February 23–26, 2020
 
Grand Ballroom West
Add Microservices migration patterns to your personal schedule
10:45am Microservices migration patterns Mark Richards (Self-employed)
Add Building a security layer around your RESTful APIs to your personal schedule
2:15pm Building a security layer around your RESTful APIs James Wallace (EBSCO LearningExpress)
Murray Hill
Add I don't understand micro-frontends to your personal schedule
10:45am I don't understand micro-frontends Luca Mezzalira (DAZN)
Add Innovation traps: How to design for uncertainty to your personal schedule
1:15pm Innovation traps: How to design for uncertainty Cristina Turbatu (Playtech)
Add On microservices, bounded contexts, and everything in between to your personal schedule
2:15pm On microservices, bounded contexts, and everything in between Vladik Khononov (DoiT International)
Add Metrics for Software-Architects to your personal schedule
3:50pm Metrics for Software-Architects Alexander von Zitzewitz (hello2morrow)
Nassau
Add Operationalizing responsible AI to your personal schedule
10:45am Operationalizing responsible AI Devangana Khokhar (ThoughtWorks), Vanya Seth (ThoughtWorks)
Add Migrating AI-infused chat to Kubernetes to your personal schedule
1:15pm Migrating AI-infused chat to Kubernetes Steven Jones (IBM), Nicholas Fong (IBM)
Add Reactive domain-driven design with message streaming to your personal schedule
3:50pm Reactive domain-driven design with message streaming Vaughn Vernon (Kalele and vlingo/PLATFORM)
Beekman Parlor
Add Practical event storming to your personal schedule
10:45am Practical event storming Allen Holub (Holub Associates)
Add Opportunities and pitfalls of event-driven utopia to your personal schedule
3:50pm Opportunities and pitfalls of event-driven utopia Bernd Rücker (Camunda)
Add Challenges to internationalize the largest digital bank in the world to your personal schedule
4:50pm Challenges to internationalize the largest digital bank in the world Luiz Hespanha (Nubank), Lucas Cavalcanti (Nubank)
Sutton South
Add Automating the New York Times crossword to your personal schedule
3:50pm Automating the New York Times crossword Phil Wells (New York Times)
Add Using actors for data-driven stream processing to your personal schedule
4:50pm Using actors for data-driven stream processing Amanda Kabak (CleanSpark)
Add Wednesday opening welcome to your personal schedule
Grand Ballroom
9:00am Wednesday opening welcome Christopher Guzikowski (O'Reilly), Neal Ford (ThoughtWorks)
Add Where do great architectures come from? to your personal schedule
9:05am Where do great architectures come from? Mary Poppendieck (Lean Software Development Series)
Add Intellectual control to your personal schedule
9:25am Intellectual control George Fairbanks (Google)
Add Architecture.Next: Invalidating old axioms to your personal schedule
9:45am Architecture.Next: Invalidating old axioms Mark Richards (Self-employed)
Add Closing remarks to your personal schedule
10:05am Closing remarks
10:15am Morning Break | Room: Expo Hall
3:05pm Afternoon Break | Room: Expo Hall
Add Lunch and Wednesday Topic Tables to your personal schedule
12:15pm Lunch and Wednesday Topic Tables | Room: Americas Hall 1
8:45am
8:00am Morning Coffee | Room: 2nd Floor Promenade (near registration)
Add Wednesday Speed Networking to your personal schedule
8:15am Wednesday Speed Networking | Room: 2nd Floor Promenade
10:45am-12:15pm (1h 30m) Microservices Best Practice
Microservices migration patterns
Mark Richards (Self-employed)
Mark Richards outlines patterns for migrating monolithic and service-oriented architectures to microservices.
1:15pm-2:05pm (50m) Domain-Driven & Event-Driven Architecture Best Practice, Theoretical
Breaking down buzzwords: Creating an adaptable event-driven architecture
Amanda Gilbert (Confluent)
Your business decides to invest in an event-driven architecture (EDA)...so what now? Join Amanda Gilbert for an overview of EDA. You'll explore the benefits they offer in terms of flexibility in your architectural design and long-term thinking—EDAs allow you to reconsider the way you share data within your organizations, and by planning an adaptable design, you allow for future growth.
2:15pm-3:05pm (50m) Application architecture, Data & Security Best Practice
Building a security layer around your RESTful APIs
James Wallace (EBSCO LearningExpress)
Services can expose sensitive data. However, we often "secure" these services using an API key or security through obscurity. James Wallace explains what you need to secure and how to secure it and shares solutions that can be implemented for both server- and client-side requests—so no matter what your services expose, you'll understand how to build secure distributed architectures.
10:45am-12:15pm (1h 30m) Fundamentals Best Practice, Case Study, Theoretical
I don't understand micro-frontends
Luca Mezzalira (DAZN)
Micro-frontends are starting to get more traction thanks to the benefits they provide, like independent deployments, team autonomy, and a quick path to production. Luca Mezzalira illustrates how to structure a micro-frontend architecture and busts myths by providing concrete examples applied in the real world.
1:15pm-2:05pm (50m) Fundamentals, Microservices Best Practice, Case Study
Innovation traps: How to design for uncertainty
