Thursday, February 18, 2021
In this talk we will demo an optimized PDF workflow using pdfOCR to recognize data in PDF documents, and pdf2Data to extract selected data from your OCR search. The beauty of using pdf2Data in this way is it can pick up exactly where pdfOCR leaves off, allowing you to both recognize and extract all kinds of data from PDF documents that would otherwise be inaccessible.
pdf2Data is our iText 7 add-on for smart data extraction from PDF documents. It’s tailored especially for extracting hard to reach data locked inside PDFs, and it fits neatly into the iText 7 ecosystem. The cherry on top? Anyone can quickly create a template for data extraction using the sleek user interface, with no need to tediously define document structures programmatically. Let the template designer assist you in creating your data extraction templates; no coding required!
If you haven’t tried it already, we’d like to give you a quick tour of its capabilities, while also demonstrating how it’s a great companion for our pdfOCR add-on.
With the rise of the high-resolution, responsive mobile user interface has come rising user expectations of technology in every facet of life. From consumer devices to industrial control panels to scientific data analysis applications, the way the user feels when interacting with technology often determines the success or failure of a product. But shiny user experience only goes so far if the underlying application framework cannot meet the product requirements, or results in a high cost of development.
How confident are you that your code—including any 3rd party code your team brought in—is running in a secure and compliant manner before you deploy to production?
Imagine this - your developers check-in code for a new feature. It includes pieces of code your team wrote and pieces of code from a 3rd party. The code passes SAST & SCA and you deploy it to production. A day later, your production server is breached...and the attacker leveraged a bug in your code that caused privilege escalation and was able to become root.
In today’s microservices-containers/Kubernetes/Docker-DevOps world, a static code scanner isn't sufficient. You need RUNTIME observability into the application’s security, privacy, and compliance. Your developers need to know if their code or a 3rd party’s code can cause issues at runtime.
This panel of RUNTIME observability and security developers and experts will discuss the what, why, and how DeepFactor’s Continuous Observability platform:
- Automatically observes more than 170 parameters—across system call, library, network, web, and API behaviors in every thread of every process in every running container of your application—and detects security and compliance risks in your CI pipeline
- Detects insecure behaviors that only manifest at runtime and cannot be caught with code scanning or just looking at known CVE databases
- Reduces alert volume by prioritizing the findings of your SCA tools with runtime insights from observability tools
- Empowers Engineering leadership to accelerate productivity and decrease mean-time-to-remediate (MTTR) security and compliance risks pre-production as their teams ship secure releases on schedule
You’ll leave this session armed with the knowledge to immediately leverage continuous observability to consistently deploy apps with confidence.
Need a Kubernetes cluster for a short amount of time, but always forget to destroy them? Worry no more, as in this session we'll show you how to create a self-destructing Kubernetes Cluster.
During this talk, we'll showcase a number of technology principles: Infrastructure as Code, CI/CD, identity in the cloud and scheduling jobs on Kubernetes. We'll use Terraform, GitHub Actions and Azure Kubernetes as demo material, but the concepts of this talk translate to any technology platform.
By attending this talk you'll get a practical understanding of Infrastructure as Code, CI/CD, identity in the cloud and scheduling jobs on Kubernetes.
Runtime security for containers, Kubernetes and cloud native isn't for the faint of heart. To confidently secure your applications, you need a recipe. And, much like the one grandma used for her consistently amazing chocolate chip cookies, the one you get from this session will guarantee your security success.
In this session, Scott Surovich and POP will share practical experience and excerpts from Scott's new book Kubernetes and Docker - An Enterprise Guide. They’ll share the key ingredients for tooling that provides an engine, ruleset, and outputs that fit real-world scenarios.
