John Billings talks about winning over those skeptical about the benefits of microservices along with tips on caching, failure, interface changes, etc. for building a distributed system architecture.
Matt Curry and Alan Moran talk about how they started with a Concourse pipeline and evolved it into a platform automation powerhouse that delivers the entirety of their developer platform ecosystem.
Gil Isaacs talks about Microsoft’s open source PaaS strategy and shows an example of how we can deploy Java micro-services to (Pivotal) Cloud Foundry on Azure.
James Governor looks to bring the threads together about the Java renaissance and associated cultural change.
The Power of Partnership & Building a Cloud Native Tier-1 Platform in Parallel to the Existing Platform and Performing a Reverse Integration Deployment Strategy
Working with the Comcast SPARROW Activation Team Pivotal provided input on product strategy, architecture and design, anticipating more than a 50% reduction in infrastructure systems.
Idit Levine introduces Unik, an orchestration system for unikernels. He covers: an overview of Unikernel, UniK and the integration with Cloud Foundry followed by a demo.
Jeff Strauss presents some of the most interesting features available in ES6, providing developers with reasons why they should start using it today.
Alex Blewitt presents how HotSpot represents Java objects in memory, how bytecode is compiled into native code to gain the fastest execution time, and how data structures have changed over time.
Bryan Nehl introduces the D3.js visualization library, demonstrating and explaining the code behind some of the more practical and interesting visualizations and charts.
Igor Wiedler discusses GIF topics: compression, patents, legal trials, boycotts, browsers, color palettes and binary numbers.
Adam Leventhal introduces DTrace, using a case study o solve a performance problem.
Kymberlee Price discusses vulnerability data and explores the source and spread of these vulnerabilities through products, along with advice on what can be done to address security vulnerabilities.