Platform-as-a-Service (PaaS) architectures simplify how applications are deployed for developers, and serverless architecture or Functions-as-a-Service (FaaS) is the next step in that direction. This article explores how serverless platforms are built, operated and leveraged for rapid application delivery. A conclusion of this work is that the serverless space is ripe for innovation.
Blockchain, most well known as the technology behind Bitcoin, has uses far beyond cryptocurrencies. This article explains the use cases and technical concepts behind blockchain, gives an overview about available services, and points out why middleware is a key success factor in this space.
This Virtual Panel focuses on some of the current trends in iPaaS. InfoQ has reached out to thought leaders from MuleSoft, SnapLogic and Microsoft to participate in this dialogue.
With the fast-pace of cloud changes, cloud lock-in remains a popular refrain. But what does it mean, and how can you ensure you're maximizing your cloud investment while keeping portability in mind?
There's no shortage of opinions on the topic of technology lock-in. InfoQ reached out to four software industry leaders to participate in a lively virtual panel on this topic.
It makes no difference how hard you try- some form of lock-in is unavoidable. What matters most is understanding the layers of lock-in, and how to assess and reduce your switching costs.
This article series explains how containers are actually being used within the enterprise.
HashiCorp's Million Container Challenge is a test for how efficiently its scheduler, Nomad, can schedule one million containers across 5,000 hosts. This post outlines the lessons learned.
Xu Wang introduces HyperContainer, a runtime for running Docker images on any hypervisor, providing hardware-enforced isolation for multi-tenant environments.
In this article, author discusses a bio-informatic software as a service (SaaS) product which was built as a public data warehousing and analytical platform for mass spectrometry data. 3
The authors discuss an approach that uses TCP SYN packets for OS ﬁngerprinting to detect the presence of unauthorized OSs in an enterprise. 3
Even though mobile apps are nothing special anymore, there is still movement in this area. In this article, Katie Stanfield highlights some of the trends we might encounter in the near future. 14