InfoQ Homepage Articles
-
The Renaissance of Code Documentation: Introducing Code Walkthrough
The Continuous Documentation methodology is a useful paradigm that helps ensure that high-quality documentation is created, maintained, and readily available. Code Walkthroughs take the reader on a “walk” — visiting at least two stations in the code — describe flows and interactions, and often incorporate code snippets.
-
Five Things to Remember When Upgrading Your Legacy Solution
Legacy software is still employed, even though it frequently fails to meet critical demands and core business operations. By choosing the right modernization strategy and software development teams, you can easily cut down on high legacy software maintenance costs and increase productivity.
-
Failing Fast: the Impact of Bias When Speeding up Application Security
This article deals with three biases people can have with establishing application security while trying to move fast in building them, attitude which can cost the organization later, showing how to spot the biases, and providing advice on what to do about them.
-
How to Reduce Burnout in IT Security Teams
Burnout isn't a selfcare problem. The information security industry needs to take a deeper examination and create changes to allow for workers to have more flexibility and the ability to have balanced personal and work life. This article serves as a starting point by breaking down why burnout exists in InfoSec, why past solutions don’t work anymore, and how to actually reduce burnout in teams.
-
Are Canary Releases an Alternative to Testers?
Canary releases enable product owners to check how a new feature is getting adopted by users by rolling it out to a small percentage of users and then incrementally rolling it out to a wider audience. Product owners might feel tempted to discontinue or reduce testing upon adopting canary releases, but decisions should be approached cautiously as they can have serious and unintended consequences.
-
How to Harden Applications against IIoT Security Threats
This article will explore two sides of the IIoT security equation: understanding how and why IIoT systems can become vulnerable to hacking attempts, and which solutions and strategies are available to harden them. It will provide also a set of best practices to address IoT security concerns.
-
Applying Software Delivery Metrics and Analytics to Recover a Problem Project
Problem software delivery projects can be recovered mid-flight if Value Stream Management (VSM) analytics are used in a forensic way to uncover the root-cause of the issues. The root-cause metrics areas considered include: People Availability; Team Stress; Backlog Health; Sprint Accuracy; Process Efficiency; Story Management; and Defect Gen. A root-cause RAG reports shows key mitigations.
-
Anomaly Detection Using ML.NET
In this article, the author introduces the concepts of Anomaly Detection using the Randomized PCA method. The theory behind the concepts is explained and exemplified. The method is demonstrated with a real-world scenario implemented using C# and ML.NET.
-
Serverless Solution to Offload Polling for Asynchronous Operation Status Using Amazon S3
This article proposes a solution to redirect the polling part to the Amazon Simple Storage Service (S3) - a highly available, scalable, and secured object storage service managed by Amazon Web Services public cloud provider (AWS). It will present a serverless implementation using AWS Lambda functions, but this is not mandatory if you want to use S3.
-
Techstinction - How Technology Use is Having a Severe Impact on our Climate and What We Can Do
Most people don’t realise how their use of technology, both socially and in the workplace, is responsible for an increasingly significant volume of the world's Co2 emissions. In this article, you will learn how our use of technology is having a severe impact on our climate and what we can do about it.
-
Forensic Monitoring of Blockchains is Key for Broader Industry Adoption
This article presents a new blockchain consensus mechanism, XinFin Delegated Proof-of-Stake Consensus Protocol 2.0, that provides a higher level of trust by creating an efficient judiciary system. It has been designed to keep all verifying nodes accountable and allow for bad actors to be identified and effectively neutralized.
-
Maximize Developer Productivity and Engagement with the Developer Experience Engineer
With developers becoming more important than ever, it’s critical to understand how to maximize their productivity and engagement, so in turn, businesses can create better value. The Developer Experience Engineer (DXE) clears the path to developer success by implementing a common set of principles, maintaining the right tools, and creating cohesive standards.