ProgSCon London 2017 - The one day conference about Programming happens Friday 28th April 2017
The Call for Paper is still open until 25th November but these speakers are definitly in!
We are building the program, the full list of talk will be published the 5th December 2016.
10:00 - 10:45
Docker made containers easy to use, and containers have proven very useful in development environments - particularly in speeding up test cycles and the feedback from them. When developers are using containers it starts to make sense to use the portability of containers all the way into the production environment; but that brings with it a range of operational considerations around image management, security, audit, logging, orchestration and how the underlying infrastructure is built and managed.
This talk will look into what can be done to deal with those operational considerations, and how they relate back to developer experience
10:00 - 10:45
The more you sweat in peace, the less you bleed in war" - the US marines certainly know how to deal with the unexpected. Building resilient distributed applications is not an easy task and you better prepare for failure during development.
In this talk you will learn how to build event-driven applications that are resilient from the bottom up, allowing you to deal with remote services that are failing, slow or misbehaving.
We'll look at code and patterns that have been assembled to withstand failure, react to load spikes and have been proven in production.
Even if you are just consuming data from a database over the network, this talk is for you.
10:00 - 10:45
It is just small github project like many others. But this is what powers a
search engine at scale with very low latency and terabytes of data in it. We
replaced our server farms and even forget distributed systems for a while - at
least until we have more data - keyvi is a resilient extremely powerful but yet
simple engine with lots of use cases.
In this talk I will introduce you to keyvi, describe the concepts, explain what
makes it special and show how and where you can use it.
11:00 - 11:45
This will be a journey through the evolution of both the definition and implementations of Reactive Programming and how they have been converging in a quest to make building responsive applications a sane process.
We are still at the point where there is no complete consensus on what a reactive application is; we will explore how this consensus is evolving and what problems it brings.
We are going to talk about the past, present and possible futures of reactive programming and how you can survive it all.
11:00 - 11:45
13:30 - 14:15
ClojureScript is a well designed functional programming language allowing developers to concentrate on what their webapps should do, rather than be tied up in the mechanics of the language. The dynamic nature of ClojureScript supports highly interactive development for rapid prototyping; coupled with a built-in specification library & generative testing you can easily develop a robust and well defined codebase.
This immutable approach greatly reduces the complexity of your code. With the help of the core.async library we can also write asynchronous code in a synchronous style, enabling the development team to reason more clearly about their code.
Through the use of a common build tool with rich set of plugins and templates, you will see how creating & managing ClojureScript projects is easy and gives you a highly interactive & dynamic development environment that is a joy to use.
13:30 - 14:15
14:30 - 15:15
14:30 - 15:15
Event sourcing is an architectural pattern that derives current application state from a journal of changes, called events. Traditionally, this is only internal and not directly visible on a system’s API. An alternative is presented which exposes the events themselves as a real-time streaming REST API.
This way, connected systems can materialize their own data, while being deployable and versioned independently. We will talk about how reactive programming helps with keeping the system performance and clusterable, how to deal with past vs. real-time events, what to do with security, in addition to sharing general event sourcing advice.
The presented use case represents the development of a real-time document conversation tool, which in addition to its own message stream extracts data from several other existing sources. The core system is built in Java and Scala using Akka, on a Cassandra database. Event consumers are written in other languages, e.g. NodeJS.
15:45 - 16:30
15:45 - 16:30
In this talk we explore how Microservices and Trading System overlap and what they can learn from each other as well as the strategies they have in common. In particular, how can we make Microservices easy to test and performant and how can Trading System have shorter time to market and easier to maintain.
15:45 - 16:30
16:45 - 17:30
In the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security.
In this session, learn about a few of the simple actions you can take (and some behaviors you must change) to create a more secure Java application for the cloud. The world of the cyber criminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.
16:45 - 17:30
DRAFT – We are building this program, the full program will be released the 5th December.
