Last active
August 29, 2015 14:22
-
-
Save clausasbjorn/290e1a2770d67513dd85 to your computer and use it in GitHub Desktop.
NDC 2015 Agenda
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"name":"NDC Oslo 2015", | |
"days":[ | |
{ | |
"order":"0", | |
"name":"Wednesday", | |
"slots":[ | |
{ | |
"id":"09:00-10:00", | |
"from":"09:00", | |
"to":"10:00", | |
"sort":900, | |
"allTracks":true, | |
"isBreak":false | |
}, | |
{ | |
"id":"10:00-10:20", | |
"from":"10:00", | |
"to":"10:20", | |
"sort":1000, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"10:20-11:20", | |
"from":"10:20", | |
"to":"11:20", | |
"sort":1020, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"11:20-11:40", | |
"from":"11:20", | |
"to":"11:40", | |
"sort":1120, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"11:40-12:40", | |
"from":"11:40", | |
"to":"12:40", | |
"sort":1140, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"12:40-13:40", | |
"from":"12:40", | |
"to":"13:40", | |
"sort":1240, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"13:40-14:40", | |
"from":"13:40", | |
"to":"14:40", | |
"sort":1340, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"14:40-15:00", | |
"from":"14:40", | |
"to":"15:00", | |
"sort":1440, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"15:00-16:00", | |
"from":"15:00", | |
"to":"16:00", | |
"sort":1500, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"16:00-16:20", | |
"from":"16:00", | |
"to":"16:20", | |
"sort":1600, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"16:20-17:20", | |
"from":"16:20", | |
"to":"17:20", | |
"sort":1620, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"17:20-17:40", | |
"from":"17:20", | |
"to":"17:40", | |
"sort":1720, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"17:40-18:40", | |
"from":"17:40", | |
"to":"18:40", | |
"sort":1740, | |
"allTracks":false, | |
"isBreak":false | |
} | |
], | |
"tracks":[ | |
{ | |
"id":"room1", | |
"name":"Room 1" | |
}, | |
{ | |
"id":"room2", | |
"name":"Room 2" | |
}, | |
{ | |
"id":"room3", | |
"name":"Room 3" | |
}, | |
{ | |
"id":"room4", | |
"name":"Room 4" | |
}, | |
{ | |
"id":"room5", | |
"name":"Room 5" | |
}, | |
{ | |
"id":"room6", | |
"name":"Room 6" | |
}, | |
{ | |
"id":"room7", | |
"name":"Room 7" | |
}, | |
{ | |
"id":"room8", | |
"name":"Room 8" | |
}, | |
{ | |
"id":"room9", | |
"name":"Room 9" | |
}, | |
{ | |
"id":"workshops", | |
"name":"Workshops" | |
} | |
], | |
"sessions":[ | |
{ | |
"id":"0-t-30314", | |
"conferenceId":"t-30314", | |
"day":0, | |
"md5":"fae3431abebdb01e44b41f329a40b56c", | |
"slot":"09:00-10:00", | |
"track":"room1", | |
"title":"Keynote - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World", | |
"speakers":[ | |
{ | |
"id":"p-28153", | |
"name":"Bruce Schneier" | |
} | |
], | |
"tags":[ | |
"Security" | |
] | |
}, | |
{ | |
"id":"0-t-30289", | |
"conferenceId":"t-30289", | |
"day":0, | |
"md5":"03b5c3e3eb8d24e6e9ae1f995b66ad44", | |
"slot":"10:20-11:20", | |
"track":"room1", | |
"title":"This is not the search you are looking for", | |
"speakers":[ | |
{ | |
"id":"p-25969", | |
"name":"Toby Henderson" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"Database", | |
"Search" | |
] | |
}, | |
{ | |
"id":"0-t-31333", | |
"conferenceId":"t-31333", | |
"day":0, | |
"md5":"30fd8112af22befe9e8d0c0669d58902", | |
"slot":"10:20-11:20", | |
"track":"room2", | |
"title":"Linux Device Driver Best Practices", | |
"speakers":[ | |
{ | |
"id":"p-28145", | |
