BT

Approaching Lock-In from a Consultant’s Perspective: An Interview with Nicki Watt

Posted by Richard Seroter on  Jun 30, 2016

Consultants play a major role in helping companies deliver software. How do these consultants tackle lock-in and build portable solutions? In this interview, OpenCredo's Nicki Watt tackles this topic.

Q&A with Intuit's Alex Balazs

Posted by David Iffland on  Jun 29, 2016

Intuit embarked on a redesign of their technology stack, creating a platform to build their product upon. In this Q&A, Alex Balazs, VP Fellow Architect of Turbo Tax tells us how they did it.

Multi-Cloud Is a Safety Belt for the Speed Freaks

Posted by Michael Coté on  Jun 24, 2016

Cloud bursting! On-premises! Hybrid cloud! Off-premises! Multi-cloud! Each of them makes logical sense, but it’s the last - multi-cloud - that the author has been seeing in actual practice the most.

Big Data Analytics with Spark Book Review and Interview

Posted by Srini Penchikala on  Jun 23, 2016

Big Data Analytics with Spark, authored by Mohammed Guller, provides a practical guide for learning Apache Spark. InfoQ and the author discuss the book & development tools for big data applications.

Configure Once, Run Everywhere: Decoupling Configuration and Runtime

Posted by Anatole Tresch on  Jun 17, 2016

Configuration is one of the most widely used cross-cutting concerns in application development. Apache Tamaya is a new incubator project that brings standardized property management to Java.

Virtual Panel on (Cloud) Lock-In

Posted by Richard Seroter on  Jun 17, 2016

There's no shortage of opinions on the topic of technology lock-in. InfoQ reached out to four software industry leaders to participate in a lively virtual panel on this topic.

Wiring Microservices with Spring Cloud

Posted by Rob Harrop on  Jun 15, 2016

As we move towards microservice-based architectures, we're faced with an important decision: how do we wire our services together?

Everything Is “Lock-In”: Focus on Switching Costs

Posted by Richard Seroter on  Jun 08, 2016

It makes no difference how hard you try- some form of lock-in is unavoidable. What matters most is understanding the layers of lock-in, and how to assess and reduce your switching costs.

Living in the Matrix with Bytecode Manipulation

Posted by Victor Grazi on  May 26, 2016

In this article we deep dive into two bytecode manipulation frameworks: Javassist and ASM, valuable tools for performing tasks that are otherwise impossible. And once you learn it the sky's the limit! 2

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT

We notice you’re using an ad blocker

We understand why you use ad blockers. However to keep InfoQ free we need your support. InfoQ will not provide your data to third parties without individual opt-in consent. We only work with advertisers relevant to our readers. Please consider whitelisting us.