This article summarizes the key takeaways and highlights from QCon London 2014 as blogged and tweeted by attendees. Over the course of the next 4 months, InfoQ will be publishing most of the conference sessions online, including 27 video interviews that were recorded by the InfoQ editorial team. The publishing schedule can be found on the QCon London web site.
As mobility is transforming our lives, this article gives a step-by-step approach on how enterprises can seamlessly connect their mobile workforce to back-end systems for increased productivity. Covering topics like business goal definition, API and data security or user experience it provides a broad overview on what to keep in mind while planning an enterprise mobility strategy.
Following up on his previous article on preparing for CD in the enterprise, Andrew Phillips reviews state-of-the-art plugins and solutions in the Jenkins ecosystem for achieving efficient, reproducible and secure delivery pipelines. Helped by none other than Jenkins creator, Kohsuke Kawaguchi.
Approximately 60% of all computers sold worldwide today are portable, making them an easy target for criminals. How can your personal data be protected? With one word - encryption! 2
InfoQ reached out to experienced ops engineers to ask them what is “Immutable Infrastructure”, its borders as well as its benefits and drawbacks, in particular compared to desired state convergence. 1
This article provides an overview of tools and libraries available for embedded data analytics & statistics, both stand-alone software packages and programming languages with statistical capabilities.
Philipp K. Janert explains how to reliably auto-scale systems using a reactive approach based on feedback control which provides a more accurate solution than deterministic or rule-based ones.
The second edition of Stephen Nelson-Smith's book "Test-Driven Infrastructure with Chef" describes a testing workflow and tools for writing fully tested infrastructure code
With the news stories of possible data breaches at enterprises like Target, and companies migrating to cloud environments, CIOs have been asking hard questions about cloud security. 2
In this article, authors discuss the role of big data and Hadoop in security analytics space and how to use MapReduce to process data for security analysis.
Yaniv Yehuda looks at the challenges involved in automating database deployments and offer suggestions based on Agile and DevOps concepts. 6
There has been a raging debate about PaaS and whether it is still a valuable part of a cloud portfolio, so InfoQ reached out to 4 leaders in the cloud domain for their opinions on the future of PaaS.