Julien Vermillard discusses challenges in IoT security regarding hardware, upgrade, transport, credentials, and cloud.
Steve Smith discusses why Release Testing is an anti-pattern, and offers an alternative risk reduction strategy.
Ward Cunningham discusses the designs goals of a federated wiki.
Matt Barcomb shares practical ideas for generating and validating projects as Real Options, using value models and risk consideration to create a framework for prioritization and decision-making.
Adib Saikali describes the best practices for building back-end services to support sophisticated single page apps using Spring 4. It contains demo code examples.
Mark Reinhold keynotes on Java 9’s impact and features –platform module system, security, performance, maintenance-, and speculates on what might come after that, including the Java VM.
Andrea Burbank discusses the risks, benefits, and lessons from running a single huge experiment with hundreds of moving parts, and with long-term engagement as the metric of success.
This talk shows what Spring Boot has to offer the web developer out of the box: content negotiation, internationalization, view templates, security, messaging with websockets, etc.
Gary McGraw keynotes on the internal forces and relationships active inside companies that drive them to success by managing to take ideas and transform them into technologies.
Colin Harrington warns that application security is not a concern that we can ignore. Vulnerabilities come from various angles, but it is important to stay aware so we can recognize and thwart threats
Jeremy Stieglitz discusses best practices for a data-centric security , compliance and data governance approach, with a particular focus on two customer use cases.
Rob Winch shows how to incrementally build security into an application, highlighting the new features in Spring Security 4 along the way.