InfoQ Homepage Presentations
-
Deep Learning for Image Understanding at Scale
Stacey Svetlichnaya discusses strategies and challenges building deep learning systems for object recognition at scale, using automatic labels in Flickr image search as a case study.
-
This Will Cut You: Go's Sharper Edges
Thomas Shadwell talks about how distinct, exploitable misuse patterns arise in software languages, and through examples in Go hopes to show the language's distinct security characteristics.
-
Making the Most out of a Bad Day as a Developer
Wim Remes talks about the war stories from his experience as a penetration tester and the numerous years of work with development teams building secure development practices.
-
Agile Reorgs - A Survival Guide
Katy Saulpaugh discusses how to approach reorganizations for Agile teams and minimize the pain using change management techniques.
-
Microservices and Mobile
Oleksii Fedorov advises on creating mobile applications, what practices to use and what to avoid.
-
GraphQL for All? A Few Things to Think about before Blindly Dumping REST for GraphQL
Arnaud Lauret discusses REST vs. GraphQL, comparing their strengths and weaknesses, suggesting evaluating both before making a decision.
-
AaaS – Anything as a Service. Anything Left to Do, Then?
Dustin Huptas compares private infrastructure with cloud IaaS. PaaS, serverless, considering pros and cons and discussing cases where either model makes sense.
-
Beyond Big Data - The Realization of an Active Grid in the Age of Fog Computing
Jan Forrslow discusses Fog Computing, Active Grids, and how an IoT network can become an Active Grid by using Fog Computing.
-
In Depth TensorFlow
Illia Polosukhin keynotes on TensorFlow, introducing it and presenting the components and concepts it is built upon.
-
Parasitic Programming Languages
David Nolen examines the benefits and tradeoffs associated with creating a language based on an existing runtime, with a special focus on the Clojure and ClojureScript projects.
-
Building Secure Player Experiences at Riot Games
David Rook talks about the Riot Games Application Security program. He focusses on the tech and social aspects of the program and why he feels both are important when it comes to writing secure code.
-
How to Backdoor Invulnerable Code
Josh Schwartz takes a look at the real tactics, with examples, used to compromise and backdoor seemingly secure products by exploiting the humans and systems that create them.