Build Systems that Drive Business
June 11–12, 2018: Training
June 12–14, 2018: Tutorials & Conference
San Jose, CA


Jessica DeVita (Microsoft)
Jessica DeVita tells the story of how a team at Microsoft challenged themselves to retrospect their retrospectives and shares what they learned about applying human factors ideas to software development.
Morgan McLean (Google), Jaana B. Dogan (Google)
Morgan McLean and Jaana Burcu Dogan detail how to quickly instrument your distributed services and gain visibility into their operation with OpenCensus.
Mark Prichard (AppDynamics)
Mark Prichard reviews available metrics from infrastructure, Kubernetes, containers, and application code and shares options for viewing them holistically, thus providing a complete picture of how your applications are behaving and how users are experiencing them.
Will Gallego (Etsy)
Will Gallego walks you through the structure of postmortems used at large tech companies with real-world examples of failure scenarios and debunks myths regularly attributed to failures. You'll learn how to incorporate open dialogue within and between teams to bridge these gaps in understanding.
David Hayes (PagerDuty)
Artificial intelligence has been almost here for 50 years, but we don't need to wait for it to escape the laboratory. Adding a manageable dose of actionable intelligence to your operations management workflow can save you time and aggravation. PagerDuty will talk about how AI's limitations and how it can decrease your noise and suggest possible courses of action.
Michael Brunton-Spall (Bruntonspall Ltd)
Traditional security approaches to threat and risk management are highly optimized to work within a traditional software development lifecycle. Michael Brunton-Spall shares a new approach to reviewing systems along with real-life examples to help you prioritize where to focus security efforts and what sorts of security threats you should worry about.
Join us at the San Pedro Square Market to enjoy the best of local food, drink, and entertainment and have a chance to win amazing prizes. Attendees of both Fluent and Velocity are invited, so you'll have the opportunity to network with everyone.
If you’re looking to find like minds and make new professional connections, come to the diversity and inclusion networking lunch on Wednesday.
Laurent Gil (Oracle + Dyn)
Bots now make up over 50% of website traffic and have become the primary source of malicious application attacks. Laurent Gil outlines what you need to know about bot traffic, discusses the types of bots you may encounter, from the simple to the sophisticated, and shares three real-world applications of machine learning and artificial intelligence to identify and defeat malicious bots.
Qingyang Chen (Google), Appu Goundan (Google)
Qingyang Chen and Appu Goundan demonstrate how to speed up container-based development by building container images with Jib, a Google image build tool for Java applications.
Jason Yee (Datadog)
Jason Yee shows how you can more easily test code in production while isolating the effect of potential issues using container orchestration and services meshes.
Join us for the closing celebration of Velocity and Fluent. Don’t miss this last chance to mingle.
Abby Fuller (Amazon Web Services)
There are many conference sessions on "how to get started with X." But once you've gotten up and running, there isn't always a lot of guidance on how to solve harder issues. Abby Fuller takes you beyond getting started with containers on AWS, covering advanced topics like hybrid clusters, bringing your own AMI, working with Docker settings not supported in the UI, and debugging load balancers.
Mike Roberts (Symphonia)
Mike Roberts leads a warts-and-all journey through some of the limitations of a serverless approach and shares a practical set of techniques for dealing with these concerns.
Bryan Liles (Heptio)
Declarative application management enables developers and operators to simplify their configurations while deploying into increasingly complex environments. Bryan Liles explains how to evaluate and integrate these new practices into existing continuous integration pipelines.
John Miller (Fauna)
The complexity of distributed databases makes building tools for their declarative automation a daunting engineering challenge. Drawing from his experience of developing multiple configuration automation systems for databases, John Miller explores patterns that generally apply to building declarative management tooling for distributed stateful systems.
Scott Wimer (Smartsheet)
Scott Wimer explains how to support the GDPR’s Right to be Forgotten through targeted, secure data destruction.
Luis Eduardo Colon (Amazon Web Services)
Many fundamental security practices and controls apply to serverless applications, including implementing proper monitoring and logging of all requests and events. Luis Eduardo Colon explores recommendations published by the Center for Internet Security (CIS), explains how to automate the deployment of some of these controls, and outlines considerations relevant to serverless functions.
