February 23–26, 2020

Data & Security sessions

Data is an immensely valuable business currency. Forward-thinking organizations depend on their data for all manner of business practices. The massive proliferation of data acquisition, and its widespread use, are making modern architectures increasingly complex. As a software architecture practitioner, it’s critical that you have an end-to-end plan for your data access, use, and security. Similarly, the security of your entire enterprise is essential to the health of your overall business. If your goal is to help your organization improve in data and security, Software Architecture Conference offers the following relevant sessions.

Add to your personal schedule
2:15pm3:05pm Tuesday, February 25, 2020
Location: Beekman Parlor
Secondary topics:  Anti-Pattern, Best Practice, Overview
Jesus Jackson (eGlobalTech)
In his time designing and deploying large-scale data lakes and distributed systems, Jesus Jackson has learned many hard truths and discovered many myths. Join in to hear some of these myths, lessons learned, and war stories. Read more.
Add to your personal schedule
3:50pm4:40pm Tuesday, February 25, 2020
Location: Beekman Parlor
Secondary topics:  Case Study
Joel Barciauskas (Datadog)
As applications have increased in complexity, so have the queries needed to understand the state and performance of those systems, leading to an explosion in the volume and dimensionality of metrics. Joel Barciauskas outlines how Datadog architected its pipelines, data structures, and storage engines to answer these complex questions, all while scaling to ingest trillions of points per day. Read more.
Add to your personal schedule
4:50pm5:40pm Tuesday, February 25, 2020
Location: Beekman Parlor
Secondary topics:  Hands-on
Alex Silva (Pluralsight)
Since the mid-1980s, relational databases have been standard for most applications to store and query structured data. As architectures became more complex, databases generalized to fit a variety of use cases. Simplicity was key: storage, indexing, caching, querying, and transaction management, all under a unified SQL. Alex Silva examines how relational databases overcome these challenges. Read more.
Add to your personal schedule
1:15pm2:05pm Wednesday, February 26, 2020
Location: Beekman Parlor
Secondary topics:  Best Practice, Case Study, Overview
Juan Saavedra (Octobot)
As a leading eGov country, the Uruguayan government decided to build its own world-class multifactor auth service for its citizens. Juan Saavedra shares how a journey focused on improving security ultimately impacted development practices and architecture and how it relates to improvements in usability and reliability in the context of a RESTful web application. Read more.
Add to your personal schedule
2:15pm3:05pm Wednesday, February 26, 2020
Location: Beekman Parlor
Secondary topics:  Best Practice
James Wallace (EBSCO LearningExpress)
Services can expose sensitive data. However, we often "secure" these services using an API key or security through obscurity. James Wallace explains what you need to secure and how to secure it and shares solutions that can be implemented for both server- and client-side requests—so no matter what your services expose, you'll understand how to build secure distributed architectures. Read more.

Contact us

confreg@oreilly.com

For conference registration information and customer service

partners@oreilly.com

For more information on community discounts and trade opportunities with O’Reilly conferences

Become a sponsor

For information on exhibiting or sponsoring a conference

pr@oreilly.com

For media/analyst press inquires