SPONSOR AD This research report focuses on open source security vulnerabilities in C, Java, JavaScript, Python, Ruby, PHP, and C++, to find out which programming languages are most secure, which vulnerability types are most common in each language, and why. Download Now. |
At the end of 2019, InfoQ ran a survey of our readers to find out what tools, techniques, and languages they were using. This is a summary of the results. (Article) |
Daniel Bryant sat down with Dave Sudia, senior DevOps engineer at GoSpotCheck, to discuss the benefits of PaaS; building a platform with Kubernetes as the foundation; selecting open source components and open standards in order to facilitate the evolution of a platform; and why care should be taken to prioritize the developer experience and create self-service operation of the platform. (Podcast) |
In this podcast Shane Hastie, Lead Editor for Culture & Methods, spoke to Jono Bacon about building communities, the value of community when suddenly working remotely, and remote collaboration. (Podcast) |
Confirm your technical and non-technical decisions. Understand how others have approached similar difficult situations and what actions they took. Find out more between Nov 16-18 at QCon San Francisco. |
AI, ML & Data Engineering Latest Content |
TOP AI, ML & Data Engineering NEWS HEADLINES |
|
MIT-IBM AI Labs and Harvard NLP Group have released a live demo of their interactive visualization tool for exploring learned representations in Transformers models called exBERT, along with a pre-publication and the source-code. (News) |
DevOps Latest Content |
TOP DevOps NEWS HEADLINES |
|
The lack of support for stateful cloud-native application behavior is a roadblock to many cloud use-cases. This article looks at graph knowledge-based systems which offer one approach to the design of next-generation platforms. (Article) |
Christine Yen explores what observability looks like in practice, so that "production" stops being simply where the development code runs into issues, and instead it becomes where part of the development process lives. (Presentation with transcript included) The next QCon is QCon New York, June 15-17, 2020. Join us! |
Katie Gamanji focuses on the evolution of interfaces within the Kubernetes landscape, including networking, storage, service mesh and cluster provisioning. (Presentation with transcript included) |
SPONSOR AD Even systems like Kubernetes need to be tested to verify they can handle turbulent production conditions. Learn how Chaos Engineering can help your team harden your k8s infrastructure, improve reliability, and keep applications running smoothly. Download the guide. |
|
Java Latest Content |
Gil Tene looks at the realities of Life after Java 8. He discusses the rate of change, the current Java ecosystem, and the implications of LTS. He talks about the issues affecting migration of applications from earlier versions, and explores choices for which version to choose for deployment. (Presentation with transcript included) |
.NET Latest Content |
In case you missed it |
In this article we walk through the process of updating an EF Core 3.1 based DAL to adhere to modern best practices such as TreatWarningsAsErrors, FxCopAnalyzers, and C# 8's nullable reference types. (Article) |
SPONSOR AD Join fellow software developers, architects and IT executives interested in learning about modern, scalable process automation for the cloud era. Hear best practices and use cases from Capital One, Goldman Sachs, Nokia Bell Labs, and others. Save your Spot! |
|
Web Development Latest Content |
TOP Web Development NEWS HEADLINES |
|
Timmy Willison released jQuery 3.5, which fixes a cross-site scripting (XSS) vulnerability found in its HTML parser. The Snyk open source security platform estimates that 84% of all websites may be impacted by jQuery XSS vulnerabilities. jQuery 3.5 also adds missing methods for the positional selectors :even and :odd in preparation for the complete removal of positional selectors in jQuery 4. (News) |
SPONSOR AD Want to get rid of your monolithic enterprise applications or not create new ones? Reactive design can help. Author and Red Hatter, Clement Escoffier, explains why and how Eclipse Vert.x is a good choice to build effective microservices systems. Download now. |
|
Mobile and IoT Latest Content |
TOP Mobile and IoT NEWS HEADLINES |
|
Alasdair Allan looks at the possible implications of machine learning on the edge around privacy and security. The ability to run trained networks “at the edge” nearer the data without access to the cloud - or in some cases even without even a network connection at all - means that sensor data in the field can be interpreted without storing potentially privacy infringing data. (Presentation with transcript included) |
SPONSOR AD Learn how to get started with feature flagging and a/b testing without creating long-term technical debt. Discover how to scale to thousands of flags with good governance and reliable QA processes, and adopt these new practices organization-wide without slowing down feature development and delivery. Learn more. |
|
Architecture & Design Latest Content |
TOP Architecture & Design NEWS HEADLINES |
|
Edge Computing is definitely a thing, but the computing need not occur at the edge. Instead what is needed is an ability to compute (anywhere) on streaming data from large numbers of dynamically changing devices, in the edge environment. This in turn demands an architectural pattern for stateful, distributed computing. (Article) |
Culture & Methods Latest Content |
As the impact of COVID-19 continues around the world, many people will be experiencing a sustained period of remote working for the first time. To help you, we’ve collated remote working good practices and resources, and will continue to do so as more emerges. While remote working may appear straightforward, there are common issues that come up as you shift to this way of working. (Article) |
As a coach, what do you need to know to have more success, getting your foot in the door of a client company? What obstacles will you have to overcome? As a company, what do you need to know about a coaching profession, not to brush off an experienced and qualified coach, while opening flood gates for charlatans, cheer-leaders, and 'best-practices" experts - and by doing so, hurting yourself (Article) |
SPONSOR AD Continue your professional learning with our free online learning paths. These learning paths are targeted by role including: Scrum Master, Product Owner, Development Team Member and Leadership. |
|
Theo Schlossnagle gives a fly-by survey of the vast and mature field of ethics and attempts to convince people to adopt ethical considerations into the software development lifecycle. Expect time split equally between ethics, ethics in computing, and computing in society. (Presentation with transcript included) |
Norma Acevedo Lopez presents their experiences regarding the hiring strategy of REWE digital Bulgaria, showing how they implemented a value stream for hiring, allowing the company to grow rapidly. (Presentation) |
Technical leaders are often tasked with guiding teams through difficult times. The Underground Railroad provides insights into how to navigate challenging conditions and find success. The principles that Conductors on the Underground Railroad followed can be directly applied to technical leadership. (Presentation with transcript included) |
SPONSORED CONTENT Latest White Papers Service Mesh and Zero-Trust Security? Leading Your Team to DevOps Maturity The Engineering Leader's Guide to Cycle Time: Accelerating Software Delivery with Data. |