Matthias Marschall contributes powerful tactical information for all users of Opscode Chef, from the beginner up to expert, in his recently published book "Chef Infrastructure Automation Cookbook". Beginners will gain progressive knowledge using open source tools and free services. The expert will find a starting point automating the configuration of production applications in data centers.
The Android Developer’s Cookbook: Building Applications with the Android SDK, 2nd Edition is a collaborative effort by Ronan Schwarz, Phil Dutson, James Steele and Nelson To. The authors have succeeded in providing a solid reference book. A book for mobile app developers that can serve as an authoritative guide for newbies and intermediate to expert devs for creating awesome mobile apps.
Learning Gerrit Code Review presents an overview of the Gerrit review tool, from how to install and configure projects through to how to integrate with other services like GitHub and Jenkins.The book also presents the rationale behind code reviews and the benefits that it brings to projects, as well as some low-level introductions to git.
One of the biggest challenges in modern business is how you integrate subsidiaries and present a single global view so that customers and partners find it simpler to integrate with your organisation.
Netflix is a widely referenced case study for how to operate a cloud application at scale. In this interview, InfoQ spoke with Adrian Cockcroft who is the Cloud Architect for the Netflix platform.
Luke Kanies, CEO of Puppet Labs, discusses how software is taking over what have always been hardware functions, and how that shift is causing dramatic realignments in how people work together.
In this article, author Mat Keep discusses the deployment best practices of MongoDB databases with focus on capacity planning & monitoring aspects. He explains hardware selection, metrics & sharding.
What is the relationship between Cloud Computing and DevOps? Cloud and DevOps are independent but mutually reinforcing strategies for delivering business value through IT.
Dennis Sosnoski explains how supposedly-secure connections can be downgraded to the point where they are easily broken and how to make it more difficult for anyone to see or alter your data exchanges. 2
Docker is an open source tool to run applications inside of a Linux container, a kind of light-weight virtual machine. 2
To protect against hacks that lead to theft of business data, best practices are set forth in the Payment Card Industry Data Security Standard. Follow these 12 steps for a secure payment environment. 1
In this article, author Yiftach Schoolman outlines how to overcome the top seven challenges associated with managing the in-memory NoSQL datastores in the cloud. 3