BT
Older Newer rss

View presentations by conference

26:16
DevOps Follow 641 Followers

Deploying Spring Boot Apps on Kubernetes

Posted by Thomas Risberg  on  May 12, 2018 Posted by Thomas Risberg Follow 0 Followers  on  May 12, 2018

Thomas Risberg overviews the challenges involved in deploying a Spring Boot app on Kubernetes, taking a look at what's needed to deploy Spring Cloud Data Flow server on Kubernetes.

21:45
Cloud Follow 238 Followers

Ensuring Platform Security with Windows Bosh Add-ons and Runtime-Config at Boeing

Posted by James Coppock  on  May 12, 2018 Posted by James Coppock Follow 0 Followers , Sheryl Maris Follow 0 Followers , Brad Schaefbauer Follow 0 Followers  on  May 12, 2018

Presenters discuss implementing security for a Windows deployment on PCF with Bosh add-ons via Runtime Config.

23:26
Java Follow 780 Followers

Lessons Learned from Upgrading Thymeleaf

Posted by Jay Aisenbrey  on  May 12, 2018 Posted by Jay Aisenbrey Follow 0 Followers  on  May 12, 2018

Jay Aisenbrey discusses what’s new in Thymeleaf 3 and what it takes to upgrade an application from Thymeleaf 2 to 3.

31:32
AI, ML & Data Engineering Follow 696 Followers

Cloud-Native Data: What Is it? Will it Solve the Data-DevOps Divide?

Posted by Charity Majors  on  May 12, 2018 Posted by Charity Majors Follow 1 Followers , Brian Dunlap Follow 1 Followers , James Governor​ Follow 1 Followers , Tim Richardson Follow 1 Followers , Dormain Drewitz Follow 1 Followers  on  May 12, 2018

The panelists debate whether data's answer to cloud-native will mirror DevOps or not.

49:28
Java Follow 780 Followers

Building a Reliable Cloud-Based Bank in Java

Posted by Jason Maude  on  May 11, 2018 Posted by Jason Maude Follow 0 Followers  on  May 11, 2018

Jason Maude talks about the server-side implementation of Starling Bank and shows how, even though Java is over two decades old, it can still be used for cutting edge applications.

41:46
Culture & Methods Follow 517 Followers

Attack Trees, Security Modeling for Agile Teams

Posted by Michael Brunton-Spall  on  May 11, 2018 Posted by Michael Brunton-Spall Follow 0 Followers  on  May 11, 2018

Michael Brunton-Spall talks about Attack Trees, a new way of understanding how a system might be attacked and how to prioritize security measures to be implemented.

33:49
AI, ML & Data Engineering Follow 696 Followers

Counterfactual Evaluation of Machine Learning Models

Posted by Michael Manapat  on  May 10, 2018 Posted by Michael Manapat Follow 0 Followers  on  May 10, 2018

Michael Manapat discusses how Stripe evaluates and trains their machine learning models to fight fraud.

49:20
AI, ML & Data Engineering Follow 696 Followers

Machine Learning Pipeline for Real-Time Forecasting @Uber Marketplace

Posted by Chong Sun  on  May 10, 2018 Posted by Chong Sun Follow 0 Followers , Danny Yuan Follow 3 Followers  on  May 10, 2018

Chong Sun and Danny Yuan discuss how Uber is using ML to improve their forecasting models, the architecture of their ML platform, and lessons learned running it in production.

32:54
Culture & Methods Follow 517 Followers

Security Champions: Only You Can Prevent File Forgery

Posted by Marisa Fagan  on  May 09, 2018 Posted by Marisa Fagan Follow 0 Followers  on  May 09, 2018

Marisa Fagan discusses how to become a Security Champion in five steps, what the benefits are, and what to do when there is no Security Champions program or even a Product Security program.

33:43
Development Follow 502 Followers

EternalBlue: Exploit Analysis and beyond

Posted by Emma McCall  on  May 09, 2018 Posted by Emma McCall Follow 0 Followers  on  May 09, 2018

Emma McCall talks about the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year.

35:15
Architecture & Design Follow 1739 Followers

Bigger, Faster and More Secure

Posted by Laura Bell  on  May 09, 2018 Posted by Laura Bell Follow 1 Followers  on  May 09, 2018

Laura Bell talks about how security can look when it stops being about fear and starts being a tool for building systems of the future.

48:20
Architecture & Design Follow 1739 Followers

Encryption without Magic, Risk Management without Pain

Posted by Anastasiia Voitova  on  May 08, 2018 Posted by Anastasiia Voitova Follow 0 Followers  on  May 08, 2018

Anastasiia Voitova talks about cryptography in a wider context: how it helps to narrow more significant risks to controlled attack surfaces, enables managing the risk efficiently & elegantly, and more

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT