BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Virtual Machines Content on InfoQ

  • Java InfoQ Trends Report - July 2019

    The InfoQ Java trend report provides an overview of technology adoption and commentary on how we see the Java and JVM-related space evolving in 2019. Key developments include the release of Java 13, the rise of non-HotSpot JVMs and the evolution of GraalVM, and the changing landscape of Java microservice frameworks.

  • Book Review: Optimizing Java

    InfoQ reviewed the book Optimizing Java, a comprehensive in-depth look at performance tuning in the Java programming language written by Java industry experts, Ben Evans, James Gough and Chris Newland. InfoQ spoke to the authors for more insights on their experiences, learnings and obstacles in authoring this book.

  • Getting to Know Graal, the New Java JIT Compiler

    Oracle have released Graal, a new JIT compiler for Java. For Java developers, Graal can be thought of as several separate but connected projects - it is a new JIT compiler for HotSpot, and also a new polyglot virtual machine, GraalVM. The initial release includes support for JVM bytecode and JavaScript with LLVM, Ruby and R in beta.

  • InfoQ Call for Articles

    InfoQ provides software engineers with the opportunity to share experiences gained using innovator and early adopter stage techniques and technologies with the wider industry. We are always on the lookout for quality articles and we encourage practitioners and domain experts to submit feature-length (2,000 to 3,000 word) papers that are timely, educational and practical.

  • Q&A with Elton Stoneman on Migrating Workloads and Running Docker on Windows

    These are still early days for Docker on Windows but the possibilities in terms of workloads keeps growing. InfoQ spoke with Elton Stoneman, author of the book Docker on Windows, and speaker at the recent WinOps conference, to understand how to run containers on Windows and which kind of workloads are a good choice for migration.

  • Under The Hood with the JVM's Automatic Resource Management

    The deprecation of Object::finalize is an unusual step for the Java ecosystem. We dive deep into the Hotspot JVM to see how it works. We also compare it to RAII and the Java 7, try-with-resources syntax. The article contrasts these very different approaches to automatic resource management, and explains why TWR should be used in place of finalization by application programmers.

  • The Three Generations of AWS

    When building a new system on AWS we are faced with three architectural choices around application packaging, runtime service and load balancing service. This article looks at these three options, and concludes that the Amazon EC2 Container Service provides the best architectural option for today's applications.

  • What the JIT!? Anatomy of the OpenJDK HotSpot VM

    If you've ever wondered what happens when your bytecode executes, join former Oracle G1GC performance-lead Monica Beckwith in her guided tour of just-in-time (JIT) compilation and runtime optimizations in OpenJDK HotSpot VM.

  • Top 10 Performance Mistakes

    Martin Thompson, co-founder of LMAX, keynoted at QCon São Paulo 2016, outlining the top 10 performance related mistakes that he has encountered in production.

  • Easily Create Java Agents with Byte Buddy

    In this article Rafael Winterhalter, creator of the bytecode manipulation tool Byte Buddy, provides detailed guidance on how to easily create Java agents using Byte Buddy.

  • Understanding Bitcode for iOS Applications

    When Apple released Xcode 7, they also enabled applications to be distributed to the AppStore through bitcode, instead of per-processor target files. InfoQ looks under the covers at what Bitcode is, what advantages it may offer, and why developers should consider enabling bitcode projects for their iOS targets.

  • Packet Inspection for Unauthorized OS Detection in Enterprises

    The authors discuss an approach that uses TCP SYN packets for OS fingerprinting to detect the presence of unauthorized OSs in an enterprise.

BT