InfoQ Homepage Architecture & Design Content on InfoQ
-
Redesign Design
Matteo Cavucci explores how design is changing in the digital age, beyond the initial delivery of specifications and blueprints, to an adaptive co-creation process that evolves iteratively over time.
-
Strangling the Monolith with a Data-driven Approach: A Case Study
Simon Duffy and David Julia discuss rewriting a monolith application using data-driven testing.
-
Modernizing Applications to Pivotal Cloud Foundry
The presenters discuss using techniques and patterns such as Event Storming, Strangling, Starving, Slice Analysis and Domain Driven Decomposition to transform legacy apps for PCF.
-
How Comcast Embraced Open
Nithya Ruff and Shilla Saebi share tips on how to change an organization’s mindset towards embracing open source and inclusiveness, community building, and contributing upstream.
-
Ford Motor Company’s Cloud Native Reference Application
Todd Hall discusses Ford’s PCF reference application and its role in describing a default set of patterns and practices for their teams.
-
Connecting All Abstractions with Istio
Ramiro Salas, Laurent Demailly explain what a service mesh is, its impact on PCF and K8s, the implications for the traditional infrastructure, and using Istio to integrate all abstractions.
-
Consensus: Why Can't We All Just Agree?
Heidi Howard takes a journey though the history of consensus, and looks ahead to the future of distributed consensus.
-
Cloud-Native Data: What Is it? Will it Solve the Data-DevOps Divide?
The panelists debate whether data's answer to cloud-native will mirror DevOps or not.
-
Building a Reliable Cloud-Based Bank in Java
Jason Maude talks about the server-side implementation of Starling Bank and shows how, even though Java is over two decades old, it can still be used for cutting edge applications.
-
Attack Trees, Security Modeling for Agile Teams
Michael Brunton-Spall talks about Attack Trees, a new way of understanding how a system might be attacked and how to prioritize security measures to be implemented.
-
EternalBlue: Exploit Analysis and beyond
Emma McCall talks about the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year.
-
Bigger, Faster and More Secure
Laura Bell talks about how security can look when it stops being about fear and starts being a tool for building systems of the future.