"name":"Bill Gatliff" | |
} | |
], | |
"tags":[ | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"0-t-30160", | |
"conferenceId":"t-30160", | |
"day":0, | |
"md5":"aa2edcb4a2b5708878f2be17f14066cc", | |
"slot":"10:20-11:20", | |
"track":"room3", | |
"title":"The Art of Software Gardening", | |
"speakers":[ | |
{ | |
"id":"p-6686", | |
"name":"Patroklos Papapetrou" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"0-t-30300", | |
"conferenceId":"t-30300", | |
"day":0, | |
"md5":"15382bc63ab377d8502e84f1cb8df735", | |
"slot":"10:20-11:20", | |
"track":"room4", | |
"title":"Duplicating data or replicating data in Micro Services", | |
"speakers":[ | |
{ | |
"id":"p-2787", | |
"name":"Dennis van der Stelt" | |
} | |
], | |
"tags":[ | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"0-t-30297", | |
"conferenceId":"t-30297", | |
"day":0, | |
"md5":"254625f22b3784e92a3d34ce081fda4a", | |
"slot":"10:20-11:20", | |
"track":"room5", | |
"title":"Practical CSS tips & tricks for backend developers", | |
"speakers":[ | |
{ | |
"id":"p-28125", | |
"name":"Alex York" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Design", | |
"UI" | |
] | |
}, | |
{ | |
"id":"0-t-31321", | |
"conferenceId":"t-31321", | |
"day":0, | |
"md5":"034f6c4b3e07fcc119f4eb36e700fe08", | |
"slot":"10:20-11:20", | |
"track":"room6", | |
"title":"The Real Price of Shared Pointers in C++", | |
"speakers":[ | |
{ | |
"id":"p-7717", | |
"name":"Nico Josuttis" | |
} | |
], | |
"tags":[ | |
"C++" | |
] | |
}, | |
{ | |
"id":"0-t-30321", | |
"conferenceId":"t-30321", | |
"day":0, | |
"md5":"e33635876acd78d881782b2cfd14b194", | |
"slot":"10:20-11:20", | |
"track":"room7", | |
"title":"ASP.NET 5 & DNX: It’s a X-Platform Party!", | |
"speakers":[ | |
{ | |
"id":"p-1887", | |
"name":"Damian Edwards" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Microsoft" | |
] | |
}, | |
{ | |
"id":"0-t-30202", | |
"conferenceId":"t-30202", | |
"day":0, | |
"md5":"da454f8710956ee9f8041f6b6253fd5e", | |
"slot":"10:20-11:20", | |
"track":"room8", | |
"title":"The New JavaScript: ES6", | |
"speakers":[ | |
{ | |
"id":"p-28148", | |
"name":"Rob Eisenberg" | |
} | |
], | |
"tags":[ | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"0-t-31341", | |
"conferenceId":"t-31341", | |
"day":0, | |
"md5":"cff277125fbf35058ef5e26f04c800b5", | |
"slot":"10:20-11:20", | |
"track":"room9", | |
"title":"Lean and Functional Programming", | |
"speakers":[ | |
{ | |
"id":"p-3278", | |
"name":"Bryan Hunter" | |
} | |
], | |
"tags":[ | |
"People", | |
"Agile", | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"0-t-32358", | |
"conferenceId":"t-32358", | |
"day":0, | |
"md5":"02cea9340392076e038f63df050c8165", | |
"slot":"10:20-11:20", | |
"track":"workshops", | |
"title":"How to build end to end solutions using Raspberry Pi and Azure", | |
"speakers":[ | |
{ | |
"id":"p-2832", | |
"name":"Pedro Dias" | |
}, | |
{ | |
"id":"p-31178", | |
"name":"Anders Gill" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
"Cloud", | |
"IoT" | |
] | |
}, | |
{ | |
"id":"0-t-30220", | |
"conferenceId":"t-30220", | |
"day":0, | |
"md5":"00a1e903e0df9137b7d287c5261a77f6", | |
"slot":"11:40-12:40", | |
"track":"room1", | |
"title":"Approaches to multi-lingual text search with Elasticsearch and Lucene", | |
"speakers":[ | |
{ | |
"id":"p-3200", | |
"name":"Itamar Syn-Hershko" | |
} | |
], | |
"tags":[ | |
"Database", | |
"Search" | |
] | |
}, | |
{ | |
"id":"0-t-31322", | |
"conferenceId":"t-31322", | |
"day":0, | |
