InfoQ Homepage Infrastructure Content on InfoQ
-
Key Takeaway Points and Lessons Learned from QCon San Francisco 2015
This article summarizes the key takeaways and highlights from QCon San Francisco 2015 as blogged and tweeted by QCon's 1,300 attendees. Over the course of the next 4 months, InfoQ will be publishing most of the conference sessions online, including 10 video interviews that were recorded by the InfoQ editorial team.
-
Data Lake-as-a-Service: Big Data Processing and Analytics in the Cloud
Data Lake-as-a-Service solutions provide big data processing in the cloud for faster business outcomes in a very cost effective way. InfoQ spoke with Lovan Chetty and Hannah Smalltree from Cazena team about how Data Lake as a Service works.
-
Real-time Data Processing in AWS Cloud
In this article, author Oleksii Tymchenko discusses a bio-informatic software as a service (SaaS) product called Chorus, which was built as a public data warehousing and analytical platform for mass spectrometry data. Other features of the product include real-time visualization of raw mass-spec data.
-
Scaling Docker with Kubernetes V1
Find out what's new in Kubernetes V1 with a Jenkins example in Google Container Engine (and locally with Vagrant). Kubernetes V1 brings enterprise-level capabilities such as self healing, service discovery, dynamic DNS, resource quotas, centralized logging, network isolation, resource quotas. In short, Kubernetes V1 makes management of Docker fleets easier.
-
Oozie Plugin for Eclipse
Oozie Eclipse plugin is a new tool for editing Apache Oozie workflows graphically inside Eclipse. Usage of this plugin allows to skip hard to develop and maintain process definition in HPDL. Instead a process graph is defined graphically by placing process actions on pallet and connecting them. An article introduces Eclipse Oozie plugin and provides an example of its usage.
-
Big Data Solutions with MS SQL ColumnStore Index
Columnar data storage can offer significant performance improvements over the way database tables are traditionally stored, but they aren’t always faster. Aleksandr Shavlyuga explores the power, and limitations of SQL Server’s ColumnStore Indexes.
-
Packet Inspection for Unauthorized OS Detection in Enterprises
The authors discuss an approach that uses TCP SYN packets for OS fingerprinting to detect the presence of unauthorized OSs in an enterprise.
-
The Estimation Game - Techniques for Informed Guessing
In this article, author Carlos Bueno discusses the strategies for estimating the server capacity for big data projects and initiatives, with the help of two case studies.
-
Machine Learning and Cognitive Computing
Based on a webinar on analytics, this article covers the topics of machine learning and cognitive computing, and how these fields are related to artificial intelligence (AI). Panelists discuss how this technology is being applied in digital marketing space and what concerns organizations have in providing machine learning services.
-
Article Series: Patterns of DevOps Culture
Healthy organizations exhibit similar patterns of behavior, organization and improvement efforts. In this series we explore some of those patterns through testimonies from their practitioners and through analysis by consultants in the field who have been exposed to multiple DevOps adoption initiatives.
-
Garage Door Openers: An Internet of Things Case Study
In this article, author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure. He talks about cloud service authentication and security improvements offered by networked openers, like two-factor authentication (2FA). He also discusses security infrastructure for IoT devices, which includes user authentication, access policy creation & enforcement.
-
Seven Microservices Anti-patterns
In this article Vijay Algarasan, a Principal Architect at Asurion, discusses how he and his teams have encountered microservices at various engagements and some lessons they have learned as a result. This has resulted in them building up a series of anti-patterns and some associated patterns, which Vijay believes are more widely applicable to all practitioners of microservices