InfoQ Homepage Articles
-
The Argument for WCF Hosting in .NET Core
Should WCF Hosting be Supported in .NET Core? To a lot of people this seems like a strange question; the answer is obviously... yes? no? Well actually it is quite contentious with people on both sides of the issue fiercely arguing for their position. We’ll try to unpack the debate and explain the arguments on both sides.
-
How to Choose a Stream Processor for Your App
Choosing a stream processor for your app can be challenging with many options to choose from. The best choice depends on individual use cases. In this article, the authors discuss a stream processor reference architecture, key features required by most streaming applications and optional features that can be selected based on specific use cases.
-
Testing Programmable Infrastructure - a Year On
Programmable infrastructure is becoming widespread. There are very specific domain issues that make testing it tricky. This article looks at the evolution of tooling and approaches used to address it.
-
Microservices from a Startup Perspective
When starting a journey to microservices, knowing what to consider might be overwhelming. No golden rule that is easily applicable exists. Every journey is different, since every organization is facing different circumstances. In this article I am sharing some lessons learned and challenges from a startup perspective, and what I would do differently the next time introducing microservices.
-
Deep Dive into JUnit 5 Extension Model
JUnit 5 is a modular and extensible testing framework with support for Java 8 and higher. The Jupiter extension model can be used to add custom features. This is explained by building out a simple set of extensions that support the BDD approach to testing with full code examples.
-
How the Boston Children’s Hospital Is Innovating on Top of an Open Cloud
Hybrid and open clouds are rising as an alternative to giants like AWS. This article explains how Boston Children’s Hospital uses this technology for more rapid diagnosis and data processing.
-
Increasing Security with a Service Mesh: Christian Posta Explores the Capabilities of Istio
Istio attempts to solve some particularly difficult challenges when running applications in a cloud platform: application networking, reliability, and observability and (the focus of this article) security. With Istio, communication between services in the mesh is secure and encrypted by default. Istio can also help with "origin" or "end-user" JWT identity token verification.
-
Q&A on the Book Agile Methods for Safety-Critical Systems
The book Agile Methods for Safety-Critical Systems by Nancy Van Schooenderwoert and Brian Shoemaker explains how agile principles and practices can be used to build quality in from the start to develop medical and other safety-critical systems.
-
Analyzing and Preventing Unconscious Bias in Machine Learning
This article is based on Rachel Thomas’s keynote presentation, “Analyzing & Preventing Unconscious Bias in Machine Learning” at QCon.ai 2018. Thomas talks about the pitfalls and risk the bias in machine learning brings to the decision-making process. She discusses three use cases of machine learning bias.
-
The Ethics of Security
Like security, tech ethics is about trying to prevent our systems from hurting users or anyone else.
-
How to Achieve Collaboration as a Key Driver for Continuous Testing
Far too often the dream of a successful digital transformation shatters against a limited, team-centric continuous testing strategy. This article describes how testing must be applied to fit not only agile teams but also the whole enterprise, why collaboration is the key enabler and how different testing techniques work together for overall success.
-
Serverless Still Requires Infrastructure Management
Serverless architectures employ a wider range of cloud services and make infrastructure stacks more heterogeneous. To effectively manage infrastructure in this era, practices and tools have to evolve.