Software is in everything from our automobiles to our mobile devices, and as the world becomes even further immersed in the digital era, new security threats are arising beyond the software industry. Today, software products are becoming more susceptible to incidences of reverse-engineering and code tampering – not just outright theft.
This article we focuses on the database backup tools and security policies when deploying MongoDB NoSQL databases. Topics like cloud backups with MongoDB Management Service (MMS), authentication, and authorization are covered.
Maintaining a legacy application can make you feel like mice in a maze. In this article Ping Chen shares her experiences on how to pragmatically maintain a large legacy application. "Pragmatic” is the operative word; since a legacy application can have lots of technical debt, one has to be strategic in choosing the right battles.
Monty Taylor and James Blair talk about the build and test challenges they face at OpenStack, and how they managed to tackle them.
In this article, author explores Cassandra CLI architecture model using JArchitect tool and CQLinq language to analyze its code base.
In this article we hear a very personal story on introducing a DevOps mindset at a large bank. In particular how the automation of configuration and release management processes enabled collaboration.
This article summarizes the key takeaways and highlights from QCon San Francisco 2013 as blogged and tweeted by attendees.
Chris Smith offers insights on how to leverage the increasing employee adoption of cloud services (Bring Your Own Cloud) to perform their work. Understanding the risks and benefits becomes essential.
In this article, a panel of experts discuss the important aspects of software analytics. Topics covered include what software analytics mean to developers, practitioners, and information analysts.
Elasticsearch is an open source, distributed real-time search and analytics engine for the cloud. InfoQ spoke with Costin Leau about Elasticsearch and how it integrates with Hadoop and Big Data.
What’s the best way to protect servers in the cloud? To find out, InfoQ spoke with Mark Nunnikhoven, a Principal Engineer in the Cloud & Emerging Technologies division at Trend Micro.
Deploying real applications is hard. Questions arise when there are Registry settings, custom folders structure, or web clusters. Here we look for answers using PowerShell and AppVeyor CI.