They will cover:
- An introduction to CNCF open source project Falco for runtime security of applications/ cloud native infrastructure
- Real world use cases of Falco with a short demo showing rulesets and outputs valid for your business
- A primer to how to contribute your own capabilities to Falco
- A kickass chocolate chip cookie recipe to wow your friends and family
Ever run code in CI/CD and builds pass only to fail during deployment? This presentation will discuss the advantages of Smoke Test patterns in CI/CD pipelines using Infrastructure as Code (IaC). Learn how teams can leverage automation to ensure apps are tested live in target environments which provide valuable insights pre-deployment. Angel will demonstrate how to leverage IaC to provision infrastructure, deploy apps, test then destroy all the resources created in a single CI/CD pipeline run.
Context switching between your IDE, Github.com, JIRA, Terminal, and Slack is no way to optimize collaboration and it results in countless hours of distraction and lack of focus, hurting code quality. Team alignment and productivity depend on just the right mix of collaboration and staying in the zone. Extensible IDEs are opening the door to great innovation in developer workflow. Turning the IDE into the true Hub of the development flow is the best way to integrate the essential tools into a cohesive and streamlined process. In the future, your code host, issue tracker and messaging app will be placed where they belong: In your editor. Here we will discuss how such an integration should happen, and we will spell out the benefits that accrue to the individual developer, the team and the organization.
The evolution of architecture from monolithic to microservices-based has enabled organizations to meet the ever-evolving needs of their customers. The need for getting insights into these microservices has become critical for developers and operations teams alike. In this session, we will explore how observability plays a critical role in the microservices world. We will deep dive into distributed tracing to achieve full observability and monitoring for production environments. Finally, we will discuss the checklist that every DevOps person should look into for incorporating observability into their environment. The attendees can expect to learn about the three pillars of observability, details of distributed tracing and strategies for achieving observability and monitoring.
Not too long ago, a reactive variant of the JDBC API was released, known as Reactive Relational Database Connectivity (R2DBC). While R2DBC started as an experiment to enable integration of SQL databases into systems that use reactive programming models, it now specifies a robust specification that can be implemented to manage data in a fully-reactive and completely non-blocking fashion.
In this session, we’ll briefly go over the fundamentals that make R2DBC so powerful. We'll keep light on the slides so that we can jump directly into application code to get a first-hand look at the recently released R2DBC client from MariaDB. From there we'll examine how you can take advantage of crucial concepts, like event-driven behavior and backpressure, that enable fully-reactive, non-blocking interactions with a relational database.
Open Policy Agent has become a powerful tool in the hands of engineering teams allowing easy, yet performant application of dynamic policies. This same policy language, Rego, can be used in micro services, Kubernetes, CI/CD pipelines, API Gateways, and more. OPA policies can not only affect running code, but also the entire path to production, resulting in a potentially unified policy syntax.
In this session we'll share some of the journey taken developing low-latency decisioning in our Go services by integrating OPA, ultimately enhancing our open banking APIs. We'll talk about how we structured the project, compensated for pitfalls, and reduced complexity. Come join us for a technical walkthrough with live working code.
Shifting Application Security Left and into the hands of developers has been a topic of discussion, but remains just that, a discussion. Legacy solutions in the market are not built from the ground up to enable this and achieve DevSecOps. In this session we will discuss the key features that your AppSec testing tools need to enable shift left, or shift everywhere, to empower developers to detect, prioritise and remediate security issues EARLY, as part of your agile development and unit testing processes, without slowing down DevOps. The talk will include specific examples from leading organizations that have deployed these solutions, the business impact they have achieved and the steps you can take to achieve the same, across your applications and APIs
A key challenge when working with software is that it’s invisible. It does not inherently lend itself to the universal DevOps goal of “Telemetry Everywhere.” While engineers consciously code their product to emit metrics, logs and traces that allow them to observe the invisible, traditional monitoring methods fall short of generating meaningful data about incidents, leaving teams with excess toil when things break. This talk will explore the relationship between observability and SDLC practices which allow AI to lead the Ops side of DevOps, so developers and SREs can move faster, innovate more and operate less.
