InfoQ Homepage Presentations
-
Microservices & Scaling of Rational Interactions
Mark Burgess talks about the scaling of microservices in computer and human interaction.
-
Securing Serverless – by Breaking in
Guy Podjarny breaks into a vulnerable serverless application and exploits multiple weaknesses, helping understand the mistakes that can be made, their implications, and how to avoid them.
-
Debugging Microservices Applications w/ Service Mesh, openTracing & Squash
Idit Levine describes and demonstrates common debugging techniques and introduces Squash, a new tool and methodology.
-
Focusing on What Matters
Tim Kadlec draws attention to the fact that it’s critically important to broaden our perspective and not lose sight of the fundamentals that make or break the web for people around the globe.
-
Modular Java Development in Action
Sander Mak explores the benefits of a modular codebase using Java 9 modules, and issues porting an existing application to modules.
-
The Modern Operating System in 2018
Justin Cormack looks at unikernels, LinuxKit, hypervisors, containers, library operating systems,and other recent developments to see status on the route towards agility for the operating system
-
This Is the Sound of All of Us
Martin Burns discusses how music can help in delivering creative work.
-
SpringOne 2017 Keynote 1
Join the Pivotal team and their customers for an update on the Spring ecosystem, including the release of Spring Boot 2.0.
-
Zero-Dollar Migration Program
Rahul Deo discusses how to lower the cost of Pivotal migration using an engagement model which manages rising cost issues.
-
Introduction to Compliance Driven Development (CDD) and Security Centric System Design
Dmitry Didovicher introduces CDD and discusses how they used Pivotal and Compliance Automation technologies to receive a certification to run PostgreSQL-As-A-Service.
-
A Practical Guide to GenStage with a Real-Life Use Case
Gyanendra Aggarwal introduces Elixir GenStage, a back-pressure abstraction, demonstrating how to use it through a real case warehouse automation.
-
How Performance Optimizations Shatter Security Boundaries
Moritz Lipp explains how the Meltdown and Spectre vulnerabilities exploit hardware optimizations to read otherwise inaccessible data processed on the computer.