InfoQ Homepage QCon Software Development Conference Content on InfoQ
-
Biztalk Services in the Cloud
Cloud computing feels like a tomorrow technology. Simon Thurman shows how developers can use Biztalk to create an Internet Service Bus which can be deployed locally or in the cloud.
-
Establishing Your Organization's Enterprise Security API
In this talk, Jeff discuss the process of establishing a security API for your enterprise, focusing on the most critical methods needed by web application and web service developers.
-
Real-Time Java for Latency Critical Banking Applications
Bertrand Delsart discusses real-time (RT) computing requirements in banking, RT Java history, priority semantics, RT APIs, RT Garbage Collection, soft vs. hard RT, and benefits of RT Java.
-
Architecting for Latency
Dan Pritchett addresses latency issues in web applications that should be dealt with from the beginning when the system is designed.
-
The Lego Hypothesis
For decades, software engineering has "dreamed an impossible dream", to build software as easily as building Lego houses. In this talk, James Noble imagines a world where the dream has been realized.
-
Diary of a Fence Sitting SOA Geek
In this presentation, Mark Little explains the history of SOAP/WSDL/WS-*-based web services and RESTful HTTP and highlights how the two approaches might converge into a single solution.
-
Eric Nelson on Windows as a Web Platform
Eric Nelson explores Windows as a web platform using IIS 7.0 providing an architecture deep dive and striving to reduce the lines of code in web applications.
-
Introducing Spring Batch
Dave Syer discusses Spring Batch (SB), batch processing patterns, typical batch processing uses, SB concepts and capabilities, case studies, SB domain details and the SB roadmap.
-
An Architecture's Response to Growth and Change
Brian Zimmer unveils Orbitz.com’s architecture and its evolution over the years as the site grew from a US domestic flights booking website to an international one offering multiple services.
-
Advanced Threat Modeling
John Steven talks about modeling security threats as a way to secure a system while designing its architecture. John focuses on authentication, authorization and session management.
-
Architectures of extraordinarily large, self-sustaining systems
Can a system that is so large it cannot be comprehended be "designed" in a conventional sense? The foundations of computing are about to change. In this talk, Richard P. Gabriel explores why and how.
-
Concurrency: Past and Present
Brian Goetz discusses the difficulties of creating multithreaded programs correctly, incorrect synchronization, race conditions, deadlock, STM, concurrency, alternatives to threads, Erlang, Scala.