InfoQ Homepage Development Content on InfoQ
-
Mobile DNUN: Danger Notification and User Navigation
This article introduces the authors’ Danger Notification and User Navigation (DNUN) application, which works in conjunction with a geolocation system to save the location of users or objects for emergency rescue or later navigation. The DNUN mobile application can help rescue a user by sending an email with a danger notification to intended contacts.
-
Virtual Panel: High Performance Application in .NET
The panelists discuss high performance computing in .NET. The topics range from the main challenges they faced, to .NET Native and high performance in unconventional platforms. Memory allocation and thus garbage collection are at the center of the conversation, from both users' and implementers' point of view.
-
Model-Based Software Engineering to Tame the IoT Jungle
The ThingML approach, which was inspired by UML, addresses the challenges of distribution and heterogeneity in the Internet of Things. This model-driven, generative approach has been continuously evolved and applied to cases in different domains, including a commercial e-health solution
-
Enabling IoT Ecosystems through Platform Interoperability
The fragmentation of the Internet of Things (IoT) and the lack of interoperability prevent the emergence of broadly accepted IoT ecosystems. The BIG IoT (Bridging the Interoperability Gap of the IoT) project aims to ignite such an ecosystem.
-
MyHeritage Releases to Production
This article explores the Continuous Delivery journey at MyHeritage, from painful, time-consuming manual releases, to a fully automated deployment pipeline.
-
Turbocharge React with GraphQL
GraphQL and React are two Facebook technologies that have grown up together. In this article, Shane Stillwell shows how GraphQL, a strongly-typed JavaScript-based language, helps developers build relationships with their data and improves marshaling across service boundaries. GraphQL is extensible, works alongside REST, and can be implemented in any back-end software solution.
-
Building a Blockchain PoC in Ten Minutes Using Hyperledger Composer
This article examines what businesses look for when considering blockchain’s role in their organization and how the Linux Foundation's Hyperledger Composer can help application developers easily create compelling blockchain solutions for the enterprise.
-
GitLab's CEO Sid Sijbrandij on Current Development Practices
In this all-round interview, GitLab CEO Sid Sijbrandij speaks about how GitLab was born, what differentiates it from its competitors, the importance of being an "open" company, how GitLab engineers use continuous integration, what being a remote-only company means, and much more.
-
Robotic Testing of Mobile Apps for Truly Black-Box Automation
Axiz is a robotic-test generator for mobile apps. Here, we compare our approach with simulation-based test automation, describe scenarios in which robotic testing is beneficial (or even essential), and tell how we applied Axiz to the popular Google Calculator app.
-
InfoQ Virtual Panel: A Practical Approach to Serverless Computing
Add serverless computing to the growing list of options developers have when building software. Serverless products—more accurately referred to as Functions-as-a-Service—offer incredible simplicity, but at a cost. To learn more about this exciting space and the practical implications, InfoQ reached out to three experienced technologists.
-
Introducing Reladomo - Enterprise Open Source Java ORM, Batteries Included! (Part 2)
Goldman Sachs is widely known as a leader in investment banking, but they are very much a leading technology firm as well. Continuing our exploration of Reladomo, the primary Java ORM used at GS and now open source, GS Technology Fellow, Mohammad Rezaei looks at advanced features, such as sharding, caching, bitemporal access, performance, and testing.
-
Security Implications of Permission Models in Smart-Home Application Frameworks
This article presents an analysis of a popular smart-home programming framework, SmartThings, which reveals that many smart-home apps are automatically overprivileged, leaving users at risk for remote attacks that can cause physical, financial, and psychological harm.