InfoQ Homepage Conferences Content on InfoQ
-
Cynefin & Test Planning - an Option for Choosing the Right Testing Approach
Lucian-Adrian Stroie discusses how Cynefin can be used to make sense of the testing context, thus helping determining the most suitable approach for testing.
-
Deploying Spring Boot Apps on Kubernetes
Thomas Risberg overviews the challenges involved in deploying a Spring Boot app on Kubernetes, taking a look at what's needed to deploy Spring Cloud Data Flow server on Kubernetes.
-
Ensuring Platform Security with Windows Bosh Add-ons and Runtime-Config at Boeing
Presenters discuss implementing security for a Windows deployment on PCF with Bosh add-ons via Runtime Config.
-
Lessons Learned from Upgrading Thymeleaf
Jay Aisenbrey discusses what’s new in Thymeleaf 3 and what it takes to upgrade an application from Thymeleaf 2 to 3.
-
Cloud-Native Data: What Is it? Will it Solve the Data-DevOps Divide?
The panelists debate whether data's answer to cloud-native will mirror DevOps or not.
-
Building a Reliable Cloud-Based Bank in Java
Jason Maude talks about the server-side implementation of Starling Bank and shows how, even though Java is over two decades old, it can still be used for cutting edge applications.
-
Attack Trees, Security Modeling for Agile Teams
Michael Brunton-Spall talks about Attack Trees, a new way of understanding how a system might be attacked and how to prioritize security measures to be implemented.
-
Counterfactual Evaluation of Machine Learning Models
Michael Manapat discusses how Stripe evaluates and trains their machine learning models to fight fraud.
-
Machine Learning Pipeline for Real-Time Forecasting @Uber Marketplace
Chong Sun and Danny Yuan discuss how Uber is using ML to improve their forecasting models, the architecture of their ML platform, and lessons learned running it in production.
-
Security Champions: Only You Can Prevent File Forgery
Marisa Fagan discusses how to become a Security Champion in five steps, what the benefits are, and what to do when there is no Security Champions program or even a Product Security program.
-
EternalBlue: Exploit Analysis and beyond
Emma McCall talks about the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year.
-
Bigger, Faster and More Secure
Laura Bell talks about how security can look when it stops being about fear and starts being a tool for building systems of the future.