Enterprise development security
Enterprise development security involves the use of software, hardware, and procedural methods to protect applications from external threats. Enterprise Java security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive enterprise data. Learn design techniques and how to design secure Java applications. Find best practices, examples and strategies for designing security into enterprise Java applications.
News:1 - 3 of 22
Mobile development teams may put corporate data security at risk
14 Dec 2012
News - Mobile app developers might be more responsible for mobile and corporate data security concerns than any other factor, including lost devices.
Designing and Architecting Tasks to Rule 2012
30 Dec 2011
News - The 2011 TSS Java Trends survey seems to indicate that overwhelmingly, designing and architecting tasks will rule with a whopping 70% of respondents indicating so. Coding entirely new apps jumped up to 39% as well. Seems that new apps are the new black...
OCPJP & OCAJP: Java 7 training requirement for the Oracle Certified Professional Programmer dropped
21 Dec 2011
News - In order to obtain the certified architect position from Oracle, attending and passing a training course is now required. But what about the Java Professional and Java Associate designations, OCPJP and OCAJP for Java 7?
Downloads:1 - 1 of 1
8 AngularJS questions with Mark Bates
24 Mar 2014
Podcast - TheServerSide got a chance to chat with Mark Bates, a freelance software developer, about AngularJS.
Reference & Learning:1 - 3 of 19
YARN and MapReduce 2.0 elevates big data Hadoop and scheduled processing
03 Jan 2014
Feature - YARN represents the biggest architectural change in Hadoop since it's inception over seven years ago. Now, Hadoop goes beyond MapReduce to provide scheduled processing while simultaneously processing big data.
Privacy, security and control: The consumerization of the personal cloud
25 Aug 2013
Feature - As more employees bring their own cloud (BYOC) software to the office, more and more challenges arise as consumerization pushes cloud based software into the enterprise.
Security, scalability, big data and performance monitoring in the cloud
14 Jul 2013
Feature - Experts on the exhibit floor at the Red Hat Summit 2013 provided great insights into the issues of cloud security, scalability, big data usage and performance.
Expert Technical Advice:1 - 2 of 2
Water-Scrum-fall: It's not an Agile methodology
07 Jun 2012
Video Tip - The bottom line? You're either Agile or you're not, and if you're not, using water-Scrum-fall to squeeze in Agile methodologies may only create problems and resentment.
Private cloud computing models alleviate some cloud security issues
03 May 2012
Tip - Private cloud computing may provide enterprise organizations seeking the performance, scalability and cost efficiencies of a cloud architecture but have serious security concerns.