Tim Lister co-author of Peopleware and Waltzing with Bears, among other books, talks about his experiences arbitrating disputes in systems development, the importance of risk management and how the IT industry is changing with distributed teams.
Robert Benefield explains the importance of business and operations understanding each other better and how they can kickstart that understanding through collaboration. He talks about the need to find meaningful metrics for business. He discusses how methodologies for operations (ITIL, COBIT) and development (Scrum, Kanban) differ and what can be learned from both.
Aaron Bedra talks about web security and issues that affect e-commerce and online payments services.
Tim Lister talks about his keynote at the Agile 2013 conference, reflecting on his 40 years in the software industry, the new release of the book Peopleware, risk management in software projects and how teams form.
The Content Security Policy specification is a mechanism web applications can use to mitigate a broad class of content injection vulnerabilities, such as cross-site scripting (XSS). Content Security Policy is a declarative policy that lets web developers inform the client about the sources from which the application expects to load resources.
Mike Amundsen talks about API management, versioning, and discovery. He compares RESTFul and CRUD-style APIs, discusses the notion of 'affordance,' and introduces hypermedia APIs. He examines documentation modelling frameworks for APIs - like Swagger - and also provides his thoughts on API governance, OAuth 2.0, and web single sign-on.
Martijn Verburg discusses his new start-up jClarity, which offers performance tooling for the Cloud. He also provides an update on the Adopt a JSR and Adopt OpenJDK programs.
Ward Cunningham talks about the continuing appeal of OOP and dynamic languages, asynchronous programming, and much more. Also: Ward explains the ideas behind his latest project Federated Wiki.
Bob Lee explains the popularity of Java, future language features like Lambdas, DI with Guice vs. the Dagger framework, the role of Java vs. Ruby at Square, hiring at Square, security and much more.
In this interview recorded at QCon NY 2012 Conference, Spring Security project lead Robert Winch discusses the new features of Spring Security 3.1 version and design strategies for multi-tenant cloud applications.
Ganesh Prasad explains how the contribution of SOA is the management of dependencies between systems, how SOA is a design aspect and not a technological one, and much more.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR
Increase security on compromised platforms with Intel® SGX.
An Intel technology for application developers who are seeking to protect select code and data from disclosure or modification.
A Developer’s Perspective.
Developers have long been constrained by the security capabilities that major platform providers have exposed for application development. How Bromium and wolfSSL employ Intel® SGX to create more secure, next-generation solutions.
Learn more about the Intel SGX SDK, a collection of APIs, libraries, documentation, sample source code, and tools that allows software developers to create and debug Intel SGX enabled applications in C/C++.
Protect Application Code, Data, & Secrets from Attack.
Developers can partition their application into CPU hardened “enclaves” or protected areas of execution that increase security even on compromised platforms.
Intel Software Guard Extensions (SGX) for Dummies.
At its root, Intel® SGX is a set of new CPU instructions that can be used by applications to set aside private regions of code and data.