What is technical leadership? Is it a genetic trait of a technologist or a skill that can be learned? This interactive talk will present a model of technical leadership. The model is not trait-based; you will not be shown a list of the 10 qualities of a technical leader. Rather, the technical leadership model presents a theory of how technical leaders think in such a way that they can make better decisions that avoid costly mistakes. This model provides an actionable plan for developers, team leaders, and architects to further develop their skills.
Both Spring and Kubernetes have massive ecosystems leading to lots of ways to use Spring on Kubernetes. Which way is the best, what are the pros and cons of different approaches to using Spring and Kubernetes. This talk is organized as a series of recommendations for how to best use Spring and Kubernetes together in the Style of the Effective Java book. We will cover the things you should do with Spring and Kubernetes along with common mistakes and pitfalls.
Flutter is a framework from Google for building native mobile application for iOS and Android. Flutter is based on Dart and complies to native ARM code so it’s pretty fast. This talk will feature live coding of a flutter application from scratch no previous experience with Dart or flutter require we will start the beginning and see how much we can code in a short time frame.
Building secure microservices requires mastering a variety of patterns, protocols, frameworks, and technologies. This deep dive provides a holistic end-to-end view of how to secure microservices using industry standard protocols and Spring. The goal is to present how standards such as JWT, JWA, JWS, JWE, JWK, OAuth2, OpenID Connect, TLS can be combined to make writing secure microservices easy.
The deep dive will alternate between slides that explain the security standards and protocols and code walkthroughs/live coding showing how to apply the patterns and standards using Spring Security 5.1. We will demonstrate the following patterns and their implementations.
Web SSO Login
Implementing OAuth2 resource servers
Implementing edge service gateways
Token Exchange in a microservice call chain
Token Relay in a microservice call chain
Integration with OpenID Connect / OAuth2 Servers
Features of Spring Security 5.1 that make it easier to secure microservices
We assume no prior experience with security standards or Spring Security. However, we assume that you are comfortable reading Java code and web development.
This introductory talk introduces the patterns and protocols used to secure microservices. The goal is to present how standards such as JWT, JWA, JWS, JWE, JWK, OAuth2, OpenId Connect, and others can be combined to make writing secure microservices easy. The patterns and protocols will be illustrated with a demo application build using Spring & PCF. The goal is to demonstrate how to make writing secure microservices easier.