The adoption of containers, and the associated desire to build microservices, is causing a paradigm shift within the monitoring space. Application functionality is becoming more granular and more independently scalable and resilient, which is a challenge for traditional monitoring solutions. InfoQ recently sat down with a series of container monitoring experts and explored these challenges.
Addison-Wesley Professional’s Docker Containers LiveLessons aim to show what Docker containers are and how they can be effectively used. The 2.5+ hours video course is aimed to practitioners with no previous experience and will lead them through a journey going from installing the software to more complex topics such as orchestration. InfoQ has spoken with course instructor Chris Negus.
Security has evolved to be pretty good at granting and managing access to confidential information - by people. But automation is taking over, requiring a shift in how we secure our infrastructure.
This article demonstrates a solution for automating the build, deployment and management of a Docker Java microservices application on any cloud or virtualization platform.
Moving your release cadence from months to weeks is not just about learning Agile practices and getting some automation tools. It involves people, tooling and a transition plan. 2
Java performance issues are often attributable to bad database access patterns. In this article a top performance field engineer demonstrates his patterns for diagnosing database related issues.
In this article, the author looks at why developers adopt software. Instead of bombarding people with new features, successful software providers recognize that choice + speed + simplicity = adoption.
Mike Talks, Test Manager at Datacom, gave a talk at the Agile New Zealand 2015 conference on Deprogramming the Cargo Cult of Testing. Afterwards he explained why agile testing needs deprogramming 1
Sourcing Security Superheroes: Part II: How Policy Can Enhance, Rather Than Hinder, Breach Detection
In theory, security policies protect organizations, stakeholders, and users. But in practice, organizations become more concerned with meeting these standards than protecting the business.
A look at how Microsoft's Bing development team has implemented agile and continuous delivery methods to vastly improve their development workflow. 1
Leaders are responsible for many interactions and behaviors in a team. So if something is not going the way you want it, start looking at yourself and ask what is your role in this misconduct.
This is the first article of a two article series in which we try to work from an abstract level of IoT reference architectures towards a concrete architecture and implementation for actual use cases. 6