InfoQ Homepage QCon Software Development Conference Content on InfoQ
-
The Future of Build vs. Buy
Based on his experience at Uber, Matt Ranney explores why the build or buy tradeoff is so difficult, and makes some recommendations for both vendors and users.
-
Avoiding the Big Crash
Bill Buxton argues that we need to rethink how we design software and how we think about applications to prevent our entire industry from stalling.
-
Netty @Apple: Large Scale Deployment/Connectivity
Norman Maurer presents how Apple uses Netty for its Java based services and the challenges of doing so, including how they enhanced performance by participating in the Netty open source community.
-
Beyond DevOps: How Netflix Bridges the Gap
Josh Evans uses the Netflix Operations Engineering team as a case study to explore the challenges faced by centralized engineering teams and approaches to addressing those challenges.
-
Scammers, Hackers, and Fraud on the Blockchain
Olaf Carlson-Wee explores key strategies to keep a company safe from a wide range of malicious actors in the virtual Wild West.
-
It Probably Works
Tyler McMullen discusses how probabilistic algorithms actually work in practice and how to know they'll be safe and reliable in critical production systems.
-
Beyond Ad-hoc Automation: To Structured Platforms
Bridget Kromhout discusses how to work with the right level of abstraction with DevOps tooling, how different DevOps pieces fit together into a cohesive solution.
-
Crossroads of Asynchrony and Graceful Degradation
Nitesh Kant describes how embracing asynchrony in Netflix applications, from networking to business processing, creates gracefully degrading and highly resilient applications.
-
Demystifying Stream Processing with Apache Kafka
Neha Narkhede describes Apache Kafka and Samza: scalability and parallelism through data partitioning, fault tolerance, order guarantees, stateful processing, and stream processing primitives.
-
Securing Code Through Social Engineering
Christina Camilleri shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats.
-
Android Apps, an Attacker’s Perspective
Tony Trummer focuses on how to apply an adversarial perspective when building Android applications, how to identify attack surfaces and the thought process attackers use.
-
Applications Through an Attacker’s Lens
Michael Coates explores how attackers target, analyze and compromise applications and discusses recent high profile compromises and deconstructs them to understand exactly what went wrong.