InfoQ Homepage Presentations
-
Securing Code Through Social Engineering
Christina Camilleri shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats.
-
Android Apps, an Attacker’s Perspective
Tony Trummer focuses on how to apply an adversarial perspective when building Android applications, how to identify attack surfaces and the thought process attackers use.
-
Take a Groovy Rest
Guillaume Laforge talks about APIs, how Groovy and Rest services interact, and how to test such APIs with Spock to be “Enterprisey".
-
Fast, Parallel, or Reliable: Pick 3, a Tour of Elixir
Jordan Day introduces the Elixir language, its syntax and the semantics of an Elixir application, highlighting differences that make Elixir apps more reliable than those written in other languages.
-
The State of Securing RESTful APIs with Spring
Rob Winch discusses how to properly secure your RESTful endpoints and explores some common pitfalls when applying security to RESTful APIs with the help of Spring Security.
-
Spring Boot and JRebel
Adam Koblentz and Josh Long teach developers about Spring Boot and how to go from nothing to a fully functioning app in no time. They then show how to keep the app up and reload code changes instantly
-
Groovy with Style!
Guillaume Laforge discusses what "idiomatic" Groovy code should look like, good practices in terms of syntax style, typing preferences and some nice shortcuts to help you be more productive.
-
Better iOS Development with Groovy
Rahul Somasunderam aims at showing how Groovy can make iOS development a pleasure.
-
Using Groovy & Spock to Develop Tests as Assets not Afterthoughts
Brian Westrich shows examples of testing anti-patterns, including redundant testing, white box testing, and using the wrong type of test double. All examples are in Groovy and Spock.
-
Applications Through an Attacker’s Lens
Michael Coates explores how attackers target, analyze and compromise applications and discusses recent high profile compromises and deconstructs them to understand exactly what went wrong.
-
Improving Cloud Security with Attacker Profiling
Bryan Payne provides a clear understanding of different types of attackers, their skill sets, and how compromises happen, with a specific focus on protecting cloud-based applications.
-
DIY Monitoring: Build Your Own JVM Performance Management Tool
Tal Weiss shows how you can easily write your own JVM agent to capture accurate performance data for virtually any type of application from Java microservices to reactive actor systems in Scala.