InfoQ Homepage InfoQ Content on InfoQ
-
Using Data Effectively: beyond Art and Science
Hilary Parker talks about approaches and techniques to collect the most useful data, analyze it in a scientific way, and use it most effectively to drive actions and decisions.
-
Building the Enchanted Land
Grady Booch examines what AI is and what it is not, as well as how it came to be and where it's headed. Along the way, he examines some best practices for engineering AI systems.
-
Effective Java, Third Edition - Keepin' it Effective
Joshua Bloch covers some highlights from the third edition of “Effective Java”, concentrating on streams and lambdas.
-
Inside a Self-driving Uber
Matt Ranney discusses the software components that come together to make a self-driving Uber drive itself, and how they test new software before it is deployed to the fleet.
-
Understanding Software System Behavior with ML and Time Series Data
David Andrzejewski discusses how time series datasets can be combined with ML techniques in order to aid in the understanding of system behaviors in order to improve performance and uptime.
-
Analyzing & Preventing Unconscious Bias in Machine Learning
Rachel Thomas keynotes on three case studies, attempting to diagnose bias, identify some sources, and discusses what it takes to avoid it.
-
End-to-End ML without a Data Scientist
Holden Karau discusses how to train models, and how to serve them, including basic validation techniques, A/B tests, and the importance of keeping models up-to-date.
-
Counterfactual Evaluation of Machine Learning Models
Michael Manapat discusses how Stripe evaluates and trains their machine learning models to fight fraud.
-
Chaos Architecture
Adrian Cockcroft takes a look at best practices and challenges in getting to a chaos architecture mindset.
-
Serverless IoT @iRobot
Ben Kehoe discusses the benefits of how the Internet of Things is right when you're producing connected devices, and that Serverless and Iot are a natural fit.
-
With Great Scalability Comes Great Responsibility
Dana Engebretson covers the contextual pros and cons of a number of architectural patterns given real world scalability constraints.
-
Securing Serverless by Breaking in
Guy Podjarny breaks into a vulnerable serverless application and exploits multiple weaknesses, helping better understand some of the mistakes people make, their implications, and how to avoid them.