Tuesday, February 8, 2022
Speed is the name of the game in continuous integration. The quicker a developer can get feedback on her changes, the quicker she can address problems and move on to the next feature.
Imagine shaving 10 minutes off your build. For a developer pushing code 5 times a day, this is 40 hours of time savings a year.
In this session, Ben will offer 7 actionable tips that mobile developers can apply to their own CI pipelines to enjoy super fast CI responsiveness.
OPEN TALK: Learn How to Find & Fix Security Issues in Kubernetes Manifests Using Open Policy Agent and RegulaJoin on Hopin
Teams can now run pre-deployment security checks on their Kubernetes (K8s) manifests using Open Policy Agent (OPA), the open standard for policy as code and a Cloud Native Computing Foundation project.
In this session, Aidan O'Connor (Senior Solutions Engineer at Fugue) will walk through using OPA and Regula (an open source OPA-based tool purpose built for IaC checks) to find and fix security issues (measured against Center for Internet Security Benchmarks) in your K8s manifests pre-deployment.
Attendees will walk away with an understanding of:
-The kinds of security risks that need to be considered with K8s manifests
-Using OPA and Regula to catch security vulnerabilities and learn how to remediate them
-How automated K8s manifest checks can be integrated into DevOps workflows
The explosion of IoT devices and the time series data they generate has accelerated the demand for specialized IoT platforms. By 2025, there’s projected to be ~60 billion connected devices around the world. The hurdles for businesses to overcome in the next few years will be centered around collecting, munging, and storing it all from the many sources it comes from, how to manage that storage, and how to analyze it most efficiently.
In this session Sam Dillard will cover why a time series data platform should be used to meet IoT scale and interoperability needs. He will walk through the core concepts of time series databases, share use cases and give us an overview of the InfluxDB platform.
Conversation Intelligence (CI) APIs enables to build applications that go beyond basic speech to text, creating a new array of sophisticated AI-driven experiences and functionalities. Basic speech recognition is designed to recognize or respond to explicit words and phrases, while conversation intelligence is capable of contextual comprehension of any human conversations to effectively extract key insights, identify user intent, surface actionable insights, detect sentiment, and more.
Conversation Intelligence has given a rise to a new generation of AI driven applications and platforms across various verticals such as revenue intelligence, tele-health, call centers and customer support, collaboration and productivity platforms and more…
In DevOps everyone performs security work, whether they like it or not. With a ratio of 100/10/1 for Development, Operations, and Security, it’s impossible for the security team alone to get it all done. We must build security into each of “the three ways”; automating and/or improving efficiency of all security activities, speeding up feedback loops for security related activities, and providing continuous learning opportunities in relation to security. While it may sound like the security team needs to learn to sprint, give feedback, and teach at the same time, the real challenge is creating a culture that embodies the mindset that security is everybody's job.
Instrumenting your services is table stakes for modern services work. If your services are appropriately instrumented, debugging stops becoming guesswork, and you can understand your systems at a much deeper level than just knowing when something goes wrong. And when something is table stakes in software development, it cannot be controlled by any one vendor. OpenTelemetry is an increasingly popular vendor-neutral Observability framework for cloud-native software, poised to be the global standard for instrumenting systems. It’s a set of APIs, SDKs, and tools so that you can better understand your software’s performance and behavior. In this session, Phillip will walk you through what OpenTelemetry is from a developer’s standpoint, why you should choose it if you’re building cloud-native applications, and strategies for instrumenting a system with OpenTelemetry. At the end of this talk, you should feel empowered to adopt OpenTelemetry today and participate in an increasingly vendor-neutral future!
“The smarter an application is, the dumber its code should be.”
Have you ever tried to add a minor feature to your application only to discover that you’ll have to re-write large blocks of code first? Or maybe you’ve spent hours deciphering hundreds, or perhaps thousands, of lines of existing code just to find out a task only required two lines of additional code. If you’re like most developers, you’ve wasted countless, frustrating hours wading through immensely complicated code trying to force it to do things it wasn’t built for.
