InfoQ Homepage Infrastructure Content on InfoQ
-
Interview with Michael Azoff from Ovum about How To Create the Agile Enterprise
Large enterprises face three challenges: to innovate and act as a start-up, to use a budgeting process that keeps the organization’s strategy in touch with changing market conditions, and to transform the whole IT department to agile. Principal analyst Michael Azoff explains Ovum’s view on creating an agile enterprise.
-
Key Takeaway Points and Lessons Learned from QCon London 2013
This article presents the main takeaway points as seen by the many attendees who blogged or tweeted about QCon. Comments are organized by tracks and sessions: Keynotes, Distributed Systems / REST, The Java Developer Track, The Developer Track, Building for Clouds, Real Startups, Creative Thinking & Visual Problem-solving, Handheld Banking and many more!
-
Choosing the Right ESB for Your Integration Needs
Kai Wähner explains the differences between an integration framework, an ESB and an integration suite, following with advice for selecting the right one from existing commercial and open source solutions.
-
Capturing Compliance Requirements: A Pattern-Based Approach
Assuring compliance across an enterprise is critical and necessitates a holistic approach for defining a consistent set of process and system level controls. In this article, authors discuss a new pattern-based framework to capture and manage business process compliance requirements. They also talk about implementation of the framework and two case studies in banking and e-business domains.
-
Application Performance Management Maturity Model
In this article, author Jim Hirschauer justifies the importance of application performance management (APM) process in organizations. He also describes a maturity model for application performance management with three different levels of maturity.
-
Evaluating Agile and Scrum with Other Software Methodologies
Historical data is a key resource for judging the effectiveness of software process improvement methods and also for calibrating software estimation accuracy. In this article, Capers Jones compares Agile and Scrum with a sample of contemporary software development methods using several standard metrics.
-
Interview: Sam Haskins from Etsy on Code Deployment, Monitoring and Failure Procedures
Sam Haskins from Etsy talks about code management with Github, fast deployments with feature flags and no packaging, canary releasing, voluntary code reviews, CI with Jenkins, monitoring and failures.
-
Interview and Book Review: DevOps Troubleshooting: Linux® Server Best Practices
Kyle Rankin delivers practical advice and techniques for team oriented troubleshooting of Linux servers in a DevOps culture. The book targets systems engineers, developers, and QA staff that have gaps in knowledge about troubleshooting Linux servers. The book includes Linux Server Best Practices in common problem areas.
-
Growing EAI with Apache Camel
This article comprises practical examples of typical integration challenges and explores how Apache Camel can meet these challenges. These examples are presented in the context of an integration solution that starts simply but grows over time as new integration needs arise. The article concentrates on how Camel helps managing complexity and keeping the team productive.
-
Self-Organizing Organizations (For Real)
This is a true story about a company that operates under principles of self-organization. It is organized according to the free will of each individual in the company, all of them freely choosing to co-operate for achieving some goals. All you’ve ever wanted to know about self-organized companies, without daring actually run one.
-
Interview & Book Review: “The Phoenix Project, A Novel About IT, DevOps & Helping Your Business Win”
This book addresses the divide between business and IT and between dev, ops and other teams in IT. It will resonate at one point or another with anyone who's ever worked in IT. DevOps on steroids one might call it.
-
Application Security Testing: The Double-sided Black Box
In this article, Rohit Sethi discusses one of the biggest risks with software security, the opaque nature of verification tools and processes, and the potential for false negatives not covered by the different verification techniques. He also talks about some examples of security requirements and examines how common verification methods apply to them.