InfoQ Homepage QCon Software Development Conference Content on InfoQ
-
Deep Representation: Building a Semantic Image Search Engine
Emmanuel Ameisen gives a step-by-step tutorial on how to build a semantic search engine for text and images, with code included.
-
The Great Migration: from Monolith to Service-Oriented
Jessica Tai provides an overview of trade-offs and motivation for the SOA migration and discusses Airbnb’s architectural tenets around service building.
-
What We Got Wrong: Lessons from the Birth of Microservices
Ben Sigelman talks about what Google got wrong about microservices, the lessons learned along the way and how to apply those lessons today.
-
From Winning the Microservice War to Keeping the Peace
Andrew McVeigh explains how to avoid common pitfalls when working with microservices.
-
If You Don’t Know Where You’re Going, It Doesn’t Matter How Fast You Get There
Jez Humble and Nicole Forsgren explain the importance of knowing how (and what) to measure in order to focus on what’s important and communicate progress to peers, leaders, and stakeholders.
-
Rethinking HCI with Neural Interfaces @CTRLlabsCo
Adam Berenzweig talks about brain-computer interfaces, neuromuscular interfaces, and other biosensing techniques that can eliminate the need for physical controllers.
-
Using Data Effectively: beyond Art and Science
Hilary Parker talks about approaches and techniques to collect the most useful data, analyze it in a scientific way, and use it most effectively to drive actions and decisions.
-
Building the Enchanted Land
Grady Booch examines what AI is and what it is not, as well as how it came to be and where it's headed. Along the way, he examines some best practices for engineering AI systems.
-
Defense in Depth: in Depth
Chelsea Komlo looks at what defense in depth means from a variety of roles and perspectives, how it can help organizations prevent unforeseen attacks and limit damage when compromises do occur.
-
Seven Strategies for Scaling Product Security
Angelo Prado discusses seven strategies for scaling and embedding security in a product.
-
Data Security Dreams and Nightmares
Alex Holden shares his lessons learned by observing and assisting with data breaches, and explains how to avoid them and what can be done to emerge successfully from a bad situation.
-
Making Security Usable: Product Engineer Perspective
Anastasiia Voitova goes through several stages of inception and implementation of database encryption and intrusion detection tools.