In this presentation, we’ll discuss 5 principles to help you create stupidly-simple applications that are maintainable, extendable, and bug-resistant. If your code is already suffering from “genius syndrome”, we’ll also be discussing strategies for refactoring existing code to avoid the infamous “grand rewrite.”
There are no shortage of API metrics you could track, but how do you aligned to business outcomes. This workshop takes a deep dive on how to align metrics to three key goals: Adoption, Engagement, and Retention. Then, we'll discuss changes you can make to your developer experience for improving these areas.
“I really want to develop a tool that aggregates user interactions!”, said no developer ever.
Product-Led Growth (PLG) has stormed into our lives over the past few years. Concepts like usage-based pricing, seamless onboarding, built-in security, and product analytics are now taking a toll on developers. Companies are investing more and more engineering resources on developing self-service features that are shifting the focus from building innovative code for your product’s core technology.
From the product side, this surely looks innovative and unique. However, from the development side, it adds another variable into the equation, which already includes bugs, security issues, never-ending product feedback loops, and other things that stop developers from building exceptional code.
But while investing resources in creating a seamless product experience is crucial, isn’t the core value of the product more important? How can developers build self-service features, while achieving their innovative selves?
In this talk, we will be discussing the application side of the story for PLG success. This will be a practical demonstration of how developers can integrate self-service and data-driven by-design capabilities, while ensuring speed, flexibility, and full user observability, without sacrificing innovation.
Need to harness the power of AI but not a data scientist? No problem. In this presentation, we’ll show you how to consume prebuilt and custom AI models even if you don’t have data science expertise. We’ll also introduce Oracle’s take on machine learning and AI—and how we’ve rearchitected the AI experience to be more streamlined, efficient, and developer-friendly. Come ready to see demos that span capabilities such as language understanding, computer vision, speech, and many more. No data science background required!
As you adopt cloud native technologies and Kubernetes, you will face a myriad of technology, process, policy and people decisions. What tools and patterns are needed to be successful? How can you ensure Kubernetes is a success across your DevOps team and organization?Rachel Sweeney, Product Advocate SRE at Fairwinds, discusses why Kubernetes plays an important role in your DevOps experience and the 5 things to help your team succeed at Kubernetes. Learn a few critical steps to achieving your Kubernetes Maturity around technology, security, visibility and consistency.
Machine Learning is disrupting nearly every industry. AI-First is the new mantra for many, but how do you architect, develop and manage intelligent, real-time applications incorporating Machine Learning that can scale to handle modern workloads driven by Cloud and Edge?
In this talk, you will learn the most critical elements for achieving machine learning applications that can scale to any throughput or volume of interaction up to one billion events per second or more. Also covered will be how to integrate these applications with MLOps frameworks, and how to design for zero-downtime architectures as well as global scale multi-region.
The recommendation algorithm is not new for the modern apps or platform business. However, with a chat feature and mobile-first strategy, Hirect is creating a new engine for job marketplace - just like the engine behind the refreshing user experience of Tiktok. Based on the algorithm, Hirect can not only gives a better distribution and matching of jobs and candidates list, giving more exposure to small business, breaking the domination of the top 10% of the giant companies from the traditional paid-ads promotion model but also react instantly to users' feedback and activities.
Large language models grow increasingly capable of producing text that is indistinguishable from human written text. Bad actors are able to leverage these text generation capabilities to quickly and easily generate spam or bypass spam filters. Learn different techniques Stream is exploring to catch machine generated text in order to increase our spam detection capabilities.
Testing in production used to be a joke. In fact, it was a popular "Most interesting man in the world" meme. But as life often imitates art, this meme has become reality. As it turns out, the best tests to learn from are the ones that match production. So when looking for feature flag solutions, developers and software delivery teams find themselves looking for ways to test their code and deployments in prod!
In this talk we will dip our toes into the world of feature flags. We'll begin with an overview of what feature flags are, how to think about them, and why both engineers and business users find them valuable. In addition, you’ll also learn about how to get started with feature flags, and the key things to look out for once you "Do it live!" .
