TITLE

Docker

AUTHOR(S)
Anderson, Charles
PUB. DATE
May 2015
SOURCE
IEEE Software;May2015, Vol. 32 Issue 3, p102
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In episode 217 of Software Engineering Radio, host Charles Anderson talks with James Turnbull, a software developer and security specialist who's vice president of services at Docker. Lightweight Docker containers are rapidly becoming a tool for deploying microservice-based architectures.
ACCESSION #
102288020

 

Related Articles

  • Requirements engineering within a large-scale security-oriented research project: lessons learned. Gürses, Seda; Seguran, Magali; Zannone, Nicola // Requirements Engineering;Mar2013, Vol. 18 Issue 1, p43 

    Requirements engineering has been recognized as a fundamental phase of the software engineering process. Nevertheless, the elicitation and analysis of requirements are often left aside in favor of architecture-driven software development. This tendency, however, can lead to issues that may...

  • The Difference between Marketecture and Tarchitecture. Hohmann, Luke // IEEE Software;Jul/Aug2003, Vol. 20 Issue 4, p51 

    Focuses on the two broad dimensions of software systems architecture, the tarchitecture or technical architecture and the marektecture or marketing architecture. Frame of reference when developers think of a system's architecture; Business perspective of the system's architecture; Gap that...

  • Multi Agent System Architecture Oriented Prometheus Methodology Design to Facilitate Security of Cloud Data Storage. Talib, Amir Mohamed; Atan, Rodziah; Abdullah, Rusli; Murad, Masrah Azrifah Azmi // Journal of Software Engineering;2011, Vol. 5 Issue 3, p78 

    Security plays an important role in the development of Multi Agent Systems (MAS). However, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. This is, mainly, due to the fact that agent...

  • Complexity Measurement During Reengineering by Using Pattern Based Metrics. Kumar, Ashok; Kumar, Anil // International Journal of Research & Reviews in Computer Science;Dec2011, Vol. 2 Issue 6, p1342 

    There is no doubt that complexity measurement of software modules not essential during software development but also very beneficial during reengineering of software modules. And there are number of metrics available that will measure complexity during software development that may be data...

  • Identifying Potential Security Flaws using Loophole Analysis and the SECREt. Busby-Earle, Curtis; Mugisa, Ezra K. // GSTF Journal on Computing;2011, Vol. 1 Issue 2, p61 

    In contemporary software development there are a number of methods that attempt to ensure the security of a system. Many of these methods are however introduced in the latter stages of development or try to address the issues of securing a software system by envisioning possible threats to that...

  • SUPPORTING ENGINEERS IN PRODUCING SECURE SOFTWARE. Essafi, Mehrez; Labed, Lamia; Ghezela, Henda Ben // Proceedings of the IADIS International Conference on WWW/Interne;Jan2006, p479 

    Several efforts are undertaken, to improve secure software engineering, however, many application engineers still miss or misuse acquired security knowledge due to domain immaturity, newness of the field, process complexity and absence of environments supporting such development. This paper...

  • Using Guidelines to Improve Quality in Software Nonfunctional Attributes. Hneif, Malik; Lee, Sai Peck // IEEE Software;Nov2011, Vol. 28 Issue 6, p72 

    Software development aims to produce software systems that satisfy two requirement categories: functional and quality. One aspect of software quality is nonfunctional attributes (NFAs), such as security, performance, and availability. Software engineers can meet NFA requirements by applying...

  • Towards Building Secure Software Systems. Sodiya, A. S.; Onashoga, S. A.; Ajayĩ, O. B. // Issues in Informing Science & Information Technology;2006, Vol. 3, p635 

    Software security breaches are now very extremely common and a larger percentage is caused by software design defects. Since individuals and organizations now completely depend on software systems for their day-to-day operations, it is then important to produce secure software products. This...

  • Architectural and Technology Variability in Rich Internet Applications. Meliá, Santiago; Gómez, Jaime; Pérez, Sandy; Díaz, Oscar // IEEE Internet Computing;May/Jun2010, Vol. 14 Issue 3, p24 

    The advent of rich Internet applications (RIAs) has evolved into an authentic technological revolution, providing Web information systems with advanced requirements similar to desktop applications. At the same time, RIAs have multiplied the possible architectural and technological options,...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics