Build & maintain complex distributed systems
October 1–2, 2017: Training
October 2–4, 2017: Tutorials & Conference
New York, NY
 

Schedule

< Filters

No Results Found

Clear all filters

Close

Filters

      Clear filters
      Beekman
      1:30pm Your (container) secret's safe with me Liz Rice (Aqua Security)
      2:25pm Managing applications on Kubernetes with Helm Michelle Noorali (Microsoft Azure)
      3:50pm Monitoring containers: Follow the data Ilan Rabinovitch (Datadog)
      4:45pm How do you eat a whale? One byte at a time Kelly Looney (Skytap)
      Regent
      11:35am Event sourcing on a global scale: Netflix downloads Joseph Breuer (Netflix), Robert Reta (Netflix)
      1:30pm Putting your first paper into production Ben Linsay (Bumpers)
      2:25pm Scalable, fluent time series data analysis Leif Walsh (Two Sigma)
      Gramercy
      11:35am Sysadmins and DevOps and SREs, oh my! Bryan Liles (Heptio)
      2:25pm The art of the possible Jonathan Moore (Comcast Cable)
      3:50pm Operating microservices: Everything is at scale. Sarah Wells (Financial Times)
      Nassau
      1:30pm Load balancing, consistent hashing, and locality Andrew Rodland (Vimeo)
      4:45pm How LinkedIn determines the capacity limits of its services using live traffic Susie Xia (LinkedIn), anant Rao (LinkedIn)
      Grand Ballroom West
      Grand Ballroom West
      9:00am Tuesday opening welcome Mary Treseler (O'Reilly Media), James Turnbull (Glitch), Ines Sombra (Fastly)
      9:25am Fly the airplane (sponsored by NS1) Kristopher Beevers (NS1)
      9:30am The impact of design: How design influences outcomes Cynthia Savard Saucier (Shopify)
      9:55am FTFY: Research advances in automatic bug repair Claire Le Goues (Carnegie Mellon University)
      10:15am Government is a system. Matt Cutts (United States Digital Service (USDS))
      10:25am Blockchains and cryptocurrencies: New paradigms for shared data Neha Narula (Digital Currency Initiative)
      10:40am Tuesday Closing
      11:35am Find your way: Orienteering for managers VM Brasseur (Juniper Networks), Deb Nicholson (Software Freedom Conservancy)
      2:25pm Managing grumpy to build stronger teams Lisa Phillips (Fastly)
      Murray Hill East B
      11:35am A reference architecture to automate content delivery into your CI/CD workflows (sponsored by Akamai) Duncan McAllister (Akamai Technologies), Akshay Ranganath (Akamai Technologies)
      2:25pm FPGA-accelerated data analytics (sponsored by Intel) Mike Strickland (Intel Corporation)
      4:45pm What happens when technology and government mix? Matt Cutts (United States Digital Service (USDS))
      12:15pm Tuesday lunch and Birds of a Feather sessions | Room: Americas Halls 2
      8:15am Tuesday Speed Networking | Room: 3rd Floor Foyer
      8:00am Coffee | Room: Grand Ballroom Foyer
      10:45am Break | Room: Sponsor Pavilion
      3:05pm Break | Room: Sponsor Pavilion
      5:25pm Sponsor Pavilion Reception (sponsored by NS1) | Room: Sponsor Pavilion
      7:00pm DevOps After Dark | Room: The Attic
      11:35am-12:15pm (40m) Orchestration, Scheduling, and Containers
      Health checking: A not-so-trivial task in the distributed containerized world
      Alexander Rukletsov (Mesosphere)
      Application health checking and probing have existed since the dawn of computer science. Usually seen as a trivial task, health checking becomes more involved when applied to distributed cloud-native apps. Alexander Rukletsov discusses the challenges and perils of modern health checking and shares lessons learned during the revamp of the Apache Mesos health checks subsystem.
      1:30pm-2:10pm (40m) Orchestration, Scheduling, and Containers
      Your (container) secret's safe with me
      Liz Rice (Aqua Security)
      In a containerized deployment, how do you safely pass secrets like passwords and certificates between containers without compromising their safety? If orchestration means a container can run on any machine in the cluster, how do you minimize who knows your secrets? Liz Rice explores the risks and shares best practices for keeping your secrets safe.
      2:25pm-3:05pm (40m) Orchestration, Scheduling, and Containers
      Managing applications on Kubernetes with Helm
      Michelle Noorali (Microsoft Azure)
      Container orchestration platform Kubernetes has seen unprecedented traction and adoption in the last few years. However, it can be difficult to figure out how to actually deploy your applications on Kubernetes if you're new to the space. Michelle Noorali walks you through configuring, deploying, and managing applications on Kubernetes using an open source tool called Helm.
      3:50pm-4:30pm (40m) Orchestration, Scheduling, and Containers
      Monitoring containers: Follow the data
      Ilan Rabinovitch (Datadog)
      Drawing on real-world metrics data from thousands of organizations, Ilan Rabinovitch shares the latest trends in container adoption and use, explores the types of applications organizations are running in containers, and explains how to best monitor these containerized applications.
      4:45pm-5:25pm (40m) Orchestration, Scheduling, and Containers
      How do you eat a whale? One byte at a time
      Kelly Looney (Skytap)
      Kelly Looney shares an incremental approach to introducing containers into complex, distributed applications—resulting in modernization with less risk and more reward. You’ll learn how to evaluate which components of your applications are best suited for containers, how to experiment safely and get fast feedback, and how to increase and scale your container adoption.
      11:35am-12:15pm (40m) Distributed Data & Databases
      Event sourcing on a global scale: Netflix downloads
      Joseph Breuer (Netflix), Robert Reta (Netflix)
      The Netflix download feature allows users to download content for offline playback. Implementing this feature required a new persistence architecture to maintain the state of user devices and content licenses. Joseph Breuer and Robert Reta explore the technical decisions behind the choice of a Cassandra event sourcing data store.
      1:30pm-2:10pm (40m) Distributed Data & Databases
      Putting your first paper into production
      Ben Linsay (Bumpers)
      Machine learning is as accessible as it has ever been, but it’s not always obvious how to go from a cool paper to serving production traffic. Ben Linsay helps you get started putting your paper into production, sharing lessons learned solving real problems with machine learning at Kickstarter.
      2:25pm-3:05pm (40m) Distributed Data & Databases
      Scalable, fluent time series data analysis
      Leif Walsh (Two Sigma)
      Leif Walsh offers an overview of Flint, Two Sigma's open source time series extension to Spark, explains how it fits in with the Spark programming model, and lays out the roadmap for the future of pandas, PySpark, and Flint.
      3:50pm-4:30pm (40m) Distributed Data & Databases, Systems Engineering
      Four things I wish I'd known sooner about persistent memory
      Rob Dickinson (resurface.io)
      On the surface, adapting software to use persistent memory seems obvious. After all, persistent memory is simply fast memory that maintains state when the power goes out, like an SSD. But unlike SSDs, persistent memory challenges long-held ideas and conventions about how software works. Rob Dickinson outlines four key ideas that will help focus your persistent memory strategy.
      4:45pm-5:25pm (40m)
      Developing scale-agnostic distributed systems with entities
      Andrew Turley (Wallaroo Labs)
      The cost of coordinating access to information in a distributed system increases as the system scales up. Andrew Turley offers an overview of the entity-based approach to addressing this issue and explains how it has influenced the design of Wallaroo, a platform for building high-performance, event-driven systems.
      11:35am-12:15pm (40m) DevOps & Tools
      Sysadmins and DevOps and SREs, oh my!
      Bryan Liles (Heptio)
      Our industry is continuing to mature, and there is a path for you. Bryan Liles explores paths for starting a career in systems engineering, ideas on where we could go in the future, and how words, technology, and empathy impact the people and projects we interact with every day.
      1:30pm-2:10pm (40m) Resilience Engineering, Systems Engineering
      Serverless security: What's left to protect?
