InfoQ Homepage The InfoQ Podcast Content on InfoQ
-
The Latest in OpenJDK and JCP Expert Group: Insights with Simon Ritter
In this episode, Simon Ritter, Deputy CTO at Azul, sat down with podcast host Michael Redlich, Lead Editor of the Java topic at InfoQ, and discussed the latest features in OpenJDK and Simon’s experiences serving on the JCP Expert Group since JDK 9. OpenJDK topics included: the six-month release cycle, Generational Shenandoah, JDK Flight Recorder, Project Leyden and Compact Object Headers.
-
Building a More Appealing CLI for Agentic LLMs Based on Learnings from the Textual Framework
Will McGugan, the maker of Textual and Rich frameworks, speaks about the reasoning of developing the two two libraries and the lesson learned. Also, he shares light on Toad, his current project, which he envisions being a more visually appealing way of interacting with agentic LLMs through command line.
-
Platform Engineering for AI: Scaling Agents and MCP at LinkedIn
QCon AI New York Chair Wes Reisz talks with LinkedIn’s Karthik Ramgopal and Prince Valluri about enabling AI agents at enterprise scale. They discuss how platform teams orchestrate secure, multi-agentic systems, the role of MCP, the use of foreground and background agents, improving developer experience, and reducing toil.
-
Bridging the Open Source Gap: from Funding Paradoxes to Digital Sovereignty
Gabriele Columbro, managing director of the Linux Foundation Europe, discusses the differences in the open-source landscape between Europe, China and the US. Stressing that the open-source landscape is the last favorable ground for global innovation in the current geo-political landscape.
-
GenAI Security: Defending Against Deepfakes and Automated Social Engineering
In this episode, QCon AI New York 2025 Chair Wes Reisz speaks with Reken CEO and Google Trust & Safety founder Shuman Ghosemajumder about the erosion of digital trust. They explore how deepfakes and automated social engineering are scaling cybercrime and argues defenders must move beyond default trust, utilizing behavioral telemetry and game theory to counter attacks that simulate human behavior.