I just wrote some code that can have a positive effect on our customers and I’m motivated to release it as quickly as possible. I need your help but you are busy and motivated to continue working on your own code. I call this conflict The Pull Request Paradox.
This problem is not theoretical - it effects most developers every day. The average pull request takes 4 days to merge from when it's opened and half of that time is idle time. Which means every PR sits idle for two days on average! That idle time reduces our code quality, kills our flow and makes it really hard to plan our sprints accurately.
In this talk I'm sharing:
* New ideas to to merge your PRs faster based on analysis of 733K PRs from 26K developers
* Why asynchronous is NOT better than synchronous when it comes to PR code reviews
* Context you can add to your pull requests to get it reviewed by your team 5X faster
* How idle time in PRs reduces situational awareness and increases cognitive load
* Why the time of day you open your pull request effects how quickly you merge
In case you haven't heard, relational databases are the new hotness. Why? Distributed SQL. Wait, distributed what now?
Distributed SQL databases are relational databases engineered with a distributed architecture to scale out on commodity hardware, on premises or in the cloud…without any trade-offs. These databases retain standard SQL, ACID transactions and strong consistency while adding unprecedented levels of scalability. But that's only the tip of the iceberg.
In this session, you'll gain an understanding of the fundamental concepts of distributed SQL and get a quick look at MariaDB's new distributed SQL implementation, Xpand. Using MariaDB Xpand we'll take a more pragmatic look at how distributed SQL takes database elasticity, scale and high availability to the next level. Then, diving deeper, you'll be introduced to the novel concept of MariaDB's columnar indexing with distributed SQL, and how it can be used to dramatically improve the execution speed of analytical queries on massive datasets.
With today's distributed work environment, running a modern agile organization requires a modern approach. No longer can projects live in their own space and be measured by their own goals. From automations to communications, measurement and more, today's successful development teams are leveraging modern tools and all-in-one productivity platforms to better plan their agile projects and seamlessly collaborate with all teams across their organization. In this session, ClickUp's strategic solutions engineer Devin Stoker will break down the keys to successful modern Agile planning and show how many global development teams today are adapting to the future of work.
Secure software development isn’t always a top concern to the business unless you are in a highly regulated industry. Today, time to market is often more important than security, increasing the value of the product that you sell with continuous improvement and quick software releases. To create and maintain a lead on the competition, you have to be really good at Agile and DevOps.
A potential scenario: the security team has called an emergency meeting. A new vulnerability has been publicly disclosed that impacts not only your software, but your company and your customers. Will the required remediation take hours or even weeks to complete? It depends on your preparedness.
To improve your readiness and reduce impact, we will look at tips and actions you can take now.
1. Learn more about the scope of the mess that was created by the Log4j CVE.
2. Why most companies struggled to address it quickly.
3. What steps you can take now to be ready for the next one.
The buzz about quantum computing has been rapidly increasing lately, and a growing number of developers have been looking into the subject. Concepts developers typically find challenging after cursory investigation of quantum computing include: superpositions of quantum bits (qubits), quantum gates, quantum entanglement (Einstein’s “spooky actions at a distance”), and the relevance of Schrödinger’s famous cat.
In this workshop, James Weaver gives a gentle introduction to quantum computing, followed by leading the participants in hands-on activities that leverage IBM Quantum simulators and computers.
The business demanded rapid innovation. Software development and IT figured out how to provide it. But now we have a whole host of new problems. In the resulting world of cloud-native apps, microservices, and API-driven applications, what we came to rely on for keeping it all running and secure is no longer enough.
In this new fog, we are basically “flying blind”. Modern applications are extremely hard to secure and protect as they are complex and continuously changing. Our visibility of what we have, how it is behaving, and how it is being used (and abused) has diminished tremendously. So how do we begin to see through the fog once again?
In this session you’ll learn:
- Why are we flying blind
- 4 key areas to focus on to stop flying blind
- A way to get started quickly (for free!)
