At the last AnDevCon, Doug Bateman moderated a panel focused on what it takes to build Android apps that scale up to millions of global users. This included team management, testing and design for testability, feature and release management, support, open source contributions, alternative architectures, and more.
The new book, The Practice of Cloud System Administration: Designing and Operating Large Distributed Systems, looks at a wide range of considerations for cloud-scale systems. In this book review and interview with the authors, we look at how teams can apply proven best practices.
In this article Monica Beckwith, starting from core Hadoop components, investigates the design of a highly available, fault tolerant Hadoop cluster, adding security and data-level isolation.
Even with WiX, working with Windows Installer packages can be quite difficult. Oleg Shilo’s solution is to ditch the XML entirely and create MSI packages using traditional C# code. 2
This article summarizes the key takeaways and highlights from QCon San Francisco 2014 as blogged and tweeted by attendees.
Paul Chiusano and Rúnar Bjarnason's Functional Programming in Scala "is not a book about Scala," say the authors, rather it is a principled introduction to functional programming that relies on Scala.
Mike Amundsen's series "Designing APIs for the Web" is a straightforward dive into API design suitable for a broad set of stakeholders. This article reviews the series so you know what to expect.
When it comes to database change, agility through automation - the ability to rapidly to accelerate delivery – is what differentiates world-class enterprises from the rest of the crowd. 4
GridGain announced that the In-Memory Data Fabric has been accepted into Apache Incubator program as Apache Ignite. InfoQ spoke with Nikita Ivanov about their product becoming part of Apache.
This article provides ideas about how to approach refactoring based on the complexity and stability of the codebase (Feather's Quadrant) and proposes a refactoring process workflow 4
In this article, author discusses three techniques to defend against malicious users in software systems. The techniques includes creating personas, misuse cases and annotated activity diagrams.