Jonas Boner explores microservices from first principles, distilling their essence and putting them in their true context: distributed systems based on reactive principles.
Edward Hiley, Dan Rathbone talk about how NHS Digital has built a highly secure and resilient system for processing patient data, applying techniques more often used in the cloud to bare metal servers
Jim Webber explores the new Causal clustering architecture for Neo4j, how it allows users to read writes straightforwardly, explaining why this is difficult to achieve in distributed systems.
Joe Duffy talks about the concurrency's explosion onto the mainstream over the past 15 years and attempts to predict what lies ahead for distributed programming, from now til 15 years into the future.
Akshat Vig and Khawaja Shams discuss DynamoDB Streams and what it takes to build an ordered, highly available, durable, performant, and scalable replicated log stream.
Stefan Krawczyk discusses how StitchFix used the cloud to enable over 80 data scientists to be productive and have easy access, covering prototyping, algorithms used, keeping schema in sync, etc.
Oleg Zhurakousky discusses the Hadoop ecosystem – Hadoop, HDFS, Yarn-, and how projects such as Hive, Atlas, NiFi interact and integrate to support the variety of data used for analytics.
Micahel Klishin talks about how one can troubleshoot a distributed service-oriented system, focusing on Java, Spring, and RabbitMQ.
Adrian Cole overviews how to debug latency problems using call graphs created by Zipkin, taking a look at the ecosystem, including tools to trace Ruby, C#, Java and Spring Boot apps.
Sean T. Allen talks about creating repeatable tests using programmatic fault injection, message tracing, and auditing to create a trustworthy system which provides correct results.
Ian Fyfe discusses the different options for implementing speed-of-thought business analytics and machine learning tools directly on top of Hadoop.
Justin Smith discusses credential hygiene in distributed systems, covering topics such as key encrypting keys, hardware security modules, and promising advances in muti-party computation.