InfoQ Homepage Development Content on InfoQ
-
Distributed Cloud Computing: Enhancing Privacy with AI-Driven Solutions
Distributed cloud, PETs, and AI enable secure, private data processing. This integration enhances collaboration, security, and compliance across marketing, finance, and healthcare, addressing the growing need for data protection.
-
Renovate to Innovate: Fundamentals of Transforming Legacy Architecture
Rashmi Venugopal explores the inevitability of legacy systems in successful companies and the importance of transforming legacy systems to accelerate innovation. Rashmi discusses various strategies to tackle such technical renovation initiatives, like evolutionary architecture, deprecation-driven development, and intentional organization design.
-
How to Compute without Looking: a Sneak Peek into Secure Multi-Party Computation
This article shows how you can compute a function across multiple parties that do not trust each other without forcing them to share their individual inputs. This technique can be used to split secrets among parties, perform logical operations, or count votes in a way that ensures data privacy is preserved.
-
DiRMA: Measuring How Your Organization Manages Chaos
Elevate your disaster recovery strategy with DiRMA—an innovative framework for assessing and enhancing Disaster Recovery Testing (DiRT) maturity across people, processes, and tools. As chaos engineering becomes essential for resilience, DiRMA guides organizations through structured improvement, addressing cultural hurdles and ensuring robust recovery readiness in the face of modern challenges.
-
Building Efficient Mobile Streaming Apps
This article explores efficient preloading systems for mobile video streaming apps, balancing user experience with technical constraints. We will dive into practical implementation strategies that leverage network intelligence, buffer management techniques, AI-driven preloading, and real-world testing methodologies to enhance video delivery in mobile environments.
-
Checklist for Kubernetes in Production: Best Practices for SREs
This article provides SREs with a checklist for managing Kubernetes in production environments. It identifies common challenges including resource management, workload placement, high availability, health probes, storage, monitoring, and cost optimization. By implementing consistent GitOps automation across these areas, teams can significantly reduce complexity, and prevent downtime.
-
Eclipse LMOS: Launching AI Agents across Europe at Breakneck Speed
In this talk, the authors share some of our company’s key learnings in developing customer-facing LLM-powered applications deployed across Europe. They used multi-agent architecture and systems design to create an open-source set of tools, a framework, and a full-fledged platform to accelerate the development of AI agents. This is a summary of a presentation from InfoQ Dev Summit Boston 2024.
-
Prompt Injection for Large Language Models
This article will cover two common attack vectors against large language models and tools based on them, prompt injection and prompt stealing. We will additionally introduce three approaches to make your LLM-based systems and tools less vulnerable to this kind of attacks and review their benefits and limitations, including fine-tuning, adversarial detectors, and system prompt hardening.
-
Elevate Developer Experience with Generative AI Capabilities on AWS
This is a summary of a talk I gave at InfoQ Dev Summit Munich 2024. I discussed the transformative potential of generative AI in enhancing developer experiences, particularly through AWS. I’ll introduce key tools like Amazon Bedrock, Code Review Assistant, Agentic Code Generation, and Code Summarization in this article.
-
Modeling Complex Data Structure in Golang Using Pointers, References, and Reverse Indices
Understanding pointers and references in Go can be challenging for many developers, especially those new to low-level programming languages. In this article, I’ll walk you through a program that leverages Go pointers and references to solve a real-world use case: a graph-based permission system.
-
Spring Security Configuration with Flow Diagrams
In modern Java systems, Spring Security is widely used, offering numerous settings for various scenarios. This diversity can be confusing when more specific configurations beyond the default formLogin(withDefaults()) are needed. This article demonstrates basic configurations with detailed component analysis through diagrams and code examples, providing a starting point for further customization.
-
Being Functionless: How to Develop a Serverless Mindset to Write Less Code!
Dynamic cloud services like AWS Lambda have revolutionized computing, leading to rapid deployment and innovation in serverless technology. However, over-reliance on Functions as a Service (FaaS) can create complex architectures and increase costs. Adopting a functionless mindset and leveraging native service integrations fosters simplicity, enhances sustainability, and optimizes efficiency.