InfoQ Homepage Presentations
-
Product Management of AI Products
Manjeet Singh discusses how to bring AI to enterprise product lines, how to analyze, plan, and design AI in a SaaS environment along with practices and lessons learned from Agile AI product lifecycle.
-
LeSS Conference 2018: Discussion Panel
Erin Perry moderates a panel on LeSS with question from the audience.
-
Blazor: C# Running in the Browser via WebAssembly
Scott Sauber introduces WebAssembly, explaining why it isn't another Silverlight, and then showing through demos how Blazor works.
-
JDK 9, 10, 11 and beyond: Delivering New Features to the JDK
Simon Ritter takes a look at some of the Java features, JPMS (JDK 9), local variable type inference (JDK 10), dynamic class file constants (JDK 11), and what to expect from JDK 12-14.
-
Under the Hood of Reactive Data Access
Mark Paluch explains what happens inside the Spring Data 5 reactive driver and how data is accessed and provided in a reactive way.
-
Reactive Relational Database Connectivity
Ben Hale discusses the Reactive Relational Database Connectivity (R2DBC), explaining how the API works, the benefits of using it, and how it contrasts with the ADBC proposed as a successor to JDBC.
-
I'll Get Back to You: Task, Await, and Asynchronous Methods
Jeremy Clark discusses consuming asynchronous methods with Task, covering continuations, cancellations, and exception handling.
-
Accelerated Spark on Azure: Seamless and Scalable Hardware Offloads in the Cloud
Yuval Degani shows how hardware accelerations in Azure can be utilized to speed-up Spark jobs, with the aid of RDMA (Remote Direct Memory Access) support in the VM.
-
Less Adoption in MTS Kassa
Illia Pavlichenko and Sergei Muzykantov share how MTS Kassa has adopted LeSS, some of the lessons learned and the failures encountered.
-
Defense in Depth: in Depth
Chelsea Komlo looks at what defense in depth means from a variety of roles and perspectives, how it can help organizations prevent unforeseen attacks and limit damage when compromises do occur.
-
Seven Strategies for Scaling Product Security
Angelo Prado discusses seven strategies for scaling and embedding security in a product.
-
Data Security Dreams and Nightmares
Alex Holden shares his lessons learned by observing and assisting with data breaches, and explains how to avoid them and what can be done to emerge successfully from a bad situation.