BT
  • Refactoring Coderetreats: In Search of Simple Design

    by David Parsons on  Mar 20, 2015 2

    In cities all over the world, groups of software developers have been getting together at weekends repeatedly trying to write code for a given problem, but never completing a solution. At coderetreats, developers learn from each other and refine their software design skills. In this article David examines how they work? What do people say about them? How to make them even better?

  • The Microservice Revolution: Containerized Applications, Data and All

    by Luke Marsden on  Mar 19, 2015 5

    Microservice architectures and container-based virtualization have taken the software development community by storm in recent months. This article will describe the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures.

  • Yes, Hardware Can Be Agile!

    by Nancy Van Schooenderwoert on  Mar 18, 2015

    “You can’t do 2-week iterations with hardware!” This is the first thing you’ll hear when talk turns to Agile methods in hardware-software product development. A mix of existing robust hardware development ideas, plus a few newly taken from Agile software are being used now by real teams, even to get around - or through - the challenge of doing fast iterations.

Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats

Posted by Aaron Beuhring and Kyle Salous on  Mar 17, 2015

In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.

Q&A on Conscious Agility

Posted by Ben Linders on  Mar 16, 2015

The book Conscious Agility (Conscious Capitalism + Business Agility = Antifragility) describes a design-thinking approach for business to benefit from uncertainty, disorder, and the unknown.

How to Start With Security

Posted by Rémon (Ray) Sinnema on  Mar 14, 2015

Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it.

Q&A on Agile! The Good, the Hype and the Ugly

Posted by Ben Linders on  Mar 13, 2015

The book "Agile! The Good, the Hype and the Ugly" provides a review of agile principles, techniques and tools. It explores the agile methods Extreme Programming, Lean Software, Scrum and Crystal. 4

What Do We Know about Software Development in Startups?

Posted by Carmine Giardino, Michael Unterkalmsteiner, Nicolò Paternoster, Tony Gorschek, Pekka Abrahamsson on  Mar 12, 2015

In this article, authors discuss the software engineering practices in startup companies and provide empirical software engineering sources related to their engineering practices. 1

Technical Leadership: The Often Overlooked Skills and Responsibilities of a Technical Team Leader

Posted by Amr Noaman on  Mar 11, 2015

A Technical Leader should demonstrate capability in three main areas which are often overlooked:Team Support, Technical Excellence, and Innovation. Read more about these capabilities in this article. 2

Q&A with Andy Singleton on Unblock! A Guide to the New Continuous Agile

Posted by Ben Linders on  Mar 10, 2015

The book Unblock! A Guide to the New Continuous Agile by Andy Singleton provides ideas and practices for doing distributed cloud-based development with continuous delivery.

The Modern JavaScript Developer’s Toolbox

Posted by David Haney on  Mar 09, 2015

The toolbox of the modern JavaScript developer has changed a lot in the last 20 years. From IDEs to build automation tools, there are plenty of options for developers. 8

Cloud Security Auditing: Challenges and Emerging Approaches

Posted by Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell on  Mar 08, 2015

Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2015 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT