In this article, author Eltjo R. Poort discusses an architecture approach called Risk and Cost Driven Architecture that helps architects become more effective in an agile world. It's based on the use of risk and cost to determine the architectural significance of concerns.
Spark SQL, part of Apache Spark big data framework, is used for structured data processing and allows running SQL like queries on Spark data. In this article, Srini Penchikala discusses Spark SQL module and how it simplifies running data analytics using SQL interface. He also talks about the new features in Spark SQL, like DataFrames and JDBC data sources.
Lean Product Development takes an end-to-end focus on the flow of work through a system. Rather than focus on traditional measures such as capacity utilization, it proves more effective to focus on how work is moving through the system. This article discusses what impedes the flow of work, and how we manage impediments to the flow of work.
We are at a crossroads in the agile-adoption narrative. Agile started spreading “bottom-up”, then shifted from teams to executives and recently to consultancy for large enterprises. What will be next?
With the emergence of the WebRTC API standard, developers without any experience in telecommunications technology are enabled to easily integrate real-time comms into their applications.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 2
This article summarizes the key takeaways and highlights from QCon London 2015 as blogged and tweeted by attendees.
Now that 2015 is underway, it’s time to consider a mobile strategy framework for a prosperous year. We will be discussing some key points to consider as you plan your strategy for a successful future.
If you don't want to analyze all user stories in your project in order to estimate size then Randomized Branch Sampling can be used for portfolio related decisions and quotations on prospect projects.
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.
Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it.