InfoQ Homepage DevOps Content on InfoQ
-
Big Data Processing with Apache Spark - Part 2: Spark SQL
Spark SQL, part of Apache Spark big data framework, is used for structured data processing and allows running SQL like queries on Spark data. In this article, Srini Penchikala discusses Spark SQL module and how it simplifies running data analytics using SQL interface. He also talks about the new features in Spark SQL, like DataFrames and JDBC data sources.
-
Software Development Tooling: Information, Opinion, Guidelines, and Tools
In this article, authors summarize the information published in "Tools of the Trade" column series in IEEE Software magazine for last ten years. Tools and best practices are organized into categories like design, developing code, tooling, builds, and operations.
-
WebRTC - Democratization of Telecom Enabling New App Experiences
With the emergence of the WebRTC API standard, telecom’s control of communications is changing. This standard enables developers without any experience in telecommunications technology and protocols to easily integrate real-time comms into their applications. This ease of access will spawn new innovative use cases that will change the way that we communicate, exchange information and interact.
-
Fifteen Years of Service-Oriented Architecture at Credit Suisse
In this article, authors reflect on Credit Suisse's adoption of SOA principles and patterns and the organization's transition from using tightly integrated mainframe programs to open SOA services with emphasis on the importance of interface contracts and service governance.
-
Key Takeaway Points and Lessons Learned from QCon London 2015
This article summarizes the key takeaways and highlights from QCon London 2015 as blogged and tweeted by QCon's 1,200 attendees. Over the course of the next 4 months, InfoQ will be publishing most of the conference sessions online, including more then 25 video interviews that were recorded by the InfoQ editorial team.
-
Hologram - Finally, AWS Key Distribution that Makes Sense
Faced with the lack of solutions for secure distribution of AWS access keys to developers, AdRoll decided to build their own open source Hologram, a system that brings Amazon's Instance Profile mechanism to developer workstations. Adair details the process, tool design and main features.
-
Creating a Mobile Development Strategy for 2015
Now that 2015 is underway, it’s imperative to consider a mobile strategy framework for a prosperous year and beyond. We will be discussing some key points to consider as you plan your strategy for the year, and how they can help you usher in a successful future. These topics include visual development environments , Bimodal IT, cloud-based mobile development and the HTML5 vs. native debate.
-
The Indian Banking Community Cloud
In this article, authors discuss the Indian Banking Community Cloud (IBCC) that provides cloud-based services exclusively to Indian banks to address the financial sector's growing demand for secure cloud-based services.
-
Q&A with Gene Kim on the State of DevOps Survey
The 4th edition of the State of DevOps survey is out. InfoQ talked to the survey's co-author Gene Kim to understand what are the goals for this edition, how the data is analysed and what have we learned so far from past surveys.
-
The Microservice Revolution: Containerized Applications, Data and All
Microservice architectures and container-based virtualization have taken the software development community by storm in recent months. This article will describe the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures.
-
Beyond Blacklisting: Cyberdefense in the Era of Advanced Persistent Threats
In this article, authors discuss the security vulnerabilities in software applications and how whitelisting approach has advantages over blacklisting. They also talk about how to implement the whitelisting security policies and cost involved with it.
-
How to Start With Security
Computer security, or the lack thereof, has made many headlines recently. In this article we'll look at how bad things are and what you, as a software developer, can do about it. It will help get you started or hopefully give you some new ideas if you're already doing some security work.