We're all aware that the industry is moving from Object-Orientation toward Functional Programming, but the move may be even deeper than that.
Justin Cormack talks about the Docker unikernels build, ship and run pipelines and how the changes they are seeing lead to unikernels in production.
Mitchell Hashimoto takes a look at VMs, which solution architectures worked there, and discusses why these architectures are no longer adequate and what are the solutions in a containerized world.
Matthias Luebken gives an overview of typical patterns and best practices that he has seen in developing, deploying and operating applications that leverage containers.
Brennan Saeta talks about aspects of Coursera’s architecture that enable them to rapidly build sophisticated features for their learning platform, the use of containers and security-related issues.
Charles Lamanna talks about the scale and architecture of Microsoft’s Azure Management Gateway and how Azure API’s are built for high availability and for data sovereignty.
Jamshid Mahdavi explains how WhatsApp has developed their server components, the deployment processes, and how they monitor, alert, and repair the inevitable failures in a billion-users service.
Luca Marturana covers the current state of the art for container monitoring and visibility, including real use cases with pros/cons of each and focuses on advanced container visibility techniques.
David Riddoch talks about the technologies that make high performance networking possible on commodity servers, with a special focus on direct access to the network adapter by bypassing the kernel.
Tim Pettersen covers Git LFS internals & architecture, CLI usage, team workflows and how to use it with Eclipse EGit, providing practical advice for those interested in using Git LFS.
Dave Farley discusses using acceptance testing to work quickly and effectively, building functional coverage for complex enterprise-scale systems, and managing and maintaining those tests.
Sid Anand discusses how Agari is applying big data best practices to the problem of securing its customers from email-born threats, presenting a system that leverages big data in the cloud.