DeveloperWeek PRO STAGE A
Monday, February 7, 2022
This is the story of using Virtual Assistants like Alexa, Google Assistant, or Bixby alongside Voice and Video AI on mobile and web devices for good!
The building of Project Enabled Play - a platform built in .NET that enables users to turn their voice into gaming controller on any platform they have access to. Come learn about scaling applications in .NET to over a dozen different platforms and channels while building for accessibility to even the playing field. Gain an understanding of voice and conversational platforms, real-time communication technology, and best practices for sharing code and going from PoC to product.
Try your shot at landing a win in Call of Duty, Fall Guys, Minecraft, and more using your voice, then leave with a working knowledge of other ways you can use .NET and the tools you're familiar with.
It’s well known that blockchain offers significant promise to enterprises. What’s less well known is that the development of most enterprise use cases get stuck due to the challenges of new Web3 programming models and to tackling the multi-party data flows, tokens, privacy and more. The blockchain itself accounts for just 5-10% of a multi-party business process, while cross-party data flows make up as much as 75% of the solution.
Learn how to build digital assets and multiparty systems for enterprise data flows, powered by blockchain. Leverage enterprise APIs and services to build blockchain apps for enterprise radically faster by allowing you to focus on business logic instead of low-level web 3 plumbing.
In this workshop, we'll give a brief introduction to Kaleido platform and Hyperledger FireFly open source technologies and how these can rapidly accelerate the adoption of blockchain technology in the enterprise arena. The workshop will also feature hands-on-keyboard use of FireFly APIs to help developers get started building.
Ever thought about building an app store for your own platform? With the evolution of no code automation tools, having an external plugin system might mean endless possibilities and usage with just 1 click directly within the platform you've created yourself.
In this talk, we'll the covering the story of how Rocket.Chat built it's own open source Apps Engine on top of the NodeJS architecture, with the help of the Node.js VM module - a module that can do wonders in creating an isolated space or a virtual machine for external apps to run within your own server, giving you a way to have external plugins interact with your platform.
One of the unique advantages of the open source Rocket.Chat platform is the ability to self-host it in an air-gapped environment. This allows our users to really own their data by keeping it safe inside their own infrastructure. This premise could not be hindered by our framework, though; we wanted all our workspaces to have access to Rocket.Chat Apps without needing to leave the comfort of their intranet. This prompted us to follow the rather "uncommon" path of having those apps running inside a Rocket.Chat server.
In this talk we'll be covering a masterclass on Node.js VM module alongside our experiences, learnings, achievements and failures around it.
Eleventy is a Node-based static site generator that is extremely flexible. In this talk, I'll introduce the project, go over it's major features, and talk about how to use it to build static sites that incorporate dynamic data.
After this session you'll not only be able to start implementing feature flags, but you'll also want to separate your releases from your deployments. You will have an understanding of - What feature flags are - The types of feature flags - Best practices around feature flags - Implementing feature flags using - Feature Toggles- Azure Application Configuration - Launch Darkly
We can easily trick a classifier into making embarrassingly false predictions. When this is done systematically and intentionally, it is called an adversarial attack. Specifically, this kind of attack is called an evasion attack. In this session, we will examine an evasion use case and briefly explain other forms of attacks. Then, we explain two defense methods: spatial smoothing preprocessing and adversarial training. Lastly, we will demonstrate one robustness evaluation method and one certification method to ascertain that the model can withstand such attacks.
Tuesday, February 8, 2022
Context switching between your IDE, GitHub repo, JIRA, Terminal and Slack is no way to optimize developer collaboration and it results in countless hours of distraction and lack of focus, hurting code quality. Team alignment and productivity depend on just the right mix of collaboration and staying in the zone. At the same time, developers are hindered by lack of visibility into the performance of applications across the entire tech stack. In the future, development teams must be able to troubleshoot their tools in context, integrate telemetry and observability as part of the workflow, and work with engineers on debugging as part of the collaboration. Here we will discuss how such an integration should happen, and we will spell out the benefits that accrue to the individual developer, the team and the organization.
Developers are under increasing pressure to build and ship applications quickly and then add new features consistently to boost user engagement and grow competitive advantage. Moving fast always comes with risks but since moving slow isn’t a popular option, how can development teams ship code with speed whilst strategically managing the risks?
Progressive delivery is a modern way of developing, testing, and deploying code, which allows development teams to make data-driven decisions throughout the software delivery lifecycle, from pre-production to production.
Join Ivan Diaz, Manager of Solutions Engineering at Bugsnag, a SmartBear company, to discuss how development teams should be thinking about progressive delivery.
Register for the session to learn more and ask questions!