"md5":"f9769b9c4de7ccb6c50908390f4df6cd", | |
"slot":"11:40-12:40", | |
"track":"room2", | |
"title":"Fundamentals of Type-Dependent Code Reuse in C++", | |
"speakers":[ | |
{ | |
"id":"p-28137", | |
"name":"Mark Isaacson" | |
} | |
], | |
"tags":[ | |
"C++" | |
] | |
}, | |
{ | |
"id":"0-t-30242", | |
"conferenceId":"t-30242", | |
"day":0, | |
"md5":"c5f1fb97923482a56c70a0b2d02a0266", | |
"slot":"11:40-12:40", | |
"track":"room3", | |
"title":"Microservices, cutting through the Gordian Knot", | |
"speakers":[ | |
{ | |
"id":"p-3217", | |
"name":"Ian Cooper" | |
} | |
], | |
"tags":[ | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"0-t-30279", | |
"conferenceId":"t-30279", | |
"day":0, | |
"md5":"39c3568ce38e75141bfeb94b9eed08e0", | |
"slot":"11:40-12:40", | |
"track":"room4", | |
"title":"Asynchronous generators and promises in ES6", | |
"speakers":[ | |
{ | |
"id":"p-28100", | |
"name":"Francis Paulin" | |
} | |
], | |
"tags":[ | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"0-t-30306", | |
"conferenceId":"t-30306", | |
"day":0, | |
"md5":"0ccf1d6d6402e671eb0fac4d704cf87e", | |
"slot":"11:40-12:40", | |
"track":"room5", | |
"title":"Developing interfaces — Why developers are the new designers", | |
"speakers":[ | |
{ | |
"id":"p-28134", | |
"name":"Martin Jensen" | |
} | |
], | |
"tags":[ | |
"Design", | |
"UI" | |
] | |
}, | |
{ | |
"id":"0-t-31338", | |
"conferenceId":"t-31338", | |
"day":0, | |
"md5":"529fb99b3b346d3856c41cd8a2e2eedf", | |
"slot":"11:40-12:40", | |
"track":"room6", | |
"title":"Faking and Mocking Legacy Embedded C", | |
"speakers":[ | |
{ | |
"id":"p-29160", | |
"name":"James Grenning" | |
} | |
], | |
"tags":[ | |
"Embedded", | |
"C++" | |
] | |
}, | |
{ | |
"id":"0-t-30200", | |
"conferenceId":"t-30200", | |
"day":0, | |
"md5":"2786dba7df0bdf03787d2d780216e361", | |
"slot":"11:40-12:40", | |
"track":"room7", | |
"title":"No Estimates, Let's Explore the Possibilities", | |
"speakers":[ | |
{ | |
"id":"p-28107", | |
"name":"Woody Zuill" | |
} | |
], | |
"tags":[ | |
"People", | |
"Agile" | |
] | |
}, | |
{ | |
"id":"0-t-30183", | |
"conferenceId":"t-30183", | |
"day":0, | |
"md5":"942068fc9d46ce03164c1a4a7dfb6494", | |
"slot":"11:40-12:40", | |
"track":"room8", | |
"title":"A Lap Around .NET 2015", | |
"speakers":[ | |
{ | |
"id":"p-28065", | |
"name":"Anthony D. Green" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"0-t-30342", | |
"conferenceId":"t-30342", | |
"day":0, | |
"md5":"8e52ff577b7f7cfdfd9913f69ac18806", | |
"slot":"11:40-12:40", | |
"track":"room9", | |
"title":"A tour of the language landscape", | |
"speakers":[ | |
{ | |
"id":"p-17738", | |
"name":"Yan Cui" | |
} | |
], | |
"tags":[ | |
"Functional Programming", | |
"Programming Languages" | |
] | |
}, | |
{ | |
"id":"0-t-32358", | |
"conferenceId":"t-32358", | |
"day":0, | |
"md5":"02cea9340392076e038f63df050c8165", | |
"slot":"11:40-12:40", | |
"track":"workshops", | |
"title":"How to build end to end solutions using Raspberry Pi and Azure", | |
"speakers":[ | |
{ | |
"id":"p-2832", | |
"name":"Pedro Dias" | |
}, | |
{ | |
"id":"p-31178", | |
"name":"Anders Gill" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
"Cloud", | |
"IoT" | |
] | |
}, | |
{ | |
"id":"0-t-30293", | |
"conferenceId":"t-30293", | |
"day":0, | |
"md5":"e3f647a365b2f045d14999dc99fa8682", | |
"slot":"13:40-14:40", | |
"track":"room1", | |
"title":"IMDB showdown - comparing OrigoDB, Redis and SQL Server Hekaton", | |
"speakers":[ | |
{ | |
