Bulk data is commonly accessed via files & FTP. As the world moves toward APIs to facilitate collaboration, what are the requirements for data APIs? This article describes a meta-data driven architecture for bulk data ingestion. Two APIs operate in parallel to provide data changes as well as the data records themselves. An example demonstrates how API responses are parameterized using meta-data.
In this article, authors summarize the information published in "Tools of the Trade" column series in IEEE Software magazine for last ten years. Tools and best practices are organized into categories like design, developing code, tooling, builds, and operations.
With the emergence of the WebRTC API standard, telecom’s control of communications is changing. This standard enables developers without any experience in telecommunications technology and protocols to easily integrate real-time comms into their applications. This ease of access will spawn new innovative use cases that will change the way that we communicate, exchange information and interact.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4
This article summarizes the key takeaways and highlights from QCon London 2015 as blogged and tweeted by attendees.
Now that 2015 is underway, it’s time to consider a mobile strategy framework for a prosperous year. We will be discussing some key points to consider as you plan your strategy for a successful future.
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.
This article describes the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures. 7
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.
In this article, authors discuss the software engineering practices in startup companies and provide empirical software engineering sources related to their engineering practices. 1
A Technical Leader should demonstrate capability in three main areas which are often overlooked:Team Support, Technical Excellence, and Innovation. Read more about these capabilities in this article. 4
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.