Adib Saikali describes the best practices for building back-end services to support sophisticated single page apps using Spring 4. It contains demo code examples.
Mark Reinhold keynotes on Java 9’s impact and features –platform module system, security, performance, maintenance-, and speculates on what might come after that, including the Java VM.
Andrea Burbank discusses the risks, benefits, and lessons from running a single huge experiment with hundreds of moving parts, and with long-term engagement as the metric of success.
This talk shows what Spring Boot has to offer the web developer out of the box: content negotiation, internationalization, view templates, security, messaging with websockets, etc.
Gary McGraw keynotes on the internal forces and relationships active inside companies that drive them to success by managing to take ideas and transform them into technologies.
Colin Harrington warns that application security is not a concern that we can ignore. Vulnerabilities come from various angles, but it is important to stay aware so we can recognize and thwart threats
Jeremy Stieglitz discusses best practices for a data-centric security , compliance and data governance approach, with a particular focus on two customer use cases.
Rob Winch shows how to incrementally build security into an application, highlighting the new features in Spring Security 4 along the way.
David Syer explores the new features in Spring OAuth2, providing guidance on what to use and when, and showing how easy they are to enable quickly.
The authors demonstrate the design and use of an environment for quantitative researchers building a market risk simulation first as a basic system and then adding a hypothetical systemic shock.
Sam McAfee focuses on quantitative risk modeling approaches exploring how to bring scientific rigor back into the Lean Startup process with Monte Carlo simulations and Cost of Delay scenarios.
CONTENT IN THIS BOX
PROVIDED BY OUR SPONSOR