The year was 2012 and operating a critical service at Netflix was laborious. Deployment frequency was measured in weeks. Operating a service involved staring at graphs and a lot of late-night heroics. Troubleshooting issues often devolved to bouncing the problem among teams. Today, in 2019, Netflix has grown to over 139M members enjoying our service all over the world. Deployments happen daily. The reliability of our service continues to improve and middle-of-the-night pages are rare. Our mission critical services are owned and operated by small teams of developers with no dedicated test teams and no dedicated operations teams. How did we make this transition? This talk presents Netflix's journey from siloed teams to our Full Cycle Developer model for building and operating services. I will discuss the various approaches we’ve tried, the motivations that pushed us to keep evolving, and the lessons learned along the way. Come learn about the Full Cycle Developer model, its pros and cons, and what’s required to make it work.
Greg Burrell Senior Reliability Engineer, Netflix
Greg Burrell is a Senior Reliability Engineer at Netflix working in the Edge Developer Experience team. In 2005 Greg was hired by Netflix to be part of a small team experimenting with the crazy idea of sending movies over the Internet. Greg has spent his time at Netflix in the Edge Engineering group working in the areas of testing, build and release, operations, and developer tools. Underlying all those roles has been a passion for improving availability, velocity, and productivity. The question always on Greg's mind is "How can we make it easier to develop, operate, and support our services?"
The world of commodity engineering is coming to an end. Developers are becoming more productive, more flexible, and more entrepreneurial. How does this impact you as an engineer? And how does it impact large companies who need a fungible set of engineers to maintain their software?
Workflow Data pipeline Orchestration with Airflow
Chaim Turkel Backend/Data Architect, Tikal
Chaim Turkel is a Big Data / Distributed Architect. At Tikal he holds the position of a Group Leader mentoring fellow workers, and with clients as a Tech Lead to achieve their Technical & Business requirements. With 20 years of experience in the field from very diverse clients, Chaim brings his experience with passion to solve new challenges in the field of distributed applications and data.
Web Assembly is an exciting new technology supported by modern browsers, that aims to execute computations at native speed in the browser. At Align Technology we are in the process of enhancing our WebGL 3D visualization apps with new interactive features that have so far been available only on native C++ applications due to performance requirements. We take existing C++ geometric algorithms and compile into WASM modules, which we load dynamically into our WebGL apps, using Web workers to run the heavy computations in the background. We will demonstrate some of the tools, share what we have learned in this journey, and explain the benefits and tradeoffs in this technology.
Adi Levin Fellow Platform Architect, Align Technology
Everybody is talking about GraalVM today. Enough papers and videos are out there explaining the technology and under the hood of GraalVM. I myself want to see what GraalVM is capable of. I am more interested in what I can do with this brand new tool and how I can benefit from it. We will see how to take polyglot to a whole new level. I want to experience the performance improvements GraalVM can give first hand. All of this we shall experience together in my session on GraalVM.
Yoav Nordman Backend Group Lead, Tikal
Yoav Nordmann is a Backend Architect, Tech Lead and a Full Cycle Developer. At Tikal he holds the position of a Group Leader mentoring fellow workers. Technology is his passion and he hungers for Knowledge and Truth. With 20 years of experience as an Architect, Tech Lead and Developer he is passionate about Knowledge sharing, Lecturing and achieving goals together. His clients are diverse. Big coorperate ones such as HP, Amdocs, CA but also smaller companies and startups such as Cyren, Brightcom and MobileODT. Having chosen a lifelong learning he yearns for new challenges with different clients, embracing new responsibilities, creating beautiful systems designed to last and inspire.
This talk will highlight the evolution of Chaos Engineering, in the first part, we will review how Chaos techniques came to life and in the second see how it 'shifts left' from post-deployment 'hacks' to continuous integration and deployment tools/frameworks, which help improve the SDLC and ensure production stability. Before we conclude, we will review practical Chaos Tools & Frameworks which you could integrate into your existing processes Today!
Haggai Philip Zagury DevOps Group Lead, Tikal
Haggai Philip Zagury, DevOps Group & Tech Lead @ Tikal Knowledge. Haggai's has over 10 years @ Tikal in DevOps, CI/CD, alongside prior OPS experience, he is passionate about Technology, Open Source, and Open Thinking. In the past 10 years, Haggai accompanied many customers in their Journey to CI/CD via Automation, Cloud, Containers Orchestration and more.
Dialogflow is the engine behind google assistant. Conversational UI is the future. We'll understand its basics while building a simple game.
So you've heard about Coroutines and you want to see what's so shine about them? We will cover best practices of using coroutines in your Android application,coroutines interaction with Architecture Components and background job processing.
Ronel Girat Mobile Architect & Group Leader, Tikal
Ronel Girat is a experienced, hands-on software architect involved in the architecture, design, and implementation of Android applications With over 15 years professional experience in software engineer. He is also very active with Hardware ,Cloud architecture and microservices architectures. At Tikal he hold the Mobile Group leader position, mentoring the group members. Technology and curiosity are the fuel that drives it to explore unfamiliar areas
The scale and frequency with which information can be distributed on social media make the problem of fake news a rapidly metastasizing issue. To do any content filtering or labelling demands an algorithmic solution. Recent advances in media generation techniques have made it easier for attackers to create forged images and videos. State of-the-art methods enable the real-time creation of a forged version of a single video obtained from a social network. Although numerous methods have been developed for detecting forged images and videos, they are generally targeted at certain domains and quickly become obsolete as new kinds of attacks appear. In this session, Shlomo will review some of the recent advances in using AI for both the generation and detection of fake images.
