Pat Patterson discusses ways of consuming RESTful APIs from Clojure on a securely manner using OAuth 2.0.
Graham Lee discusses designing, building and testing a secure mobile app, detailing several vulnerabilities that can be found in such apps and ways to deal with them.
Ben Stopford, Farzad Pezeshkpour and Mark Atwell discuss: the Manhattan processor – avoiding GC pauses-, beyond messaging with ODC, Risk, data virtualization and collaboration in banking.
Jonathan Shapiro, Dean Tribble, Marc Steigler, David Wagner and Mark S. Miller (moderator) present their view on achieving security while using modularity for building large systems.
Martin Thompson and Michael Barker explain how Intel x86_64 processors and their memory model work along with low-level techniques that help creating lock-free software.
Paul Downey talks on the current status of identity management on the web covering cross-site challenges, REST, HTTPS, Open ID, all in the context of enterprise architecture.
Craig Walls discusses the need for adding social features to applications, how to secure such applications and how Spring Social can help.
Mark S. Miller explains how to create secure mashups with ECMAScript 5, emphasizing the security pitfalls to be avoided and patterns to use in order to stay clear of them.
David Syer discusses identity management, SSO, security standards –SAML, OpenID, OAuth, SCIM, JWT-, how Spring Security can fit in, and demoing IdM as a service.
John Davies examines Visa’s architecture and shows how major enterprises have architected very complex integrations incorporating Hadoop, memcached, Ruby on Rails, and many others to deliver innovative technology solutions. John explains how the platform architecture and technologies -- integrated and invented -- must be reliable and able to massively scale.
Craig Walls talks about securing the modern web and how OAuth can help with that, showing how to secure and consume resources with OAuth.
While Cloud Computing offers increased business agility and reduced cost, many are worried about security: loss of control and lack of confidentiality. Presented by Alon Hazy and Jakob Illeborg Pagter, this talk looks at the threat landscape, then examines how to secure cloud solutions today and in the future.