In this article, author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure. He talks about cloud service authentication and security improvements offered by networked openers, like two-factor authentication (2FA). He also discusses security infrastructure for IoT devices, which includes user authentication, access policy creation & enforcement.
Author Lenley Hensarling discusses the Foreign Data Wrapper (FDW) feature in Postgres database. FDW provides a SQL interface for accessing data objects in remote data stores to integrate data from disparate sources like NoSQL databases and bring them into a common model.
The WebRTC API lets developers easily integrate real-time comms into their apps. This article is the second part of a two part series analyzing the market of WebRTC platforms. It compares data from late 2013 / early 2014 to a survey conducted in April and May of this year as part of an ongoing coverage of the cloud real-time communications platform market.
In this article, Aaron Kendall uses the "metadata-driven design and development" approach by Kevin Perera to show how to rapidly create a mobile application that can evolve during runtime.
Every developer knows the pain of incompatible software. By using Docker executable images developers can take advantage of container technology to better control their development environments. 1
We take a look at Etsy's blameless postmortems, both in terms of philosophy, process and practical measures/guidance to avoid blame and better prepare for the next outage. Learning is the key outcome.
The Design and Implementation of the FreeBSD Operating System is a long awaited update to a successful and authorative guide to the FreeBSD kernel that covers all major new features up to FreeBSD 11.
There are various types of subscriptions: recurring, non-recurring, free-trial periods, various billing cycles, .... This article will make your life easier when addressing in-app subscriptions.
Óscar San José, technical lead at Tuenti (largest Spanish social network) explains how and why their in-house Flow deployment system allowed developer teams to be more independent and deliver faster.
In this article, authors discuss ad hoc anonymous & secure survey system called Anonize that can be used in applications like university course evaluations, online product reviews, and whistleblowing.
If you are building or designing your next monitoring system, take a look at this short list of habits exhibited by the most successful monitoring systems in the world today. 1
This article features highlights from interviews on the state of practice and challenges in release engineering space. Interview questions cover topics like metrics, continuous delivery's benefits. 2