Enterprise development security
Enterprise development security involves the use of software, hardware, and procedural methods to protect applications from external threats. Enterprise Java security measures built into applications and a sound application security routine minimize the likelihood that hackers will be able to manipulate applications and access, steal, modify, or delete sensitive enterprise data. Learn design techniques and how to design secure Java applications. Find best practices, examples and strategies for designing security into enterprise Java applications.
Emerging 2015 Java trends: Cloud based IDEs and greater Java 8 adoption
09 Apr 2015
Feature - So far in 2015, big trends are emerging in the Java ecosystem, and top among those trends are the use of cloud-based IDEs and the adoption of Java 8 and lambda expressions.
Reflecting on Liferay Portal: From big data to secure mobile delivery
02 Dec 2014
Feature - The portal has evolved in a variety of ways, not the least of which is the manner in which it can integrate with big data solutions and deliver secure mobile content. Here are ten big takeaways from the 2014 Liferay Symposium in Boston.
Addressing security concerns and evolving beyond Spring with Java EE 8
05 Nov 2014
Feature - The Spring framework created a situation where the Java EE platform had plenty of catching up to do, but if Java EE 8 can plug the security holes and evolve beyond Spring, Java EE may once again become the first choice for enterprise application...
Allaying the AWS security concerns: How the cloud became more secure than on-premise
19 May 2014
Feature - Many organizations stayed away from the cloud over concerns for security. But in the Internet of things, where everything is connected, organizations are embracing AWS and other clouds, believing them to be more secure than on-premise data centers.
Tactics, tools and teamwork: Effectively managing cloud security
19 May 2014
Feature - Managing security in the cloud is a completely new ball game, from dealing with remote storage, to worrying about who has access to your programs and applications. Here we talk with the experts from TrendMicro about how cloud computing is changing the...
YARN and MapReduce 2.0 elevates big data Hadoop and scheduled processing
03 Jan 2014
Feature - YARN represents the biggest architectural change in Hadoop since it's inception over seven years ago. Now, Hadoop goes beyond MapReduce to provide scheduled processing while simultaneously processing big data.
Privacy, security and control: The consumerization of the personal cloud
25 Aug 2013
Feature - As more employees bring their own cloud (BYOC) software to the office, more and more challenges arise as consumerization pushes cloud based software into the enterprise.
Security, scalability, big data and performance monitoring in the cloud
14 Jul 2013
Feature - Experts on the exhibit floor at the Red Hat Summit 2013 provided great insights into the issues of cloud security, scalability, big data usage and performance.
Are consumer cloud services or a BYOD mindset a bigger security threat?
25 Jun 2013
Video - The threat of consumer cloud services like Dropbox is a bigger menace to corporate security than the BYOD mindset.
Application lifecycle management needs a unified DevOps approach
08 Apr 2013
Feature - Application lifecycle management often pits development against operations creating the need for a unified DevOps approach.