Didier Verna keynotes on the bonds between biology and computer science, how these bonds developed over the years, and how software could behave like living organisms.
Ted Epstein shows how a shared canonical model can make life easier for API consumers, while still allowing the flexibility to expose different services, with different contextual requirements.
Marcel Kornacker presents a case study of an EDW built on Impala running on 45 nodes, reducing processing time from hours to seconds and consolidating multiple data sets into one single view.
Todd Montgomery explains using WebSocket and reactive programming in an event driven RESTful architecture for the emerging IoT world.
Michael Dowden introduces JMeter and explains how to develop a data-driven methodology to determine some of the limits of a web application: max number of concurrent users, bottlenecks, etc.
In this solutions track talk, sponsored by Cloudera, Eva Andreasson discusses how search and Hadoop can help with some of the industry's biggest challenges. She introduces the data hub concept.
Andreas Olofsson reviews the history of processors and outlines some of the challenges ahead, introducing project Parallella meant to speed up the transition to massively parallel computing.
Paul Simmonds discusses the importance of identity and attribute information that will define how access to the functionality and how data is governed by applications in the near future.
Brandon Byars discusses the constraints and the flexibility of nonpublic APIs, and lessons learned from scaling RESTful integration across more than a dozen teams.
Lance Walton shares the experience of a small team building a trading platform in 6 weeks in Scala and Lift while fighting against an opposing organizational culture.
Graham Steel takes a look at some of the cryptographic standards whose security is the subject of speculation and tries to separate rumor from fact. Then he examines some of most widely encountered crypto APIs, evaluating them on two important axes: facilities for flexible, secure key management and provision of modern cryptographic primitives.