Attendees will learn:
- How introducing visibility and control over incidents earlier in the development cycle can reduce toil.
- How to leverage Service Level Objectives (SLOs), error budgets and the ‘wisdom of production’ to improve the Ops part of DevOps.
- Methods for using AI-driven observability to turn every incident into a learning opportunity.
Discover how AI-driven observability methods help improve practices from Site Reliability Engineering to Continuous Integration and Deployment, and supports the transition from project to product-centric ways of working.
Historically, data security has been an afterthought — something that others handle; the IT team will handle it after our software goes live, the client will handle it with hardware. In today’s environment of large-scale data breaches, data security as an afterthought is too little too late.
Application and data security should be part of every design and product roadmap discussion just like functionality, stability and user experience. The more mobile the data needs to be, the more agile the solution needs to be. By shifting security conversations to early in the product development lifecycle instead of after code has already been released, software organizations can save money, better differentiate their offerings and scale more effectively in the long run. This session will discuss important design considerations for application-level security and how to select tools and methods that support your software architecture instead of dictating it.
Human connections are so important to us all. By adding the ability to have real time conversations, it allows communities to grow and flourish, increase trust in transactions, drive down cancelations, and improve stickiness. Join us in exploring what makes humans, and real time communications, tick.
The role of the developer continues to change as they sit on the front line of application and even cloud infrastructure security. Today, developers are focused on innovating fast and improving security, but how do high-performing teams accomplish this? They commit code frequently, release often and update dependencies regularly (608x faster than others).
In this webinar, we discuss the key traits of high-performing teams and how that impacts the role of the developer.
Choose the best third party dependencies
Determine the lowest effort upgrades between open source versions
Solve for issues in both direct and transitive dependencies with a single-click
Block and quarantine suspicious open source components
As software engineers, we strive to better our craft and leave a lasting mark on the organizations we work for. Throughout our careers, we balance two types of knowledge: the combination of business domain and technical stack is our bread and butter.
No matter if you work for a bank or an app that is revolutionizing wine delivery for pets, as an engineer you tend to get better at developing features. Design patterns and approaches learned on one project can transfer into others, while the new challenges add to your skillset. Ironically what does not transfer easily between projects is the process of deploying and releasing the software that you work so hard to build. For most organizations, deployments and releases are team-centric since applications are unique but Continuous Delivery is changing that.
Learn in this session how modern Continuous Delivery approaches are ushering in standardization in one of the last and sometimes scary frontiers for software engineers, your releases. Core to Continuous Delivery is making strides in engineering efficiency. With advancements with AI/ML in your CI/CD pipelines, even the most snowflake based deployments can benefit from standardization.
OPEN TALK: Accelerating to Escape Velocity: Migrating Applications to the Cloud with Programmable Data InfrastructureJoin on Hopin
Building on its rich history of innovation, Choice Hotels used a cloud-first approach to accelerate innovation and battle digital-native competitors.
To escape the gravitational pull of data and make the cloud promise a reality, Choice Hotels brought on an API-first programmable data infrastructure platform to automate data compliance and data delivery. By doing so, the organization broke down data silos, allowing software teams to significantly improve the quality and speed of application testing and development.
In this fireside chat with Jason Simpson, VP of Engineering at Choice Hotels, you’ll discover:
Learnings from a migration of hundreds of applications from legacy systems to Amazon Web Services (AWS)
Insights on leveraging data to minimize the risk of outages and delivering a frictionless experience for customers and franchisees across platforms
Reaping the scalability of cloud to manage unexpected business shifts including impacts from COVID-19
Perspectives on how Programmable Data Infrastructure can be leveraged for Migration, CI/CD Acceleration and even Service Restoration with APM Integration
Speakers: Jason Simpson, VP of Engineering at Choice Hotels & Alex Hesterberg, Chief Customer Officer at Delphix
Every error does not concern every engineer. Your team members don’t need to be pinged about every application error, especially when an error occurs in someone else’s part of the code. In fact, it can become a negative distraction that takes away focus from their work. Join Bugsnag's Sr. Solution Engineer to discover why eliminating noise and focusing on the bugs that you can and should fix, drive a culture of code ownership, and improves developer productivity.