A healthy development team is critical to the success of any technology-led organization. Companies around the globe are not only dealing with a competitive talent landscape but also a technology skills gap that has worsened since the start of the COVID-19 pandemic. But once you find the right talent, how do you nurture, retain, and keep them successful? Lilac Mohr shares key learnings on what a healthy team looks like and teaches best practices to find opportunities and areas of improvements to keep your team healthy, productive, and successful.
As companies migrate to more resilient cloud infrastructures, threat actors continue to turn their attention to the application landscape as the new entry point for compromising systems.
Despite cyberattacks happening at a pace of every 39 seconds, only 3% of U.S. bachelor's degree graduates have cybersecurity-related skills. While several factors play into this, the most glaring is that faculty just don't know about the security field, leading to gaps between academia and industry. Unfortunately the gap has gotten wider due to constant changes and growing toolchains in software development.
This is compounded by a consistent lack of employee training in secure coding principles and how it applies to the software development life cycle, causing new entrants into software development to be ill-prepared to build secure systems.
In order to continue to defend critical assets and infrastructure in rapidly evolving cloud-centric environments, secure coding principles need to be adopted not only within corporate environments but in the classroom, ensuring that the next generation of developers can build experiences that are not only engaging but also secure.
This session will delve into:
The growing security challenges developers face today
The current perceptions of “security” within the developer community
The need for secure coding education at the university level
Opportunities for learning secure coding in educational and corporate environments
This interactive presentation reviews the four distinct schools of thought that have emerged in product management and their impact on the product manager role.
High performing distributed/remote teams require a concerted effort to remain productive, healthy and happy while continuing to operate with excellence. In this talk, we will talk about how to set the right metrics to measure productivity and refactor team design, day-to-day work, onboarding process with a goal to stay nimble through constant changes to work environments, needs of the customer and a rapidly growing cloud native distributed software stack.
So you’re ready to hire someone to help with user experience. You’ve identified usability issues with your sites, apps, or other software products, and need someone to help fix them, a single usability professional to “do UX”—whatever that means. I’m sorry to tell you, this person does not exist. And, if you try to foist all of your usability problems onto one professional, you will not get the rainbow-filled success you’re hoping for.
While UX professionals might be pretty magical beings, no one person can juggle all of the areas of expertise needed for top-tier user experience. Having a full, well-rounded usability team is always ideal. But we don’t live in a world of unicorns or ideals. You may only be able to get the budget, resources, or go-ahead for one UX hire.
If that’s where you’re at, not all is lost. You can still create more useful, usable sites and apps with a single, strategic UX hire. To make this work, you’ll need to focus less on one person to do all things UX and more on how your lone UX pro will fit into the team and skillsets you already have.
Attendees will walk away being able to:
1. Make an honest assessment of their team’s strengths and weaknesses.
2. Understand the value of embedding UX in their existing team structure.
3. Take concrete steps towards happier users and improved success online.
With the explosion of various developer tools and services in recent years, it's tempting to think that we've entered a golden age for software development productivity. However, contrary to popular belief, developer productivity is in fact declining, and this phenomenon risks bringing modern software development to a grinding halt in many organizations. In this talk, Nnamdi Iregbulem, Partner at Lightspeed Venture Partners, reveals a framework for thinking about developer productivity and charts a path toward reversing this dire trend.
As web performance and user experience across both mobile and desktop devices continue to increase in importance, so do progressive web apps (PWAs). PWAs are becoming more popular because they have lots of enhancements that help your application perform better and they make apps accessible even to users with limited internet connection. In this talk, you are going to learn the advantages of using PWAs and how to turn your web application into a PWA.
Wednesday, February 9, 2022
While APIs have clear and obvious benefits, they’re also creating a rapidly-growing attack surface that isn’t widely understood and is sometimes completely overlooked by developers and software architects. With recent reports suggesting that by 2022, API abuses will be the most responsible vector for data breaches within enterprise web applications, securing them is a top challenge and must be a bigger priority.
The first step in accomplishing this goal is generating awareness around the most critical API-related vulnerabilities and ways of protecting these programs.
This significant gap in knowledge drove me to spearhead the development of the OWASP API Security Top 10 list, which was officially published at the end of 2019, to inform organizations, developers, and security professionals about the top issues impacting API-based applications. Since deploying, it has been adopted as the de-facto standard by many organizations and security specialists.
In this talk, I'll emphasize the uniqueness of API-centric design from the security angle, highlight the risks presented by API use, and show why an increased level of awareness is required to mitigate the risks. From there, I'll dive into the top security risks presented in the OWASP API Top 10 list, and provide example attack scenarios for each. Finally, I will share what we can expect to see when it comes to API exploitation moving forward as modern software is increasingly targeted by adversaries.
