BT
Older Newer rss
58:38

Move Deliberately and Don’t Break Anything: Lessons from the Evolution of Java

Posted by Brian Goetz  on  Jul 28, 2016

Brian Goetz looks at some of the challenges and lessons of steering Java through major evolutionary changes, and a sneak peek at where the Java platform is headed.

43:06

Performance and How to Measure It

Posted by Matt Warren  on  Jul 28, 2016

Matt Warren takes a look at how to measure, what to measure and how get the best performance from .NET code, considering examples from the Roslyn codebase and StackOverflow (the product).

42:17

Category Theory for the Working Hacker

Posted by Philip Wadler  on  Jul 28, 2016 1

Philip Wadler on why category theory is relevant for developers, discussing the principle of Propositions as Types connecting propositions and proofs in logic, and types and programs in computing.

45:33

Effortless Eventual Consistency with Weave Mesh

Posted by Peter Bourgon, Matthias Radestock  on  Jul 23, 2016

Peter Bourgon and Matthias Radestock explain the theory behind Weave Mesh, some of the important key features, and demonstrate some exciting use cases, like distributed caching and state replication.

55:21

Phoenix and Elm – Making the Web Functional

Posted by Chris McCord, Evan Czaplicki  on  Jul 22, 2016

Chris McCord and Evan Czaplicki keynote on the birth, development and benefits of using their respective tools they created for web development: Phoenix and Elm.

47:02

Elm: Finding the Functional in Reactive Programming

Posted by Claudia Doppioslash  on  Jul 19, 2016

Claudia Doppioslash discusses some of the useful features of Elm, such as time traveling debugger, immutability, union types, type inference and Functional Reactive Programming.

42:36

The Nihilist’s Guide to Wrecking Humans & Systems

Posted by Christina Camilleri  on  Jul 17, 2016 1

Christina Camilleri talks about how social engineering can be used in conjunction with technical attacks to create sophisticated and destructive attack chains and shares some real world war stories.

50:55

Modern iOS Application Security

Posted by Dan Guido  on  Jul 17, 2016

Dan Guido talks about the current state of iOS attacks, reviews available security APIs, why they are not good enough, and the design of the Mobile Application Security Toolkit to address risks.

48:50

RxJS 5 in Depth

Posted by Gerard Sans  on  Jul 16, 2016

Gerard Sans explains RxJS' data architecture based on reactive programming, exploring Observables API using RxJS koans and unit tests. RxJS 5 focuses on performance and usability.

30:49

Design by Contract in Elixir: “Let It Crash” Meets “It Shouldn’t Crash”

Posted by Elba Sanchez  on  Jul 16, 2016

Elba Sanchez explains what Design by Contract is, what can be achieved using it and how it can be used in any kind of projects, from personal to mission-critical software.

59:49

Code Quality in Practice

Posted by Bryan Helmkamp  on  Jul 16, 2016

Bryan Helmkamp discusses insights from analyzing over 1T LoC daily, what makes a code metric valuable, when unmaintainable code may be preferable, and what prevents maintaining quality code over time.

42:39

Bitcoin Security: 1/10th Cent to a Billion Dollars

Posted by Olaf Carlson-Wee  on  Jul 13, 2016

Olaf Carlson-Wee explores micropayment and wealth storage use cases for bitcoin and examines cryptosystems used to facilitate micro-penny payments and secure $B in global bitcoin banks.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT