BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Operating Systems Content on InfoQ

  • Benchmarks Don't Have to Die

    Are tracing and profiling the future of performance engineering outside of the fast-moving JavaScript community? Do all benchmarks have a shelf-life? In this article, Matt Fleming talks about benchmarks and what keeps the good ones alive and why others die. By adapting benchmarks, they can live forever.

  • Continuous Delivery with Kubernetes the Hard Way

    Automating continuous delivery with Kubernetes requires a Single-Source-Of-Truth, and that rollbacks can be implemented efficiently without requiring new code changes to be pushed.

  • How to Effectively Collect User Feedback in Mobile Application

    This article analyzes a variety of forms of collecting feedback in mobile applications from a number of perspectives, including user experience, development, operations,and cost. It also analyzes in which scenario each form of feedback is more applicable, with the purpose of helping mobile application developers or product managers use the right feedback mechanism and improve their products.

  • An Introduction to Differential Privacy

    Differential privacy leapt from research papers to tech news headlines last year when, in the WWDC keynote, Apple VP of Engineering Craig Federighi announced Apple’s use of the concept to protect user privacy in iOS. This article gives a definition of differential privacy and example of differentially private algorithms.

  • Elevating Builds into a Container

    Automated builds and delivery pipelines are a wonderful thing once they’re operational. But provisioning build agents can be quite painful. It can be greatly simplified by running tools in containers.

  • Swift and Objective-C Runtime Programming

    Since a few months ago, a debate has been going on within the Objective-C/Swift developer community concerning the lack of dynamic features in Swift and the importance that runtime programming plays in Objective-C and Cocoa. InfoQ has spoken with Swift developers Chris Eidhof and Drew Crawford to learn more about these potential issues.

  • Reactor by Example

    Reactor, like RxJava 2, is a fourth generation reactive library launched by Spring custodian Pivotal. It builds on the Reactive Streams specification, Java 8, and the ReactiveX vocabulary. In this article, we’ll draw a parallel between Reactor and RxJava, and showcase the common elements as well as the differences.

  • Can Your Company Benefit from a Progressive Web App?

    Progressive web apps is a new concept that bridges the gap between websites and mobile apps. They promise offline capabilities as well as improved speed and performance. In this article, Mark Pedersen reviews the benefits of progressive web apps and how your company can benefit from this emerging technology.

  • Pros and Cons of Cross-Platform Mobile App Development

    The world has gone mobile. One of the most challenging situations for app developers is whether to develop a native mobile app or go for cross-platform. This article discusses the pros and cons of cross-platform mobile app development.

  • IBM's Swift on the Server

    Since Swift's open-source release, IBM has been working on the project and providing libdispatch on Linux, as well as providing a Swift web-based runtime and a managed catalog of Swift projects. InfoQ spoke to Chris Bailey and Patrick Bohrer, who presented at QCon London 2016, and asked them where they see Swift going in the future.

  • Understanding Bitcode for iOS Applications

    When Apple released Xcode 7, they also enabled applications to be distributed to the AppStore through bitcode, instead of per-processor target files. InfoQ looks under the covers at what Bitcode is, what advantages it may offer, and why developers should consider enabling bitcode projects for their iOS targets.

  • Packet Inspection for Unauthorized OS Detection in Enterprises

    The authors discuss an approach that uses TCP SYN packets for OS fingerprinting to detect the presence of unauthorized OSs in an enterprise.

BT