Having good reliability means that incidents are nothing special, merely variations of our regular work. Such a perfect dream of Site Reliability Excellence means that there are clear paths to expertise and common grounding between teams happens frequently. To make this vision a reality, we run an open session at Blameless that builds on musical traditions of improvisation. Inspired by western jazz and Indonesian percussion orchestras, our weekly session seeks to build group intuition through a discipline of iterative collaboration. In this talk I introduce our approach to continuous learning, Practice of Practice Gamelan.
What we've created is an opportunity for coming together in a collaborative way without the anxiety of performing under pressure. We share mental models through the telling of stories, playing of games, and riffing of ideas. Different areas of our socio-technical system are explored as seen through different eyes. By learning about how our coworkers view the system we operate together, we continuously build new connections through our newly shared perspectives. We not only learn how our teammates strive towards Reliability Excellence in their daily work, we also reduce unknowns about the system itself, giving us more flexibility to adapt around inevitable ambiguity. Come see how we want incidents to be just another time to get together and jam about some fascinating part of the system that has suddenly revealed itself as a wrong note we can learn by.
Learn how developers can use Synopsys® Code Sight™ plug-in to quickly find and fix security defects in source code, open source dependencies, IaC and more, without leaving the IDE. It’s easy to try, and provides quick time to value. It helps them write better code, fix issues before code commit, and avoid costly rework caused by issues not found until downstream testing.
With testing and new releases, errors are going to creep through the cracks and new debugging approaches are needed. Nick Hodges, Developer Advocate at Rollbar, will uncover the 4 main insights that are transforming the ways we approach debugging to help return more productive time to developers.
Traditional monitoring and observability platforms continue to support the same approach: DevOps and SRE teams must centralize logs, metrics, and traces before they can start to analyze them. Faced with exploding data volumes, teams dependent on these platforms are left trying to predict which systems and datasets to monitor and centralize. What doesn’t meet the bar gets neglected or discarded altogether. You shouldn’t have to compromise data visibility to stay within budget. In this session, Edge Delta CEO and Co-Founder, Ozan Unlu will break down Edge Observability -- a novel approach to observability that aims to solve this issue. You will learn how DevOps and SRE teams can maximize visibility, optimize costs, and respond to issues orders of magnitude faster.
Implementing a search experience for a single database of content can be straightforward. However, many companies operate several distinct websites that each feature important content for their customers. For example, your marketing site, product documentation library, developer hub, and community portal may all use separate content management systems, possibly managed by different teams.
If each site has its own isolated search experience, then the information from each is siloed. As a result, your customers may not find what they're looking for when they visit one of your web properties. Or, your users may find a helpful article, but they may not be exposed to some of your other content that's relevant to their query. If you create a combined search experience that incorporates the content from each of your sites, you can address both of these problems.
This talk presents a solution for a federated search experience. The federated search will serve a content library that spans disparate content types and databases. This issue was tackled by Linode during a redevelopment of the Linode Docs website (https://www.linode.com/docs) in 2020. The presented solution is powered by Algolia. The talk will outline the technical architecture for our Algolia search indices, how they are queried, and how they are kept up-to-date with the content present in each of our web properties.
Finally, once you have implemented a federated search experience, the search backend can also be used to power interesting non-search navigation for your sites. For example, the Linode Docs site features a tree navigation that includes all of the content that we offer. The talk will explore how this was accomplished.
Magic is more than just a plug-and-play passwordless auth that enables a delightful onboarding experience for end-users.
Instead of usernames and passwords, Magic uses blockchain-based public and private keys to authenticate users under the hood. A decentralized identifier is signed by the private key to generate a valid authentication token that can be used to verify user identity.
Traditionally, usernames are publicly recognizable identifiers that help pinpoint a user, whereas passwords are secrets that were created by the user and are supposed to be something only they know.
