InfoQ Homepage Development Content on InfoQ
-
Introduction to Kotlin's Coroutines and Reactive Streams
Krystian Rybarczyk looks into coroutines and sees how they facilitate asynchronous programming, discussing flows and how they make writing reactive code simpler.
-
How the HotSpot and Graal JVMs Execute Java Code
James Gough discusses HotSpot, explores Graal and the JVM ecosystem to discover performance benefits of a platform 25 years in the making.
-
Elixir vs Scala
Ludwik Bukowski and Kacper Mentel compare the results of a pattern recognition app implemented in Elixir and Scala.
-
A Year with Java 11 in Production!
Andrzej Grzesik talks about Revolut’s experience in running Java 11 in production for over a year. He discusses tools, alternative JVM languages, and some 3rd party products.
-
Performance vs. New Features: It Doesn’t Have to Be a Zero-Sum Game
Dmitry Vyazelenko explores implementing CRC checksums for a durable log while trying to retain respectable performance.
-
Distributed Programming, Hash Tables, and Fun!
Thomas Gebert and Nick Misturak demonstrate how they built a distributed hash-table video-sharing system, the technical hurdles encountered, and the pros/cons of using functional languages to do so.
-
Lessons from DAZN: Scaling Your Project with Micro-Frontends
Luca Mezzalira explains how to implement micro-frontends, enabling to scale up a project with tens of developers without reducing the throughput.
-
Maximizing Applications Performance with GraalVM
Alina Yurenko shows how to make real-world applications GraalVM-ready, and how languages like JavaScript, Ruby, R and Python can also benefit from GraalVM.
-
Build Your Own WebAssembly Compiler
Colin Eberhardt looks at some of the internals of WebAssembly, explores how it works ‘under the hood’, and looks at how to create a (simple) compiler that targets this runtime.
-
Pony, Actors, Causality, Types, and Garbage Collection
Sophia Drossopoulou gives an overview of Pony’s programming model, actors, and causality.
-
Live Coding 12-Factor App
Emily Jiang performs live coding of building 12-factor microservices using MicroProfile programming mode and gets them running Open Liberty and Quarkus.
-
Security Vulnerabilities Decomposition
Katy Anton flips the security from focusing on vulnerabilities (measured at the end) to focusing on the security controls which can be used by developers from beginning in software development cycle.