Serena Chen (BNZ Digital)
What insights do we gain if we apply user experience design to information security? Serena Chen shares four strategies that apply design thinking to security problems, pinpointing which practices work and which are detrimental. Serena then walks you through some common flows and dissects how design decisions affect your personal security.
Ben Amaba (IBM)
The digital world has produced efficiencies, new products, and closer customer relationships. Yet as systems continue to gain complexity through emerging technology, the failure rates in budgets, schedules, and quality goals become increasingly unmanageable. Ben Amaba explains how to effectively use frameworks and methods to create business models that are intelligent and resilient.
Alena Hall (Microsoft)
Data is generated at an ever-increasing rate, so your architecture for ingesting these incoming influxes of data needs to be flexible, scalable, fast, and resilient. Alena Hall walks you through using distributed systems like Apache Kafka and Spark Streaming to process data coming from multiple sources in real time, do processing, and perform machine learning tasks.
Sean Kane (New Relic)
Drawing on his book Docker: Up & Running, Sean Kane walks you through everything that you need to know to start using Docker successfully, from installing Docker and designing and building Docker images to deploying and managing Docker containers. You'll leave with a firm understanding of how containers can help you optimize your workflow.
Sean Kane (New Relic)
Sean P. Kane, co-author of Docker: Up and Running, and an experienced trainer for O’Reilly will teach students everything that they need to know to start using Docker successfully. This will include teaching students how to install Docker, design and build Docker images, deploy and manage Docker containers, and simply think about containers and how they can help you optimize your workflow.
Dave Andrews (Verizon Digital Media Services)
Change is inevitable, but the aftereffects can be both good and bad. Having the right tools is one way to meet this challenge. Dave Andrews explains how to wield the power of a global 50 Tbps application delivery network, featuring 125+ points of presence, to ensure maximum availability during and after a change.
Ben Hartshorne (Honeycomb), Christine Yen (Honeycomb)
Ben Hartshorne and Christine Yen explore what it means for a system to be “up” by discussing end-to-end (e2e) checks (what makes a good one and what techniques are valuable when thinking about them). Along the way, you'll learn how to write and evolve an e2e check against a common API.
Donovan Brown (Microsoft)
“That would never work here.” You’ve likely heard this sentiment (or maybe you’ve even said it yourself). Good news: change is possible. Donovan Brown explains how Microsoft's Visual Studio Team Services (VSTS) went from a three-year waterfall delivery cycle to three-week iterations and open sourced the VSTS task library and the Git Virtual File System.
Join us for the Expo Hall Reception on Wednesday, June 13, following the afternoon sessions.
Kathleen Vignos (Twitter)
Engineering teams want technically competent managers, but they also often want managers to keep their hands off their code. So how can managers keep their technical skills relevant in order to add the most value? Kathleen Vignos shares creative strategies for developing and maintaining technical skills—some through the act of managing itself.
Bing Wei (Slack)
In 2016, Slack faced a problem: the load on its backend servers had increased by 1,000x. Bing Wei explains how rearchitecting the system with lazy loading, a publish/subscribe model, and an edge cache service overcame the problem with zero downtime, improved latency, and led to gains in reliability and availability.
Soam Vasani (Platform9 Systems), Timirah James (Platform9 Systems)
FaaS functions are great for small functionality but not for complex real-world applications. Soam Vasani and Timirah James explore four available options for composing functions, along with a deep dive into workflows.
Christian Saide explains how NS1 was able to reduce infrastructure, maintenance, and operational costs while simultaneously increasing throughput and visibility of key metrics by leveraging Elasticsearch as a time series database.
Francesc Campoy Flores walks you through the tools that make Go a great programming language, from the well-known go tool to lesser-known tools that allow you to profile, debug, and understand the performance of your programs. Along the way, you'll learn how to tune Visual Studio Code as a Go editor, although you are welcome to use any other editor—most provide great integration with Go.
Martin Woodward (Microsoft)
Expanding on the concepts from his keynote, Martin Woodward digs in behind the data and gives a technical summary of the steps Microsoft has taken in its journey to DevOps. Join in to discover what Microsoft has learned so far and the next areas it will focus on.
