InfoQ Homepage Development Content on InfoQ
-
How We Improved Application’s Resiliency by Uncovering Our Hidden Issues Using Chaos Testing
This article lists the chaos testing principles which are outlined by Netflix. The readers should be able to understand the advantages and disadvantages that chaos testing offers. This will help them to decide whether they want to perform it or not. The article also explains why we should convince the management to perform chaos tests, considering all benefits over the risks.
-
An Ode to Unit Tests: in Defense of the Testing Pyramid
The switch to the testing diamond approach has not effectively addressed issues caused by the testing pyramid. Instead, the focus should be on using unit tests correctly within a testable architecture.
-
Java InfoQ Trends Report - December 2022
This report provides a summary of how the InfoQ Java editorial team and several Java Champions currently see the adoption of technology and emerging trends within the Java and JVM space in 2022. We focus on Java the language, as well as related languages like Kotlin and Scala, the Java Virtual Machine (JVM), and Java-based frameworks and utilities.
-
Software Testing through the Lens of Energy Management
I’m a software tester who observed that certain activities were getting me excited, while other simpler, shorter activities were draining and took a lot longer to get me motivated enough to even pick them up . This article is an experience report of how I discovered my personal energy system and superimposed it on a video game model, which also applies to the world of software testing.
-
Moving to .NET 7 MSMQ Alternatives
No MSMQ support is available in the new versions of .NET; if it’s time to move, this article presents a few considerations on what that transition can look like. It will explore some of the available options. By the end, you should see that even though it may be tough, there is a pathway forward.
-
Colliding Communities, Cloud Native, and Telecommunications Standards
What happens when an ecosystem driven from the bottom up collides with a community characterized by top-down development? The 5g broadband cellular network standard by the 3rd Generation Partnership Project (3GPP), the Network Function Virtualization (NFV) standard by the European Telecommunications Standards Institute (ETSI), and the Service Function Chain RFC (request for comments) are examples.
-
Using Serverless WebSockets to Enable Real-Time Messaging
This article reviews some of the most common live-user experiences with examples, discusses event-driven architectures to support real-time updates, and introduces common technology choices.
-
PHP 8 - Classes and Enums
In this article, we will review new PHP 8 features related to classes, including enums, used to specify an enumerated list of possible values for a type; the new readonly modifier for a class property, which makes the property unmodifiable after its initialization; and constructor parameter promotion, useful to assign a constructor parameter value to an object property automatically.
-
Extinguishing IT Team Burnout through Mindfulness and Unstructured Time
Burnout is taking a toll on IT and creating serious skill shortages. How can you keep your IT team engaged, productive, and happy? Mindfulness and unstructured time are delivering tangible business benefits that positively impact the bottom line, all while driving worker satisfaction and well-being.
-
Java Champion Josh Long on Spring Framework 6 and Spring Boot 3
Microservices show where Java lags behind other languages. Reactive programming provides a concise DSL to express the movement of state and to write concurrent, multithreaded code with better scaling. Developing in Spring Boot works well even without special tooling support. Josh Long is excited about Project Loom, Java optimization in Project Leyden, and Foreign-Function access in Project Panama.
-
Who Moved My Code? An Anatomy of Code Obfuscation
In this article, we introduce the topic of code obfuscation, with emphasis on string obfuscation. Obfuscation is an important practice to protect source code by making it unintelligible. Obfuscation is often mistaken with encryption, but they are different concepts. In the article we will present a number of techniques and approaches used to obfuscate data in a program.
-
Build, Test, and Deploy Scalable REST APIs in Go
In this article, we'll look at how to use the gin framework to create a simple Go application. We will also learn how to use CircleCI, a continuous deployment tool, to automate testing and deployment.