Hilary Mason, interviewed by Ryan Slobojan, discuss the engineering behind bit.ly and their use of machine learning in their system architecture. Hilary also talks about their use of MySQL and MongoDB to manage terabytes of information about users and clicks and their implications on performing real-time analysis of anthropology on the human condition.
In this interview Ryan discusses Clojure with author Chris Houser. They cover Clojure's approach to classes, comparing and contrasting it with Java. Chris delves into they type of programming problem sets Clojure is best suited for, especially in relation to parallelism as the number of cores in computers increases and Clojure's applicability as or research language.
In this interview conducted by Stefan Tilkov, Guilherme Silveira compares Restfulie, a hypermedia-centric REST framework, with other RESTful frameworks and explains the difference between its Java and Ruby implementations.
This interview begins with a discussion of functional programming, the use of Scala by programmers trained in Java and the differences between purely functional languages like Haskell and hybrids like Scala. Later in the interview other programming languages are discussed along with the notion of programming paradigms and the need for combining both paradigms and languages to best solve problems.
Mary-Lynn discusses how Fearless Change presented patterns focused on the evangelist and the introduction of new change ideas into an organization. She goes on to note how the sequel, tentatively titled More Fearless Change, adds patterns that focus on gaining the necessary emotional and personal commitment to making change happen. She also talks about Agile and its adoption.
In this interview, Dr. Mercuri defines computer forensics, then discusses how forensics apply to criminal, civil, and intellectual property law. She addressed the challenges that technological advances, (e.g. RAID, cell phones, GPS devices, and Cloud Computing) increase the challenges faced by the forensic computer scientist. She also discusses appropriate actions if you suspect security issues.
Brian and dave discuss what it might mean to be a true craftsman and why the idea of craft has become so popular of late. Other issues discussed include the question of why craft seems to be focused almost exclusively on programming and why everyone does not aspire to be a craftsman? Programming as performance art, programs as literary artifacts, and code "habitability" round out the discussion.
Michael Nygard on: feature complete vs. production ready, how to make a system more resilient and monitorable, explaining stability patterns like Bulkhead and Circuit Breaker, and the need for the development department to cooperate with the operations one and the business managers.
Ric Smith is an advocate of HTML 5, considering that browser vendors will incorporate more and more features of the emerging standard, driving its adoption. Ric details some of the features already implemented, Web Sockets, server events, focusing on the difference between plug-in solutions and HTML 5 ones.
What is Data Grid computing? What makes it different from a database? Is a data grid always scalable? Is the cloud the next step? Cameron Purdy answered these questions and others during an InfoQ interview, and also gave some hints on how to build scalable grids and how to avoid horror stories.
This interview, conducted at QCon 2009, covers a wide range of topics beginning with a definition of OSGi and ending with an audience question about integrating OSGi into legacy application servers (like Websphere). In between Neil answers questions about the origins and evolution of OSGi, how OSGi compares to .Net modularization, and constraints on the use of certain Java libraries.
Sir Tony Hoare answers questions about his background, his relationship with Microsoft Research, his interest in "Unifying Theories of Programming," and numerous other topics in the area of programming, correctness, formal analysis of programs, and even type systems. Also addressed: concurrency, null-references, and even buffer overflows.