Ryan Neal (Netlify)
Ryan Neal explains how Netlify planned, tested, and executed its first multicloud migration that could direct traffic to Google Cloud (GCP), AWS, and Rackspace Cloud on demand, without any service interruptions. Along the way, Ryan shares lessons learned and key takeaways you can apply to your own infrastructure decisions.
David Calavera (Netlify)
Netlify recently moved a production system to Kubernetes, but the story isn't so simple. David Calavera shares the lessons Netlify learned during the migration that made the company roll the migration back and explains how they rolled it again—all without affecting production availability.
Tammy Butow (Gremlin)
High-severity incident management is the practice of recording, triaging, tracking, and assigning business value to problems that impact critical systems in order to enhance the customer experience by improving your infrastructure reliability and upskilling your team. Tammy Butow walks you through establishing a high-severity incident management program and measuring its success.
Baron Schwartz (VividCortex)
Baron Schwartz demonstrates how to monitor a database by understanding the difference between workload and resource monitoring—and the golden signals for each.
Cynthia Thomas (Cilium)
Modern microservices architectures (like those run on Kubernetes) need modern security solutions to provide least-privilege security. Cynthia Thomas outlines traditional firewall methods and details the evolution of the distributed security model to enforce least privilege for microservices.
Miro Cupak (DNAstack)
The Beacon Network is the largest search and discovery engine of human genomic data in the world. Miro Cupak details the architecture and technologies behind the system with focus on the technical decisions that allow it to scale and disrupt the perception of genetic data.
David Cheney (Heptio)
David Cheney shares real-world advice on how to extend the capabilities of a Kubernetes cluster, using the development of the open source Contour Ingress controller as a case study.
Kyle Kingsbury (Jepsen)
Kyle Kingsbury offers an overview of Tesser, a Clojure library for writing commutative, parallel folds that can be chained and composed into complex single-pass reductions that are dramatically faster on multicore systems and can be transparently distributed over Hadoop.
Seth Vargo (Google)
Kubernetes is a popular application scheduler and orchestration tool, but its built-in secret storage does not provide the robustness many organizations require. In this interactive workshop, Seth Vargo demonstrates how to connect applications and services running under Kubernetes to HashiCorp Vault.
Michael Hausenblas (Red Hat)
Join Michael Hausenblas to learn everything you need to know to be successful with networking in a containerized setup, no matter if you’re a developer or an admin. You'll start with a simple case of Docker containers running on a single machine and move on to advanced networking with Kubernetes.
Ryan Schneider (Heptio)
Using a combination of lecture and hands-on exercises, Ryan Schneider walks you through deploying Kubernetes and containers to build out a microservices architecture.
Nathen Harvey (Chef)
Join Nathen Harvey to learn how to easily integrate automated tests that check for adherence to policy into any stage of your deployment pipeline, using InSpec for compliance and Chef for remediation.
Tamao Nakahara (Weaveworks), Ilya Dmitrichenko (Weaveworks), Stefan Prodan (Weaveworks)
Prometheus—an open source monitoring system and time series database—features a multidimensional data model and a flexible query language and integrates monitoring aspects from client-side instrumentation to alerting. Tamao Nakahara, Ilya Dmitrichenko, and Stefan Prodan offer an overview of Prometheus architecture and concepts and walk you through using Prometheus and PromQL.
Tyler McMullen (Fastly)
Tyler McMullen offers an overview of sandboxing compilers, which provide important benefits but are also challenging to make both safe and fast. Tyler covers machine code generation and optimization, trap handling, and memory sandboxing and illustrates how to integrate them into an existing system—all based on a real compiler and sandbox, currently in development.
People often say that they’re practicing continuous delivery, and then add something like “I can let the security team know any time” or “I just have to run the performance tests.” They might have really good continuous integration, but it's not CD if they can't deploy right now.
JavaScript engines are frequently targeted by malicious attackers, and dozens of vulnerabilities are reported in them every year. Most of these occur due to errors made while implementing well-specified features. Natalie Silvanovich discusses the link between feature complexity, developer error, and security vulnerabilities and the importance of considering implementation difficulty in design.