You can think of public and private keys as materially improved versions of usernames and passwords. The public key is the identifier and the private key is the secret. Instead of being created by users and prone to human error (e.g. weak/reused passwords), the key pair is generated via elliptic curve cryptography that has proven itself as the algorithm used to secure immense value sitting on mainstream blockchains like Bitcoin and Ethereum.
Using blockchain key pairs for authentication gives Magic native compatibility with blockchain, supporting over a dozen of blockchains. This enables web3 developers to use Magic SDK to provide user-friendly onboarding experiences to mainstream users and tap into the potential of the rapidly expanding blockchain industry that is growing 56.1% year over year and projected to reach $69.04 billion by 2027.
The key pairs are also privacy-preserving (no personally identifiable information) and exportable. This allows user identity to be portable and owned by users themselves (self-sovereignty). The world is already moving towards this direction with novel solutions from companies like Workday and Microsoft.
As a first step, we are committed to enabling a passwordless future, by providing developers with the easiest way to integrate passwordless login methods into their apps, but having blockchain key-pairs actually connects us to other future-proof infrastructure such as IPFS for decentralized user identity data storage, which will pave the way towards worldwide adoption of decentralized identity.
If you want to see just how seamless both the developer and user experiences are with Magic, or you want to learn how Magic plans to onboard the next billion users into web3, do not sleep on this talk.
A well-crafted container or kubernetes avoids using excessive privileges, shipping unused packages, leaking credentials, and will expose a minimal attack surface. By removing known risks in advance, you’ll reduce security management and operational overhead; however, not everything can be known and prevented in advance. You cannot forget about security since the container is running.
Join this session to gain clear direction on how to:
- Image build and apply Dockerfile best practices
- Reduce the attack surface and optimize size for distribution using multistage builds
- Manage threats and vulnerabilities, like log4j
Developers know what they want and don’t want. And we are pretty sure they don’t want ops. The world is becoming serverless…Including the database.
In this session, we will deliver a deep-dive exploration into the internals of a serverless database, exploring the following, and more:
- How to automatically scale your workload with zero downtime
- How Raft and MVCC are used to guarantee serializable isolation for transactions
- How Cockroach automates scale and guarantees an always-on resilient database
- How to tie data to a location to help with performance and data privacy
- How to only pay what you use and never overspend
CockroachDB - a Distributed SQL cloud-native database designed for consistency, resiliency, located data and scale - is the core of CockroachDB Serverless. We’d love for you to join us and see how it works!
Roughly 60% of stream processing is spent doing mundane transformation tasks like format unification for ML workloads, filtering for privacy, simple enrichments like geo-ip translations, etc.
In this session, we will show you how easy it can be to do streaming data transformations while also eliminating data ping-ponging between storage and compute — thanks to Redpanda’s built-in support for WebAssembly (WASM). We’ll share best practices for data transforms using Redpanda, our Kafka API-compatible streaming data platform.
We will also cover:
- Overview of Redpanda and our WASM architecture
- Example use cases for data transforms
- Live demo of data transforms
Cadence is an exciting new technology open sourced by Uber in 2017 and that is a foundation technology for Uber and several other leading tech companies. Cadence makes it easier and much more efficient to develop and operate long-running, highly reliable process-based business logic (or workflows) at the highest levels of reliability and scale.
This session will explain the basic concepts of Cadence by walking through some simple code examples, discuss how to determine if your use-case is a good fit for Cadence, and outline some considerations for the successful adoption of Cadence in your organization.
It has never been more important to build secure applications from the ground up starting with developers implementing the DevSecOps framework. One facet of DevSecOps is building code that emits high quality telemetry so development teams can deliver new software and services at agile speed without compromising application security. In this session, Cribl technical evangelist Ed Bailey, will discuss three ways to instrument applications at the code level to give operations and security observability platforms enhanced data to provide next level fault detection capabilities that are not otherwise available. We have never seen a more challenging environment to monitor and secure modern applications and advanced telemetry based observability is the only way to meet this challenge.