If you are building applications today, you are probably using either cloud or Kubernetes ... or both! As a result, we are entering an era that we don’t have to make complex architecture decisions by weighing tradeoffs on scale, uptime, and usability. Patrick McFadin has been building and supporting scale applications for a long time and has seen all the evolution that has brought us to today. Engineer to engineer, Patrick wants to show you his journey into this world and what he’s been doing at DataStax and the Apache Cassandra project to help make it a reality. Here’s what he’ll cover.
-How you can shorten application development time and ship code fast
-The role of open source in this next wave of modern application development
-Ways to participate in this fast-moving community of data services
-How you can futureproof your code and be ready for the next big thing
How do you know your feature is working perfectly in production? If something breaks in production, how will you know? Will you wait for a user to report it to you? What do you do when your staging test results do not reflect current production behavior? In order to test proactively as opposed to reactively, try testing in production! You will have an increased accuracy of test results, your tests will run faster due to the elimination of bad data, and you will have higher confidence before releases. This can be accomplished through feature flagging, canary releases, setting up a proper CI/CD pipeline, and data cleanup. You will leave this talk with strategies to mitigate risk, to better your understanding of the steps to get there, and to shift your company’s testing culture, so you can provide the best possible experience to your users. At the end of the day, we don't care if your features work in staging, we care if they work in production.
In this session, we’ll explore how to secure your delivery pipelines, from development to deployment with key learnings including:
- Combining continuous packaging with integration & delivery.
- Applying holistic security principles across the whole value stream.
- Using infrastructure-as-code techniques to build, stage, and deploy.
Observability, instrumentation, telemetry--what does it all mean? This introduction to observability is for software practitioners who want to better understand the health of their production systems. Learn how to generate better data and gain new insights. You'll walk away ready to use observability to level up everyone on your team!
The always-on, always-available expectations of digital services have increased the requirements of technical teams to provide response and readiness around the clock. For teams new to this concept, introducing on-call can be challenging. There are technical and cultural considerations to keep in mind when adding on-call responsibilities to new teams. In this talk, we’ll look at some of those challenges and provide recommendations for folks who are dreading their new duties.
How do you switch design paradigms, or shift technologies or architectures - especially when not all of your team has the requisite knowledge? Many times this means that either some of your team will be left behind or you have to stop\slow development. Who likes those choices? We will go over a couple of up-skilling strategies that will keep a developer team productive while updating their skills and knowledge as part of their job.
Creating consistent, quality APIs is a tough job, especially as ecosystems move past 100 APIs and beyond. API Style Guides can help, but developers rarely read them, and those that do don't always remember everything. API Design Reviews and Governance tooling is maturing to help solve this, automating API Style Guides allowing teams to introduce new guidance over time. Learn how to roll this out at your company easily.
We’re quickly becoming better at building software. The increased adoption of microservices architectures and the move to open source are evidence of this. But, we’re not really that much better at fixing it. Finding and remediating bugs is a drain on developers’ time and productivity. We’re reliant on tools that tell us about the stability of our infrastructures. But with more lines of code being written today than the day before, it’s not enough. Teams are getting too much noise and false signals, creating alert fatigue. Developers spend too long investigating issues, struggle to prioritize what needs fixing, and become less productive.
How we build, test, deploy, and release has become more complex, so finding the root cause of errors has become harder. More contextual information is needed to quickly pinpoint where it’s occurring and better error signals can help reduce the noise by grouping together similar root causes which, in turn, alleviates alert fatigue. Plus, bugs should get resolved before users complain, which is still the top way companies find out about bugs despite all the tools they have in place.