Kyle Kingsbury (Jepsen)
Kyle Kingsbury explores anomalies in three distributed systems—Tendermint, Hazelcast, and Aerospike—and shares general strategies for correctness testing using Jepsen, a distributed system testing harness that applies property-based testing to databases to verify their correctness claims during common failure modes: network partitions, process crashes, and clock skew.
Jeff Williams (Contrast Security)
Jeff Williams explains how to layer security tools on a CI/CD pipeline without disrupting it and demonstrates a fast, effective, scalable DevSecOps pipeline using free tools.
Bridget Kromhout (Microsoft)
In this hands-on Kubernetes workshop, Bridget Kromhout walks you through launching clusters and details all the moving parts you need to know about to use Kubernetes in production.
Ian Lewis (Google)
Ian Lewis shares the easiest and best ways to improve the security of your Kubernetes clusters
Brian Ketelsen (Microsoft), Erik St. Martin (Microsoft)
Brian Ketelsen and Erik St. Martin guide you through key concepts and practices for deploying and maintaining applications using Kubernetes.
Brian Ketelsen (Microsoft), Erik St. Martin (Microsoft)
This class is intended for solutions developers, systems operations professionals, solution architects, and development operations professionals who develop, migrate, and deploy container-based applications in the public cloud and want to learn the key concepts and practices for deploying and maintaining applications using Kubernetes.
Sunil Sadasivan compares the work environments of startups to those of bureaucracies and shares lessons for maintaining an optimal engineering work culture learned at the US Department of Veterans Affairs.
When Tamar Bercovici joined Box, the entire platform was running on a single MySQL DB host fronted by a simple pool of memcached servers. Tamar details how the team has evolved the Box database stack to handle an ever-growing query load and dataset. It now comprises hundreds of servers serving millions of queries per second over hundreds of billions of data records.
Matt Torrisi (Oracle + Dyn)
Matt Torrisi demonstrates how to build domain traffic easily by enabling multiplatform DNS, covers the important criteria in assessing DNS network compatibility, and walks you through using DNS as a traffic-steering platform.
John LaBarge (Google)
John LaBarge details how to perform lightweight mobile DevOps on GCP, including building Android applications with Container Builder, doing functional testing with Firebase Device Lab, and distributing tested artifacts through Crashlytics Beta.
Tim Koopmans (Tricentis)
Tim Koopmans explains how load testing is being reinvented for DevOps, covering where traditional load testing approaches fall short for Agile and DevOps, what’s needed to rapidly expose performance issues before they impact users, and new approaches to making load testing faster, simpler, and more realistic.
Join other attendees during lunch at Velocity to share ideas, talk about the issues of the day, and maybe solve a few. Not sure which topic to pick? Don’t worry—it's not a long-term commitment. Try two or three and settle on a different topic tomorrow.
Join other attendees during lunch at Velocity to share ideas, talk about the issues of the day, and maybe solve a few. Not sure which topic to pick? Don’t worry—it's not a long-term commitment. Try two or three and settle on a different topic tomorrow.
Mike Roberts (Symphonia)
Serverless applications have moved from interesting oddity to the mainstream. But how do teams take the raw ideas of serverless and apply them in a continuous deployment context, operate serverless applications with confidence, and scale them to handle whatever the world can throw at them? Mike Roberts guides you through the answers to these questions and more in this in-depth master class.
Mike Roberts (Symphonia)
Serverless applications have moved from “interesting oddity” into the mainstream. But how do teams take the raw ideas of Serverless and apply them to a continuous deployment context, operate Serverless applications with confidence, and scale them to handle whatever the world can throw at them? Mike Roberts guides you through the answers to these questions, and more, in this in-depth masterclass.
Gwen Shapira (Confluent), Xavier Léauté (Confluent)
Experienced Kafka admins don’t just collect metrics; they go the extra mile and use additional tools to validate availability and performance on both the Kafka cluster and their entire data pipelines. Gwen Shapira and Xavier Léauté share best practices for monitoring Apache Kafka, discussing critical metrics, common mistakes, what metrics don’t tell you, and how to cover these essential gaps.
