|
|
|
Published in blog | Published on December 14, 2012
Combining SSL and encrypted volumes can secure your Cloud data in motion and at rest, but it plug all the holes. Published in Enterprise Zone | Published on December 7, 2012
Not all software development project tasks must be done in a sequence. With Agile requirements prioritization you can complete the deliverables and tasks in order of importance. Published in blog | Published on December 6, 2012
With hypermedia-based discovery, any client can determine what any resource can do for it simply by following hyperlinks. The API is the bookmark, which never changes. Published in blog | Published on December 2, 2012
Never expect requirements to be fixed -- even for agnostic Services. Digital ink never dries. The same should go for your code. Published in blog | Published on November 27, 2012
Achieving reusable code that actually meets the requirements for reuse is far more difficult than it sounds. Published in blog | Published on November 20, 2012
We haven't yet seen any type of cyber attack that changes the game. Some kind of coordinated effort that causes unexpected, appalling damage. In other words, we haven't had our Cyber-9/11 yet. PARTNER NEWS
From the BlogLatest Posts � Whatever Happened to Business Process Management? (January 2, 2013) � Geolocation in the Cloud? If You Must (December 27, 2012) � The REST Shell Game (December 23, 2012) � Don't *aaS-ume Cloud Service Models Are Set in Stone (December 18, 2012) � When Encryption Gets in the Way of Data Availability (December 16, 2012) � In the Cloud, Encryption in Motion + Encryption at Rest = Not Good Enough (December 14, 2012) TIPS
Create an Instance of a Class Whose Name Will Be Supplied at Runtime
Published in Classes | Published on August 26, 2012
JSF Backing Bean Tips: Parameter Extractions and Redirects
Published in Tip Bank | Published on June 13, 2012
|