Josh Long introduces some of the latest Spring features supporting HATEOAS-compliant and OAuth-secured REST services, NoSQL and Big Data, Websockets, OAuth, open-web security and mobile.
Alex Raitt, Clive Saha present design patterns and use cases of capital market firms that are incorporating big data technologies into their credit risk analysis, price discovery or sentiment analysis software. They also discuss various technology stacks and their advantages, including batch-based processing, real-time analytics, and NoSQL systems.
Paul Fremantle discusses using WSO2 Identity Server for a federated identity for the Internet of Things.
Chris Risner demos an Android app built with Azure Mobile Services using structured data stored in the cloud, GCM push notifications with a single line of code, authentication, security and others.
Darren Hobbs shares lessons learned building polyglot systems, the technology choices made. mitigating risk and delivering value.
Paul Simmonds discusses the importance of identity and attribute information that will define how access to the functionality and how data is governed by applications in the near future.
Frank Breedijk addresses security concerns raised in a DevOps environment that practices continuous deployment.
Joe Kuemerle discusses some of the top threats that can break an app along with techniques to improve the design of an application to minimize vulnerabilities and mitigate what cannot be removed.
Graham Steel takes a look at some of the cryptographic standards whose security is the subject of speculation and tries to separate rumor from fact. Then he examines some of most widely encountered crypto APIs, evaluating them on two important axes: facilities for flexible, secure key management and provision of modern cryptographic primitives.
Caspar Bowden discusses about duplicity, the impact of Snowden's revelations on the society and what can be done about trust today.
Tim Lister presents the advantages—and the dangers—of practicing risk management in an adult-like fashion, offering a process for tailoring an organization and discussing how an organization can grow up.
Robin Wilton wonders what are the real costs, risks and economics of digital footprints, and what - if anything - can be done about it? This session examines these issues and makes some practical recommendations about how to understand and manage one's digital footprints.