Jeff Poole (Vivint Smart Home)
Networking with Docker and Kubernetes is a lot more complex than with traditional servers and virtual machines. Jeff Poole offers an overview of the concepts involved and explains what tuning may be required to use Kubernetes successfully.
Kris Nova (Heptio)
Kris Nova leads a deep dive into the world of migrating a monolithic Java application to Kubernetes.
Tomas Lin (Netflix), Emily Burns (Netflix)
Tomas Lin and Emily Burns walk you through building continuous delivery pipelines for deploying and promoting code across cloud virtual machines and containers using Netflix's Spinnaker continuous delivery platform.
Kyle York (Oracle + Dyn), Richard Lee (Netra)
Kyle York and Richard Lee explore Netra’s high-performance computing environment, focusing on how the company's AI and deep learning models process tens of millions of images and videos each day in a time- and cost-effective manner. Along the way, they explain what worked, what didn't, and why you need an Agile, hybrid infrastructure if you want to build an AI business at the scale of social.
Victoria Nguyen (Fastly)
Victoria Nguyen explains how Fastly overhauled the monitoring and data collection of its globally distributed network without its caches noticing.
Ignite is happening at Velocity on Tuesday, June 12. Join us for a fun, high-energy evening of five-minute talks—all aspiring to live up to the Ignite motto: Enlighten us, but make it quick.
Renee Orser (NS1)
Engineering managers build the strongest teams by listening to their engineers, continuously calibrating their own alerts, and driving change management based on the feedback sourced from within their engineering organization. Renee Orser explains how to monitor the human networks within your engineering teams using models similar to your distributed technology systems.
Alex Jaimes (Nauto)
Machine learning (ML) is becoming a critical skill for developers and businesses alike. Applying ML successfully in real-world scenarios, however, remains challenging. Alex Jaimes discusses how to find opportunities to apply ML, the pitfalls in applying it, and the steps required to succeed—from data to metrics to testing to other critical factors.
Sean T Allen (Wallaroo Labs)
In 2007, Pat Helland published "Life Beyond Distributed Transactions: An Apostate’s Opinion," in which he conducts a thought experiment on how to design a distributed database that can scale almost infinitely. While the paper explicitly addresses distributed database design, Sean Allen shows that the ideas are far more widely applicable, particularly in scaling stateful applications.
Performance debugging is a crucial part of ensuring code is production ready, particularly as a company and its products grow. However, bottlenecks that hold these services back can be hard to identify. Christian Grabowski shares his experience debugging bottlenecks in distributed systems, at both a macro (metrics, distributed tracing) and a micro (user space and kernel space profiling) level.
Common retorts from tech types is, "you are doing it wrong", or "RTFM", or "well... actually". What if we aren't doing it wrong? What if we are right and the rest of the industry is wrong? In grand Lightning Talk fashion, we'll do a deep dive on this phenomenon and expose it for what it's worth. Or perhaps, we'll embrace being wrong. Worse things could happen.
Jamie Wilkinson (Google)
Jamie Wilkinson offers an overview of SLOs and the concept of the error budget, a study of the motivation to move away from cause- to symtom-based alerting, and demonstrates how to implement it in your own projects.
A humourous review of some accessibility barriers in our built environment.
Brodie Kurczynski (Las Cumbres Observatory)
Brodie Kurczynski shares how Las Cumbres Observatory developed a stateless interface to take real-time observations on a private global telescope network over the internet on a nonprofit budget.
Rewriting the key software component of your platform from scratch is always intimidating, especially when you guarantee 100% uptime, your platform is in the critical application delivery path, and your environment is highly distributed. Shannon Weyrick discusses NS1's recent DNS server rewrite and the steps the company took to roll it out across its globally distributed network with no downtime.
Astrid Atkinson (Google)
Astrid Atkinson discusses techniques for building systems that are resilient by design.
Kris Nova (Heptio)
Kris Nova explores the current state of running stateful applications in Kubernetes, the tooling gaps you'll want to watch out for, and the four metrics that will help you determine if it's worth the risk.
