BT
Older Newer rss
48:00

Dino DNA! Health Identity from the Wrist @Jawbone

Posted by Brian Wilt  on  Jan 24, 2016

Brian Wilt discusses how applied machine learning techniques and data science helped Jawbone build a successful fitness tracking app.

50:53

Takes a Village to Raise a Machine Learning Model

Posted by Lucian Vlad Lita  on  Jan 16, 2016

Lucian Vlad Lita focuses on the next step in personalization: well-designed software architectures for storing, computing, and delivering responsive, accurate in-product predictions and experiments.

49:07

The Lego Model for Machine Learning Pipelines

Posted by Leah McGuire  on  Jan 16, 2016

Leah McGuire describes the machine learning platform Salesforce wrote on top of Spark to modularize data cleaning and feature engineering.

47:04

Scaling Uber

Posted by Matt Ranney  on  Jan 07, 2016

Matt Ranney covers the evolution of Uber's architecture and some of the systems they built to handle the current scaling challenges.

45:24

The Future of Build vs. Buy

Posted by Matt Ranney  on  Jan 07, 2016

Based on his experience at Uber, Matt Ranney explores why the build or buy tradeoff is so difficult, and makes some recommendations for both vendors and users.

36:14

Avoiding the Big Crash

Posted by Bill Buxton  on  Jan 06, 2016

Bill Buxton argues that we need to rethink how we design software and how we think about applications to prevent our entire industry from stalling.

48:59

Netty @Apple: Large Scale Deployment/Connectivity

Posted by Norman Maurer  on  Jan 06, 2016

Norman Maurer presents how Apple uses Netty for its Java based services and the challenges of doing so, including how they enhanced performance by participating in the Netty open source community.

45:53

Beyond DevOps: How Netflix Bridges the Gap

Posted by Josh Evans  on  Jan 01, 2016

Josh Evans uses the Netflix Operations Engineering team as a case study to explore the challenges faced by centralized engineering teams and approaches to addressing those challenges.

50:50

Scammers, Hackers, and Fraud on the Blockchain

Posted by Olaf Carlson-Wee  on  Jan 01, 2016

Olaf Carlson-Wee explores key strategies to keep a company safe from a wide range of malicious actors in the virtual Wild West.

34:23

It Probably Works

Posted by Tyler McMullen  on  Jan 01, 2016

Tyler McMullen discusses how probabilistic algorithms actually work in practice and how to know they'll be safe and reliable in critical production systems.

47:25

Beyond Ad-hoc Automation: To Structured Platforms

Posted by Bridget Kromhout  on  Jan 01, 2016

Bridget Kromhout discusses how to work with the right level of abstraction with DevOps tooling, how different DevOps pieces fit together into a cohesive solution.

47:24

Crossroads of Asynchrony and Graceful Degradation

Posted by Nitesh Kant  on  Dec 25, 2015 1

Nitesh Kant describes how embracing asynchrony in Netflix applications, from networking to business processing, creates gracefully degrading and highly resilient applications.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2015 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT