InfoQ Homepage Cloud Computing Content on InfoQ
-
Deliver With Confidence: 10 Practical Tips to Streamline Your Delivery Pipeline
David Alpert shares 10 tips on streamlining the delivery pipeline to make the process fast and smooth.
-
Light and Fluffy APIs in the Cloud
Shiva Narayanaswamy discusses event driven architectures, serverless architectures, identity management and security related to building APIs in the cloud.
-
The Death of Continuous Integration
Steve Smith compares and contrasts different types of Feature Branching and Trunk Based Development, and explains why Continuous Delivery without Continuous Integration is not working.
-
Writing a Kubernetes Autoscaler with Groovy and Spring Boot
Ray Tsang shares his experience in writing a custom metrics collector plus an autoscaler using Groovy and Spring Boot, deployed as containerized microservices in Kubernetes.
-
Disciplined Agile Delivery (DAD): The Foundation for Scaling Agile
Mark Lines keynotes on the Disciplined Agile Delivery (DAD) framework, scaling an Agile strategy, and practices for successfully scaling Agile.
-
The Lego Model for Machine Learning Pipelines
Leah McGuire describes the machine learning platform Salesforce wrote on top of Spark to modularize data cleaning and feature engineering.
-
Lean’ing Towards Continuous Delivery
Adam Krieger discusses improving CD: using feedback to improve customer satisfaction, treating DevOps as a responsibility, discovering the mindset and toolset necessary to deliver successfully.
-
A Taxonomy of Clustering, or No Container is an Island
Ted Young discusses the various tools one can use to manage and operate containers, what they do and what they are useful for.
-
Beyond Ad-hoc Automation: To Structured Platforms
Bridget Kromhout discusses how to work with the right level of abstraction with DevOps tooling, how different DevOps pieces fit together into a cohesive solution.
-
Improving Cloud Security with Attacker Profiling
Bryan Payne provides a clear understanding of different types of attackers, their skill sets, and how compromises happen, with a specific focus on protecting cloud-based applications.
-
Exploding the Linux Container Host
Ben Corrie discusses Project Bonneville, how to create a shared Linux kernel for privileged containers, running containers without Linux, and VMware's dynamic resource constraints of a container host.
-
A How-to Guide to Security in the PAAS Cloud
John Field and Shawn McKinney examine the security of a typical Java web application and describe 5 common application security architecture patterns taken from real world customer problems.