Marc Stiegler presents popular but faulty security architectures used - Independence Day Evil Alien Architecture, the Gilded Cage, and Gone Phishin' – along with effective architectures emerging today
Diana Larsen discusses how Agile can help to overcome 3 management traps by relying on data and evidence, accepting uncertainty and unpredictability, and maintaining a whole systems view.
Jeff Brown introduces Groovy to Java developers, outlining the conciseness and expressivity of the language and covering various topics: GStrings, Closures, collections, builders, beans, etc.
Patrick Copeland presents the first three principles of the eXtreme innovation approach based on the Pretotyping Manifesto: Innovators Beat Ideas, Pretotypes Beat Productypes, and Data Beats Opinion.
Rod Barlow talks about the architectural redesign of the Shopzilla.com website, sharing the solutions chosen over the old ones and the lessons learned while doing it.
Andy Gross discusses the design philosophy behind Riak based on Amazon Dynamo - Gossip Protocol, Consistent Hashing, Vector clocks, Read Repair, etc. -, overviewing its main features and architecture.
Dan North considers that ignorance is the major roadblock on the way to success, presenting strategies and techniques for reducing it, delivering software in a more deterministic and less riskier way.
John Allspaw presents technical, cultural, and process related lessons learned at Flickr and Etsy.com from the collaboration between the operations and development teams.
Tyler Close considers that the old client-server security model is no longer viable and a new security web model is needed, presenting tools and techniques to secure the social web apps of today.
Ola Bini offers advice to those interested in using the JVM with languages other than Java, talking about language interoperability, polyglot patterns, build tools, tweaking the JVM, and JVM tools.
Josh Graham addresses 10 myths related to working on legacy software, attempting to prove that one can make good use of legacy code without having to rewrite the entire thing.
Tom Sulston explains how to manage systems with Cucumber and Puppet based on BDD principles, including practical tricks and pitfalls. The session demoes using those tools.