So you have adopted an API-first, product-led approach and are trying to build well-designed APIs to meet your business needs. But as you are doing that you are quickly running into system complexity, management overhead, and increased cost of development. There are many design patterns out there but you are not able to choose the best one for your enterprise. Join this session to learn more about how to implement an API architecture that works, is simple enough to provide great ROI and ensures high performance, security, and reliability.
Open source software is the de facto standard for many new applications, this is especially true in the database industry. Currently, MySQL, PostgreSQL, MariaDB, MongoDB, Elastic, and others have shown up in every industry and organization in the world in some form or another. People are no longer choosing a single database for the company, they are letting developers and architects choose the best database for the job.
This has led to an increase in the number of technologies operations teams have to support. Couple that increases in technologies with a growing micro-service ( or cloud-native ) development paradigm where every service has its own database and where all the data is valuable.
Now companies are now faced with dozens of technologies, hundreds or even thousands of individual database instances, and petabytes of data. The management of the complexity of such an environment is changing the way we look at systems and operations.
Let’s talk about the trends and tell you what you need to know about how to manage the new multi-verse of data.
Is your API getting as much use as it could? Low code technology is emerging as a primary way to develop applications. In this session, we'll explore how you can innovate faster and unlock opportunities by integrating your API's with low code platforms.
I would like to talk a bit about Web 3.0 in this session. The what and how! A quick look at the stack, the current projects and why it matters.
Based on over two years of experience running a multi-cloud and multi-region Multi-Tenant SaaS Platform on top of Kubernetes, this talk presents the “dream Kubernetes distro” that SaaS providers need. Why can’t we have a distribution that is cloud vendor neutral, and is designed from the first install to be compatible with important third party services that deliver such things as observability, marketplace integration, self-managed and SaaS channels, CI/CD, and robust security?
Attendees will benefit by learning about important requirements to consider while designing their SaaS services to run on Kubernetes, and some insights into the providers and other options available to them today.
Over the years Kubernetes has become the de facto orchestration platform and it becomes important that developers have the right set of tools to increase their productivity for development and operations. In this talk, speakers will discuss the following tools:
- K9s: Kubernetes CLI to manage multiple clusters.
- lens: Open-source IDE to take control of your Kubernetes clusters.
- krew: Package manager for kubectl plugins.
- Okteto: Remote development environments, powered by Kubernetes.
- devspace: develop and deploy cloud-native software faster.
These tools not only accelerate the development workflow but also help to debug issues faster. You can improve your productivity by 10x using these tools and speakers will be showcasing demo for each one of them. In the end, they will also talk about their recommendations for working and developing with Kubernetes.
Challenges people face with Kubernetes
Introduction to different Kubernetes tools
Impact of Kubernetes development and day2 operations
How to improve productivity while working with Kubernetes
Working demo of what these tools have to offer.
Speaker recommendations to get the most out of these tools.
Common techniques protect data at rest and in transit. But what about while it is being processed? That’s what confidential computing aims to solve. Confidential apps run in secure execution environments called enclaves, isolated from the main processor. Data is encrypted at runtime and opaque to privileged users, the operating system, and even cloud providers.
Confidential computing is a powerful, emerging technology but requires some specialized knowledge to use it effectively. Tools and software are thus needed to make confidential computing more accessible and use it in cloud-native contexts.
This talk is for everyone looking for an overall introduction to confidential computing and the big ideas that make it special. Along the way we'll explore core concepts, explain what use cases can be tackled, and share the resources we've found most helpful for getting started.
Previously, HDR video capture was available only in high-end Cameras. With the launch of iPhone12 last year, HDR cameras has become accessible for common users, and HDR content is on the surge.
This has given rise to UGC HDR content, making it crucial for all online media platforms to support it seamlessly. In this talk, I will discuss what challenges online media platforms are facing in terms of capturing, backward compatibility, compute, storage etc.
With so many existing and emerging wireless technologies - 5G, eSIM /eUICC, and NB-IoT, one of the key decisions you need to make as an IoT product builder is - Which of these technologies are right for your current IoT initiatives? There are many (almost an overwhelming amount of) considerations - cost, coverage, bandwidth, impact on battery life, module availability, operational overhead and the list goes on. And you have many industry players steering you one way or another. This session will give you the guidance you need on how to prioritize these considerations and ultimately make a decision that will ensure a successful product lifecycle.
Understand the pros and cons of wireless technologies
Learn how to map each to your existing product needs
Take home a decision making framework for IoT project success