InfoQ: Developer-Driven Threat Modeling
Threat modeling is critical for assessing and mitigating the security risks in software systems. In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats using the dataflow diagrams.
Managing the Virtual World | Philip J. Gill
"The killer app for virtualization has been server consolidation," says Al Gillen, program vice president for systems software at market research firm International Data Corporation (IDC).
Solaris X86 AESNI OpenSSL Engine | Dan Anderson
"Having X86 AESNI hardware crypto instructions is all well and good, but how do we access it? The software is available with Solaris 11 and is used automatically if you are running Solaris x86 on a AESNI-capable processor," says Anderson.
WebLogic Access Management | René van Wijk
"This post is a continuation of the post WebLogic Identity Management. In this post we will present the steps involved to integrate WebLogic and Oracle Access Manager," says Oracle ACE René van Wijk.
OTN Developer Days in the Nordics - Helsinki, Oslo, Stockholm, and Copenhagen
OTN Developer days head for the land of the midnight sun.
Podcast: Information Integration Part 2/3
In part two of a three-part program, Oracle Information Integration, Migration, and Consolidation authors Jason Williamson, Tom Laszewsk, and Marc Hebert offer examples of some of the most daunting information integration challenges.
Measuring the Human Task activity in Oracle BPM | Leon Smiers
Leon Smiers discusses using Oracle BPM to get answer to important questions about what's happening with business process.
Architecture all day. Oracle Technology Network Architect Day - Phoenix, AZ- Dec 14
Spend the day with your peers learning from experts in Cloud computing, engineered systems, and Oracle Fusion Middleware.
The Heroes of Java: Michael Hüttermann | Markus Eisele
Oracle ACE Director Markus Eisele interviews Java Champion Michael Hüttermann on his role, his process, and on why he uses Java.