BT
Older Newer rss

Security vs. Security Architecture

Posted by Marc Stiegler  on  Mar 24, 2011 1

Marc Stiegler presents popular but faulty security architectures used - Independence Day Evil Alien Architecture, the Gilded Cage, and Gone Phishin' – along with effective architectures emerging today.

Managing Agile: Transforming the Three Dysfunctions of Management

Posted by Diana Larsen  on  Mar 23, 2011

Diana Larsen discusses how Agile can help to overcome 3 management traps – magical thinking, illusion of control, individual blame – by relying on data and evidence, accepting uncertainty and unpredictability, and maintaining a whole systems view.

Groovy for Java Programmers

Posted by Jeff Brown  on  Mar 22, 2011 6

Jeff Brown introduces Groovy to Java developers, outlining the conciseness and expressivity of the language and covering various topics: GStrings, Closures, collections, builders, beans, etc.

QCon Keynote: Innovation at Google

Posted by Patrick Copeland  on  Mar 18, 2011 9

Patrick Copeland presents the first three principles of the eXtreme innovation approach based on the Pretotyping Manifesto: Innovators Beat Ideas, Pretotypes Beat Productypes, and Data Beats Opinion.

Hot Swapping Your Engines At 30,000 Feet

Posted by Rod Barlow  on  Mar 18, 2011

Rod Barlow talks about the architectural redesign of the Shopzilla.com website, sharing the solutions chosen over the old ones and the lessons learned while doing it.

Riak Core: Dynamo Building Blocks

Posted by Andy Gross  on  Mar 10, 2011

Andy Gross discusses the design philosophy behind Riak based on Amazon Dynamo - Gossip Protocol, Consistent Hashing, Vector clocks, Read Repair, etc. -, overviewing its main features and architecture.

Deliberate Discovery: Code Like You Mean It

Posted by Dan North  on  Mar 08, 2011 2

Dan North considers that ignorance is the major roadblock on the way to success, presenting strategies and techniques for reducing it, delivering software in a more deterministic and less riskier way.

Cooperation, Collaboration, and Awareness

Posted by John Allspaw  on  Mar 03, 2011

John Allspaw presents technical, cultural, and process related lessons learned at Flickr and Etsy.com from the collaboration between the operations and development teams.

Securing the Social Web by Moving Beyond Client-Server Security

Posted by Tyler Close  on  Mar 02, 2011 2

Tyler Close considers that the old client-server security model is no longer viable and a new security web model is needed, presenting tools and techniques to secure the social web apps of today.

Adopting the JVM

Posted by Ola Bini  on  Mar 01, 2011

Ola Bini offers advice to those interested in using the JVM with languages other than Java, talking about language interoperability, polyglot patterns, build tools, tweaking the JVM, and JVM tools.

Brownfield Software - Industrial Waste or Business Fertilizer?

Posted by Josh Graham  on  Feb 25, 2011

Josh Graham addresses 10 myths related to working on legacy software, attempting to prove that one can make good use of legacy code without having to rewrite the entire thing.

BDD with Puppet & Cucumber

Posted by Tom Sulston  on  Feb 24, 2011

Tom Sulston explains how to manage systems with Cucumber and Puppet based on BDD principles, including practical tricks and pitfalls. The session demoes using those tools.

General Feedback
Bugs
Advertising
Editorial
InfoQ.com and all content copyright © 2006-2013 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT