Industry practitioners and technical product managers from leading vendors demonstrate solutions to some of today's toughest software development challenges in the areas of performance monitoring, Big Data, software delivery, scalability, and more.
Track: Sponsored Solutions Track III
Location: Liberty, 8fl.
Day of week:
Track Host: Nitin Bharti
Over the last decade, Nitin has helped build several notable online developer communities including TheServerSide.com, DZone, and The Code Project. He is known for his extensive editorial work in the Enterprise Java, .NET, SOA, and Agile communities. As Managing Editor and Product Manager at C4Media - the producer of InfoQ.com and QCon events - Nitin continues to pursue his primary passion: helping spread knowledge and innovation throughout the enterprise software development community.
10:35am - 11:25am
Are Opensource Cloud Technologies Ready for Enterprise Scale?
As most of the commercial cloud providers embrace opensource technologies in their cloud platform, many enterprises wonder whether these technologies are ready for cloud scale. These opensource cloud technologies provide key functions like Orchestration, Scheduling, Traffic management, Security, Observability and form the core part of cloud fabric and services. In this session, I will review how major opensource projects like Istio, Cloud Foundry, Kubernetes, Envoy etc., are designed for performance and scale. I will also share my experiences on absorbing these open technologies and hardening them for enterprise consumption with focus on multiple industry use cases and application patterns.
11:50am - 12:40pm
Serverless - What to Know and How to Prepare
Serverless computing is growing in popularity as it allows developers to move faster by focusing on business-critical software without worrying about underlying infrastructure or toolchains, as well as saving money on cloud computing costs by only running serverless functions and applications as they are needed. With this move from 24/7 computing to an on-demand, a la carte model of running software, it is important for businesses to have a workflow that is flexible and can easily be replicated on any public cloud.
In this demo, we will talk about and show how GitLab Serverless is leading the way towards easy Serverless solutions.
1:40pm - 2:30pm
Java at Speed: Building a Better JVM
Getting the best performance out of your Java applications can often be a challenge due to the managed environment nature of the JVM and the non-deterministic behaviour that this introduces.
This session will start by looking at what we mean by speed and how the JVM, whilst extremely powerful, means we don’t always get the performance characteristics we want. We’ll then move on to discuss the three key features of the Zing JVM that address these issues:
- The Falcon JIT compiler that leverages the LLVM open source project to provide optimisations specific to the newest CPU architectures using features like AVX2.
- ReadyNow, which allows details of speculative optimisations and JIT profiling to be logged on production systems. ReadyNow! profiles can then be used to substantially reduce the warm up and deoptimisation issues that affect performance when restarting an application.
- The C4 garbage collector, which eliminates GC pauses that affect the performance of an application even after all hot code paths have been compiled and optimised.
2:55pm - 3:45pm
Using AI to Optimize SQL Query Plans and Performance
Digital transformation is enabling organizations to discover valuable new ways to leverage structured and unstructured data. Queries are very powerful since they specify what information is desired from a data source. Applications issue queries to read and write tables that transform and summarize Big Data into actionable information and insights. Queries using the high level SQL language and Hive let the query engine build an execution plan, avoiding the complexity of MapReduce and promising greater efficiency and faster results with less effort.
However, cluster resources are not unlimited, and at some point the operator (and developer) will observe a query that is running more slowly than usual, or has stopped altogether. An inefficient query may pose a burden on the database’s resources, cause slow query performance, or even impact other cluster users if the query contains errors. Poor performance can result from many sources, including CPU and memory bottlenecks, an excessive number of rows, and failed stages, forcing the query operator to intervene. But without clear visibility into the query plan, resolving these issues can prove to be difficult and time-consuming.
In this informative session, Pepperdata field engineer Kirk Lewis will discuss how Pepperdata’s query performance management solution, Query Spotlight, uses AI to continuously monitor and analyze queries, providing operators with a top-down view of cluster resources combined with detailed insight into query plans, including duration time, memory/CPU usage, stages, and critical path for every query. Learn why the real-time correlation of application and infrastructure performance is essential to optimizing query plans and ensuring efficient cluster operations.
4:10pm - 5:00pm
Security Delusions (Not a Sales Pitch!)
Security teams are frequently the gatekeepers of adopting new technology in the enterprise. In fact, information security represents perhaps the biggest tech laggard among technical functions today. “Because security” can understandably feel like an unsatisfying answer to why security teams are hesitant in embracing these technologies – particularly when there are ample benefits to productivity, performance, and stability for engineering teams.
Why do security teams so tightly clutch their pearls over modern tech? What are common enterprise security perspectives on potential risks inherent in fresh technology such as microservices – or even more conventional tech like cloud-based systems? This non-sales promo talk delves into the common delusions held by enterprise infosec, exploring the reasons why they opt for the rubber stamp of “no” to help inform how DevOps can assuage security’s concerns. We’ll also explore the “cheat codes” that can be presented to gain passage by the grumpy gatekeeper that is enterprise infosec.