InfoQ Homepage QCon Software Development Conference Content on InfoQ
-
Beyond Entitlements for Cloud-native
Chandra Guntur and Hong Liu show how they use Open Policy Agent with Spring Boot and HOCON to produce a responsibility management solution that scales to volume and performance needs.
-
Robot Social Engineering: Social Engineering Using Physical Robots
Brittany Postnikoff covers some of the capabilities of physical robots, related human-robot interaction research, and the interfaces that can be used by a robot to social engineer humans.
-
Empathy: A Keystone Habit
Paul Tevis explores how empathy is what Charles Duhigg calls a "keystone habit", a behavior change that unlocks other cascading behavior changes.
-
A Look at the Methods to Detect and Try to Remove Bias in Machine Learning Models
Thierry Silbermann explores some examples where machine learning fails and/or is making a negative impact, looking at some of the tools available today to fix the model.
-
Software Supply Chain Management with Grafeas and Kritis
Aysylu Greenberg discusses the goals for Grafeas and Kritis used to secure a company's software supply chain, and concludes with the details of current and future development.
-
From Developer to Security: How I Broke into Infosec
Rey Bango discusses the impetus for his career change, from developer (building sites and apps for the web) to security, and the challenges he faced as a new person to the community.
-
The Not-So-Straightforward Road from Microservices to Serverless
Phil Calçado discusses the fundamental concepts, technologies, and practices behind Microservices and Serverless.
-
Peloton - Uber's Webscale Unified Scheduler on Mesos & Kubernetes
Mayank Bansal and Apoorva Jindal present Peloton, a Unified Resource Scheduler for collocating heterogeneous workloads in shared Mesos clusters.
-
Modern WAF Bypass Scripting Techniques for Autonomous Attacks
Johnny Xmas talks about some of the techniques people are using in automated attacks and what are some of the ways people use to circumvent website protection.
-
The Trouble with Memory
Kirk Pepperdine takes a look at the telltale signs that a JVM based application is in the 60% memory inefficiency area, and demonstrates the steps one can take to attack this problem.
-
Advanced Data Visualizations in Jupyter Notebooks
Chakri Cherukuri discusses how to build advanced data visualization applications and interactive plots in Jupyter notebooks, including use cases with time series analysis.
-
Building and Running Applications at Scale in Zalando
Pamela Canchanya shares practices and lessons learned when building and running critical business applications at scale.