Mandy Chessell and Harald Smith have written a book titles Patterns of Information Management in which they present approaches to structuring and managing information assets based on their experiences across a range of customers. They use a Patterns approach to identify ways of addressing information problems which are common to many of the organisations they have worked with.
Writing Java software that correctly and safely makes use of concurrency requires careful thought. Software that incorrectly accounts for concurrency can contain intermittent defects that elude even the most rigorous testing regimes. Static analysis tools can analyze source code or compiled bytecode to discover latent bugs hidden within code, long before it is executed.
Some 80% of all improvement and change programmes fail. Intelligent Evolution ensures long-term business success rather than short-term satisfaction of a standard or theory.
The book change artistry is a collection of essays from Esther Derby, Don Gray, Johanna Rothman and Gerald M. Weinberg. It supports professionals in developing their organizational change skills.
The new book Real World OCaml provides a deep dive into the OCaml programming language. InfoQ caught up with the authors to hear about real world Ocaml users, its unique features, and much more.
Software piracy emerged in the 1980s and has since spread beyond the software industry. Today software products are becoming more susceptible to incidences of code tampering, not just outright theft.
This first article in the series on the Kanban “nine values, three agendas” model, explores the sustainability agenda: a common approach to Kanban adoption at the level of individuals and teams.
This article we focuses on the database backup tools and security policies when deploying MongoDB NoSQL databases. Cloud backup with MongoDB Management Service (MMS) is covered.
In this article, author discusses the effectiveness of using design patterns, based on surveys conducted to indicate which patterns were considered useful under what circumstances. 12
In this article Ping Chen shares her experiences on how to pragmatically maintain a large legacy application. 9