InfoQ Homepage Articles
-
Engineering a Time Series Database Using Open Source: Rebuilding InfluxDB 3 in Apache Arrow and Rust
At times, to evolve your product, you need to rebuild it from scratch. The article provides the story behind the rewrite of InfluxDB from scratch using a different programming language - Rust - and stack - Apache Flight, Data Fusion, Apache Arrow and Parquet (FDAP). It emphasises the benefits, as well as the mechanics behind its operation and the different versions of the product.
-
FedCM: a New Proposed Identity Standard That Could Change How We Log in on the Web
FedCM is a new proposed browser API for secure, frictionless, privacy-preserving federated logins. FedCM simplifies user authentication, for both user and developers and reduces the reliance on third-party cookies. The proposal is currently a public working draft moving towards a candidate recommendation from the W3C It's actively developed, with Chromium browsers already supporting it.
-
Beyond the Padlock: Why Certificate Transparency is Reshaping Internet Trust
Certificate Transparency (CT) creates public, append-only logs of every TLS certificate issued, enabling detection of rogue or mistaken certificates. This article explores how CT has transformed internet PKI by moving from reliance on certificate authority trustworthiness to providing verifiable transparency that major browsers now require.
-
Virtual Panel: How Software Engineers and Team Leaders Can Excel with Artificial Intelligence
Artificial intelligence is impacting the individual work of software developers, how professionals work together in teams, and how software teams are being managed. In this panel, we'll discuss how artificial intelligence is reshaping software development, and what mindset and skills are required for software developers and engineering leaders to become adaptable and resilient in the age of AI.
-
Effective Practices for Architecting a RAG Pipeline
Hybrid search, smart chunking, and domain-aware indexing are key to building effective RAG pipelines. Context window limits and prompt quality critically affect LLM response accuracy. This article provides lessons learned from setting up a RAG pipeline.
-
How Causal Reasoning Addresses the Limitations of LLMs in Observability
Large language models excel at converting observability telemetry into clear summaries but struggle with accurate root cause analysis in distributed systems. LLMs often hallucinate explanations and confuse symptoms with causes. This article suggests how causal reasoning models with Bayesian inference offer more reliable incident diagnosis.
-
Evaluating Kotlin Multiplatform: Benefits and Trade-Offs in Cross-Platform Development
KMP is emerging as an alternative for cross-platform development, offering a path to share code without sacrificing the performance and feel of a native application. KMP comes with its own set of trade-offs and this article dives deep into those. While it focuses primarily on Android and iOS, KMP can be used to build desktop, web, and server-side applications, all from the same shared logic.
-
MCP: the Universal Connector for Building Smarter, Modular AI Agents
In this article, the authors discuss Model Context Protocol (MCP), an open standard designed to connect AI agents with tools and data they need. They also talk about how MCP empowers agent development, and its adoption in leading open-source frameworks.
-
The Virtual Think Tank: Using LLMs to Gain a Multitude of Perspectives
The virtual think tank leverages LLMs to simulate diverse stakeholder and expert perspectives, enabling architects to explore trade-offs, challenge biases, and refine decisions. By prompting personas of real industry experts, the method fosters rich, contextual debates—offering a scalable, low-cost alternative to a traditional think tank.
-
Ransomware-Resilient Storage: the New Frontline Defense in a High-Stakes Cyber Battle
Cybersecurity has evolved, with ransomware now primarily targeting data storage and backups. To combat this, modern defense strategies focus on making storage systems more resilient. Key tactics include using immutable storage that prevents data from being altered or deleted, employing AI-powered detection, and implementing air-gapping to create isolated, tamper-proof recovery points.
-
The Missing Layer in AI Infrastructure: Aggregating Agentic Traffic
In this article, author Eyal Solomon discusses AI Gateways, the outbound proxy servers that intercept and manage AI-agent-initiated traffic in real time to enforce policies and provide central management.
-
Zero-Downtime Critical Cloud Infrastructure Upgrades at Scale
Engineers can avoid common pitfalls in large-scale infrastructure upgrades by studying others' experiences. The article provides lessons learned from big firms like eBay and Snowflake, offering solutions for legacy systems, performance validation, and rollback planning. It emphasizes systematic preparation and clear communication to handle challenges and ensure zero-downtime upgrades at scale.