Build resilient systems at scale
May 27–29, 2015 • Santa Clara, CA

networking conference sessions

1:45pm–2:25pm Thursday, 05/28/2015
Ritesh Maheshwari (LinkedIn)
Slides:   external link
In this talk, we describe how LinkedIn used RUM (real user monitoring), beyond its monitoring use-case, to improve content download times of the LinkedIn site by up to 25%. We describe the techniques used by LinkedIn to drive many optimizations using RUM; and show how they can be used by others to solve similar problems.
4:10pm–4:50pm Thursday, 05/28/2015
Douglas Barth (Stripe)
With systems moving to the cloud, securing network traffic is becoming more difficult using traditional hub-and-spoke architectures because the network layout might not be under your control. PagerDuty solved this problem using an IPSec mesh network. Come find out how we did it.
9:00am–10:30am Wednesday, 05/27/2015
Patrick Meenan (Google)
Slides:   1-PDF 
Service workers provide a fully programmable in-browser proxy which presents a fairly open slate for doing all kinds of things. Here we will explore practical applications (with real examples) for preventing third-party SPOFs, improving performance, and getting more control over your user's experience interacting with your site. All with effectively no changes to the pages themselves.
5:05pm–5:45pm Friday, 05/29/2015
JP CASTRO (Sony)
In this talk, JP Castro will highlight the challenges of understanding single page application performance, and describe unique optimization techniques that ultimately led to increased user engagement on the latest gaming console from Sony.
5:05pm–5:45pm Friday, 05/29/2015
John Rauser (Snapchat)
This talk explores the history of the Internet's congestion control algorithms and how they put a fundamental limit on application performance.
2:40pm–3:20pm Friday, 05/29/2015
Bill Green (New Relic)
The network forms a critical part of the user experience, whether you run the most popular site on the internet or a single database on an office LAN. How much visibility into this critical part of your infrastructure do you really have? Polling, traps, and logs are good, but today they aren’t enough. Learn how network flow data can bring your own network mysteries into sharp focus.
10:05am–10:20am Friday, 05/29/2015
Ariya Hidayat (Shape Security)
Slides:   external link
What actually happens in the complicated network of undersea fiber optic cables, the foundation of modern communications? The talk gives an entertaining journey through this remarkable achievement, a series of scientific milestones in recent human history that will tickle the geeky side of the audience and inspire further exploration.
5:05pm–5:45pm Friday, 05/29/2015
Ilya Grigorik (Google)
Slides:   external link
The limitations of HTTP/1.X forced us to develop various application workarounds to optimize performance, but in the process we've also introduced numerous regressions: poor caching, unnecessary downloads, delayed execution, and more. Well, good news, because HTTP/2 eliminates this tradeoff: we can eliminate the hacks, simplify our applications, and deliver improved performance!