ProgSCon London 2017

ProgSCon London 2017 - The one day conference about Programming happens Friday 28th April 2017

  • The C4P is close and the full program will released the 5th December.
  • Progscon 2017 will have 5 main tracks: Microservice, Reactive Programming, Cloud Service, Blockchain and Software Container
  • We are delighted to host Progscon 2017  in the Skills Matter event space: Code Node
  • We will be revealing the final programme in December, so be sure to check it out
  • The registration for the 2017 edition is already open on Eventbrite with some blind ticket
  • You can check program of last year and the video of all previous editions on InfoQ: 2016, 2015

Follow us on twitter to have the last news on @Progscon - Join our Newsletter

 

Register Now

Speakers

The Call for Paper is still open until 25th November but these speakers are definitly in!

Talks

We are building the program, the full list of talk will be published the 5th December 2016.

Operational considerations for containers

Chris Swan

10:00 - 10:45

Docker made containers easy to use, and containers have proven very useful in development environments - particularly in speeding up test cycles and the feedback from them. When developers are using containers it starts to make sense to use the portability of containers all the way into the production environment; but that brings with it a range of operational considerations around image management, security, audit, logging, orchestration and how the underlying infrastructure is built and managed.

This talk will look into what can be done to deal with those operational considerations, and how they relate back to developer experience

-

The Walking Dead - A Survival Guide to Resilient Reactive Applications

Michael Nitschinger

10:00 - 10:45

The more you sweat in peace, the less you bleed in war" - the US marines certainly know how to deal with the unexpected. Building resilient distributed applications is not an easy task and you better prepare for failure during development.

In this talk you will learn how to build event-driven applications that are resilient from the bottom up, allowing you to deal with remote services that are failing, slow or misbehaving.

We'll look at code and patterns that have been assembled to withstand failure, react to load spikes and have been proven in production.

Even if you are just consuming data from a database over the network, this talk is for you.

-

Do we need another key value store? - Keyvi a key value store based on 'finite state', what is it good for, for what do you need it?

Hendrik Muhs

10:00 - 10:45

It is just small github project like many others. But this is what powers a
search engine at scale with very low latency and terabytes of data in it. We
replaced our server farms and even forget distributed systems for a while - at
least until we have more data - keyvi is a resilient extremely powerful but yet
simple engine with lots of use cases.

In this talk I will introduce you to keyvi, describe the concepts, explain what
makes it special and show how and where you can use it.

-

WTF is Reactive Programming

Claudio José Rodríguez Evgeny Poberezkin

11:00 - 11:45

This will be a journey through the evolution of both the definition and implementations of Reactive Programming and how they have been converging in a quest to make building responsive applications a sane process.

We are still at the point where there is no complete consensus on what a reactive application is; we will explore how this consensus is evolving and what problems it brings.

We are going to talk about the past, present and possible futures of reactive programming and how you can survive it all.

-

Is Docker Dead?

Nic Jackson

11:00 - 11:45

By now most of us have some exposure to using Docker either in production or development. However, Serverless architecture has been taking off in a big way over the last 12 months, could Docker have had its day before it has even reached maturity?
In this talk, we will examine the development and deployment flow for both a Docker and a Serverless project.  We will compare and contrast the two approaches, both subjectively and objectively and by the end of the talk we will be fully equipped to answer the question "Is Docker dead?"
Keywords: Containers, Serverless, Cloud

-

Taming The Wild Frontier - Adventures in ClojureScript

John Stevenson

13:30 - 14:15

Building modern reactive full-stack webapps with JavaScript feels like being an explorer in a wild frontier, you never know when something is going to bite you!

ClojureScript is a well designed functional programming language allowing developers to concentrate on what their webapps should do, rather than be tied up in the mechanics of the language.  The dynamic nature of ClojureScript supports highly interactive development for rapid prototyping; coupled with a built-in specification library & generative testing you can easily develop a robust and well defined codebase.

Discover how ClojureScript is extremely fast, by generating highly optimised JavaScript through dead code elimination.  Avoiding state changes also provides a huge performance boost to ClojureScript through its heavy use of Immutable data structures (list, map, vector, set).

This immutable approach greatly reduces the complexity of your code.  With the help of the core.async library we can also write asynchronous code in a synchronous style, enabling the development team to reason more clearly about their code.

