InfoQ Homepage Development Content on InfoQ
-
WebHooks: The API Strikes Back
Phil Nash takes a look at services that use Webhooks, exploring reasons to use WebHooks and the emerging best practices, and discusses implementing WebHook endpoints with live coded examples.
-
Building out Hypermedia Clients
Todd Brackley outlines the general engine of a hypermedia client implementation, what API forms look like, and then outlines five design issues useful in creating such clients.
-
Simplifying API Development
Abhinav Asthana discusses methods for simplifying API development.
-
Java Performance Engineer's Survival Guide
Monica Beckwith provides a step-by-step approach to finding the root cause of any performance problem in a Java app, showcasing through an example a few performance tools and the performance process.
-
Concurrency and Strong Types for IoT
Carl Hewitt promotes using strong types and the actor model to deal with various devices in IoT.
-
Money Is in the Gap
Eric Horesnyi discusses how to develop an API business to have financial success.
-
This Will Cut You: Go's Sharper Edges
Thomas Shadwell talks about how distinct, exploitable misuse patterns arise in software languages, and through examples in Go hopes to show the language's distinct security characteristics.
-
Making the Most out of a Bad Day as a Developer
Wim Remes talks about the war stories from his experience as a penetration tester and the numerous years of work with development teams building secure development practices.
-
GraphQL for All? A Few Things to Think about before Blindly Dumping REST for GraphQL
Arnaud Lauret discusses REST vs. GraphQL, comparing their strengths and weaknesses, suggesting evaluating both before making a decision.
-
Parasitic Programming Languages
David Nolen examines the benefits and tradeoffs associated with creating a language based on an existing runtime, with a special focus on the Clojure and ClojureScript projects.
-
How to Backdoor Invulnerable Code
Josh Schwartz takes a look at the real tactics, with examples, used to compromise and backdoor seemingly secure products by exploiting the humans and systems that create them.