Cristina Turbatu (Playtech)
The path to growing innovation projects to highly scalable, resilient, and performant systems is riddled with challenges and doubts. Cristina Turbatu draws on her experience to highlight the problems that occur during the rapid evolution of proof-of-concept architectures to production-ready products while discussing some of the solutions to ongoing uncertainty and constant pivots.
2:15pm-3:05pm (50m) Microservices Best Practice, Case Study, Overview, Theoretical
On microservices, bounded contexts, and everything in between
Vladik Khononov (DoiT International)
Often microservices and bounded contexts are considered the same thing. They aren't. Vladik Khononov points out the difference between the two, provides heuristics for when each pattern should be used, and shares his experience optimizing microservices-based architectures at NaXex.
3:50pm-4:40pm (50m) Fundamentals Best Practice, Theoretical
Metrics for Software-Architects
Alexander von Zitzewitz (hello2morrow)
Software metrics can be used effectively to judge the maintainability and architectural quality of a code base. Even more importantly, they can be used as canaries in a coal mine to warn early about dangerous accumulations of architectural and technical debt.
4:50pm-5:40pm (50m) Domain-Driven & Event-Driven Architecture, Microservices Anti-Pattern, Best Practice
Event-driven microservices: The sense, the nonsense, and a way forward
Allard Buijze (AxonIQ)
Microservices, and especially the event-driven variants, are at the very peak of the hype cycle and, according to some, on their way down. Meanwhile, a large number of success stories and failures have been shared about this architectural style. Allard Buijze explains how not to throw away the baby with the bath water and end up reinventing the same concepts again a decade from now.
10:45am-12:15pm (1h 30m) AI and Machine Learning, Application architecture Best Practice, Framework-focused, Theoretical
Operationalizing responsible AI
Devangana Khokhar (ThoughtWorks), Vanya Seth (ThoughtWorks)
Exponential growth in AI technologies has resulted in discourse around the potential harms, intentional and unintentional, that the algorithms and AI can cause. The public conversation, however, has remained largely policy oriented. Devangana Khokhar and Vanya Seth outline how to build responsible AI systems with evolutionary architecture that have responsibility at their core.
1:15pm-2:05pm (50m) AI and Machine Learning, Containers & Containers Orchestration Best Practice, Case Study
Migrating AI-infused chat to Kubernetes
Steven Jones (IBM), Nicholas Fong (IBM)
Steven Jones and Nicholas Fong walk you through migrating a chatbot, cognitive search, and other services to a Kubernetes-based architecture. Technologies include multiregion clusters, load balancers, integrating Express and Flask servers, and high-speed data transfer for importing models.
2:15pm-3:05pm (50m) AI and Machine Learning Language-focused, Overview
A modern dilemma: When to use a rules engine versus machine learning
Andrew Bonham (Capital One)
Machine learning is taking the world by storm, and many companies with rules engines in place for making business decisions are starting to leverage it. However, the two technologies are geared toward different problems. Andrew Bonham details the strengths of both rules engines and machine learning and identifies the best use cases for each.
3:50pm-4:40pm (50m) Domain-Driven & Event-Driven Architecture Best Practice
Reactive domain-driven design with message streaming
Vaughn Vernon (Kalele and vlingo/PLATFORM)
Vaughn Vernon leads a deep dive into whether event-driven architecture and streaming is all it's cracked up to be, serious pitfalls to these to techniques, and how to avoid them. You'll learn about domain-driven design (DDD) context mapping with open host service and published language and discover how to integrate using reactive implementations that transform streaming to well-designed solutions.
4:50pm-5:40pm (50m) Business concerns, Key skills Best Practice
How to gauge open source package health: Tools and practices for picking the best package
Keenan Szulik (Tidelift)
The pressure on development teams to build amazing products and digital experiences to keep users happy has never been higher. Success depends on automating the manual approaches to researching and selecting open source packages. Keenan Szulik shares best practices for application development teams to use while reviewing how to simplify, streamline, and strengthen the process.
10:45am-12:15pm (1h 30m) Domain-Driven & Event-Driven Architecture, Fundamentals Best Practice
Practical event storming
Allen Holub (Holub Associates)
Allen Holub leads a practical introduction to event storming, including an extensive live demo. Join in to explore the entities, bounded contexts, and essential events for an effective choreographed microservice (or reactive) architecture.
1:15pm-2:05pm (50m) Data & Security Best Practice, Case Study, Overview
A journey for security in a multifactor auth system for a whole nation
Juan Saavedra (Octobot)
