Troy Hunt explain how to discover the vulnerabilities of one’s own APIs, identifying common security anti-patterns.
Paul Fremantle explores the challenges of security for IoT, including reviewing some existing attacks and predicting others, hardware, software, network and cloud attacks.
Kate Carruthers overviews some of the privacy challenges and security issues introduced by the Internet of Things.
Colin Mower discusses the challenges met using together Cloud, Big Data, Mobile and Security and how these can work together to achieve business value.
Julien Vermillard discusses challenges in IoT security regarding hardware, upgrade, transport, credentials, and cloud.
Steve Smith discusses why Release Testing is an anti-pattern, and offers an alternative risk reduction strategy.
Ward Cunningham discusses the designs goals of a federated wiki.
Matt Barcomb shares practical ideas for generating and validating projects as Real Options, using value models and risk consideration to create a framework for prioritization and decision-making.
Adib Saikali describes the best practices for building back-end services to support sophisticated single page apps using Spring 4. It contains demo code examples.
Mark Reinhold keynotes on Java 9’s impact and features –platform module system, security, performance, maintenance-, and speculates on what might come after that, including the Java VM.
Andrea Burbank discusses the risks, benefits, and lessons from running a single huge experiment with hundreds of moving parts, and with long-term engagement as the metric of success.
This talk shows what Spring Boot has to offer the web developer out of the box: content negotiation, internationalization, view templates, security, messaging with websockets, etc.