In the age of microservices, "monolith" has become a dirty word. Yet, monoliths, designed with an emphasis on modularity, can be a better solution for complex domains, such as enterprise applications. The second part of this 2-part series covers a practical approach to creating a successful, modular monolith.
Sergey Laptick shows how to create web components to display data in the form of different types of lists using the Webix UI Library. From simple lists, to advanced, interactive lists, Laptick discusses the core concepts behind Webix lists and how to create your own, customized list implementations.
In the age of microservices, "monolith" has become a dirty word. Yet, monoliths, designed with an emphasis on modularity, can be a better solution for complex domains, such as enterprise applications.
In this article, author discusses Apache Spark GraphX used for graph data processing and analytics, with sample code for graph algorithms like PageRank, Connected Components and Triangle Counting. 1
Troubleshooting Java memory problems can be tricky. In this article, we discuss the proper approach for locating them, and we take a look at a wide range of tools we can use to eradicate them.
This is the third in a three-part series that explores how PayPal has adopted a more API-first approach to building platform services taking a closer look at the program and operational challenges.
You're ready to explore reactive opportunities in your codebase but you are wondering how to test it. In this article Java Champion Andres Almiray provides techniques and tools for testing RxJava2. 4
Extracting useful information from inaccurate data stream, such as human trajectories, is a key issue in IoT applications. This problem can be successfully tackled with Kalman filters.
In this article, we’ll take a closer look at how the portfolio of API’s themselves are managed. 2
InfoQ reached out to Matt Watson, founder and CEO of Stackify, to learn more about its products Prefix and Retrace.
For many use cases (e.g. cryptocurrency ledgers), we must ensure that actions execute deterministically and terminate. In this article, Ben Evans reviews the theory behind the WhitelistClassLoader.