BT
Older Newer rss
36:35

Two-Factor Authentication

Posted by Phil Nash  on  Jul 12, 2016

Phil Nash takes a look at generating one time passwords, implementing two-factor authentication in web applications and the use cases for QR codes.

54:08

Securing Software by Construction

Posted by Jean Yang  on  Jul 08, 2016

Jean Yang discusses research ideas to create secure software, what prevents them from becoming commercial solutions, and how the Cybersecurity Factory accelerator bridges the research/industry gap.

45:43

Scala, ECS, and Docker: Delayed Execution @Coursera

Posted by Brennan Saeta  on  Jun 05, 2016

Brennan Saeta talks about aspects of Coursera’s architecture that enable them to rapidly build sophisticated features for their learning platform, the use of containers and security-related issues.

52:13

How Will Persistent Memory Change Software Design?

Posted by Maciej Maciejewski  on  May 29, 2016

Maciej Maciejewski discusses persistent memory, storage devices, and DRAM, accessing persistent memory with ACPI 6.0 extensions, existing support in the Linux kernel and the NVM library.

52:18

Real World Experience Report on Running Docker

Posted by Ben Hall  on  Apr 22, 2016

Ben Hall shares his experience working with Docket for development, testing and deployment into production, discussing scalability, resource management, security and other related issues.

42:23

Real-Time Fraud Detection with Graphs

Posted by Jim Webber  on  Mar 29, 2016

Jim Webber talks about several kinds of fraud common in financial services and how each decomposes into a straightforward graph use-case. He explores them using Neo4j and Cypher query language.

26:32

Light and Fluffy APIs in the Cloud

Posted by Shiva Narayanaswamy  on  Feb 16, 2016

Shiva Narayanaswamy discusses event driven architectures, serverless architectures, identity management and security related to building APIs in the cloud.

01:26:40

Hands on Spring Security

Posted by Rob Winch  on  Feb 14, 2016

Rob Winch discusses how to rapidly and correctly apply Spring Security to an existing application. Rob demos security exploits and shows how to mitigate them, answers frequently asked questions.

32:40

Is that API Secure?

Posted by Marko Vuksanovic  on  Feb 02, 2016

Marko Vuksanovic walks through HTTP security mechanisms, and how to transfer and store sensitive data.

47:59

Build the Right Thing - De-risk Your Products with Experiments

Posted by Andrea Darabos  on  Jan 27, 2016

Andrea Darabos discusses how to lower the startup risk with Minimum Viable Experiments which help product managers and investors build with more confidence and avoid costly mistakes.

50:50

Scammers, Hackers, and Fraud on the Blockchain

Posted by Olaf Carlson-Wee  on  Jan 01, 2016

Olaf Carlson-Wee explores key strategies to keep a company safe from a wide range of malicious actors in the virtual Wild West.

40:50

Securing Code Through Social Engineering

Posted by Christina Camilleri  on  Dec 23, 2015

Christina Camilleri shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT