InfoQ Homepage Articles
-
Exploring Hadoop OutputFormat
As more companies adopt Hadoop, its integration with other applications is becoming more important. A key to such integration is usage of the appropriate OutputFormat allowing to produce output data in a form most appropriate for other applications.
-
Is Agile Sub-Optimal?
Lean has the concept of a Sub-Optimal process. A Sub-Optimal process is where a part of the process is optimized to the detriment of the entire process’s efficiency. Are Agile practices creating projects that are in danger of being or becoming Sub-Optimal? What Agile practices are contributing to projects becoming Sub-Optimal? What can we do ensure our projects do not become Sub-optimal?
-
Interview and Book Review: Pro HTML5 and CSS3 Design Patterns
"Pro HTML5 and CSS3 Design Patterns" catalogs many common patterns in modern HTML5 applications. InfoQ talked to one author, Dionysios Synodinos, about the book and working with HTML5.
-
Agile Adoption – Vital Behaviours and Influence Strategies
Steve is interested in uncovering better ways to deliver successful projects regardless of whether or not those ways are ‘agile’. After reading "Influencer, the Power to Change Anything" he found a set of behaviours and influence strategies that are helpful for giving projects the best chance for success and also for helping teams transition to agile.
-
Trust is good, Control is better - Software Architecture Assessment
Testing is an important means to obtain information about implementations. Likewise, code reviews help to keep the code quality high. What is very common for code, gets sometimes neglected for software architecture. But how can a project team test the architecture itself? Software architecture assessment represents an effective approach for introspecting and assessing software design.
-
Comparison of Intrusion Tolerant System Architectures
In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system (ITS) architectures and their efficiency for intrusion tolerance and survivability. For the ITS architectures, they propose a taxonomy with four categories: detection triggered, algorithm driven, recovery based, and hybrid.
-
Virtual Panel: Cloud Services Governance
Governance plays an indisputably important role in maintaining and guiding the implementation of an architectural vision. The advent of cloud computing has changed the architectural landscape affecting the needs and demands of existing governance programs. InfoQ presents a virtual panel discussion with six leading experts on the current state and future of cloud services governance.
-
Agile Modeling: Enhancing Communication and Understanding
Modeling supports us in communicating and understanding when we create software solutions. As communication and understanding are two of the most critical aspects of delivering software solutions - modeling is a valuable tool that should not be overlooked. Agile Modeling adheres to and aligns with Agile values and principles and should be one of the practices within your Agile toolkit.
-
Enterprise Shared Services and the Cloud
As an industry, we have converged onto a standard three-layered service model (IaaS, PaaS, SaaS) to describe cloud computing, with each layer defined in terms of the operational control capabilities it offers. This is unlike, enterprise shared services, which have unique characteristics around ownership, funding and operations, and they span SaaS and PaaS layers, as we explore the differences.
-
Social + Lean = Agile
In today’s increasingly dynamic business environment, organizations must continuously adapt to survive. Change management has become a major bottleneck. Organizations’ need a practical mechanism for managing controlled variance and change in-flight to break the logjam. This paper provides a foundation for applying lean and agile principles to achieve Enterprise Agility through social collaboration
-
Virtual Panel: Security Considerations in Accessing NoSQL Databases
NoSQL databases offer alternative data storage options for storing unstructured data compared to traditional relational databases. Though the NoSQL databases have been getting a lot of attention lately, the security aspects of storing and accessing NoSQL data haven't been given much emphasis. This article focuses on the security considerations and best practices in accessing the NoSQL databases.
-
Developer-Driven Threat Modeling
Threat modeling is critical for assessing and mitigating the security risks in software systems. In this IEEE article, author Danny Dhillon discusses a developer-driven threat modeling approach to identify threats using the dataflow diagrams.