      Guy Podjarny (Snyk)
      Serverless means handing off server management to the cloud platforms—along with their security risks. With the “pros” ensuring our servers are patched, what’s left for application owners to protect? As it turns out, quite a lot. Guy Podjarny explores the aspects of security serverless doesn’t solve, the problems it could make worse, and the tools and practices you can use to keep yourself safe.
      2:25pm-3:05pm (40m) DevOps & Tools, Systems Engineering
      The art of the possible
      Jonathan Moore (Comcast Cable)
      How does a large 50-year-old company go from purchasing much of its technology and working with yearlong release cycles to building multiple products in-house and releasing daily? Jon Moore traces the changing set of tools, techniques, and attitudes that have powered (and still power) this transformation at Comcast over the last decade, mapping out a path you can follow in your own company.
      3:50pm-4:30pm (40m) DevOps & Tools, Monitoring, Tracing and Metrics
      Operating microservices: Everything is at scale.
      Sarah Wells (Financial Times)
      Most people think about microservices as a solution for scale. That may be the case, but operating them is definitely a scale challenge. Sarah Wells explains why, when you have 100+ services, everything needs to be automated, or else you'll spend two days updating Jenkins build pipelines or be woken up every night by false alarms caused by network blips.
      4:45pm-5:25pm (40m) DevOps & Tools
      Persistent SRE anti-patterns: Pitfalls on the road to creating a successful SRE program like Netflix and Google
      Blake Bisset (Independent), Jonah Horowitz (Stripe)
      People aren't just wrong on the internet. Sometimes they bring it back to the office. Blake Bisset and Jonah Horowitz share stories about anti-patterns in monitoring, incident response, configuration management, and more and explain how Google and Netflix view the role of the SRE (and how it differs from the traditional system administrator role).
      11:35am-12:15pm (40m) Networking, Traffic, and Edge Management
      The Vary header and the future of cache variation at the edge
      Andrew Betts (Fastly)
      Most people working with CDN caches know about the Vary header, but few properly understand what it really does. With the advent of the Key header, new patterns for varying cache content will soon emerge. Andrew Betts shares common and advanced use cases for Vary, such as language, A/B testing, compression, and service worker support, and outlines potential changes to consider when Key arrives.
      1:30pm-2:10pm (40m) Networking, Traffic, and Edge Management, Systems Engineering
      Load balancing, consistent hashing, and locality
      Andrew Rodland (Vimeo)
      Serving a billion requests per day with a dynamic video packager makes unique demands on a load balancer. Andrew Rodland shares a new consistent hashing algorithm developed by Google researchers that helped improve cache locality and optimize delivery—and made a contribution to open source software in the process.
      2:25pm-3:05pm (40m) Networking, Traffic, and Edge Management
      Automated bot squashing: How to build your own bot fighting infrastructure
      Felix Glaser (Shopify)
      During flash sales, when milliseconds matter, bots buy faster than humans. These bots created a constant load on Shopify’s infrastructure and SREs—until the company decided to create an automated system to detect and block nearly all bot traffic on its load balancers. Felix Glaser offers an overview of this system and shares the challenges Shopify faced differentiating between bots and humans.
      3:50pm-4:30pm (40m) Networking, Traffic, and Edge Management
      From prototype to mission critical: The evolution of edge architecture at a global DNS service provider
      Kristopher Beevers (NS1)
      Kristopher Beevers discusses the evolution of the edge delivery architecture of major DNS service provider NS1, from its earliest prototypes to the large, heavily automated global network it operates today, and the many operational lessons learned along the way.
      4:45pm-5:25pm (40m) Capacity Planning, Networking, Traffic, and Edge Management
      How LinkedIn determines the capacity limits of its services using live traffic
      Susie Xia (LinkedIn), anant Rao (LinkedIn)
      Susie Xia and Anant Rao explain how LinkedIn leverages live production traffic to determine service and resource bottlenecks at scale with a tool called Redliner and how you can use your current architecture to do the same.
      9:00am-9:05am (5m)
      Tuesday opening welcome
      Mary Treseler (O'Reilly Media), James Turnbull (Glitch), Ines Sombra (Fastly)
      Mary Treseler, James Turnbull, and Ines Sombra welcome you to the first day of keynotes.
