In this article, author Eltjo R. Poort discusses an architecture approach called Risk and Cost Driven Architecture that helps architects become more effective in an agile world. It's based on the use of risk and cost to determine the architectural significance of concerns.
Spark SQL, part of Apache Spark big data framework, is used for structured data processing and allows running SQL like queries on Spark data. In this article, Srini Penchikala discusses Spark SQL module and how it simplifies running data analytics using SQL interface. He also talks about the new features in Spark SQL, like DataFrames and JDBC data sources.
Bulk data is commonly accessed via files & FTP. As the world moves toward APIs to facilitate collaboration, what are the requirements for data APIs? This article describes a meta-data driven architecture for bulk data ingestion. Two APIs operate in parallel to provide data changes as well as the data records themselves. An example demonstrates how API responses are parameterized using meta-data.
In this article, authors summarize the information published in "Tools of the Trade" column series in IEEE Software magazine for last ten years.
With the emergence of the WebRTC API standard, developers without any experience in telecommunications technology are enabled to easily integrate real-time comms into their applications.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 2
This article summarizes the key takeaways and highlights from QCon London 2015 as blogged and tweeted by attendees.
Now that 2015 is underway, it’s time to consider a mobile strategy framework for a prosperous year. We will be discussing some key points to consider as you plan your strategy for a successful future.
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.
This article describes the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures. 6
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.
In this article, authors discuss the software engineering practices in startup companies and provide empirical software engineering sources related to their engineering practices. 1