Boris Cherny, creator of Claude Code, shares the development philosophy behind the AI coding tool, emphasizing building for future models, leveraging latent user demand, and the surprising longevity of the terminal interface.
Serverless Panel • N. Coult, R. Kohler, D. Anderson, J. Agarwal, A. Laxmi & J. Dongre
A panel of experts from AWS, G-P, and AntStack discuss the practical impact of Generative AI on software development. They explore how AI is used as an accelerant for productivity, the challenges of applying it to large-scale system design, its role in modernization, and the future implications for developer careers and safety-critical systems.
You Asked About AI: Agents, Hacking & LLMs
An exploration of the evolving AI landscape, covering the paradigm shift in cybersecurity due to AI agents, the practicalities of running local LLMs with tools like Ollama and vLLM, and the emerging stack for agent-to-agent communication.
Tool Calling
A panel discussion with experts from Arcade, Prosus Group, and MeaningStack who argue that most teams are building agents incorrectly. They dissect the failures of simple API wrappers, the pros and cons of MCP, and the critical role of governance and organizational structure in deploying agents successfully.
What is Multimodal RAG? Unlocking LLMs with Vector Databases
A technical breakdown of three distinct approaches for implementing Multimodal Retrieval-Augmented Generation (RAG), moving from simple text conversion to fully integrated cross-modal systems. The discussion covers the architecture, trade-offs, and capabilities of each method.
State of the Art of Container Security • Adrian Mouat & Charles Humble • GOTO 2026
Adrian Mouat from Chainguard discusses the evolution of container security, highlighting the flaws of traditional Linux distributions for modern container workflows. He explains how Chainguard's approach of building minimal, 'distroless' images from source using Wolfi addresses the noise from vulnerability scanners, and delves into the importance of SBOMs, attestations, and a 'defense in depth' strategy, contextualized by recent major security incidents like the XZ Utils backdoor and Shai-hulud attacks.