Parisa Tabriz presents current online threats and some of the ways Chrome protects users, along with Chrome's philosophies, successes, and ongoing challenges to doing security in a browser.
Mark Harwood shows how anomaly detection algorithms can spot card fraud, incorrectly tagged movies and the UK's most unexpected hotspot for weapon possession.
Danielle Jabin shares some of Spotify's key takeaways from their A/B testing efforts and the challenges they faced in building out their A/B testing infrastructure.
Simon Ritter discusses the syntax and use of Lambda expressions, focusing on using Streams to greatly simplify the way bulk and aggregate operations are handled in Java.
Torben Hoffmann discusses doing parallel programming with the Intensional Computing Engine (ICE) on top of the Erlang VM.
Richard Crowley introduces Go standard library's HTTP packages, the relationship between JSON and Go's data structures, and Go's support for reflection, useful to create safe APIs.
Josh Bloch, Bob Lee point out to the dangers that lurk in Java’s dark corners, so they can be avoided or eliminated from programs and designs.
Bodil Stokke attempts to answer why some meritorious technologies fade away while others end up dominating the software landscape, and suggests what can be done to fix that.
Philip Wadler presents a practical theory of language-integrated query based on quotation and normalization of quoted terms and a theorem guaranteeing that a host query generates a single SQL query.
Colin Gravill discusses programming living cells, demonstrating a software tool chain for characterizing genetic parts that can be combined into genetic devices for programming cell function.
Chris Granger attempts to imagine what programming would look like if it was created today.
Felienne Hermans introduces BumbleBee, a refactoring and metaprogramming spreadsheets tool based on a DSL that can perform transformations against spreadsheet formulas.