Sastry Malladi presents different ways used by the industry to implement a RESTful SOA, detailing how eBay did it in order to achieve performance, and what lessons can be taken from that.
Roger Bodamer talks about consistency models in NoSQL databases, showing how different products deal with replication, multiple copies of information, consistency, failover, high availability.
Randy Shoup discusses the cloud programming model, covering topics such as state/statelessness, distribution, workload partitioning, cost and resource metering, automation, and deployment strategies.
Thomas Enebo explains the basics of JRuby, showing what’s different from Java, how Java and JRuby interact with each other, and some examples demonstrating the usefulness of a complementary language.
Mark Miller on how E and Caja influenced the EcmaScript 5 standard so it can be a secure language, enabling the creation of safe mashups, and how Dr. SES enables secure distributed computing.
Leonardo Mattiazzi considers that Scrum and XP are not enough, and complementary Lean principles and practices are necessary to create an Agile culture across the entire enterprise in order to succeed
Kresten Krab Thorup emphasizes existing problems with the Java concurrency model, explaining when to use Erjang, a JVM-based Erlang VM, built around the process and actor concepts.
Dan North argues organizations need to continuously innovate, finding new ways and practices to develop software by looking at the motivations behind Agile practices and not just implementing them.
Dan Ingalls presents his journey through the world of software developing a number of core technologies over the last forty years, explaining what brought them forth and why they are fun even today.
Vaughn Vernon advocates using DDD’s strategic modeling patterns when integrating services in a RESTful SOA implementation, avoiding one of SOA’s pitfalls: focusing on services rather than the domain.
Ryan King presents how Twitter uses NoSQL technologies - Gizzard, Cassandra, Hadoop, Redis - to deal with increasing data amounts forcing them to scale out beyond what the traditional SQL has to offer
Collin Jackson discusses ways to enforce browser session security against threats such as Cross-Site Request Forgery and various network attacks by using Local Storage and Strict Transport Security.