|ALT Room||TAB Room||CAPSLOCK Room|
|08:15||Registration and Breakfast|
|09:00||Keynote by Trisha Gee|
|10:00||Operational considerations for containers by Chris Swan|
|The Walking Dead - A Survival Guide to Resilient Reactive Applications by Michael Nitschinger |
|Do we need another key value store? by Hendrik Muhs
|11:00|| Is Docker Dead? by Nic Jackson|
Containers, Serverless, Cloud
|WTF is Reactive Programming by Evgeny Poberezkin|
|tbd by Ramkumar Aiyengar
|13:30||The future of serverless by Paul Johnston|
|Taming The Wild Frontier - Adventures in ClojureScript by John Stevenson|
|Smart Contracts are Neither Smart Nor Contracts .. So What Are They? by Christopher Gilbert
|14:30||Serverless Architectures by Rafal Gancarz|
Serverless, Cloud, Microservices
|Disrupting Development using Reactive Event Sourced Systems with Akka by Jan Ypma |
Reactive, Akka, Scala, Java
|Distributed Ledgers for the Blockchain by Eleanor McHugh
|15:45||Latency Sensitive Microservices by Peter Lawrey|
|Scala Typeclasses by Emmanuele Blanco|
|Microsoft and Open-Souce A 'brave new world' by Matt Warren
|16:45||Cybercrime and the Developer: How to Start Defending Against the Darker Side by Steve Poole|
Cloud, Security, Java
|tbd by Jan Machacek |
Scala, Akka, Deep Learning
Methods & Tools is a free e-magazine providing practical expert knowledge for software development professionals. It gives software development ideas more than one page to express themselves and covers all aspects of software engineering (project and process management, software testing, architecture, requirements, etc) and contains software tools presentations. Past and future issues contain many articles on agile and lean approaches written by experts like Jeff Sutherland, Mike Cohn, Rachel Davies or Lisa Crispin.
Go to http://www.methodsandtools.com/ and get instant access to this knowledge
Software is changing the world. InfoQ, a news and community site with content currently published in English, French, Chinese, Japanese and Brazilian Portuguese, empowers software developers to be agents of change in their industries. Along with QCon, our practitioner-driven conferences, InfoQ’s purpose is to facilitate the spread of knowledge and innovation in professional software development. As of 2014, InfoQ.com’s readership base is over 1,000,000 unique visitors per month reading content from 100 locally-based editors across the globe. Our goal is to continue to build localized language communities.
RavenDB, is the premier NoSQL database for .NET. Open source, speed-obsessed, and a joy to use.
Datafloq, is the One-Stop Shop around Big Data. We are the number one Big Data platform connecting Data and People, connecting all stakeholders in the global Big Data market. Read interesting content, register for our Big Data training or find Big Data events. New sections will be introduced soon.
London Dev Community Meetup is aimed at professionals within the web industry who have an interest in software development and computer science. It happens usually the last Tuesday of every Month.
We are looking for volunteers, speakers, partners, sponsors and nice places to host the event. If you are interested in or have some idea about, please contact us.
London IT Contractor Group,. Please Check out our meet-up group for event details http://www.meetup.com/London-IT-Contractors-Group and come at our next meetup to exchange tips about IT Contracting and attend to first class technical talks.
Brighton Java Meetup is a group bringing together Java users, enthusiasts and learners. We’re interested in the whole world of Java – android development, server frameworks, Groovy, interesting tools, applications, Clojure, development methodologies and so on and so on – anything Java.
ProgSCon London Code of conduct
All attendees, speakers, sponsors and volunteers at our conference are required to agree with the following code of conduct. Organisers will enforce this code throughout the event. We are expecting cooperation from all participants to help ensuring a safe environment for everybody.
– Need Help?
You have our contact details in the emails we’ve sent.
– The Quick Version
Our conference is dedicated to providing a harassment-free conference experience for everyone, regardless of gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion (or lack thereof), or technology choices. We do not tolerate harassment of conference participants in any form. Sexual language and imagery is not appropriate for any conference venue, including talks, workshops, parties, Twitter and other online media. Conference participants violating these rules may be sanctioned or expelled from the conference without a refund at the discretion of the conference organisers.
– The Less Quick Version
Harassment includes offensive verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion, technology choices, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention.
– Participants asked to stop any harassing behavior are expected to comply immediately.
Sponsors are also subject to the anti-harassment policy. In particular, sponsors should not use sexualised images, activities, or other material. Booth staff (including volunteers) should not use sexualised clothing/uniforms/costumes, or otherwise create a sexualised environment.
If a participant engages in harassing behavior, the conference organisers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.
If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of conference staff immediately. Conference staff can be identified as they’ll be wearing branded t-shirts.
Conference staff will be happy to help participants contact hotel/venue security or local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. We value your attendance.
We expect participants to follow these rules at conference and workshop venues and conference-related social events.
Original source and credit: http://2012.jsconf.us/#/about & The Ada Initiative Please help by translating or improving: http://github.com/leftlogic/confcodeofconduct.com This work is licensed under a Creative Commons Attribution 3.0 Unported License