The Pipeline61 framework supports the building of data pipelines involving heterogeneous execution environments. It reuses the existing code of the deployed jobs in different environments and provides version control and dependency management that deals with typical software engineering issues. A real-world case study shows its effectiveness.
Artificial intelligence (AI) is increasingly hyped by everyone, from well-funded startups to well-known software brands. In this article the author describes the need for high-quality, structured data before AI technologies can be of use to organizations and their customers.
Clemens Szyperski (Microsoft), Martin Petitclerc (IBM), and Roger Barga (Amazon Web Services) answer three questions: What major challenges do you face when building scalable, big data systems? How do you address these challenges? Where should the research community focus its efforts to create tools and approaches for building highly reliable, scalable, big data systems?
The emerging DevOps movement emphasizes development and operations staff working together as early as possible-sharing tools, processes, and practices that smooth the production path.
Crypto-currency remains controversial, and Bitcoin is at the center of this controversy. Here is an update on the state of Bitcoin in particular, and examines the future of crypto-currency in general. 1
Because code analysis alone is insufficient to prevent attacks in today's typical large-scale deployment, certain mitigations should be done throughout the entire software life cycle.
When adopting inner source, organizations should consider nine factors pertaining to product, process, and organization.
Francisco Torres shares from experience why it is important to define a software’s operating range: the set of quality properties in which a software system can successfully run.
The authors have concluded after analyzing 15 years of ATAM data that modifiability, performance, availability, interoperability, and deployability are key quality attributes for Agile practitioners.
The authors discuss an approach that uses TCP SYN packets for OS ﬁngerprinting to detect the presence of unauthorized OSs in an enterprise. 3
Authors discuss modularity and projectional editing concepts used to design programming languages, using a Language Workbench (LWB) tool like MPS from Jetbrains.
Author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure and the security infrastructure for IoT devices, like authentication & access policy enforcement. 1