Remove Architecture Remove Development Remove SCRUM Remove White Paper
article thumbnail

Networking the Cloud for IoT - Pt. 2 Stressing the Cloud

Cloud Musings

A majority of security vulnerabilities are a result of coding errors that go undetected in the development stage. The research firm also believes that software development organizations should incorporate coding standards such as CERT C and utilize the Common Weakness Enumeration (CWE) database.

Cloud 70
article thumbnail

Networking the Cloud for IoT - Pt. 1: IoT and the Government

Cloud Musings

But even more amazing is the fact that anyone in the world can also develop an application or a powerful API to filter out the “nuggets” of valuable information. As stated in his white paper Genius of Things , “…the real promise of the IoT [is] its potential to deliver such a leap of insight about the world around us.