InfoQ Homepage Presentations
-
Project Jigsaw in JDK 9: Modularity Comes to Java
Simon Ritter explains the impact project Jigsaw will have on developers in terms of building their applications, as well as helping them to understand how things will change in JDK 9.
-
Exploring the Android APK
Connor Tumbleson discusses the Android package and examines how it can be explored in order to extract information while looking at some of the products and tools used by both sides.
-
ETL Is Dead, Long Live Streams
Neha Narkhede shares the experience at LinkedIn moving from ETL to real-time streams, the challenges of scaling Kafka to hundreds of billions of events/day, supporting thousands of engineers, etc.
-
MLeap: Release Spark ML Models
Hollin Wilkins discusses the reasons behind MLeap, outes the programming time saved by using it, shows benchmarks of several online models, and provides a demo and examples of using it in practice.
-
Open Culture in a Corporate Setting
Daniel Tenner discusses open culture in a corporate setting, how to get it and why to have one.
-
Elasticsearch for SQL Users
Shaunak Kashyap looks at several well-understood concepts and SQL queries from the relational paradigm and maps these to their Elasticsearch equivalents.
-
Coaching New Management Behaviors
Christopher Chapman introduces W.E. Deming's philosophy and Eli Goldratt's Theory of Constraints, providing a basis for managers to learn to manage complexity and systems instead of people.
-
Designing, Implementing and Using Reactive APIs
Ben Hale and Paul Harris talk about what led them to choose a reactive API, how they designed and implemented it using Project Reactor.
-
The Psychology of Security Automation
Jason Chan discusses how security teams can use thoughtful tools and automation to improve relationships with development teams while creating a more secure and manageable environment.
-
Art of Stepping on the Same Rake, Volume 2
Alex Holden talks about hackers and their attacks, their latest techniques and the defenses needed today and tomorrow. He also talks about a number of recent breaches as well as lessons learned.
-
What Happens When Data Gets Breached?
Jarrod Overson talks about a world where passwords are traded, sold, verified, and used to exploit sites, how to recognize malicious traffic, and how to take a stand against attackers.
-
The History and Future of Wearable Computing and Virtual Experience
Amber Case talks about the road from VR to AR, the history and future of wearables, human augmentation, infrastructure, machine vision, computer backpacks, heads up displays, reality editing, etc.