Josh Long and Dave Syer focus on how Spring Cloud integrates service registration, declarative REST clients, messaging microservices with Spring Cloud Stream and much more.
Matt Stine introduces the basics of Lattice, a cloud-native application platform that enables one to run applications in containers like Docker, on a local machine via Vagrant.
Scott Frederick and Craig introduce the capabilities provided by Spring Cloud Services and demonstrate how it makes simple work of deploying cloud native applications to Cloud Foundry.
Emad Benjamin covers various GC tuning techniques and how to best build platform engineered systems; in particular the focus is on tuning large scale JVM deployments.
Mitchell Hashimoto shows how Terraform and Consul can be used together to easily deploy and scale large-scale containerized workloads using container runtimes like Docker.
Atlassian Hybrid Cloud/On-Premise Software Delivery and the Journey to 300,000 Applications in the Cloud
George Barnett discusses techniques for building the supporting infrastructure for a hybrid model, and how to make monitoring, deployment tools, and shared services work effectively.
Paul Payne explains the benefits of containerization of a Go web service, discussing testing, integration, canary deploys and how they achieve 20 minute development cycles with zero downtime.
Ken Dale demoes building, testing and deploying a project in the cloud using popular services and technologies.
Jerome Petazzoni explains in detail the advantages of immutable servers, then how to implement them with containers in general, and Docker in particular.
Georgi Knox conducts a hands on session overviewing the history of Linux, what the kernel is, what system calls are, how to write modules, how to build a kernel, etc.
Noopur Gupta shows how to get started with Java 8 in Eclipse, demonstrating how the new Java 8 constructs blend with the existing functionality in Eclipse.
Josh Bregman explores some of the security challenges created by both the development workflow and application runtime, why SecDevOps 1.0 is insufficient, and how SecDevOps 2.0 can help.