Enterprise development security
Enterprise development security involves the use of software, hardware, and procedural methods to protect applications from external threats. Enterprise Java security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive enterprise data. Learn design techniques and how to design secure Java applications. Find best practices, examples and strategies for designing security into enterprise Java applications.
Addressing security concerns and evolving beyond Spring with Java EE 8
05 Nov 2014
Feature - The Spring framework created a situation where the Java EE platform had plenty of catching up to do, but if Java EE 8 can plug the security holes and evolve beyond Spring, Java EE may once again become the first choice for enterprise application...
Allaying the AWS security concerns: How the cloud became more secure than on-premise
19 May 2014
Feature - Many organizations stayed away from the cloud over concerns for security. But in the Internet of things, where everything is connected, organizations are embracing AWS and other clouds, believing them to be more secure than on-premise data centers.
Tactics, tools and teamwork: Effectively managing cloud security
19 May 2014
Feature - Managing security in the cloud is a completely new ball game, from dealing with remote storage, to worrying about who has access to your programs and applications. Here we talk with the experts from TrendMicro about how cloud computing is changing the...
YARN and MapReduce 2.0 elevates big data Hadoop and scheduled processing
03 Jan 2014
Feature - YARN represents the biggest architectural change in Hadoop since it's inception over seven years ago. Now, Hadoop goes beyond MapReduce to provide scheduled processing while simultaneously processing big data.
Privacy, security and control: The consumerization of the personal cloud
25 Aug 2013
Feature - As more employees bring their own cloud (BYOC) software to the office, more and more challenges arise as consumerization pushes cloud based software into the enterprise.
Security, scalability, big data and performance monitoring in the cloud
14 Jul 2013
Feature - Experts on the exhibit floor at the Red Hat Summit 2013 provided great insights into the issues of cloud security, scalability, big data usage and performance.
Are consumer cloud services or a BYOD mindset a bigger security threat?
25 Jun 2013
Video - The threat of consumer cloud services like Dropbox is a bigger menace to corporate security than the BYOD mindset.
Application lifecycle management needs a unified DevOps approach
08 Apr 2013
Feature - Application lifecycle management often pits development against operations creating the need for a unified DevOps approach.
Key benefits of architecting loosely coupled SOA-based solutions
01 Apr 2013
Video - Service-oriented architectures (SOA) experience the most benefits when architects use loose coupling to build their solutions.
Mobile application development tutorial
13 Mar 2013
Tutorial - Looking for a start in developing mobile apps for existing enterprise computing systems? This mobile application development tutorial is here to help.