"id":"p-7702", | |
"name":"Robert Friberg" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"Database" | |
] | |
}, | |
{ | |
"id":"0-t-30253", | |
"conferenceId":"t-30253", | |
"day":0, | |
"md5":"51f9b2afc2546c81828a0a89bb31a448", | |
"slot":"13:40-14:40", | |
"track":"room2", | |
"title":"Omnisharp: .NET sans Microsoft", | |
"speakers":[ | |
{ | |
"id":"p-4389", | |
"name":"Mathew McLoughlin" | |
} | |
], | |
"tags":[ | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"0-t-32359", | |
"conferenceId":"t-32359", | |
"day":0, | |
"md5":"867305c5d6ef3c5848fef5353be52da7", | |
"slot":"13:40-14:40", | |
"track":"room3", | |
"title":"Norway, Software and Me", | |
"speakers":[ | |
{ | |
"id":"p-31181", | |
"name":"Ted Nelson" | |
} | |
], | |
"tags":[ | |
] | |
}, | |
{ | |
"id":"0-t-30174", | |
"conferenceId":"t-30174", | |
"day":0, | |
"md5":"52d5be542589c70330335ababc69eb66", | |
"slot":"13:40-14:40", | |
"track":"room4", | |
"title":"Async and Streaming JavaScript, We're All Doing it Wrong!", | |
"speakers":[ | |
{ | |
"id":"p-4400", | |
"name":"Matthew Podwysocki" | |
} | |
], | |
"tags":[ | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"0-t-30292", | |
"conferenceId":"t-30292", | |
"day":0, | |
"md5":"1af236357eed844340d34f1e4cec5285", | |
"slot":"13:40-14:40", | |
"track":"room5", | |
"title":"‘Don't Make Me Feel Stupid’ – A. User", | |
"speakers":[ | |
{ | |
"id":"p-4425", | |
"name":"Liam Westley" | |
} | |
], | |
"tags":[ | |
"UI", | |
"UX" | |
] | |
}, | |
{ | |
"id":"0-t-31323", | |
"conferenceId":"t-31323", | |
"day":0, | |
"md5":"a64591e2229c748f6a658c35c7a51f13", | |
"slot":"13:40-14:40", | |
"track":"room6", | |
"title":"When order does not matter", | |
"speakers":[ | |
{ | |
"id":"p-29157", | |
"name":"Bartek Szurgot" | |
} | |
], | |
"tags":[ | |
"C++" | |
] | |
}, | |
{ | |
"id":"0-t-30322", | |
"conferenceId":"t-30322", | |
"day":0, | |
"md5":"ba4efbe2c7a476a33a0dd4ed79cb4478", | |
"slot":"13:40-14:40", | |
"track":"room7", | |
"title":"What’s new in ASP.NET 5 and MVC 6", | |
"speakers":[ | |
{ | |
"id":"p-1887", | |
"name":"Damian Edwards" | |
}, | |
{ | |
"id":"p-2778", | |
"name":"Jon Galloway" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Microsoft", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"0-t-30330", | |
"conferenceId":"t-30330", | |
"day":0, | |
"md5":"2b63c4c771ff373e07df4eedac8e8cb6", | |
"slot":"13:40-14:40", | |
"track":"room8", | |
"title":"CQRS – but different", | |
"speakers":[ | |
{ | |
"id":"p-21762", | |
"name":"Udi Dahan" | |
} | |
], | |
"tags":[ | |
] | |
}, | |
{ | |
"id":"0-t-32354", | |
"conferenceId":"t-32354", | |
"day":0, | |
"md5":"beabf1573909e03033c393e486ba49ab", | |
"slot":"13:40-14:40", | |
"track":"room9", | |
"title":"The Need for Closure", | |
"speakers":[ | |
{ | |
"id":"p-4466", | |
"name":"Karl Krukow" | |
} | |
], | |
"tags":[ | |
"Functional Programming", | |
"Programming Languages" | |
] | |
}, | |
{ | |
"id":"0-t-32353", | |
"conferenceId":"t-32353", | |
"day":0, | |
"md5":"6a2b2bd12d15d22585bbadb08f3f42d3", | |
"slot":"13:40-14:40", | |
"track":"workshops", | |
"title":"Breaking .NET(C#) Applications: Hands-On Attack Scenario Class", | |
"speakers":[ | |
{ | |
"id":"p-3209", | |
"name":"Jon McCoy" | |
}, | |
{ | |
"id":"p-30176", | |
"name":"Topher Timzen" | |
} | |
], | |
"tags":[ | |
"Security" | |
] | |
}, | |
{ | |
"id":"0-t-30219", | |
"conferenceId":"t-30219", | |
"day":0, | |
"md5":"e174179892c6f242b4b941e8b04070b0", | |
"slot":"15:00-16:00", | |
