BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Development Content on InfoQ

  • Implementing Hypermedia

    In this article, we'll talk about four different real-world implementations of hypermedia: how you may already be using hypermedia through image links, how GitHub uses the Link header for pagination, using hypermedia in constrained systems like iOS, and how Balanced uses hypermedia principles to build their product.

  • Book Review and Interview: Mastering Eclipse Plug-in Development

    Regular InfoQ Java contributor Dr. Alex Blewitt has recently published a follow-up to last year’s "Eclipse 4 Plug-in Development by Example”. Called “Mastering Eclipse Plug-in Development,” the book, like its predecessor, is essentially a tutorial, but it assumes that you are already familiar with the basics of building plug-ins for the Eclipse IDE, and rapidly dives into advanced topics. 

  • Q&A with Janet Gregory and Lisa Crispin about More Agile Testing

    The book More Agile Testing reflects back on the developments that have happened in agile testing in the last five years. It covers new challenges in testing, test practices, and examples of and experiences with agile testing from teams all around the world. InfoQ did an interview with the authors Janet Gregory and Lisa Crispin.

  • Key Takeaway Points and Lessons Learned from QCon San Francisco 2014

    This article summarizes the key takeaways and highlights from QCon San Francisco 2014 as blogged and tweeted by QCon's 1,200 attendees. Over the course of the next 4 months, InfoQ will be publishing most of the conference sessions online, including 10 video interviews that were recorded by the InfoQ editorial team.

  • Functional Programming in Scala Review and Q&A with the Authors

    Paul Chiusano and Rúnar Bjarnason's Functional Programming in Scala "is not a book about Scala," say the authors, rather it is a principled introduction to functional programming that relies on Scala. An interview with the authors.

  • A Web API Design Methodology

    This article provides a brief overview of the design methodology covered in the book "RESTful Web APIs" by Richardson and Amundsen.

  • Review: Designing APIs for the Web

    Mike Amundsen's video series "Designing APIs for the Web" is a straightforward dive into API design suitable for a broad set of stakeholders. The thirteen part series provides a rich blend of practical advice, new ideas & a bit of controversy to keep you on your toes. This article reviews the series so you know what to expect. It provides an overview of the content and a balanced commentary.

  • Apache Ignite GridGain Incubator Project - Q&A Interview with Nikita Ivanov

    GridGain announced that the In-Memory Data Fabric has been accepted into Apache Incubator program as Apache Ignite. InfoQ spoke with Nikita Ivanov about their product becoming part of Apache.

  • The Fatal Flaw of Finalizers and Phantoms

    Most developers know that finalizers should not be depended on, but sometimes they are necessary. PhantomReferences, often cited as a good alternative, also suffer from the same fundamental problems. In this article we reveal how to contend with the many issues surrounding finalization in Java.

  • Scaling Docker with Kubernetes

    An introductory guide to scaling Kubernetes with Docker. Kubernetes is an open-source project to manage a cluster of Linux containers as a single system, managing and running Docker containers across multiple hosts, offering co-location of containers, service discovery and replication control.

  • Implementing and Searching Deep Links with the URX API

    John Milinovich explains why mobile deep links matter, how to implement them and search for deep links in other apps using the URX API.

  • How Well Do You Know Your Personae Non Gratae?

    In this article, author discusses three techniques to defend against malicious users in software systems. These techniques includes creating personas to think strategically about the mischief a malicious user might attempt, misuse cases used to determine how the software should respond to unintended use, and activity diagrams annotated with security concerns.

BT