Sastry Malladi presents different ways used by the industry to implement a RESTful SOA, detailing how eBay did it in order to achieve performance, and what lessons can be taken from that.
Roger Bodamer talks about consistency models in NoSQL databases and how they compare to traditional RDBMS solutions, showing how different products deal with replication, multiple copies of information, consistency, failover, high availability.
Randy Shoup discusses the need for a new programming model targeted at the cloud, covering topics such as state/statelessness, distribution, workload partitioning, cost and resource metering, automation readiness, and deployment strategies.
Thomas Enebo explains the basics of JRuby, showing what’s different from Java, how Java and JRuby interact with each other, and some examples demonstrating the usefulness of a complementary language.
Mark Miller on how E and Caja influenced the EcmaScript 5 standard so it can be a secure language, enabling the creation of safe mashups, and how Dr. SES enables secure distributed computing.
Leonardo Mattiazzi considers that Scrum and XP do not necessarily create a great product, and complementary Lean principles and practices are necessary to create an Agile culture across the entire enterprise in order to succeed.
Kresten Krab Thorup emphasizes existing problems with the Java concurrency model, explaining when to use Erjang, a JVM-based Erlang VM, built around the process and actor concepts.
Dan North argues that Agile best practices can help an organization only to a point, and continuing to rigidly apply them after that will stifle innovation and drive people away. Organizations need to continue to innovate, finding new ways and practices to develop software by looking at the motivations behind Agile practices and not just implementing them.
Dan Ingalls presents his journey through the world of software developing a number of core technologies over the last forty years, explaining what brought them forth and why they are fun even today.
Vaughn Vernon advocates using DDD’s strategic modeling patterns when integrating services in a RESTful SOA implementation, avoiding one of SOA’s pitfalls: focusing on services rather than the domain.
Ryan King presents how Twitter uses NoSQL technologies - Gizzard, Cassandra, Hadoop, Redis - to deal with increasing data amounts forcing them to scale out beyond what the traditional SQL has to offer.
Collin Jackson discusses ways to enforce browser session security against threats such as Cross-Site Request Forgery and various network attacks – eavesdropping, corrupt traffic, fake certificates – using Local Storage and Strict Transport Security.