InfoQ Homepage Articles
-
A Bottom-Up View of Kotlin Coroutines
Recently coroutines have become popular as an alternative to Reactive Programming on the JVM. In many cases the costs of restructuring your code around functional operations for reactive streams outweigh the benefits, so coroutines have emerged, initially for Android, as an alternative solution. This deep dive explores how Kotlin's implementation works under the hood.
-
Kubernetes Security: The State of the Union - a Virtual Panel
InfoQ caught up with experts Scott Coulton, cloud developer advocate at Microsoft, Liz Rice, VP of open source engineering at Aqua Security, Gareth Rushgrove, director of product management at Snyk, Maya Kaczorowski, product manager for security and privacy at Google Cloud and Kirsten Newcomer, senior principal product manager at Redhat about the state of the union of Kubernetes security.
-
Q&A on The Host Leadership Field Book
The Host Leadership Field Book: Building Engagement for Performance and Results provides 30 cases and experiences from people who are applying host leadership in different settings. The book emerged from the 2019 Host Leadership Gathering, and was edited by Mark McKergow and Pierluigi Pugliese.
-
The Datum Data Binding Library
There has been an explosion of frameworks and libraries for making single page applications for the web. Angular, React, Vue and quite a few others have made it easier to develop on the web and helped fuel its growth as webapps have become more dynamic and interactive. Howeve,r there may still be room for other libraries and new ideas such as Datum, a new, simple data binding library.
-
Preparing Entity Framework Core for Static Analysis and Nullable Reference Types
In this article we walk through the process of updating an EF Core 3.1 based DAL to adhere to modern best practices such as TreatWarningsAsErrors, FxCopAnalyzers, and C# 8’s nullable reference types.
-
The Fundamental Truth behind Successful Development Practices: Software is Synthetic
Software systems are creative compounds, emergent and generative; the product of complex interactions between people and technology. They are different from the orderly, analytic worlds that our school-age selves expect to find. Being so full of complexity and uncertainty, we use a different way to arrive at a solution.
-
Q&A on the Book EDGE: Value-Driven Digital Transformation
In the book EDGE: Value-driven Digital Transformation, the authors explain why and how every business today needs to become a digital business with technology at the core. They explain six principles and a variety of practices that organisations can apply to survive and thrive on the creative edge where value is generated.
-
Enterprise API Management: Q&A with Book Author Luis Weir
In the Enterprise API Management book, Luis Weir provides technology-agnostic strategies that organizations can implement to drive more predictable outcomes. The topics that Weir covers in this book include the Business Value of APIs, Business-Led API Strategy, API-Led Architectures, API-Architecture Styles, API Life Cycle and more.
-
How King uses AI to test Candy Crush Saga
To be able to improve features in games which are constantly evolving, the challenge will be to scale tests to be on a par with new feature development. Automated tests are vital for King to keep up testing Candy Crush, therefore they are constantly looking for new improved ways to test.
-
Q&A on the Book Creating your Dojo
Dion Stewart & Joel Tosi have written a book about creating a dojo to help teams get better at delivering software products. A dojo is an immersive learning environment where whole teams improve their practices on a range of skills. Dojos are more effective than traditional classroom learning because the whole team works together in the context of their own product and organization.
-
A Transformation Journey for a Distributed Development Organization
Agile transformations are never easy, but are even more challenging than usual when it comes to geographically distributed teams. This article highlights experiences from Konica Minolta’s Workplace Hub program and shares the methods that helped them on their journey. It's about the organization, processes, but most importantly, about the people and the mindset.
-
What Is Account Creation Fraud? Complete Guide to Detection and Prevention
In this article, we'll take a look at the re-emergence of account creation fraud, and how this type of attack works. Then we'll turn our attention to the impact that this is already having on the way that companies secure their identity management systems, the effects of security measures like virtual private networks (VPN) and password managers, along with what the future will bring.