As a leading eGov country, the Uruguayan government decided to build its own world-class multifactor auth service for its citizens. Juan Saavedra shares how a journey focused on improving security ultimately impacted development practices and architecture and how it relates to improvements in usability and reliability in the context of a RESTful web application.
2:15pm-3:05pm (50m) Domain-Driven & Event-Driven Architecture, Fundamentals Best Practice, Case Study
The life beyond event sourcing: Why building event sourcing strategy is awesome and dangerous
Biharck Araujo (ThoughtWorks)
When it comes to building complex systems architectures, teams often begin with strategies such as event drive and, in some cases, even sourcing approaches. What some forget is that details in postproduction might generate more problems than solutions. Biharck Araújo shares real use cases that illustrate the most essential parts of the event sourcing methodology and common mistakes to avoid.
3:50pm-4:40pm (50m) Domain-Driven & Event-Driven Architecture Hands-on, Overview
Opportunities and pitfalls of event-driven utopia
Bernd Rücker (Camunda)
Event-driven architectures are on the rise. Bernd Rücker looks at events on the inside and outside of an application or service to determine the advantages of event-driven architectures. But he also focuses on the often-forgotten pitfalls. You'll leave with a better understanding what event driven means and how to apply it in your project.
4:50pm-5:40pm (50m) Enterprise architecture, Fundamentals Best Practice, Case Study
Challenges to internationalize the largest digital bank in the world
Luiz Hespanha (Nubank), Lucas Cavalcanti (Nubank)
Nubank is a national bank from Brazil with 12 million customers and an architecture with 300+ microservices that are totally cloud based. Luiz Hespanha and Lucas Cavalcanti outline the challenges of expanding to other countries and internationalizing all the bank's services.
3:50pm-4:40pm (50m) DevOps & Continuous Delivery, Fundamentals Best Practice, Case Study
Automating the New York Times crossword
Phil Wells (New York Times)
The engineers on the New York Times digital games team bake quality into every new product and feature they deliver. Join Phil Wells for an overview of how the team builds a culture of quality. You'll discover a few of the technical tools and tricks the team uses to ensure confidence and velocity in their software delivery process.
4:50pm-5:40pm (50m) Domain-Driven & Event-Driven Architecture Case Study
Using actors for data-driven stream processing
Amanda Kabak (CleanSpark)
Amanda Kabak explains why there's more to stream processing than serverless workflows. Actors can provide the ability to create complex calculations meshes that run on cloud resources with cost-effective density.
9:00am-9:05am (5m)
Wednesday opening welcome
Christopher Guzikowski (O'Reilly), Neal Ford (ThoughtWorks)
Program chairs Christopher Guzikowski and Neal Ford open the second day of keynotes.
9:05am-9:25am (20m)
Where do great architectures come from?
Mary Poppendieck (Lean Software Development Series)
Every 15 years or so, the common wisdom about the best architecture in the software world changes. Mary Poppendieck walks you through a few of the more dramatic architectural changes, looking at what triggered them and how well they worked out.
9:25am-9:45am (20m)
Intellectual control
George Fairbanks (Google)
Software today is staggeringly larger than the programs of the 1960s. George Fairbanks interrogates whether that means it's under our intellectual control or if we found ways to make progress without Edsger Dijkstra's high standards.
9:45am-10:05am (20m)
Architecture.Next: Invalidating old axioms
Mark Richards (Self-employed)
Mark Richards challenges some of the tried-and-true axioms in software architecture and shows you how to manage the ever-changing state of software architecture.
10:05am-10:15am (10m)
Closing remarks
Program chairs Chris Guzikowski and Neal Ford close the second day of keynotes.
10:15am-10:45am (30m)
Break: Morning Break
3:05pm-3:50pm (45m)
Break: Afternoon Break
12:15pm-1:15pm (1h)
Lunch and Wednesday Topic Tables
Join other attendees during lunch at Software Architecture to share ideas, talk about the issues of the day, and maybe solve a few problems. If you aren’t sure which topic to pick, don’t worry—it's not a long-term commitment.
8:45am-9:00am (15m)
Plenary
8:00am-9:00am (1h)
Break: Morning Coffee
8:15am-8:45am (30m)
Wednesday Speed Networking
Jumpstart your networking at Software Architecture by coming to Speed Networking before the keynotes begin. Bring your business cards and prepare a minute of chitchat about yourself, your projects, and your interests.
  • IBM
  • LaunchDarkly
  • LightStep
  • Red Hat
  • ThoughtWorks
  • Auth0
  • Check Point Software
  • Contentful
  • Contrast Security
  • Datadog
  • Diamanti
  • Octobot.io
  • Optimizely
  • Perforce
  • Robin.io
  • SmartBear
  • Tidelift
  • WhiteSource
  • Synopsys
  • AxonIQ
  • Codefresh
  • CodeStream
  • Hello2morrow
  • LogRocket
  • Rookout
  • Solo.io
  • CNN
  • Boundless Notions, LLC

Contact us

confreg@oreilly.com

For conference registration information and customer service

partners@oreilly.com

For more information on community discounts and trade opportunities with O’Reilly conferences

Become a sponsor

For information on exhibiting or sponsoring a conference

pr@oreilly.com

For media/analyst press inquires