Wednesday, February 9, 2022
Observability has never been more important: kubernetes and distributed architectures are necessary, but they make it harder and harder to answer basic questions about system behavior. The conventional wisdom claims that Metrics, Logging and Tracing are “the three pillars” of observability… yet software organizations check these three boxes and are still grasping at straws during emergencies.
In this session, we’ll examine how we got ourselves into this predicament, and how to get ourselves out of it. We will talk briefly about the theory and then illustrate more elegant and modern approaches to common observability problems using live demos.
Spinning up exact copies of your application in multiple regions is as easy as git commit and git push. Now security policies and decisions for these applications can be just as easy. Learn how to extend your GitOps workflow to include policy-as-code. By using Open Policy Agent to write your application policy and security, you can have the benefits of GitOps for your security policies.
The rest of your application has moved to cloud-native; now it's time your application and security policies do as well. Long gone are the days of programming servers one by one. Infrastructure is now all push-button deploy powered by configurations that live in Git. The next logical step is to commit the security decisions that protect these systems into Git repositories. Becoming very popular over the last few years, GitOps has standardized application and infrastructure management processes. Within GitOps, smaller branches are starting to emerge to handle specific areas of your application. With tools like Open Policy Agent (OPA), we can define application and infrastructure security policies using Policy As Code and commit them to Git.
OPA is a general purpose policy engine that comes with a custom built dedicated policy language called Rego. Rego allows you to declaratively state the intent of your security policies using human readable expressions. It comes equipped with over 150 built-in functions tailor made for policy authoring. Together OPA and Rego allow you to supercharge your Policy As Code workflow in a Cloud Native way.
Join this talk to gain a general understanding of what policy-as-code is, the benefits in adding it to your application workflow, and see some examples of everyday use cases implemented with OPA and Rego.
So you want to be a cloud company? Making the jump to being a cloud-native rather than just a company who runs their product on the cloud requires deep changes throughout the organization. You'll need to change how your teams work together, how they think about the software development lifecycle, who you hire, how you approach reliability, and your relationship with your customers.
This talk goes through the prerequisites for becoming a cloud native company, addressing how to change not just what you do but how you do it, giving examples of other companies who have been through a similar transition. The speaker, Jordan Tigani, is a veteran who helped create one of GCP's first and most successful cloud products, and has helped SingleStore make the transition to a cloud-native company.
Good user experience requires a well performing frontend application. Code observability on a frontend application—to understand errors and their relevancy, performance of transactions, and Web Vitals to quantify website quality—is complex. By attending this session, you'll learn more about the tools that are available to aggregate and organize relevant frontend data to provide necessary visibility on errors and performance to keep users engaged.
OPEN TALK: How Beta Testing Can Support Automated Testing to Help You Release Better Mobile Apps FasterJoin on Hopin
53% of users have reported uninstalling or removing a mobile app with issues such as errors and freezes. As developers, a critical bug making it through to your end users, in turn leading to customer and revenue loss, is one of your biggest nightmares. Especially, if you never got this feedback from real users, during testing.
When application performance and stability can make or break your business, how can you prevent bugs from reaching end-users and deliver the best possible mobile app experience, every time? Well, part of the solution lies in completing your automated testing strategy with mobile app beta testing, to help you quickly deploy beta versions of your apps, get critical real-user feedback, and iterate at a faster pace.
Join Wim Selles, Lead Solutions Architect at Sauce Labs, as he discusses how you can address the key challenges inherent to mobile app development by optimizing your beta testing processes. Wim will demonstrate how a developer-centric mobile testing solution can enable you to improve both the quality and release velocity of your mobile applications.
You will take away:
- How seamless access to mobile beta testing capabilities can help you take your mobile app development to the next level
- How to implement beta testing best practices, including finding the right beta users, enabling them to report more bugs faster, and getting the most value of bug reports
- How to streamline your iOS and Android app distribution, and optimize your mobile app beta testing processes to shorten app development cycles
CI/CD success comes with iteration and continuous improvement. Harnessing the power of logs from the CI/CD process can be key to driving improvement. In this session we will demonstrate an easy path to bring CI/CD logs from Jenkins (or any platform utilizing cloud object storage in AWS or GCP) to drive success with CI/CD.
