Microservices break up monolithic code into discrete chunks that are easier to maintain. Here's an overview and a look at the pros and cons of migrating to a microservices architecture. Nearly every ...
Nothing is more important for an enterprise application than scalability and availability. Learn how to use clustering to meet both existing and future demands. Enterprise application (EA) architects ...
Real-time operating systems (RTOSs) are finding their way into nearly every IoT device. The capability of an RTOS to manage low-level resources and complex timing requirements make them well suited ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Service-oriented architecture (SOA) emerged in the early part of this century as an evolution of distributed computing. Before SOA, services were understood as the end result of the application ...
The last two articles have explored the five steps to designing an embedded software architecture. So far, we have seen a need in modern embedded systems to separate software architecture into ...
A web application firewall (WAF) is a critical component of an enterprise security infrastructure, providing a key security layer for web-facing applications and APIs. As web applications mature and ...
As more companies begin to rely on Web-based applications, questions arise about the security of such applications. One weak link in the security chain is user authentication. User IDs and passwords ...
Software applications in widespread general use can be broken down into two developmental types – those designed to run on the Web and others that are non-Web-based. Web-based apps are designed for ...