Spark SQL, part of Apache Spark big data framework, is used for structured data processing and allows running SQL like queries on Spark data. In this article, Srini Penchikala discusses Spark SQL module and how it simplifies running data analytics using SQL interface. He also talks about the new features in Spark SQL, like DataFrames and JDBC data sources.
In this article, authors summarize the information published in "Tools of the Trade" column series in IEEE Software magazine for last ten years. Tools and best practices are organized into categories like design, developing code, tooling, builds, and operations.
With the emergence of the WebRTC API standard, telecom’s control of communications is changing. This standard enables developers without any experience in telecommunications technology and protocols to easily integrate real-time comms into their applications. This ease of access will spawn new innovative use cases that will change the way that we communicate, exchange information and interact.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 2
This article summarizes the key takeaways and highlights from QCon London 2015 as blogged and tweeted by attendees.
Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram. Adair details the process, design and main features.
Now that 2015 is underway, it’s time to consider a mobile strategy framework for a prosperous year. We will be discussing some key points to consider as you plan your strategy for a successful future.
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services to banks to address the financial sector's growing demand for secure cloud-based services.
The 2015 State of DevOps survey is out. Survey's co-author Gene Kim explains what are the goals for this edition, how the data is analysed and what have we learned so far from past surveys.
This article describes the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures. 6
In this article, authors discuss the security vulnerabilities in software applications, the advantages whitelisting approach provides and how to implement the whitelisting security policies.
Security audits are an important part of IT security programs. In this article, authors highlight the challenges in cloud computing business models, based on interviews with cloud security auditors.