanced Application Security Product Brief.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.