InfoQ Homepage Infrastructure Content on InfoQ
-
Runtime Changes Are the Weeds Killing Your Crops
Spike Morelli discusses best practices behind creating Programmatically Generated Images, a tool for building and deploying system images that remain unchanged through QA, staging and production.
-
Webmail for Millions, Powered by Erlang
Scott Lystig Fritchie presents the architecture and lessons learned implementing a webmail system in Erlang, using UBF and Hibari, a distributed key-value store, to accommodate a large user base.
-
Proving the Business Value of SOA
Anne Thomas Manes discusses SOA goals and objectives used to measure a system’s success, measuring the business value, SOA project metrics, and recommendations on proving the business value of SOA.
-
Advanced GORM - Performance, Customization and Monitoring
Burt Beckwith discusses potential performance problems using mapped collections and Hibernate 2nd-level cache in GORM, along with strategies for avoiding such performance penalties.
-
RESTful SOA or Domain-Driven Design - A Compromise?
Vaughn Vernon advocates using DDD’s strategic modeling patterns when integrating services in a RESTful SOA implementation, avoiding one of SOA’s pitfalls: focusing on services rather than the domain.
-
Zero Investment SOA
Eric Jan Malotaux discusses implementing SOA in small iterative steps, each step delivering value to stakeholders, using feedback from previous steps to adjust the requirements and design accordingly.
-
NoSQL at Twitter
Ryan King presents how Twitter uses NoSQL technologies - Gizzard, Cassandra, Hadoop, Redis - to deal with increasing data amounts forcing them to scale out beyond what the traditional SQL has to offer
-
Enterprise NoSQL: Silver Bullet or Poison Pill?
Billy Newport explains the fundamental differences between SQL and NoSQL, creating awareness that NoSQL is not suited for many cases, and people should make informed decisions before buying into it.
-
SOA Threat Modeling: Attacking and Defending REST, XML and SOAP-based Services
Jason Macy details the basic requirements for security testing and SOA gateway, attack examples and countermeasures to protect against SQL Injection, DoS, XSD Mutation, and Identity type of attacks.
-
Continuous Deployment to Production 50 Times a Day
Eishay Smith discusses the advantages of using continuous deployment (CD) at a rapid pace, dozens of times a day, the process and the tools needed to attain CD, and practices to ensure code quality.
-
Squid Wrangling
Sam Newman and Chris Read describe the architectural change of a large European website by introducing a caching layer based on Squid, and the cultural change done by breaking down the dev-ops silos.
-
Hacking Your Organization
Lloyd Taylor talks about different types of organizational culture, how to understand the culture one is in, what to do to be successful in the respective organization, and how to prepare for change.