InfoQ Homepage QCon Software Development Conference Content on InfoQ
-
Refactoring Organizations - A Netflix Study
Josh Evans uses Netflix as a case study to illustrate how specific strategies, framed as technical analogs, have been employed to maximize engineering agility, velocity, and impact.
-
BLESS: Better Security and Ops for SSH Access
Bryan Payne talks about BLESS in general: what it is, how it works, and how we can start using it. He explores the Netflix BLESS production architecture and how other companies have used BLESS.
-
Adopting Stream Processing for Instrumentation
Sean Cribbs talks about the interface Comcast has designed for their instrumentation system, how it works, how the stream processor manages flows on behalf of the user, and some trade-offs applied.
-
Addressing Security Regression by Unit Testing
Christopher Grayson covers unit testing solutions that are both integrated into tested codebases as well as solutions that can test deployed codebases from a black box standpoint.
-
When Streams Fail: Kafka Off the Shore
Anton Gorshkov discusses how to evaluate and architect a resilient streaming platform, focusing on Kafka and Spark streaming and sharing his experience of using them to process financial transactions.
-
Practical mTLS: Security without the Headaches
Ying Li discusses in detail the implementation challenges of Swarm, how her team at Docker greatly reduced the overhead necessary to manage an infrastructure that makes use of TLS certificates.
-
This Will Cut You: Go's Sharper Edges
Thomas Shadwell talks about how distinct, exploitable misuse patterns arise in software languages, and through examples in Go hopes to show the language's distinct security characteristics.
-
Making the Most out of a Bad Day as a Developer
Wim Remes talks about the war stories from his experience as a penetration tester and the numerous years of work with development teams building secure development practices.
-
Building Secure Player Experiences at Riot Games
David Rook talks about the Riot Games Application Security program. He focusses on the tech and social aspects of the program and why he feels both are important when it comes to writing secure code.
-
How to Backdoor Invulnerable Code
Josh Schwartz takes a look at the real tactics, with examples, used to compromise and backdoor seemingly secure products by exploiting the humans and systems that create them.
-
Blockchain: The Oracle Problems
Paul Sztorc talks about why the oracle problem is so hard (the historical evolution of failures, why they fail), and the basics of blockchain ("blockchain as immortal software", ledger "rents").
-
Big Ideas: Decentralized Storage
David Vorick talks about the need for distributed/decentralized storage, real life use cases for distributed storage systems, dealing with data loss in a distributed system, overviewing IPFS and Sia.