During the demonstration of the ChaosSearch Data Platform, we’ll share how you can easily access and leverage:
Velocity and Trends of CI/CD progress
Build failure trends and debugging
Visualizations & Dashboards
Alerts and Integration opportunities
There is a widespread belief that fixed bids are not a good fit for Agile. Agile advocates flexibility. Agile principles help projects adapt to changes based on changes in priorities or market conditions. However, fixed means something that cannot be changed. Another common belief is that if we follow Agile with a fixed bid, we need to make sure the scope is crystal clear. In today’s fast-changing world this approach to project scope can significantly reduce the value a customer or a user gets when a project is delivered.
Do we know Agile can be a great fit for fixed bids?
In this session, Rohit will talk about a few tweaks that will not just make your fixed bid projects successful but can also make your project teams thrive in an Agile environment. He will share his experience on why Agile is a great methodology for fixed bids.
According to Product School’s annual State of Product Report, more than 45% of product managers say prioritization is their biggest challenge faced.
Backlog prioritization can feel like an ongoing rat race where you’re juggling a myriad of inputs and trying to keep up with demands. And yet, PMs are challenged to be the CEOs of their product and think strategically and proactively.
According to a study by Workato, a leader in enterprise automation, two-thirds of product managers report concern over managing their integration backlog and the volume of integration requests they receive.
Fortunately, product managers can have it all by leveraging the Workato Embedded Platform. Learn how the solution can help you become the hero CEO of your product and efficiently tackle integration requests that save engineering resources for building core product features, all while driving new revenue for your product.
Qt is widely recognized as a premier development framework for native, cross-platform applications and devices. But do you know what else is cross-platform? The web! Join us to see how the latest version of Qt supports the WebAssembly standard.
While the age-old choice between native vs. HTML5 development solutions will never be straightforward, we’ll show you how there can be overlap. We’ll also take a look at how you can leverage the latest Qt enhancements to expedite cross-platform deployment.
From your bank account to your email, APIs power your digital experiences. According to a survey by RapidAPI, 96% of developers are using more APIs in 2021 than in 2020. Are you planning on building internal APIs to be used just within your organization or external APIs for your mobile app? Whatever your API goals are, you need an API gateway to handle incoming traffic. API gateway deployments are a leading use case for NGINX Plus, our commercially supported offering based on NGINX Open Source.
In this webinar we cover what APIs and API gateways are, and how to configure and secure your API gateways using NGINX Plus and NGINX App Protect. We demo how to deploy NGINX Plus as an API gateway, and show how to secure the API gateway by using encrypted JSON Web Tokens (JWE) and importing an OpenAPI spec to NGINX App Protect. In the Q&A we answer your questions about deploying and securing your API gateway.
OPEN TALK: Fake Your Data: Mimicking Production to Maximize Testing, Shorten Sprints, and Release 5x FasterJoin on Hopin
Raise your hand if you’ve ever written a script or built a tool to generate test data for your staging environment. Keep your hand up if it was fun. And easy. And still works. If your hand (and shoulders and morale) fell, rest assured you’re not alone. Now for the good news: help is here.
With the increasing complexity of today’s data ecosystems and the expanding reach of privacy regulations, generating useful, safe test data has become more difficult and riskier than ever. An effective test data solution must work across a variety of database types and de-identify production in a way that ensures privacy. Challenging? Yes. Attainable? That, too.
Technologies now exist that integrate directly into your data ecosystem to create test data that looks, acts, and behaves just like your production data. By hydrating QA and staging with useful, safe, fake data, dev teams are upleveling testing, catching bugs faster, and shortening their development cycles by as much as 60%. Data mimicking sets a new standard of quality test data generation that combines the best aspects of anonymization, synthesis, and subsetting.
