SESSION + Live Q&A
CRDTs and the Quest for Distributed Consistency
We all know how to build applications that rely on a central server. However, such centralisation is not always desirable, and recently there has been new interest in developing decentralised applications. Blockchains inevitably come up in that conversation, but when you examine them critically, not every problem is best solved by a blockchain.
In this talk we will explore how to ensure data consistency in distributed systems, especially in systems that don't have an authoritative leader. We will see how to sync data between your phone and your laptop without sending it via a remote server. We will explore algorithms that allow several people to collaborate on a shared document, communicating via a peer-to-peer network.
Conflict-Free Replicated Datatypes (CRDTs) are a set of algorithms that ensure data consistency in such settings. Recent research on CRDTs has enabled us to better understand their consistency guarantees and design richer datatypes. On the practical side, CRDTs are making their way into more and more applications. This talk will examine that research and its uses, showing where we are now and where we are heading in the future.
Speaker
Martin Kleppmann
Software Engineer, Author, & Samza and Avro Committer
Martin Kleppmann is a distributed systems researcher at the University of Cambridge, and author of the acclaimed O'Reilly book Designing Data-Intensive Applications (http://dataintensive.net/). Previously he was a software engineer and entrepreneur, co-founding and selling two startups, and...
Read moreFind Martin Kleppmann at:
From the same track
Consensus: Why Can't We All Just Agree?
Reaching agreement is never easy and distributed systems are no exception to this rule. In this talk, we take a journey though the history, to the current reality and look ahead to the future for distributed consensus. We start over three decades ago, when the field of distributed consensus began...
Heidi Howard
Distributed Systems PhD Candidate @CambridgeComputerLab
Formal Methods at Amazon Web Services
Security is a top priority at Amazon Web Services. As we have a shared responsibility model with customers, AWS manages the components from the operating system down to the physical security of the facilities; AWS customers are responsible for building secure applications on top of it. In this...
Michael Tautschnig
Software Development Engineer @AWS Security
Modern CS Open Space
How Performance Optimizations Shatter Security Boundaries
With the customers demand of high-performance computing, CPU manufacturers deploy more and more sophisticated optimizations in their processors to increase the performance as much as possible. However, these performance optimizations often come with the downside of enabling side-channel attacks...
Moritz Lipp
Researcher in Information Security at Graz University of Technology
Java at Speed
Getting the most of your Java applications can be an interesting challenge. Understanding some of the optimizations the latest crop of JVMs are able to apply when running on the latest servers may help with that. This talk will discuss some of those features and optimizations. Along with...
Gil Tene
CTO and co-founder @AzulSystems