Adrian Colyer reviews five computer science papers which cover DBSherlock, how Google organises datasets, relaxing the majority quorum requirement in the Paxos Consensus algorithm, the key paper Netflix first looked to for principles on which to build its cloud architecture, and decomposing systems in modules.
This eMag takes a look back at five of the most popular presentations from the Architectures You’ve Always Wondered About track at QCons in New York, London and San Francisco, each presenter adding a new insight into the biggest challenges they face, and how to achieve success. All the companies featured have large, cloud-based, microservice architectures, which probably comes as no surprise.
Technology choices are made, and because of a variety of reasons - such as multi-year licensing cost, tightly coupled links to mission-critical systems, long-standing vendor relationships - you feel “locked into” those choices. In this InfoQ emag, we explore the topic of cloud lock-in from multiple angles and look for the best ways to approach it.
A summary of five CS papers chosen from the 55 that Adrian Colyer has reviewed for his Morning Paper blog during Q2 2016. Amongst the five papers in the magazine Colyer takes a look at how Facebook collect and analyse over 1 trillion data points per day across 2 billion unique time series, and the technology behind bots on Q&A systems like Siri, Cortana, Alexa et al.
The creation of many competing, complementary and supporting container technologies has followed in the wake of Docker, and this has led to much hype and some disillusion around this space. This eMag aims to cut through some of this confusion and explain the essence of containers, their current use cases, and future potential.
In this eMag we have curated articles on bytecode manipulation, including how to manipulate bytecode using three important frameworks: Javassist, ASM, and ByteBuddy, as well as several higher level use cases where developers will benefit from understanding bytecode.
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. This book will help you find out what Shiro actually is, and will help you to secure your Java EE project from scratch and to understand the security philosophy.
A summary of five CS papers chosen from the 66 that Adrian Coyler has reviewed for his Morning Paper blog during the first quarter of 2016. Topics include distributed transactions, transaction recovery, and Hyperloglog.
This year was the tenth anniversary for QCon London, and it was also our largest London event to date. Including our 140 speakers we had 1,400 team leads, architects, and project managers attending 112 technical sessions across 18 concurrent tracks and 12 in-depth workshops. This eMag brings together InfoQ’s reporting of the event, along with views and opinions shared by attendees.
In little over a decade, Africa has gone from being a region where it’s still hard to find power lines, fixed-line telecom infrastructure, and personal computers to being the second-most mobile-connected continent where about 15% of the billion inhabitants own a cell phone.
If there were ever any question that Java was the de facto standard for server side enterprise development, Java 8 has certainly quelled that one. The world now anxiously awaits Java 9 and the innovations it promises. Oracle has slated Java 9 for a March 2017 release. In this eMag, we take a look at what’s on the scheduled horizon for Java 9 and beyond.
This eMag provides a concise review of all that is essential for developers to know for building apps for the latest release of Apple’s mobile OS. This eMag is essentially based on the video sessions from WWDC that Apple made available to developers and tries to enrich them with links to reference material that has become meanwhile available online.