And all of this is happening as companies embrace faster deployment models like CI/CD. It’s why the shift left movement is happening, to move testing earlier in the process to catch issues earlier. But what if you could shorten testing cycles and still catch errors before users do?
In this session, you’ll learn:
* Why developers need to be focused on continuously improving code, and not just observability
* How to boost developer productivity by spending less time debugging
* How to catch errors before users report them
All SaaS products have reports, but most don't truly embrace analytics as a differentiator. You'll learn how to use analytics within your product to increase customer satisfaction, decrease churn and expand revenue opportunities using data that is already being captured by your product.
Call for Code is a multi-year program that calls on developers to create practical, effective, and high-quality applications based on one or more IBM Cloud services (for example, web, mobile, data, analytics, AI, IoT, or weather) or Red Hat platforms (including OpenShift) to build a solution that can have an immediate and lasting impact on humanitarian issues as open source projects. In this session you'll learn more about the solutions built to tackle natural hazards, climate change, and the pandemic. What sets Call for Code apart from other technology-for-good competitions is the commitment to deploy the winning solutions with the IBM Service Corps and to help teams build sustainable open source communities through The Linux Foundation. Join us at this talk to hear about the most recent winning projects, get an update on previous year's progress, and learn about how to contribute to two projects directly from the developers.
The low-code movement is creating a lot of buzz. In this workshop, hear about how no/low-code identity verification is making compliance and fraud prevention more cost-effective and accessible.
-How no/low-code solutions can be easily implemented by anyone, including non-technical entrepreneurs
-Why identity verification is making cross-border KYC and fraud mitigation faster with less friction
-How an identity platform streamlines verification workflows by leveraging multiple identity solutions and a network of single-point data sources
Every organization has security requirements influenced by the technologies in use, legal regulations, internal conventions, and so on. Policy enforcement is difficult because it often affects the entire stack, requires state from multiple locations, and must evolve over time as business needs change.
Organizations have relied on wikis and tribal knowledge to document and enforce important rules that govern how their systems behave, but today, many organizations pursue "policy as code" for greater control and visibility over their stacks.
In this talk, Ash will introduce the Open Policy Agent (OPA), an open source, general-purpose policy engine used by companies like Netflix, Intuit, and CapitalOne to enforce policies across a breadth of domains such as custom applications, container-management, i.e. Kubernetes, public clouds, server management etc.
This talk will highlight how fine-grained authorization can be achieved by organizations consisting of multiple teams, massive container deployments, diverse security requirements and how all of this can be made possible without significant changes to the existing infrastructure.
How do you build increasingly better APIs? It’s easier than you may think! In this session, we will talk about how to build better APIs with API management and show the key advantages of using APIM to drive your API development. We will cover the basics of APIM features and some of the use cases for these features. Including: Rate limiting
Whether you are looking to provide better service for your users, better reporting and metrics for your stakeholders, or to help your support team to become more efficient at supporting your API portfolio, stop in to see how API management can power these improvements.
Friday, February 19, 2021
In this session, Blue Hexagon and AWS present AI-powered cloud-native security for near real-time threat detection and response, deep visibility into cloud configuration and workloads, and achieving compliance with industry-standards. Delivered agentless and managed as code, this technology greatly reduces the burden of deployment and management of an effective security posture against adversaries, even as DevOps teams build and deploy business workloads at an agile pace.
Benchmarking cloud providers is difficult and time-consuming. In 2017 our cloud provider decisions were based on tests and informed assumptions. But when we started to see results that contradicted our assumptions, we dug further. Were our assumptions leading us astray?
This led us to develop the Cloud Report, a benchmark comparison of Amazon Web Services (AWS),Google Cloud Platform (GCP), and Microsoft Azure. Every year since, cloud infrastructure improves, so we have developed a cadence of benchmarking to keep our own engineering team, as well as our customers, at the cutting edge. In this talk, John breaks down how we benchmark each of the clouds, how we select the benchmarks, and the difficulties that we encounter -- no matter how variables we control for.
