In this three-part series, Monzy Merza will discuss the challenges within organizations to retain and develop top cybersecurity talent, and outline the organizational steps companies can take to keep talent in-house.
In this article, author Carlos Bueno describes a method for analyzing constraints on the shape and flow of data in systems. He talks about the factors useful for system analysis like working set & average transaction sizes, request & update rates, consistency, locality, computation, and latency. He also discusses big data architecture details of two use cases, movie streaming and face recognition.
Over a period of seven years, gilt.com has grown from an e-commerce start-up running a monolithic Ruby on Rails application to $1B luxury goods company operating a cloud-based microservice platform utilising Scala, Docker and AWS. This article introduces Gilt's ION-Roller continuous deployment application, and explains the history and motivations that lead to the creation of this tool.
In little over a decade, Africa has become the second most mobile connected continent, where about 15% of the billion inhabitants owns a cell phone, opening the way to many innovative applications. 2
Cloud based test labs provide an infrastructure to automatically test your software on a great number of devices. Leverage this in your build to reach to goal of continuous quality.
This article explains why Paddy Power adopted continuous delivery (CD), describes the resulting CD capability, and reports the huge benefits and challenges involved.
Spark SQL, part of Apache Spark, is used for structured data processing by running SQL queries on Spark data. Srini Penchikala discusses Spark SQL module & how it simplifies data analytics using SQL. 1
In this article, authors summarize the information published in "Tools of the Trade" column series in IEEE Software magazine for last ten years.
With the emergence of the WebRTC API standard, developers without any experience in telecommunications technology are enabled to easily integrate real-time comms into their applications.
In this article, authors reflect on Credit Suisse's adoption of SOA principles and the organization's transition from mainframe programs to open SOA services with interface contracts and governance. 4
This article summarizes the key takeaways and highlights from QCon London 2015 as blogged and tweeted by attendees.
Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram. Adair details the process, design and main features.