Jon Tirsen (Square)
Jon Tirsen explains how Square scaled out the backend for its Cash app using Vitess, a database middleware for MySQL built at YouTube.
Julia Grace (Slack)
When Julia Grace joined Slack two-and-a-half years ago, the company had fewer than 100 engineers. It's now at more than 350, and her own team grew from 10 to 50 people in 18 months. Julia shares tips and stories from the leadership front lines as she learned how to rapidly scale herself and her leadership team during a period when her job was substantially changing every six months.
Julia Grace (Slack)
When Julia Grace joined Slack two-and-a-half years ago, the company had fewer than 100 engineers. It's now at more than 350, and her own team grew from 10 to 50 people in 18 months. Expanding on her keynote, Julia shares tips and stories from the leadership front lines as she transitioned from line manager to managing managers.
Nicole Forsgren shares results and stories from four years of research to uncover the secrets and surprises of what really makes high-performing technology-driven teams and organizations.
Bill Boulden (ClearView Social)
Serverless architectures remove load from web servers and scale flawlessly to handle any volume while keeping you from paying for an instant of wasted idle time. Bill Boulden walks you through creating a functioning serverless API that coexists alongside conventionally served web pages using AWS Lambda and API Gateway.
Lynn Langit (Lynn Langit Consulting)
Serverless data access (via SQL and other data query/processing languages such as Spark) is fast becoming the norm. Lynn Langit compares the state of public cloud serverless SQL via AWS Athena, Google Big Query, and others and explores architectural patterns and examples of services for emerging serverless and data lake cloud pipelines.
Seth Vargo (Google)
Local service discovery and availability is easy, but how do you discover services in other data centers or other cloud providers? Seth Vargo explains how HashiCorp Consul can provide service discovery, monitoring, and failover across many regions and multiple public and private cloud providers.
Marcel Flores (Verizon Digital Media Services)
Marcel Flores explores the design and implementation of Heteractis, the traffic management system Verizon Digital Media Services uses to turn network telemetry data into automated decisions in an automated fashion.
Sacha Judd (Hoku Group)
Homogenous teams are one proven cause of missteps and flaws in software products and pipelines. Sacha Judd offers a fresh perspective, detailing available tools to improve hiring, promotion, and internal culture.
Jon Hodgson (Riverbed)
Much of the monitoring data we rely on is fundamentally flawed, lacking the resolution and accuracy needed to effectively detect and diagnose many issues. Digital signal processing science has overcome similar challenges for audio. Using sound as an example, Jon Hodgson explains how these principles are leveraged by organizations to improve the fidelity of their performance monitoring.
As systems increase in complexity, proactively introducing failure through cross-team GameDays can not only improve your overall uptime, but encourage more resilient implementations across the stack.
Imagine you went to a Gap store, even before entering you had to fill out a survey based on your experience? Imagine doing groceries, all aisles are empty, and the staff is populating the shelves as you walk past them. Sounds absurd? Yet, that’s what we subject digital users to today. In this talk we explore how strange some of the digital design practices would be, if planted in the real world.
Manish Mehta (Netflix), Torin Sandall (Open Policy Agent Project)
Manish Mehta and Torin Sandall lead a deep dive into how Netflix enforces authorization policies (“who can do what”) at scale in its microservices ecosystem in a public cloud without introducing unreasonable latency in the request path.
Introducing the Fluent/Velocity 5K Fun Run/Walk! You don’t have to be a serious runner. We encourage you to go at your own pace and stop to take in views of San Jose.
Kyle York (Oracle + Dyn)
When the internet is not bombarding your DNS with bogus requests, it’s trying to execute malicious SQL queries and crawling your site with bots (some good, some bad). Join Kyle York to learn how to take action.
Javier Garza (Akamai Technologies)
We are more mobile now than ever. Although we use our mobile devices to optimize our time and do more anytime, anywhere, our apps are still too slow and cannot cope with our fast-paced lifestyle. Javier Garza details the ingredients you need to build and deliver an amazing app your users will love.
