Skip to content

{ Category Archives } Conference Papers

Papers I’ve presented at software development conferences.

F# Presentations at CodeMash 2016

I’ve been scouring the CodeMash accepted session list for talks featuring F#, and there are quite a few!

A Developer’s Journey from Object Oriented to Functional Programming, by Reid Evans
Async Everywhere!, by Stephen Cleary
Deep Dive into Deep Learning, by Gary Short
Functional Browser Automation Testing for Newbs, by Bryan Arendt
Programs that Write Programs: How Compilers Work, by [...]

Tagged , ,

Speaking at Dog Food Conference, CloudDevelop, and CodeMash

I’ll be speaking about compilers, testing, and machine learning at a conference near you! Abstracts for all of these sessions are on my Presentations page.

Programs that Write Programs: How Compilers Work Dog Food Conference and CodeMash
What Testing Can Never Do and How to Do It Anyway Dog Food Conference
Machine Learning with Azure ML CloudDevelop

Share This [...]

Tagged , , , , ,

Your Flying Car is Ready: Amazing Programming Tools of the Future, Today!

That’s the title of my presentation at Dog Food Conference 2014, 29-30 September, in Columbus, Ohio. If you found my post on "Test-Only Development" with the Z3 Theorem Prover was interesting, then you’ll love this.
What if simply writing "unit tests" was enough to produce a program which makes them pass? What if your compiler could [...]

Tagged , , , , ,

Cloud Security, For Real This Time: Homomorphic Encryption and the Future of Online Privacy

That’s the title of the presentation I’ll be giving at CloudDevelop 2014, on October 17th, in Columbus, Ohio. If you read my blog at all then you’re probably interested in where software development will be headed five years in the future. Two things I recommend that you study are proving systems and homomorphic encryption.
I’ve written [...]

Tagged , , ,

Emerging Languages Camp Part 5: Axiomatic Language

This is the fifth post of my notes from Emerging Languages Camp last year. If you haven’t seen it already, you might want to read the Introduction to this series.
Axiomatic Language
Walter Wilson
Homepage · Slides · Presentation
One of the ways that you can describe a coding style is declarative versus imperative. That is, focusing on the desired result versus [...]

Tagged , , , ,

Emerging Languages Camp Part 3: Noether

This is the third post of my notes from Emerging Languages Camp last year. If you haven’t seen it already, you might want to read the Introduction to this series.
Noether: Symmetry in Programming Language Design
Daira Hopwood
Slides · Presentation
I found this presentation to be at once fascinating and frustrating. It was the single best talk at [...]

Tagged , ,

Emerging Languages Camp Part 2: Daimio and Babel

In this exciting installment of my notes from Emerging Languages Camp last year, some information about the Daimio and Babel programming languages. If you haven’t seen it already, you might want to read the Introduction to this series.
Daimio: A Language for Sharing
Dann Toliver
Homepage · Presentation · Slides
Daimio Is a domain-specific language for customization of web [...]

Tagged , , , , ,

Cloud Security, For Real This Time

Cloud Security, For Real This Time: Homomorphic Encryption and the Future of Data Privacy. That’s the title of my presentation at the next Central Ohio OWASP Quarterly Seminar, on 27 February at 1:00 p.m. Dan King, from Microsoft, will be talking about single sign-on for federated Dynamics CRM, very practical stuff which is in real [...]

Tagged , , ,

Delphi Unit Testing Power Tools

Here’s an outline of my upcoming CodeRage II presentation:
Ready to move beyond basic unit testing? This presentation will explain several techniques for getting the most out of your testing effort, including:

A system, inspired by Haskell’s QuickCheck, which helps generate semi-random test cases for you.
A simple, Delphi-friendly technique for enumerating lists [...]

InterBase Performance Monitoring: Vision and Control

With InterBase 7 and higher, InterBase now provides insight into and control
over the internal functions of the server via the temporary system tables. This article focuses on practical use of the feature.

Bad Behavior has blocked 1377 access attempts in the last 7 days.

Close