Shlomo Kashani Head of AI, DeepOncology AI
Shlomo is the Head of Deep Learning at DeepOncology. His primary interests lie in Deep Learning for tumour classification, detection and segmentation in both 2D and 3D. He did not start his career intent on becoming active in AI research, however. Ten years before deep learning was even remotely cool, he specialised in Computer Vision systems, while pursuing an MSc. (Distinction) in Digital Signal Processing (University of London, UK). Shlomo is very proud when the opportunity arises to teach students, and he is also co-founder of the Deep Learning Bootcamp: a community based non-profit organisation offering free 5-day Deep learning courses, donating its entire income to fight ALS / MND.
We’ve all experienced it: you’re working on a task, adding some code, and then you need to store some sensitive configuration value. It could be an API key, client secret or an encryption key ― something that’s highly sensitive and must be kept secret. And this is where things get messy. Usually, secret storage is highly coupled with how the code is deployed, and different platforms have different solutions. Kubernetes has a promise to simplify this process by using the native secret object, which, as the name implies, can be used to store secrets or sensitive configurations. Unfortunately, Kubernetes secrets are fundamentally broken, and a developer who tries to use them will definitely have some issues. But no need to worry ― there are solid alternatives for storing secrets securely on Kubernetes platform. One solution is to use Kamus, an open-source, git-ops solution, that created by Soluto, for managing secrets on Kubernetes. Kamus can encrypt a secret so it can be decrypted only by your app on runtime - and not by anyone else. The first part of this session will cover the challenges faced when using Kubernetes secrets (from a usability and security point of view). The second part will discuss some of the existing solutions (Sealed Secrets, Helm Secrets and others), their pros, and cons, and then feature Kamus: how it works, what problems it solves, how it differs from other solutions, and what threats it can help mitigate (and what threats it can’t). The talk will cover all that is required to know so you can run Kamus on your own cluster and use it for secret management. Join me for this session to learn how you can build a Kubernetes cluster than can keep a secret ― for real. Let me know if there is anything else you need.
Omer Levi Hevroni DevSecOps engineer, Soluto
I started coding in fourth grade when my dad taught me BASIC and now I’m an AppSec/DevSecOps enthusiast, always trying to integrate more hacking tools into the CI/CD pipeline. Constantly looking for new and interesting ways to increase security awareness across the entire R&D team – Developers, Product and UX. Admittedly an OWASP groupie, and therefore both a proud member and also an OWASP Glue project leader. Besides all that, I’m an open source addict, and a heavy OSS user and contributor. Today I’m working at Soluto in Tel Aviv but most importantly – I’m happily married and a proud father to two lovely children.
Hillel Coren will be giving a talk sharing the lessons he's learned using Flutter to build Invoice Ninja's new mobile app. Some of the topics covered will include: … - Comparing Redux to other state management options - Best practices for structuring the codebase - Handling app persistence - Managing forms - Common pitfalls and gotchas - Using a code generator to reduce boilerplate code
Creating near real-time data pipeline for billions of events and terabytes of data can be a challenging task. How can we serve the requests, with low latency and persist them all in less than a second latency end-to-end? What are the do's and don'ts when rolling such a system to production and how to monitor the hundreds of components involved? Come to hear a real-life case of such a system. We will discuss the architecture, technologies, code and DevOps concern of the streaming data pipeline we created for one of the top ten mobile games in the US.
Haim Cohen Big Data Architect & Machine Learning Engineer, Tikal
Haim Cohen, Backend Group & Big Data Tech Lead @ Tikal Knowledge. Haim has more than 18 years of experience building Predictive Analytics systems using BigData tools and Machine Learning enabled architectures. He is passioned about data, specializing in streaming, transforming, aggregating and storing data at a large scale.
Looking at the ongoing risks on any company today, no matter how much time and money you'll invest in cyber security as CISO or any security practitioner, You always arrive to same conclusion, it's not enough to achieve high standard of security, you have to do it 24/7 according to the changing cyber threats. In the talk we'll give a brief overview on different aspects of Cyber Security in the modern world, talking about Cloud and other external services that any size of a company uses now a days. We'll show from experience that the best and most fit approach is to achieve on going monitoring on your security posture. For the "why"? because the only thing that is a 100% sure, that the attack surface of every company is changing constantly, So we should keep on validating our security posture accordingly. And now the "How": We'll share how to build an infrastructure for security researchers that will allow them to concentrate on business logic and writing hacker “tasks”. Using Docker and Kubernetes on Google Cloud, these tasks can then be performed in parallel and without a lot of DevOps hassle. Our technique removes two common barriers: first, long and risky deployment processes and second, low transparency within the production system. Lessons learned promised and a glimpse of the Hackers view, because it's always interesting to see how you look from the outside.
Demi Ben-Ari Co-Founder & VP R&D, Google Developers Expert, Panorays
Software engineer, Entrepreneur and an International Tech Speaker. Demi has over 12 years of experience in building various systems both from the field of near real time applications and Big Data distributed systems. Co-Founder of the “Big Things” Big Data community and Google Developer Group Cloud. Big Data Expert, but interested in all kinds of technologies, from front-end to backend, whatever moves data around.
Uri Shaked Software Engineer, CodeMagic
Uri Shaked is a Google Developer Expert for Web Technologies. He enjoys combining his passion for the web with his love for hardware electronics and robotics in challenging IoT projects, which he shares with the world in his blog, as well as travelling around the world and speaking in conferences and meetups. Among his interests are reverse engineering, hardware hacking, neuroscience, playing music and Salsa dancing.
Roy Pearl Java Tech Lead, Tikal
Roy Pearl Backend tech leader, leading the Go domain @ Tikal. With over 10 years of experience in managing software development, and 16 years of experience in hands on development with a special focus on multimedia such as audio analysis and synthesis, video, 3D and gaming. A musician by heart and soul, sometimes combining music creation with software development.