InfoQ Homepage QCon Software Development Conference Content on InfoQ
-
Improving Cloud Security with Attacker Profiling
Bryan Payne provides a clear understanding of different types of attackers, their skill sets, and how compromises happen, with a specific focus on protecting cloud-based applications.
-
DIY Monitoring: Build Your Own JVM Performance Management Tool
Tal Weiss shows how you can easily write your own JVM agent to capture accurate performance data for virtually any type of application from Java microservices to reactive actor systems in Scala.
-
Debugging Microservices in Production
Bryan Cantrill describes the debugging techniques employed at Joyent, and shares real stories from the trenches - and how those painful experiences resulted in better tools and better methodologies.
-
Designing C# 7
Lucian Wischik discusses the design process for C# 7, which is being designed in the open, with eager community participation on GitHub and elsewhere, and the language features that are taking shape.
-
Go GC: Prioritizing Low Latency and Simplicity
Rick Hudson discusses the motivation, performance, and technical challenges of Go's low latency concurrent GC and why the approach fits Go well.
-
LinkedIn's Active/Active Evolution
Erran Berger discusses how they scaled architecture at LinkedIn across multiple data centers.
-
So We Hear You Like Papers
Ines Sombre and Caitie McCaffrey offer a guided tour of papers from past and present research that have reshaped the way we think about building large scale distributed systems.
-
How Netflix Directs 1/3rd of Internet Traffic
Haley Tucker and Mohit Vora discuss the architecture at Netflix that makes streaming happen, while highlighting interesting lessons and design patterns that can be widely applied.
-
Exploding the Linux Container Host
Ben Corrie discusses Project Bonneville, how to create a shared Linux kernel for privileged containers, running containers without Linux, and VMware's dynamic resource constraints of a container host.
-
Stream Processing in Uber
Danny Yuan discusses how Uber uses stream processing to solve a wide range of problems, including real-time aggregation and prediction on geospatial time series, and much more.
-
The Imitation Game: The New Frontline of Security
S. Ghosemajumder reviews the evolution of AI based security attacks that imitate the actions of real people, and looks at how they are changing the nature of developing online applications securely.
-
Evolving Prolog
Michael Hendricks talks about how they used genetic algorithms to evolve Prolog programs based on historic data from peer to peer lending markets.