Josh Franklin, Alex Basson, and Jim Thomson – a designer, an engineer, and a PM, respectively, will give a "Balanced Talk" on their successes and failures building the Small Token iOS app.
Spencer Chan overviews Quora's architecture that allows them to share the majority of their application code across their Android, iOS and web apps, discussing challenges and benefits.
Craig Walls and Roy Clarkson introduce the capabilities provided by Spring Cloud Services and demonstrate how to deploy cloud native applications to Cloud Foundry.
Thomas Gamble examines each factor in the Twelve Factor App (12factor.net) which describes elements of cloud native, and presents how Spring, and platforms such as Cloud Foundry satisfy them.
Dan Guido talks about the current state of iOS attacks, reviews available security APIs, why they are not good enough, and the design of the Mobile Application Security Toolkit to address risks.
Tim Wagner defines server-less computing, examines the key trends and innovative ideas behind the technology, and looks at design patterns for big data, event processing, and mobile using AWS Lambda.
Brent Vatne introduces React Native, a framework for building native user interfaces for mobile devices.
Daniel Steinberg takes a look at what idiomatic Swift will look like when Swift 3 is released and discusses the reasoning behind some of the choices.
Simon Gladman overviews some of the image processing techniques available to iOS developers and three frameworks offered by Apple: Core Image, Accelerate/vImage and Metal.
Alex Blewitt talks about Swift and looks at the open source project, how applications and libraries can be built, the differences between the different builds and how Swift works under the hood.
Brian Holt talks about React, performance issues, some general web performance tips, lessons learned while helping write m.reddit.com using React.
Tony Trummer focuses on how to apply an adversarial perspective when building Android applications, how to identify attack surfaces and the thought process attackers use.