Through the use of a common build tool with rich set of plugins and templates, you will see how creating & managing ClojureScript projects is easy and gives you a highly interactive & dynamic development environment that is a joy to use.

-

Smart Contracts are Neither Smart Nor Contracts .. So What Are They?

Christopher Gilbert

13:30 - 14:15

It's hard to ignore the hype around block-chain in financial services. Nearing fever pitch, the excitement is almost palpable as banks race each other to implement this 'revolutionary’ and disruptive technology, with block-chain labs spanning the globe. But when you cut past all the hype, what really is it? And more importantly, are we ready for it? Let's find out.
Block-chain is the technology that underpins Bitcoin, and it's not really new, but the artful arrangement of several pre-existing technologies. This talk is designed to be a deep dive into the block-chain technology space, covering first principles through how to apply this technology to solve real-world problems.

-

Serverless Architectures

Rafal Gancarz

14:30 - 15:15

The world of cloud computing is on a verge of revolution, the Serverless revolution. With the advent of Function as a Service capabilities offered by the major cloud providers, the architectures we will be building in the future are going to be very different from those you are familiar with today.
In this talk I will introduce the core concepts around Serverless/FaaS and describe some archirectural and operational aspects of distributed systems built on top the Serverless stack. I will also present some experiences, challenges faced and lessons learned from the Serverless project using AWS cloud platform.

-

Disrupting Development using Reactive Event Sourced Systems with Akka

Jan Ypma

14:30 - 15:15

Event sourcing is an architectural pattern that derives current application state from a journal of changes, called events. Traditionally, this is only internal and not directly visible on a system’s API. An alternative is presented which exposes the events themselves as a real-time streaming REST API.

This way, connected systems can materialize their own data, while being deployable and versioned independently. We will talk about how reactive programming helps with keeping the system performance and clusterable, how to deal with past vs. real-time events, what to do with security, in addition to sharing general event sourcing advice.

The presented use case represents the development of a real-time document conversation tool, which in addition to its own message stream extracts data from several other existing sources. The core system is built in Java and Scala using Akka, on a Cassandra database. Event consumers are written in other languages, e.g. NodeJS.

-

Scala Typeclasses

Emanuele Blanco

15:45 - 16:30

A typeclass is a set of behaviors that can be attached to types and allow you to work at a much higher level of abstraction. While in languages such as Haskell typeclasses are a first class citizen, Scala doesn’t offer support for typeclasses with a keyword, but they can be implemented using implicits and context bounds. A vast number of libraries, including the standard library, use them extensively. For example, using typeclasses, you can write a single function that transforms `List[Option[A]]` into `Option[List[A]]`, `List[Try[A]]` into `Try[List[A]]`, and works with any other type that implements the same typeclass, without rewriting the function itself.
In this talk, we’ll learn what’s a typeclass, when to use them and how to implement them, look at some examples and figure out how to do more with less code!
A basic knowledge of Scala syntax is recommended to get the most out of this talk.

-

Latency Sensitive Microservices in Java

Peter Lawrey

15:45 - 16:30

In this talk we explore how Microservices and Trading System overlap and what they can learn from each other as well as the strategies they have in common. In particular, how can we make Microservices easy to test and performant and how can Trading System have shorter time to market and easier to maintain.

-

Microsoft and Open-Source - A 'brave new world'

Matt Warren

15:45 - 16:30

It's a 'brave new world' or 'hell has frozen over' (depending on your point-of-view). Microsoft is the top contributor on GitHub, they have opened-sourced their entire .NET platform and gone cross-platform!
In this talk we will look at what the new 'Open-Source' Microsoft actually looks like, what they've done, how they're doing it and what it all means. From new features to compiler design meetings, from TechEmpower benchmarks to increased community contributions, we will examine it all!

-

Cybercrime and the Developer: How to Start Defending Against the Darker Side

Steve Poole

16:45 - 17:30

In the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security.

In this session, learn about a few of the simple actions you can take (and some behaviors you must change) to create a more secure Java application for the cloud. The world of the cyber criminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.

-

Sponsored talk

16:45 - 17:30

Talk 45min

Sponsored talk

-

Program

DRAFT – We are building this program, the full program will be released the 5th December.