Explore these technologies in a live demo and discover how to use them to:
- Maintain consistency in your test data across tables and across databases
- Subset your data from PB down to GB without breaking referential integrity
- Achieve mathematical guarantees of data privacy
- Increase your team’s efficiency by 50%
- Realize 5x more releases per day
We don't usually set out to write a monolith...but it happens. With changes over time, and limited resources to refactor, our application can turn into a "legacy monolith" that runs for years, and years, and that we all dread working on! In this session, learn about the AWS Microservice Extractor for .NET and how it can help you identify and extract parts of your application into services. Transforming your monolithic applications into smaller, independent services makes them easier to scale, more efficient to operate, and faster to develop, accelerating time to market for new features. Then go a step further to re-platforming to ASP.NET Core running on Linux, by adding to your tool chain the Porting Assistant for .NET. Come and learn how!
In a world of tech debt, shadow IT, app sprawl, and reliability—the concept of "scale" can quickly spiral into speculative decision making, complete re-writes and delays in delivering customer value. While planning for growth is key for any organization, the methodology around how (and when) to scale an engineering org can be much more opaque. In this session, we'll cover the 4 P's of Pragmatic Scaling - People, Process, Product & Platform, and how to ensure you're maximizing the productivity and efficiency of resources through hyper-growth.
Join Shailesh Kumar, Sr. VP of Engineering, as he shares his customer-centric approach to engineering that helped scale ClickUp's platform from zero to over 800,000 teams in just four years.
Scaling design is not about throwing more designers at the problem. Scaling design effectively is about operationalizing design, aligning closer with the principals of DevOps. How do we enable product teams to successfully deliver useful and useable products to their customers. This is an evolution that they call DesignOps2.0
Nearly everything a product team deals with impacts UX. Traditional development issues like availability and latency have a significant impact the user’s experience. When viewing the problem through this lens; the entire product team is responsible for the user experience and needs to be accountable for it, not just the UX team.
Erica will discuss the philosophy and end to end methods her team has developed around DesignOps2.0 and where they are heading from here.
• Establishing tools and an environment that empowers product teams to deliver useful and useable products
• Gaining a common understanding with product teams around what impacts the user experience and who is responsible.
• Holding engineering and product teams accountable for delivering a good user experience.
OPEN TALK: IBM Developer Technology Sandbox and IBM API Hub - Removing Barriers to Exploring Technologies for DevelopersJoin on Hopin
Before taking a car out for a test drive we don’t expect to be given instructions and a box of parts and be told to build it first. Most of us expect to be handed the keys and told “let’s go!“. The same should be true when we are kicking the tires on new tech to build your next application. IBM Developer Sandbox was created with that experience in mind. This session will use micro-solutions built around IBM API Hub services and other products, and made available through our developer sandbox to create a new way to explore technology from IBM and our ecosystem partners.
If you work in an organization that uses open source to develop applications, by now you are probably aware of the recently disclosed vulnerability in log4j, commonly being referred to as the Log4Shell vulnerability.
Virtually every organization that uses Java (Maven/Gradle) uses log4j and has likely been impacted. According to data tracked by Tidelift, log4j-core has over 3,600 dependent packages in the Java language ecosystem and over 20,900 dependent software repositories on public code collaboration platforms.
Tidelift solutions architect Sean Wiley breaks down the current Log4Shell situation and shares tips for remediating the issue—including ways Tidelift can help your organization prepare for the next zero day vulnerability.
Context is a crucial component of moving from Monitoring to Observability. Attaching rich context to application tracing allows us to answer fundamental questions required for true Observability, like "What changed?" In this talk, we'll discuss what context is, how it's applied, what problems it solves, and what challenges it presents.
Embedding security into DevOps practices is critical for enterprises making the transition into Secure DevOps. The Secure DevOps evolution is enabling continuous security which is achieved by shifting left to the development team. Market leading application security tool HCL AppScan makes is simple for developers to scan in every stage of the process with DAST SAST IAST capabilities.
Learn how with market leading tools and the right approach, you can build applications securely, without compromising speed.