Build resilient systems at scale
May 27–29, 2015 • Santa Clara, CA

cloud conference sessions

2:40pm–3:20pm Thursday, 05/28/2015
Tim Prendergast (Evident.io)
The rise of programmatic infrastructure and services has created a rift in the industry between business acceleration and risk aversion/mitigation. The rate at which technology teams consume, manipulate, and iterate infrastructure now far exceeds traditional security technologies. A new approach to security, a DevOps approach, can marry these aspects of business together again in amazing ways.
4:10pm–4:50pm Thursday, 05/28/2015
Douglas Barth (Stripe)
With systems moving to the cloud, securing network traffic is becoming more difficult using traditional hub-and-spoke architectures because the network layout might not be under your control. PagerDuty solved this problem using an IPSec mesh network. Come find out how we did it.
2:35pm–2:55pm Wednesday, 05/27/2015
Benny Wong (Timehop)
Slides:   1-PDF 
You've read everything on Hacker News. You've deployed a bunch of apps on Heroku. You've signed up for as many stats and APM services as you know of. You have everything you need to scale if your startup blows up, right? In this talk, we'll walk through some of the lessons we've learned the hard way growing 13x over the past 9 months.
5:05pm–5:45pm Friday, 05/29/2015
Rajiv Kurian (SignalFx)
Slides:   1-PDF    external link
At SignalFx, we deal with high-volume, high-resolution data from our users. This requires a high performance ingest pipeline. Over time we’ve found that we needed to adapt architectural principles from specialized fields such as HPC to get beyond performance plateaus encountered with more generic approaches.
1:45pm–2:25pm Thursday, 05/28/2015
Arun Kejariwal (MZ), Sailesh Mittal (Twitter), Karthik Ramasamy (Streamlio)
Data-driven decision making rests, in part, on availability of high fidelity data. Presence of anomalies limits the use of data on an “as is” basis. Automatic anomaly detection is key to providing high fidelity data. We present a statistically rigorous method for automatic anomaly detection, which leverages correlations between multiple time series.
10:05am–10:20am Friday, 05/29/2015
Ariya Hidayat (Shape Security)
Slides:   external link
What actually happens in the complicated network of undersea fiber optic cables, the foundation of modern communications? The talk gives an entertaining journey through this remarkable achievement, a series of scientific milestones in recent human history that will tickle the geeky side of the audience and inspire further exploration.

Related blog posts

Sam Guckenheimer, product owner for Microsoft’s Visual Studio product line, will be at the Velocity conference to present the story of Microsoft’s transformation to becoming a Software-as-a-service provider and the lessons learned by embracing DevOps. We recently spent some time to talk about the origins of this change and what it means not only to Microsoft, but to the hundreds of thousands of customers they support world wide. . Read more