BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Development Content on InfoQ

  • Integrating Lucene with HBase

    The article describes overall design and implementation of integrating Lucene search library with HBase back end. It describes integration architecture, implementation and HBase tables design

  • Key Takeaway Points and Lessons Learned from QCon San Francisco 2011

    This article presents the main takeway points as seen by the many attendees who blogged about QCon. Comments are organized by tracks and sessions: Keynotes, Advancing Agile to the Next stage with Lean, Agile in the Midlife, Architecture Case Studies, Beautiful Code, Big Data and NoSQL, Functional Web, Cross Platform Mobile Development, HTML5 & JavaScript, Systems That Never Stop and many more!

  • A Java Developer’s Guide to PaaS

    This article reviews and compares 6 leading vendors of Platform-as-a-Service (PaaS) solutions for Java developers, together with 3 up and coming vendors mentioned at the end of the article. After reading it, you will learn different technical and business approaches of Java PaaS, and then decide for yourself which vendor provides the best platform for your needs.

  • Interview and Book Review: Pro HTML5 and CSS3 Design Patterns

    "Pro HTML5 and CSS3 Design Patterns" catalogs many common patterns in modern HTML5 applications. InfoQ talked to one author, Dionysios Synodinos, about the book and working with HTML5.

  • Comparison of Intrusion Tolerant System Architectures

    In this IEEE article, authors Quyen L. Nguyen and Arun Sood discuss three types of intrusion tolerant system (ITS) architectures and their efficiency for intrusion tolerance and survivability. For the ITS architectures, they propose a taxonomy with four categories: detection triggered, algorithm driven, recovery based, and hybrid.

  • Virtual Panel: Security Considerations in Accessing NoSQL Databases

    NoSQL databases offer alternative data storage options for storing unstructured data compared to traditional relational databases. Though the NoSQL databases have been getting a lot of attention lately, the security aspects of storing and accessing NoSQL data haven't been given much emphasis. This article focuses on the security considerations and best practices in accessing the NoSQL databases.

  • Finding the Right Data Solution for Your Application in the Data Storage Haystack

    With the recent NoSQL movement there are several alternative data storage solutions available compared to the traditional relational databases. In this article, author Srinath Perera discusses the various data storage options and what to consider when choosing each of these solutions.

  • An Overview of .NET/Mono Runtime Versions, Profiles, and Targeting Packs

    The .NET/Mono Framework has never been a single, unified stack and over the years Microsoft and Novell added several new versions to cover Linux, OS X, and mobile devices. With the introduction of Windows 8 and Visual Studio 11 we can expect one, maybe two more. In an attempt to clear up some of the confusion this article reintroduces all of the major profiles and many of the lessor know ones.

  • Interview and Book Review: Specification by Example

    Gojko Adzic has written the book Specification by Example, explaining the set of techniques for describing the functional and behavioural aspects of a computer system in a way that they are useful to the development team (expressed ideally as executable tests), understandable by non-technical stakeholders and maintainable to remain relevant despite changing customer demands.

  • The Essence of Google Dart: Building Applications, Snapshots, Isolates

    Google has previewed Dart, a new language with a VM but also a JS compiler. InfoQ looks beyond the grammar at Dart's contributions for building apps: Snapshots, Isolates, Modularity.

  • Mobile Attacks and Defense

    In this IEEE article, author Charlie Miller talks about the mobile security vulnerabilities. He explains how smart phones are becoming targets of attackers and discusses security models of two smart phone operating systems: Apple's iOS and Google's Android. The attackers can get remote code to run on a mobile device in two ways: mobile malware and drive-by downloads.

  • Integrating PHP with .NET Using Phalanger

    Phalanger can be used to create solutions that combine .NET and PHP in ways that are not possible with the standard PHP interpreter. Thanks to Phalanger extensions, PHP programs can directly use .NET classes and .NET programs can dynamically invoke PHP scripts or use functions and classes implemented in PHP.

BT