 ALT RoomTAB RoomCAPSLOCK Room
08:15Registration and Breakfast
09:00Keynote by Trisha Gee
09:45Break
10:00Operational considerations for containers by Chris Swan
Containers
The Walking Dead - A Survival Guide to Resilient Reactive Applications by Michael Nitschinger
Reactive
Do we need another key value store? by Hendrik Muhs
Bigdata
10:45Break
11:00 Is Docker Dead? by Nic Jackson
Containers, Serverless, Cloud
WTF is Reactive Programming by Evgeny Poberezkin
Reactive
tbd by Ramkumar Aiyengar
Bigdata, Solr
11:45Lunch Break
13:30The future of serverless by Paul Johnston
Serverless, Cloud
Taming The Wild Frontier - Adventures in ClojureScript by John Stevenson
Reactive, Clojure, Javascript
Smart Contracts are Neither Smart Nor Contracts .. So What Are They? by Christopher Gilbert
Blockchain
14:15Break
14:30Serverless Architectures by Rafal Gancarz
Serverless, Cloud, Microservices
Disrupting Development using Reactive Event Sourced Systems with Akka by Jan Ypma
Reactive, Akka, Scala, Java
Distributed Ledgers for the Blockchain by Eleanor McHugh
Blockchain, Ruby
15:15Afternoon Break
15:45Latency Sensitive Microservices by Peter Lawrey
Microservices, Java
Scala Typeclasses by Emmanuele Blanco
Scala
Microsoft and Open-Souce A 'brave new world' by Matt Warren
.Net
16:30Break
16:45Cybercrime and the Developer: How to Start Defending Against the Darker Side by Steve Poole
Cloud, Security, Java
tbd by Jan Machacek
Scala, Akka, Deep Learning
Sponsored Talk
17:30Break
17:45Farwell drink

Containers
Serverless/Cloud
Microservices
Reactive
Bigdata
Blockchain
Other Talks
Keynote

Register

Blind tickets are already available with Eventbrite. For a 15% student discount please contact us.

Powered by Eventbrite

Venue

Code Node 10 South Place, EC2M 7EB,

https://skillsmatter.com/event-space   |   +44 (0)207 183 9040

Crew

Matt Warren

Program Commitee

Nic Jackson

Program Commitee

Linda Timpere

Event Assistant

Hina Paracha

Community Manager

Cyril Lapinte

Program Commitee

David Gimelle

Leader / Founder

Oliver Szymanski

Speaker Manager / Founder

Shency Ravindran

Speaker Manager

Randeep Singh

Partnership Manager

Sponsors

Code of Conduct

ProgSCon London Code of conduct

 

All attendees, speakers, sponsors and volunteers at our conference are required to agree with the following code of conduct. Organisers will enforce this code throughout the event. We are expecting cooperation from all participants to help ensuring a safe environment for everybody.

– Need Help?
You have our contact details in the emails we’ve sent.

– The Quick Version
Our conference is dedicated to providing a harassment-free conference experience for everyone, regardless of gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion (or lack thereof), or technology choices. We do not tolerate harassment of conference participants in any form. Sexual language and imagery is not appropriate for any conference venue, including talks, workshops, parties, Twitter and other online media. Conference participants violating these rules may be sanctioned or expelled from the conference without a refund at the discretion of the conference organisers.

– The Less Quick Version
Harassment includes offensive verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion, technology choices, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention.

– Participants asked to stop any harassing behavior are expected to comply immediately.
Sponsors are also subject to the anti-harassment policy. In particular, sponsors should not use sexualised images, activities, or other material. Booth staff (including volunteers) should not use sexualised clothing/uniforms/costumes, or otherwise create a sexualised environment.

If a participant engages in harassing behavior, the conference organisers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.

If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of conference staff immediately. Conference staff can be identified as they’ll be wearing branded t-shirts.

Conference staff will be happy to help participants contact hotel/venue security or local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. We value your attendance.

We expect participants to follow these rules at conference and workshop venues and conference-related social events.

Original source and credit: http://2012.jsconf.us/#/about & The Ada Initiative Please help by translating or improving: http://github.com/leftlogic/confcodeofconduct.com This work is licensed under a Creative Commons Attribution 3.0 Unported License

Contact

ProgSCon London
Join our Newsletter

contact@progscon.co.uk





* - Required Fields