InfoQ Homepage Development Content on InfoQ
-
The Renaissance of Code Documentation: Introducing Code Walkthrough
The Continuous Documentation methodology is a useful paradigm that helps ensure that high-quality documentation is created, maintained, and readily available. Code Walkthroughs take the reader on a “walk” — visiting at least two stations in the code — describe flows and interactions, and often incorporate code snippets.
-
Five Things to Remember When Upgrading Your Legacy Solution
Legacy software is still employed, even though it frequently fails to meet critical demands and core business operations. By choosing the right modernization strategy and software development teams, you can easily cut down on high legacy software maintenance costs and increase productivity.
-
Are Canary Releases an Alternative to Testers?
Canary releases enable product owners to check how a new feature is getting adopted by users by rolling it out to a small percentage of users and then incrementally rolling it out to a wider audience. Product owners might feel tempted to discontinue or reduce testing upon adopting canary releases, but decisions should be approached cautiously as they can have serious and unintended consequences.
-
How to Harden Applications against IIoT Security Threats
This article will explore two sides of the IIoT security equation: understanding how and why IIoT systems can become vulnerable to hacking attempts, and which solutions and strategies are available to harden them. It will provide also a set of best practices to address IoT security concerns.
-
Applying Software Delivery Metrics and Analytics to Recover a Problem Project
Problem software delivery projects can be recovered mid-flight if Value Stream Management (VSM) analytics are used in a forensic way to uncover the root-cause of the issues. The root-cause metrics areas considered include: People Availability; Team Stress; Backlog Health; Sprint Accuracy; Process Efficiency; Story Management; and Defect Gen. A root-cause RAG reports shows key mitigations.
-
Anomaly Detection Using ML.NET
In this article, the author introduces the concepts of Anomaly Detection using the Randomized PCA method. The theory behind the concepts is explained and exemplified. The method is demonstrated with a real-world scenario implemented using C# and ML.NET.
-
Serverless Solution to Offload Polling for Asynchronous Operation Status Using Amazon S3
This article proposes a solution to redirect the polling part to the Amazon Simple Storage Service (S3) - a highly available, scalable, and secured object storage service managed by Amazon Web Services public cloud provider (AWS). It will present a serverless implementation using AWS Lambda functions, but this is not mandatory if you want to use S3.
-
Techstinction - How Technology Use is Having a Severe Impact on our Climate and What We Can Do
Most people don’t realise how their use of technology, both socially and in the workplace, is responsible for an increasingly significant volume of the world's Co2 emissions. In this article, you will learn how our use of technology is having a severe impact on our climate and what we can do about it.
-
Forensic Monitoring of Blockchains is Key for Broader Industry Adoption
This article presents a new blockchain consensus mechanism, XinFin Delegated Proof-of-Stake Consensus Protocol 2.0, that provides a higher level of trust by creating an efficient judiciary system. It has been designed to keep all verifying nodes accountable and allow for bad actors to be identified and effectively neutralized.
-
Maximize Developer Productivity and Engagement with the Developer Experience Engineer
With developers becoming more important than ever, it’s critical to understand how to maximize their productivity and engagement, so in turn, businesses can create better value. The Developer Experience Engineer (DXE) clears the path to developer success by implementing a common set of principles, maintaining the right tools, and creating cohesive standards.
-
Records in C# 9
In this article, Tugce Özdeger talks about Records, a new reference type introduced in C# 9 that provides built-in functionality for encapsulating data. The article shows the potential benefits and advantages of using records and how developers can use them in their applications, with code examples and comparisons with classes and structs.
-
Application Security Manager: Developer or Security Officer?
The role of the Application Security Manager (ASM) should be the driving force of the overall code review process. An ASM should know about development processes, information security principles, and have solid technical skills. To get a good ASM you can either use experts from a service provider or grow an in-house professional from developers or security specialists.