      9:05am-9:25am (20m)
      Unconventional programming paradigms for the future, now
      Carin Meier (Cognitect)
      As technology advances, our systems are growing more and more complex, reaching the threshold of what we can handle and even comprehend. We need more than tools to keep it under control. We need new ways of thinking. Carin Meier explores new ways to approach systems and tame complexity for the rapidly changing future.
      9:25am-9:30am (5m) Sponsored
      Fly the airplane (sponsored by NS1)
      Kristopher Beevers (NS1)
      During active operational incidents, we experience very human reactions that get in the way of resolution. Approaches like Incident Command provide solid foundations for incident response. Kristopher Beevers explains how to augment Incident Command with simple tools and processes that help your team focus, communicate effectively, and respond calmly and precisely during mission-critical events.
      9:30am-9:50am (20m)
      The impact of design: How design influences outcomes
      Cynthia Savard Saucier (Shopify)
      We like to think that technology can make the world a better place, but we (conveniently) forget how it can make it worse. Primum non nocere (first do no harm) is the first concept taught in medical school, serving as a reminder of the possible harm that any intervention might do. Cynthia Savard Saucier challenges the tech industry to come up with its own fundamental principle.
      9:50am-9:55am (5m) Sponsored
      You scream for microservices orchestration; I scream for batch; we all scream for jobs as code (sponsored by BMC Software)
      Joe Goldberg (BMC Software)
      Business transformation has led us to adopt new technologies and process and cultural changes. How batch application automation is built, tested, and run must evolve to keep pace. Joe Goldberg explores jobs as code, which looks at batch application automation from an SDLC perspective—an approach that embeds expectations within a modern automation platform.
      9:55am-10:15am (20m)
      FTFY: Research advances in automatic bug repair
      Claire Le Goues (Carnegie Mellon University)
      Claire Le Goues shares recent advances in academic software engineering and programming languages research that aims to bring that dream to reality, using everything from metaheuristic search to program synthesis to machine learning and search over big databases of existing code to make it happen.
      10:15am-10:25am (10m)
      Government is a system.
      Matt Cutts (United States Digital Service (USDS))
      In government, you can still find out-of-date tech practices like writing requirements for years or launching systems without monitoring. The government wants more effective technology. Meanwhile, everyone else wants a more effective government. Matt Cutts discusses how better technology can improve not just software systems but also trust in government itself.
      10:25am-10:40am (15m)
      Blockchains and cryptocurrencies: New paradigms for shared data
      Neha Narula (Digital Currency Initiative)
      Bitcoin showed us a new way of moving value around the internet without intermediaries. Neha Narula explains how this paradigm might apply to our traditional ways of thinking about databases that cross organizational boundaries. As data on the web becomes consolidated around a few key players, the blockchain might help users gain more control.
      10:40am-10:45am (5m)
      Tuesday Closing
      Keynotes
      11:35am-12:15pm (40m) Technical Leadership
      Find your way: Orienteering for managers
      VM Brasseur (Juniper Networks), Deb Nicholson (Software Freedom Conservancy)
      Are you managing distributed teams with very different stakeholders—perhaps even a mix of hobbyists and paid staff? It probably seemed easy at first, but the further you travel, the more unfamiliar the terrain appears. Luckily, this is not new ground. Many have gotten lost here before and found their way out again. VM Brasseur and Deb Nicholson share a map to productive, happy teams.
      1:30pm-2:10pm (40m) Technical Leadership
      Lessons in interpersonal dynamics from massively multiplayer online games
      Margaret Gourlay (VictorOps)
      In 2005, a World of Warcraft bug helped epidemiological research in unexpected ways. Margaret Gourlay draws on this research to share insight into what works and what doesn’t for functional teams and explains how using these ideas has helped VictorOps strategically grow its engineering team in unexpected ways.
      2:25pm-3:05pm (40m)
      Managing grumpy to build stronger teams
      Lisa Phillips (Fastly)
      Lisa Phillips shares strategies for overcoming individual and organizational management challenges in a globally diverse environment and explores people management challenges and methods to work with the grumpiest admin.
