SESSION + Live Q&A
Power of the Log:LSM & Append Only Data Structures
This talk is about the beauty of sequential access and append only data structures. We'll do this in the context of a little known paper entitled “Log Structured Merge Trees”. LSM describes a surprisingly counterintuitive approach to storing and accessing data in a sequential fashion. It came to prominence in Google's Big Table paper and today, the use of Logs, LSM and append only data structures drive many of the world's most influential storage systems: Cassandra, HBase, RocksDB, Kafka and more. Finally we'll look at how the beauty of sequential access goes beyond database internals, right through to how applications communicate, share data and scale.
Speaker
Benjamin Stopford
Author of “Designing Event Driven Systems” & Senior Director @confluentinc
Ben is a Senior Director at Confluent (a company that backs Apache Kafka) where he runs the Office of the CTO. He's worked on a wide range of projects from implementing the latest version of Kafka’s replication protocol through to assessing and shaping Confluent's strategy. His...
Read moreFind Benjamin Stopford at:
From the same track
SQL Server On Linux: Will It Perform Or Not?
Will SQL Server perform on Linux better than on Windows? Have you been wondering whether the multi-layer architecture the team revealed recently will hurt SQL Server’s performance? Are you still not convinced about the entire endeavor. Come, listen to the talk, learn about SQL Server’s...
Slava Oks
Core Developer Behind Porting SQL Server to Linux @Microsoft
Property-Based Testing In Practice
Testing is a cornerstone of modern software development. It provides us with a safety net against bugs and regressions – without testing, it would be impossible to write large-scale applications. The traditional approach to testing relies on hard-coded examples: fire some specific inputs into...
Alex Chan
Hypothesis Maintainer & Software Developer @WellcomeTrust
Assuring Crypto Code with Automated Reasoning
Bugs in software are ubiquitous, but the impact of these bugs can vary widely. Sometimes they are largely benign, and at other times they can have catastrophic effects. Bugs in cryptographic software tend to be especially serious. To add to that, cryptographic algorithms are difficult to design...
Aaron Tomb
Research Lead, Software Correctness @Galois
Panel: What's Next for Our Programming Languages?
Types, testability, tooling, paradigms, productivity, managed, native, concurrency, parallelism, performance, asynchrony, integrations, memory management, security, resilience, or, maybe, simple readability? What are the important things crossing the minds of language designers today as they...
Brian Goetz
Java Language Architect @Oracle
Joe Duffy
Pulumi Co-founder & CEO, Previously @Microsoft Director of Engineering for Languages/Compilers
Martin Thompson
High Performance & Low Latency Specialist
Sylvan Clebsch
CTO @Causality
Richard Feldman
Elm Pioneer & Software Engineer @noredink
Pony: Co-Designing A Type-System And A Run-Time
Pony is an actor-model, capabilities-secure, native programming language. I will talk about reference capabilities (a type system for data-race freedom influenced by object capabilities and deny guarantee reasoning), the ORCA and MAC protocols for fully concurrent no-stop-the-world garbage...
Sylvan Clebsch
CTO @Causality