Erica Windisch (IOpipe)
Serverless and other stateless applications still manipulate state—somewhere. Erica Windisch explains why observing this state and knowing where, how, and why that state is manipulated is important for operational security and developer concerns such as debugging.
Paul McCallick (Nordstrom)
Paul McCallick discusses how and why Nordstrom has moved to an only-production viewpoint, saving countless engineering cycles and putting effort where it matters.
John Mumm (Wallaroo Labs)
Coordination is a common source of performance problems when dealing with distributed state. John Mumm shares strategies for avoiding coordination and relying on local knowledge wherever possible along with pros and cons and tips for using in-memory state instead of the typical approach of using external data stores.
It’s 2018 and our understanding of the human creative process is still embarrassingly disappointing. If there is one thing we know, though, it is that the most ground-breaking innovations of all times have often originated from the craziest ideas. What if the eccentricity that is characteristic of the human brain was indeed the missing ingredient to building artificially intelligent systems?
O’Reilly Author Book Signings will be held in the O’Reilly booth on Thursday. This is a great opportunity for you to meet O’Reilly authors and speakers.
Nikki McDonald (O’Reilly Media ), Ines Sombra (Fastly), James Turnbull (Empatico)
Program chairs Nikki McDonald, Ines Sombra, and James Turnbull open the second day of keynotes.
Jumpstart your networking at Velocity at Speed Networking before the keynotes begin. Bring your business cards and prepare a minute of patter about yourself, your projects, and your interests.
Astrid Atkinson (Google)
Astrid Atkinson shares a microservices-based approach to tackling legacy and heterogeneity at Google.
Donna Malayeri (Pulumi)
Tooling is necessary for serverless and service-full applications. Donna Malayeri shares a decision framework for choosing infrastructure deployment tools, based on whether you need flexibility and control or simplicity and ease-of-use. You'll learn how to evaluate several popular cloud automation tools, including AWS SAM, Terraform, Chalice, Serverless Framework, and more.
Jasmin Nakic (Salesforce ), Jackie Chu (Salesforce)
Jasmin Nakic and Jackie Chu share techniques to identify performance challenges by analyzing production data from Salesforce and other sources and explore the AI models to predict trends, detect anomalies, and troubleshoot performance problems.
In our O'Reilly book, Distributed Denial of Service, we talked about the necessity of having an "IP Yellow Page" in real time. As merchant silicon becomes powerful enough to house millions of filter entries, If we can determine the source reputation of an incoming request, we can efficiently drop the bad requests upstream and mitigate DDoS attacks at scale.
Looking for dinner plans Tuesday night? Sign up to join a group of fellow attendees for the Velocity Dine-Around.
O’Reilly Author Book Signings will be held in the O’Reilly booth on Wednesday. This is a great opportunity for you to meet O’Reilly authors and speakers.
Nikki McDonald (O’Reilly Media ), James Turnbull (Empatico), Ines Sombra (Fastly)
Program chairs Nikki McDonald, Ines Sombra, and James Turnbull open the first day of keynotes.
Jumpstart your networking at Velocity at Speed Networking before the keynotes begin. Bring your business cards and prepare a minute of patter about yourself, your projects, and your interests.
Imad Mouline (Everbridge)
During crisis situations when lives are at stake, your critical event management and messaging platform cannot allow even the tiniest performance glitch. Imad Mouline explores technical and compliance challenges for building highly reliable, highly scalable, and highly secure systems that comply with the most demanding clients' needs and the highest levels of international regulations.
Liz Rice (Aqua Security)
Liz Rice leads a dive into what's easy—and what's not—about finding and patching security vulnerabilities in containers.
Want to be a better speaker, collaborator and communicator? Learn how improv can help.
Martin Woodward (Microsoft)
Martin Woodward leads a whistle-stop tour of Microsoft's seven-year DevOps journey, explaining why the company embarked on this transformation and what benefits it has already seen.
Neal Mueller (Google)
Google conducted the first longitudinal study of the underground ecosystem fueling credential theft and identified 12.4 million potential victims of phishing kits. Neal Mueller discusses this data and shares phishing demos and recommendations about the effectiveness of phishing prevention tools, including education, antivirus software, filtering, 2FA, password managers, and security keys.