InfoQ Homepage QCon Software Development Conference Content on InfoQ
-
C++ for Real-Time Communications in the Cloud
Thiya Ramalingam talks about what Zoom’s platform engineers have learned over the years from running a complete C++ stack in their back-end service.
-
From Rocks to Rust: Our C to Rust Paradigm Shift
Esther Momcilovic talks about the reasons why Metaswitch chose Rust, and what it’s been like for the development teams getting to grips with this language.
-
Rust 2018: An Epochal Release!
Steve Klabnik talks about where Rust is now, what new features are coming down the pipeline, how it's all being managed, and how this affects Rust's development in the future.
-
Counting is Hard: Probabilistic Algorithms for View Counting at Reddit
Krishnan Chandra explains the challenges of building a view counting system at scale, and how Reddit used probabilistic counting algorithms to make scaling easier.
-
Developing Data and ML Pipelines at Stitch Fix
Jeff Magnusson discusses thoughts and guidelines on how Stitch Fix develops, schedules, and maintains their data and ML pipelines.
-
Building a Reliable Cloud-Based Bank in Java
Jason Maude talks about the server-side implementation of Starling Bank and shows how, even though Java is over two decades old, it can still be used for cutting edge applications.
-
Attack Trees, Security Modeling for Agile Teams
Michael Brunton-Spall talks about Attack Trees, a new way of understanding how a system might be attacked and how to prioritize security measures to be implemented.
-
Counterfactual Evaluation of Machine Learning Models
Michael Manapat discusses how Stripe evaluates and trains their machine learning models to fight fraud.
-
Machine Learning Pipeline for Real-Time Forecasting @Uber Marketplace
Chong Sun and Danny Yuan discuss how Uber is using ML to improve their forecasting models, the architecture of their ML platform, and lessons learned running it in production.
-
Security Champions: Only You Can Prevent File Forgery
Marisa Fagan discusses how to become a Security Champion in five steps, what the benefits are, and what to do when there is no Security Champions program or even a Product Security program.
-
EternalBlue: Exploit Analysis and beyond
Emma McCall talks about the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year.
-
Bigger, Faster and More Secure
Laura Bell talks about how security can look when it stops being about fear and starts being a tool for building systems of the future.