      3:50pm-4:30pm (40m) Technical Leadership
      Pay attention: Why you should care about psychological safety
      John Le Drew (Wise Noodles)
      John Le Drew draws on the hours of interviews he conducted with some of the most respected people in the industry for the Agile Path podcast to explain what psychological safety is and why you should care about it, as he walks you through a series of highly interactive role-playing and improvisation exercises.
      4:45pm-5:25pm (40m) Technical Leadership
      You're not an architect, and this is not a bridge we're building: Leading technical decision making for high-performing teams
      Kellan Elliott-McCrea (Blink Health)
      Kellan Elliott-McCrea explains how to lead technical decision making for high-performing teams.
      11:35am-12:15pm (40m) Sponsored
      A reference architecture to automate content delivery into your CI/CD workflows (sponsored by Akamai)
      Duncan McAllister (Akamai Technologies), Akshay Ranganath (Akamai Technologies)
      CDN automation and pipeline integration can often be a daunting task. Too often these services are integrated late in the delivery process, traditionally in the QA or production deployment phases. Duncan McCallister and Akshay Ranganath share approaches that account for CDNs much earlier in the development lifecycle and highlight specific considerations around CI/CD pipeline integration.
      1:30pm-2:10pm (40m) Sponsored
      Scaling up for performance engineers: Practicing what we preach (sponsored by Micro Focus)
      Oded Keret (Micro Focus)
      Oded Keret shares HPE's performance testing experience, the challenges the company overcame, and the lessons learned along the way.
      2:25pm-3:05pm (40m) Sponsored
      FPGA-accelerated data analytics (sponsored by Intel)
      Mike Strickland (Intel Corporation)
      Microsoft has widely deployed field-programmable gate arrays (FPGAs) for accelerating search, networking, and machine learning—with a little help from the company’s software expertise and its FPGA programmers. Mike Strickland explains how a single FPGA can deliver significant acceleration for multiple workloads.
      3:50pm-4:30pm (40m) Sponsored
      Struts 2, Equifax, and you: The story of the worst breach in history (sponsored by Contrast Security)
      Arshan Dabirsiaghi (Contrast Security)
      Arshan Dabirsiaghi explains what Contrast Security learned from the Struts 2 exploit and details how to stop the next attack against your production apps.
      4:45pm-5:25pm (40m)
      What happens when technology and government mix?
      Matt Cutts (United States Digital Service (USDS))
      When the Healthcare.gov website failed, it was a turning point and an opportunity. In the last few years, hundreds of engineers, designers, and product managers have signed up to do tours of service in government. Matt Cutts explores what happens when technology and government mix. A lot of interesting things, it turns out.
      12:15pm-1:30pm (1h 15m)
      Tuesday lunch and Birds of a Feather sessions
      Birds of a Feather (BoF) sessions provide face-to-face exposure to those interested in the same projects and concepts. BoFs can be organized for individual projects or broader topics (best practices, open data, standards, etc.). BoFs are entirely up to you. We post your topic and provide the space and time. You provide the engaging topic.
      8:15am-8:45am (30m)
      Tuesday Speed Networking
      Meet us before the opening keynotes on Tuesday morning and get to know fellow attendees in quick, 60-second discussions.
      8:00am-9:00am (1h)
      Break: Coffee
      10:45am-11:35am (50m)
      Break: Break
      3:05pm-3:50pm (45m)
      Break
      5:25pm-7:00pm (1h 35m)
      Sponsor Pavilion Reception (sponsored by NS1)
      Join us in the Sponsor Pavilion after the afternoon sessions on Tuesday, October 3, from 5:25pm to 7:00pm for the Velocity Sponsor Pavilion Reception. Visit the exhibitors, mingle with other attendees, and enjoy great refreshments and drinks.
      7:00pm-9:30pm (2h 30m)
      DevOps After Dark
      Join us for the social highlight of Velocity New York at one of New York's finest rooftop lounges, the Attic, located at 251 West 48th Street at 8th Avenue. Enjoy great music, food, and cocktails while networking and making new connections.