InfoQ Homepage Articles
-
Reducing Cloud Infrastructure Complexity
Cloud computing adoption has taken the world by storm, and is accelerating unabated. According to Flexera’s annual State of the Cloud Report for 2020, 93% of respondents used multi or hybrid cloud strategies. This article examines different aspects of cloud infrastructure complexity, and approaches to mitigate it.
-
Overriding Sealed Methods in C#
In this article, the author demonstrates how we can change the behavior of sealed methods in C#. This can be done by understanding Operating System mechanisms and how the .NET platform generates and compiles code. The author illustrates these techniques using real-world scenarios, including the modification of the WinPAI wrapper.
-
Thriving in the Complexity of Software Development Using Open Sociotechnical Systems Design
The amazing progress made in technology has led to blindly following the technical imperative at the cost of the social and human dimension. Social sciences can help us create a work environment where people feel more at home and proud of what they produce. An organisation designed using open sociotechnical systems theory will be a more humane one where people are more engaged.
-
The Renaissance of Code Documentation: Introducing Code Walkthrough
The Continuous Documentation methodology is a useful paradigm that helps ensure that high-quality documentation is created, maintained, and readily available. Code Walkthroughs take the reader on a “walk” — visiting at least two stations in the code — describe flows and interactions, and often incorporate code snippets.
-
Five Things to Remember When Upgrading Your Legacy Solution
Legacy software is still employed, even though it frequently fails to meet critical demands and core business operations. By choosing the right modernization strategy and software development teams, you can easily cut down on high legacy software maintenance costs and increase productivity.
-
Failing Fast: the Impact of Bias When Speeding up Application Security
This article deals with three biases people can have with establishing application security while trying to move fast in building them, attitude which can cost the organization later, showing how to spot the biases, and providing advice on what to do about them.
-
How to Reduce Burnout in IT Security Teams
Burnout isn't a selfcare problem. The information security industry needs to take a deeper examination and create changes to allow for workers to have more flexibility and the ability to have balanced personal and work life. This article serves as a starting point by breaking down why burnout exists in InfoSec, why past solutions don’t work anymore, and how to actually reduce burnout in teams.
-
Are Canary Releases an Alternative to Testers?
Canary releases enable product owners to check how a new feature is getting adopted by users by rolling it out to a small percentage of users and then incrementally rolling it out to a wider audience. Product owners might feel tempted to discontinue or reduce testing upon adopting canary releases, but decisions should be approached cautiously as they can have serious and unintended consequences.
-
How to Harden Applications against IIoT Security Threats
This article will explore two sides of the IIoT security equation: understanding how and why IIoT systems can become vulnerable to hacking attempts, and which solutions and strategies are available to harden them. It will provide also a set of best practices to address IoT security concerns.
-
Applying Software Delivery Metrics and Analytics to Recover a Problem Project
Problem software delivery projects can be recovered mid-flight if Value Stream Management (VSM) analytics are used in a forensic way to uncover the root-cause of the issues. The root-cause metrics areas considered include: People Availability; Team Stress; Backlog Health; Sprint Accuracy; Process Efficiency; Story Management; and Defect Gen. A root-cause RAG reports shows key mitigations.
-
Anomaly Detection Using ML.NET
In this article, the author introduces the concepts of Anomaly Detection using the Randomized PCA method. The theory behind the concepts is explained and exemplified. The method is demonstrated with a real-world scenario implemented using C# and ML.NET.
-
Serverless Solution to Offload Polling for Asynchronous Operation Status Using Amazon S3
This article proposes a solution to redirect the polling part to the Amazon Simple Storage Service (S3) - a highly available, scalable, and secured object storage service managed by Amazon Web Services public cloud provider (AWS). It will present a serverless implementation using AWS Lambda functions, but this is not mandatory if you want to use S3.