OPEN TALK: WordPress as a Service: Get It Done in Less Than 30 Minutes with Terraform & K8s on IONOS CloudJoin on Hopin
Let’s assume that we’d like to become the next big internet tycoon by offering an awesome, high end managed WordPress service to the world, including monitoring, completely dedicated database, backups, restores and the whole nine yards. In addition to our great idea, let’s also set some…less realistic goals:
– We need a Proof of Concept up and running in less than 30 minutes
– We need to reach our goal(s) without having to deep-dive into WordPress specifics
– A new dedicated wordpress site needs to be deployable with a single command or API call.
– Upon deployment, each WordPress website needs to be secured through HTTPS
This speech will give you an overview on how to start a project like this by leveraging the power of Kubernetes Operators running on the IONOS Cloud infrastructure.
Join our resident Kubernetes and modern apps experts in a discussion of the challenges of Kubernetes traffic management in today’s technology landscape. While Kubernetes Ingress gets most of the attention, how you handle egress traffic is just as important. Egress isn’t just about traffic leaving a cluster, either, but also concerns traffic among managed and unmanaged services within the cluster. We demo a solution using NGINX Service Mesh and NGINX Ingress Controller to control egress from the cluster and between NGINX Service Mesh and unmanaged services. Whether you’re new to modern application architectures, or looking to improve your current microservices deployment, this webinar is for you.
Join this webinar to learn:
* Solutions to common challenges when managing traffic in Kubernetes
* How to control both ingress and egress in a single configuration
* Which solutions from NGINX can best serve your needs, depending on your requirements
* About NGINX Service Mesh and NGINX Ingress Controller with live demos
Manage Databases with MySQL
Create, Deploy, and Manage Containers with Docker
Build and Manage Websites with Plesk
Over the past 17 years, the Linode community has grown to serve millions of developers and small businesses around the world. Tap into a diverse and growing community to accelerate your app's awareness and adoption.
Simplify your sales cycle, discover new customers and leverage co-marketing support from the Linode Partner Team. We're here to guide you through listing on the Linode Marketplace, and see what opportunities come next.
Once your listing is created, developers, teams, and companies can discover your solution in our library and quickly deploy it from our Cloud Manager, API, or CLI.
With the average enterprise organization consuming thousands of APIs, it has become increasingly challenging for developers to locate or socialize created APIs. It is even more difficult for organizations to manage their API collections. Even companies are now offering to socialize business partner’s APIs to their customers in order to create microservices, complex integrations, and product solutions.
IBM’s answer to this problem is the IBM API Hub. This essential API hub offering allows for managing friction, preventing resource duplication, and breaks silos. It provides a single place for organizations to publish and share created APIs in an easy discoverable, searchable, highly available, and curated environment.
In this session, learn about the key attributes of the IBM API Hub. Explore the consumer experience and its low barrier of entry for any API Provider. Discover how IBM Sterling has created an all new enriched experience for their developers using the IBM API Hub. Try out the IBM API Hub yourself with a full set of API consumer features and functionality.
Cloud and Kubernetes adoption led to greater container usage in 2020. Staying up-to-date with the latest trends in security and monitoring for Kubernetes and container environments is more important than ever.
