BT
Older Newer rss

View presentations by conference

45:29
Java Follow 786 Followers

Beyond Lambdas & Streams - Functional Fluency in Java

Posted by Naresha K  on  May 13, 2018 Posted by Naresha K Follow 1 Followers  on  May 13, 2018

Naresha K discusses writing functional code in Java 8, the limitations and using Vavr to circumvent those limitations.

43:27
Culture & Methods Follow 522 Followers

Disruption - How the World Works

Posted by Mark Allen  on  May 13, 2018 Posted by Mark Allen Follow 0 Followers  on  May 13, 2018

Mark Allen discusses disruption, comparing it with innovation, and sharing advice on how to be prepared for disruption and how to deal with it.

25:18
Culture & Methods Follow 522 Followers

Cynefin & Test Planning - an Option for Choosing the Right Testing Approachu

Posted by Lucian-Adrian Stroie  on  May 13, 2018 Posted by Lucian-Adrian Stroie Follow 0 Followers  on  May 13, 2018

Lucian-Adrian Stroie discusses how Cynefin can be used to make sense of the testing context, thus helping determining the most suitable approach for testing.

26:16
DevOps Follow 646 Followers

Deploying Spring Boot Apps on Kubernetes

Posted by Thomas Risberg  on  May 12, 2018 Posted by Thomas Risberg Follow 0 Followers  on  May 12, 2018

Thomas Risberg overviews the challenges involved in deploying a Spring Boot app on Kubernetes, taking a look at what's needed to deploy Spring Cloud Data Flow server on Kubernetes.

21:45
Cloud Follow 239 Followers

Ensuring Platform Security with Windows Bosh Add-ons and Runtime-Config at Boeing

Posted by James Coppock  on  May 12, 2018 Posted by James Coppock Follow 0 Followers , Sheryl Maris Follow 0 Followers , Brad Schaefbauer Follow 0 Followers  on  May 12, 2018

Presenters discuss implementing security for a Windows deployment on PCF with Bosh add-ons via Runtime Config.

23:26
Java Follow 786 Followers

Lessons Learned from Upgrading Thymeleaf

Posted by Jay Aisenbrey  on  May 12, 2018 Posted by Jay Aisenbrey Follow 0 Followers  on  May 12, 2018

Jay Aisenbrey discusses what’s new in Thymeleaf 3 and what it takes to upgrade an application from Thymeleaf 2 to 3.

31:32
AI, ML & Data Engineering Follow 703 Followers

Cloud-Native Data: What Is it? Will it Solve the Data-DevOps Divide?

Posted by Charity Majors  on  May 12, 2018 Posted by Charity Majors Follow 1 Followers , Brian Dunlap Follow 1 Followers , James Governor​ Follow 1 Followers , Tim Richardson Follow 1 Followers , Dormain Drewitz Follow 1 Followers  on  May 12, 2018

The panelists debate whether data's answer to cloud-native will mirror DevOps or not.

49:28
Java Follow 786 Followers

Building a Reliable Cloud-Based Bank in Java

Posted by Jason Maude  on  May 11, 2018 Posted by Jason Maude Follow 0 Followers  on  May 11, 2018

Jason Maude talks about the server-side implementation of Starling Bank and shows how, even though Java is over two decades old, it can still be used for cutting edge applications.

41:46
Culture & Methods Follow 522 Followers

Attack Trees, Security Modeling for Agile Teams

Posted by Michael Brunton-Spall  on  May 11, 2018 Posted by Michael Brunton-Spall Follow 0 Followers  on  May 11, 2018

Michael Brunton-Spall talks about Attack Trees, a new way of understanding how a system might be attacked and how to prioritize security measures to be implemented.

33:49
AI, ML & Data Engineering Follow 703 Followers

Counterfactual Evaluation of Machine Learning Models

Posted by Michael Manapat  on  May 10, 2018 Posted by Michael Manapat Follow 0 Followers  on  May 10, 2018

Michael Manapat discusses how Stripe evaluates and trains their machine learning models to fight fraud.

49:20
AI, ML & Data Engineering Follow 703 Followers

Machine Learning Pipeline for Real-Time Forecasting @Uber Marketplace

Posted by Chong Sun  on  May 10, 2018 Posted by Chong Sun Follow 0 Followers , Danny Yuan Follow 3 Followers  on  May 10, 2018

Chong Sun and Danny Yuan discuss how Uber is using ML to improve their forecasting models, the architecture of their ML platform, and lessons learned running it in production.

32:54
Culture & Methods Follow 522 Followers

Security Champions: Only You Can Prevent File Forgery

Posted by Marisa Fagan  on  May 09, 2018 Posted by Marisa Fagan Follow 0 Followers  on  May 09, 2018

Marisa Fagan discusses how to become a Security Champion in five steps, what the benefits are, and what to do when there is no Security Champions program or even a Product Security program.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT