Scaling Docker with Kubernetes V1

Posted by Carlos Sanchez on  Oct 31, 2015

Find out what's new in Kubernetes V1 with a Jenkins example in Google Container Engine. V1 brings enterprise-level capabilities such as self healing, service discovery, dynamic DNS, resource quotas.

Oozie Plugin for Eclipse

Posted by Ahmed Mahran on  Oct 30, 2015

A new Eclipse Oozie plugin allows to significantly simplify implementation of Oozie processes by allowing to define them graphically. An article introduces plugin and provides an example of its usage. 1

Big Data Solutions with MS SQL ColumnStore Index

Posted by Aleksandr Shavlyuga on  Oct 11, 2015

ColumnarStore can offer performance improvements over traditional tables, but aren’t always faster. Aleksandr Shavlyuga explores the power, and limitations of SQL Server’s ColumnStore Indexes.

Packet Inspection for Unauthorized OS Detection in Enterprises

Posted by Rohit Tyagi, Tuhin Paul, B.S. Manoj, B. Thanudas on  Oct 10, 2015

The authors discuss an approach that uses TCP SYN packets for OS fingerprinting to detect the presence of unauthorized OSs in an enterprise. 3

The Estimation Game - Techniques for Informed Guessing

Posted by Carlos Bueno on  Sep 26, 2015

In this article, author Carlos Bueno discusses the strategies for estimating the server capacity for big data projects and initiatives, with the help of two case studies.

Machine Learning and Cognitive Computing

Posted by Seth Earley on  Sep 19, 2015

This article covers machine learning and cognitive computing, and how they are related to artificial intelligence (AI). Panelists discuss how this technology is applied in digital marketing space.

Article Series: Patterns of DevOps Culture

Posted by Manuel Pais on  Sep 18, 2015

This series explores some of the patterns of behavior of healthy organizations through testimonies from their practitioners and through analysis by consultants in the field.

Garage Door Openers: An Internet of Things Case Study

Posted by Jonathan Margulies on  Sep 13, 2015

Author discusses how to design an Internet-connected garage door opener ("IoT opener") to be secure and the security infrastructure for IoT devices, like authentication & access policy enforcement. 1

Seven Microservices Anti-patterns

Posted by Vijay Alagarasan on  Aug 24, 2015

In this article Vijay Algarasan, a Principal Architect at Asurion, discusses how he and his teams have encountered microservices at various engagements and some lessons they have learned as a result. 8

General Feedback
Marketing and all content copyright © 2006-2016 C4Media Inc. hosted at Contegix, the best ISP we've ever worked with.
Privacy policy

We notice you're using an ad blocker

We understand why you use ad blockers. However to keep InfoQ free we need your support. InfoQ will not provide your data to third parties without individual opt-in consent. We only work with advertisers relevant to our readers. Please consider whitelisting us.