In this session, you’ll hear real-world examples of nearly one billion unique containers deployed in today’s modern global enterprises. You’ll walk away with new knowledge about:
- How organizations are dealing with container security concerns
- Interesting shifts in runtime and registry usage
- Usage trends that impact container security
- Practices others are using to to run containers with greater confidence
- Trends in lifespan and density as container usage matures
Kubernetes brings promises of application modernization and agile applications development and deployment, but it also brings new challenges in managing these environments. Nowhere are these challenges more of an issue than with traffic management and security of microservice environments, especially in those which require high-volume, high-reliability, and high-security. But the good news is that you’re not alone: These challenges impact everyone moving to Kubernetes, and there are solutions to make traffic management and security in Kubernetes microservice environments easier. Come join NGINX Service Mesh engineers to talk about NGINX Service Mesh and tools available for your microservice traffic management challenges. This session will be an engineering round-table where we'll have an open discussion about service mesh use cases, demos, and a Q&A with the engineers. Join us to talk all things mesh, the need for ingress/egress traffic management within a mesh, and some best practice guidelines with microservice traffic management.
PDF forms are widely created and used in many facets and applications. You’ve probably seen, filled out, or maybe even created your own PDF Forms for your clients or customers to fill out. In this talk, we’ll cover XFA PDF forms and AcroForms which are the two most common types of PDF Forms. XFA forms were designed to enhance the processing of web forms, however, they are not always compatible with PDF viewers and software. This means that a majority of PDF software does not support the XFA format and you can’t open, view, process, convert or print these forms. So what can you do to fix it? In this presentation, we’ll dive into showcasing PDF forms and their advantages, we’ll also cover XFA forms and explore why they are such a unique PDF Form format, and guide you on how to efficiently work with any PDF forms despite some of their challenges.
K8ssandra has made it effortless to deploy Apache Cassandra on Kubernetes. Long a simple means of deploying stateless applications, modern tooling and APIs has facilitated the move of databases to this pervasive platform. Join Chris Bradford in deploying the K8ssandra stack to Kubernetes. Learn how it packages a production Cassandra deployment with supporting tooling alongside Stargate, a next generation data gateway. We will explore everything from the management interfaces leveraged by DevOps teams to performant, highly available, REST, Graph, and Document APIs for developers.
After a long evolution, the browser has become a programmable client that lives in a globally connected world of APIs. This combination of a ubiquitous client with a sea of serverless APIs and the emergence of APIs with advanced security features have enabled the new, client-serverless application model. In such a model, we slowly move away from three-tier applications. In three-tier applications, APIs were typically guarded by the backend. In client-serverless, clients are rapidly taking on a more central role, where clients become responsible for gathering their data services directly from the data source. Needless to say, this reduces complexity, but also brings an entirely different security model which SaaS providers will need to prepare for.
The task at hand: brief your executives and the board on the progress you’ve made this quarter. Business execs and board members want to see what it is your team is doing, or whether and why you are or are not doing whatever is in their head. This can be tough when it comes to engineering. You may know how your team is performing, and you know what they’re doing, but it can be a challenge to present this to the business and board members. What topics should technical leaders cover, and how should they present those topics to answer the board’s questions even before they’re asked?
Andrew Lau, engineering leader turned CEO of Jellyfish has experienced these presentations from both sides. In this session, he’ll walk through:
- Why engineering leaders can and should be more influential in executive decision-making
- The most important topics that your board will want to hear about
- How and where to find the data
- How to present it in ways that will resonate with business executives
The networked software systems we build are increasing in complexity every moment. From the abstractions of cloud hosting and inherited libraries to container scheduling and third-party vendors, the turtles go all the way around!
Today the most successful builders and operators are embracing complexity through CI/CD, Chaos Engineering, and innovation in Incident Response. They realize that the adaptive world around us is advancing at such a breakneck speed, it is leaving our capacity to understand it in the dust. That humans and technology must race a gauntlet of automation surprises and collaboration challenges as a team, learning and improving along the way.
This session showcases methods of deploying, running, and navigating complexity. It offers a practical view of how software systems can scale and remain robust to failure (like fallbacks or high-availability), achieve highly reliable socio-technical operations (via runbooks and game-days), and adapt to surprise through techniques of resilience engineering (graceful extensibility and building for adaptation).
PDFs are everywhere but they are painful to deal with and even harder to write code for. We’ll talk about why PDFs are challenging and share a better way to programmatically interact with them.
Come hear about:
* Why PDFs are everywhere (with examples)
* Why PDFs are hard to deal with
* A live demo of the Anvil PDF API—the easiest way to incorporate PDF creation, filling, and signing
Are you ready to say goodbye to your application backlog, and hello to developing apps at lightning speed? Look no further than progressive web apps.
Progressive web apps (PWAs) are web apps that provide end-users with a frictionless experience while still offering the features of the native-like applications they know and love. Some of the key benefits of PWAs include cross-platform, independent distribution, no installation, and offline capabilities.
In this session, Rui Barbosa, Developer Advocate at OutSystems, will demonstrate how to quickly build a mobile application from scratch and immediately distribute it using PWA technology. See how the OutSystems platform can empower you to become a world-class problem solver!
Why neutral foundational elements like identity can unlock a future of agility.
Modern applications require neutrality and flexibility. Long gone are the days where a developer could rely upon a single vendor’s technology stack or assume that connecting systems would share the same language, platform, geography or timezone. Organizations have evolved from on-premises, to cloud to multi-cloud strategies and with this complexity comes the added requirement that development go faster, user stories become richer and code lives longer. Teams must demonstrate agility through neutrality in order to achieve increased velocity.
Okta is rooted in the concept that proprietary methods and restrictive ecosystems are contrary to the precepts of the modern developer. In this session, a discussion will revolve around why identity is the common thread that allows for interoperability and extensibility across systems, infrastructure and technologies. Identity isn’t a component of an application, but rather a fundamental attribute of all applications.
Are you struggling with security testing of your APIs, web-services or cloud-native applications? Are you looking for new ways to test security without impacting velocity? Would you like to get visibility into sensitive data that your application handles? If answer to any of these questions is yes, allow us to introduce you to new and unique ways to perform security testing. In this session, we will give you an overview of developer friendly security test tools from Synopsys for unparalleled accuracy and visibility into application vulnerabilities with remediation guidance and just-in-time contextual training to help your developers with remediation effort to improve your application security posture.
As distributed systems grow bigger they have become more complex and harder to manage. The amount of data coming out of these microservices based applications is more than any human, or even group of humans, can process on their own. Because of this, AIOps is essential for proper management of all the Observability data points.
With a look into the AIOps space, there are many different options to choose from. And, those choices are not just limited to products and companies. A bigger challenge is to understand the different routes to implement data gathering. Domain-Centric or Domain-Agnostic are the two main approaches.
In this presentation I’ll walk down the road of issues, how they can be solved, and take a quick tour into the differences of Domain-Centric and Domain-Agnostic approaches, as well as their pros or cons.
The future of work has arrived. As product development teams have shifted to working remotely, we’ve had to adjust our processes, communication, and culture. Join Lucidspark to learn how to effectively drive collaboration across distributed teams both now and going forward.
Picture yourself flying First Class. You board the plane first, you get champagne, and you feel as though you’re the most important. Why not treat your APIs the same way? Join FireHydrant’s CEO and Co-Founder, Robert Ross, for this session where he’ll share why putting your APIs first can be a game-changer for your business.
In this session we’ll discuss:
- The benefits of building your API first and how it can pay dividends in the long haul
- The different types of APIs and which choice is the right choice
- The importance of hosting API documentation
Serverless cloud technologies have been around for some time now and most of us know the benefits include simpler management and pay-per-use billing. There are additional benefits on top of these, however, adoption of this technology is not as straightforward as other cloud transition strategies. In this talk, we explore the advantages of serverless technologies, highlight the architectures that support them, and discuss the challenges of adoption.
As we go through these points you will hear from an organization that has embraced Serverless technology and are well on their journey towards full adoption. You will hear about the reasons they selected serverless, the challenges they faced while adopting the serverless mindset, and how they overcome these challenges.