InfoQ Homepage Cloud Content on InfoQ
-
Nine Trends That Are Influencing the Adoption of Devops and Devsecops in 2021
While it’s important to recognize the value of both DevOps and DevSecOps, they are not one-size-fits-all, monolithic, permanent paradigms. In this article, we’ll take a look at that ongoing development – isolating and explaining nine key trends that are driving and changing the adoption of DevOps, DevSecOps, and a number of related approaches to development and management.
-
Article Series: Building Microservices in Java
This article series will explore the state-of-the-art in building microservice-based architectures using the Java language. Alongside popular stalwarts, such as Spring Boot and Dropwizard, newer frameworks, such as Quarkus, Micronaut and Helidon, have been gaining momentum. These frameworks emerged after MicroProfile was introduced to the Java community in 2016.
-
Why AWS Lambda Pricing Has to Change for the Enterprise
AWS Lambda users pay only when their code is run. This can result in massive cost savings over long-running workloads. The advantages start to disappear quickly when AWS Lambda is employed for batch processing. Enterprises can gain significantly from the scalability of FaaS - yet a price comparison between EC2, Lambda, and Fargate, the AWS-managed container service, reveals an ugly truth.
-
The Evolution of Distributed Systems on Kubernetes
At QCon in March, Bilgin Ibryam, product manager at Red Hat, gave a talk on the evolution of distributed systems with Kubernetes. You might have an answer to that, and Ibryam has one too. At the end of the article, you will find out what he thinks the answer will be.
-
Cloud-Native Is about Culture, Not Containers
At QCon London last year, Holly Cummins, innovation leader in IBM Corporate Strategy, provided a session titled: Cloud-Native is about Culture, not Containers. In this article, Cummins will discuss the role of culture in cloud-native architecture. Furthermore, she will dive into various topics around cloud-native ranging from its definition to CI/CD and operations.
-
The Perfect Pair: Digital Twins and Predictive Maintenance
Businesses are moving towards developing a predictive maintenance model using digital twins that mirror their real-life counterparts. In this article, the author looks at digital twins, and provides an example of how to build one.
-
Serverless Functions for Microservices? Probably Yes, But Stay Flexible to Change
When designing cloud-native systems, it is important to accommodate freedom to change deployment strategy, from FaaS to containers or VMs, for potentially significant savings on cloud bills.
-
Network Edge 5G Computing Technologies Predicted to Make Dramatic Changes to Business Operations
Implementing network edge 5G technologies can offer many advantages, but also presents challenges for your team. In this article, we’ll take a look at promise and risk of network edge 5G models.
-
Blockchain Node Providers and How They Work
In this article, we will review the concept of a blockchain node, the problems a developer might face while deploying a node, and the working principle of Blockchain-as-a-Service providers, which simplify the integration of the blockchain into products, maintaining wallets, or keeping the blockchain in sync.
-
Experts Discuss Top Kubernetes Trends and Production Challenges
Kubernetes growth has led to cultural, technological and operational challenges. InfoQ caught up with Kubernetes experts and implementers who talk about 2-3 top trends and challenges that are facing the platform.
-
Is Ruby Pass-by-Value Or Pass-by-Reference?
This article will delve into Ruby internals to explain how parameters are passed into functions. As you will see, it is not immediate to say if Ruby passes parameters by value or by reference, but understanding how this works will help you to write better programs.
-
AI No Silver Bullet for Cloud Security, But Here’s How It Can Help
In this article, the author looks at the real role of artificial intelligence in cloud security – the hype, the reality, and how we can resolve the gap between them. He encourages the reader to focus on making cloud security platforms that allow humans to provide truly intelligent threat responses, rather than relying on the machines to do it for us.