210,615 research outputs found
Symbolic Quantitative Information Flow
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages:
DevOps in Practice -- A preliminary Analysis of two Multinational Companies
DevOps is a cultural movement that aims the collaboration of all the
stakeholders involved in the development, deployment and operation of soft-ware
to deliver a quality product or service in the shortest possible time. DevOps
is relatively recent, and companies have developed their DevOps prac-tices
largely from scratch. Our research aims to conduct an analysis on practic-ing
DevOps in +20 software-intensive companies to provide patterns of DevOps
practices and identify their benefits and barriers. This paper presents the
preliminary analysis of an exploratory case study based on the interviews to
relevant stakeholders of two (multinational) companies. The results show the
benefits (software delivery performance) and barriers that these companies are
dealing with, as well as DevOps team topology they approached during their
DevOps transformation. This study aims to help practitioners and researchers to
better understand DevOps transformations and the contexts where the practices
worked. This, hopefully, will contribute to strengthening the evidence
regarding DevOps and supporting practitioners in making better informed
decisions about the return of investment when adopting DevOps.Comment: 8 pages, 1 figure, 2 tables, conferenc
Issues Affecting Security Design Pattern Engineering
Security Design Patterns present the tried and tested design decisions made by security engineers within a well documented format. Patterns allow for complex security concepts, and mechanisms, to be expressed such that non domain experts can make use of them. Our research is concerned with the development of pattern languages for advanced crypto-systems. From our experience developing pattern languages we have encountered several recurring issues within security design pattern engineering. These issues, if not addressed, will affect the adoption of security design patterns. This paper describes these issues and discusses how they could be addressed
Using Technology Enabled Qualitative Research to Develop Products for the Social Good, An Overview
This paper discusses the potential benefits of the convergence of three recent trends for the design of socially beneficial products and services: the increasing application of qualitative research techniques in a wide range of disciplines, the rapid mainstreaming of social media and mobile technologies, and the emergence of software as a service. Presented is a scenario facilitating the complex data collection, analysis, storage, and reporting required for the qualitative research recommended for the task of designing relevant solutions to address needs of the underserved. A pilot study is used as a basis for describing the infrastructure and services required to realize this scenario. Implications for innovation of enhanced forms of qualitative research are presented
- …