InfoQ Homepage QCon Software Development Conference Content on InfoQ
-
Netty @Apple: Large Scale Deployment/Connectivity
Norman Maurer presents how Apple uses Netty for its Java based services and the challenges of doing so, including how they enhanced performance by participating in the Netty open source community.
-
Beyond DevOps: How Netflix Bridges the Gap
Josh Evans uses the Netflix Operations Engineering team as a case study to explore the challenges faced by centralized engineering teams and approaches to addressing those challenges.
-
Scammers, Hackers, and Fraud on the Blockchain
Olaf Carlson-Wee explores key strategies to keep a company safe from a wide range of malicious actors in the virtual Wild West.
-
It Probably Works
Tyler McMullen discusses how probabilistic algorithms actually work in practice and how to know they'll be safe and reliable in critical production systems.
-
Beyond Ad-hoc Automation: To Structured Platforms
Bridget Kromhout discusses how to work with the right level of abstraction with DevOps tooling, how different DevOps pieces fit together into a cohesive solution.
-
Crossroads of Asynchrony and Graceful Degradation
Nitesh Kant describes how embracing asynchrony in Netflix applications, from networking to business processing, creates gracefully degrading and highly resilient applications.
-
Demystifying Stream Processing with Apache Kafka
Neha Narkhede describes Apache Kafka and Samza: scalability and parallelism through data partitioning, fault tolerance, order guarantees, stateful processing, and stream processing primitives.
-
Securing Code Through Social Engineering
Christina Camilleri shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats.
-
Android Apps, an Attacker’s Perspective
Tony Trummer focuses on how to apply an adversarial perspective when building Android applications, how to identify attack surfaces and the thought process attackers use.
-
Applications Through an Attacker’s Lens
Michael Coates explores how attackers target, analyze and compromise applications and discusses recent high profile compromises and deconstructs them to understand exactly what went wrong.
-
Improving Cloud Security with Attacker Profiling
Bryan Payne provides a clear understanding of different types of attackers, their skill sets, and how compromises happen, with a specific focus on protecting cloud-based applications.
-
DIY Monitoring: Build Your Own JVM Performance Management Tool
Tal Weiss shows how you can easily write your own JVM agent to capture accurate performance data for virtually any type of application from Java microservices to reactive actor systems in Scala.