Haley Tucker discusses how other systems may affect Netflix' services, strategies to protect their systems and make sure they won't fail even if things go wrong.
Albert Yu presents a few viable, usable and effective defensive techniques that developers have often overlooked.
Matt Ranney talks about the limits that some companies have encountered in their large microservices deployments and some non-microservices approaches to those same problems.
Yao Yue introduces Pelikan, a framework to implement distributed caches such as Memcached and Redis.
Keith Adams tours Slack's infrastructure from clients into the Slack datacenter, and around the various services that provide real-time messaging, search, voice calls, and custom emoji.
Josh Evans talks about the chaotic and vibrant world of microservices at Netflix, exploring the cultural, architectural, and operational methods that lead to microservice mastery.
Matt Sakaguchi addresses the research and the insights of a manager who worked with his own team and others to instill the findings and principles from a pilot program at Google in the real world.
Connor Tumbleson discusses the Android package and examines how it can be explored in order to extract information while looking at some of the products and tools used by both sides.
Neha Narkhede shares the experience at LinkedIn moving from ETL to real-time streams, the challenges of scaling Kafka to hundreds of billions of events/day, supporting thousands of engineers, etc.
Jason Chan discusses how security teams can use thoughtful tools and automation to improve relationships with development teams while creating a more secure and manageable environment.
Alex Holden talks about hackers and their attacks, their latest techniques and the defenses needed today and tomorrow. He also talks about a number of recent breaches as well as lessons learned.
Jarrod Overson talks about a world where passwords are traded, sold, verified, and used to exploit sites, how to recognize malicious traffic, and how to take a stand against attackers.