"track":"room1", | |
"title":"A guided tour of the BigData technologies zoo", | |
"speakers":[ | |
{ | |
"id":"p-3200", | |
"name":"Itamar Syn-Hershko" | |
} | |
], | |
"tags":[ | |
"Big Data", | |
"Database" | |
] | |
}, | |
{ | |
"id":"0-t-30344", | |
"conferenceId":"t-30344", | |
"day":0, | |
"md5":"7031c2cf4ff0334afdadf1c8eefce17b", | |
"slot":"15:00-16:00", | |
"track":"room2", | |
"title":"How TDD and SOLID principles can improve your HW abstraction", | |
"speakers":[ | |
{ | |
"id":"p-28007", | |
"name":"Tore Martin Hagen" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"Agile", | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"0-t-30298", | |
"conferenceId":"t-30298", | |
"day":0, | |
"md5":"f28cb906bdb958b31c894b94abda59c3", | |
"slot":"15:00-16:00", | |
"track":"room3", | |
"title":".NETCore Blimey!", | |
"speakers":[ | |
{ | |
"id":"p-4429", | |
"name":"Matt Ellis" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"0-t-30208", | |
"conferenceId":"t-30208", | |
"day":0, | |
"md5":"15dee152ed2036c91c50e1a252456881", | |
"slot":"15:00-16:00", | |
"track":"room4", | |
"title":"All Your Tests Are Belong to Us", | |
"speakers":[ | |
{ | |
"id":"p-25951", | |
"name":"Rachel Appel" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Agile", | |
"Testing", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"0-t-30267", | |
"conferenceId":"t-30267", | |
"day":0, | |
"md5":"58a207b2676174f14f05f154121f1ddf", | |
"slot":"15:00-16:00", | |
"track":"room5", | |
"title":"Form with Function: Adding Behavior with CSS", | |
"speakers":[ | |
{ | |
"id":"p-3294", | |
"name":"Tim G. Thomas" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Design", | |
"UI" | |
] | |
}, | |
{ | |
"id":"0-t-31324", | |
"conferenceId":"t-31324", | |
"day":0, | |
"md5":"9cb92b051261a398ab1e9a95ad876e71", | |
"slot":"15:00-16:00", | |
"track":"room6", | |
"title":"Dealing with noexcept in the C++ Standard Library", | |
"speakers":[ | |
{ | |
"id":"p-7717", | |
"name":"Nico Josuttis" | |
} | |
], | |
"tags":[ | |
"C++" | |
] | |
}, | |
{ | |
"id":"0-t-30197", | |
"conferenceId":"t-30197", | |
"day":0, | |
"md5":"a8fb1a87675793eadb98eccd7677b6ed", | |
"slot":"15:00-16:00", | |
"track":"room7", | |
"title":"Anti-fragile and feedback. Trying to make up for the failures of \"agile.\"", | |
"speakers":[ | |
{ | |
"id":"p-3380", | |
"name":"Andy Hunt" | |
} | |
], | |
"tags":[ | |
"Agile" | |
] | |
}, | |
{ | |
"id":"0-t-30257", | |
"conferenceId":"t-30257", | |
"day":0, | |
"md5":"a635e42c9b5d41e5f491ae28676e9610", | |
"slot":"15:00-16:00", | |
"track":"room8", | |
"title":"Extremely scalable cloud applications made easy using the Azure service fabric actor model", | |
"speakers":[ | |
{ | |
"id":"p-28034", | |
"name":"Patriek van Dorp" | |
} | |
], | |
"tags":[ | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"0-t-30341", | |
"conferenceId":"t-30341", | |
"day":0, | |
"md5":"2fe009f069b6855303473e687226ce12", | |
"slot":"15:00-16:00", | |
"track":"room9", | |
"title":"Learning from Haskell", | |
"speakers":[ | |
{ | |
"id":"p-2860", | |
"name":"Venkat Subramaniam" | |
} | |
], | |
"tags":[ | |
"Functional Programming", | |
"Programming Languages" | |
] | |
}, | |
{ | |
"id":"0-t-32353", | |
"conferenceId":"t-32353", | |
"day":0, | |
"md5":"6a2b2bd12d15d22585bbadb08f3f42d3", | |
"slot":"15:00-16:00", | |
"track":"workshops", | |
"title":"Breaking .NET(C#) Applications: Hands-On Attack Scenario Class", | |
"speakers":[ | |
{ | |
"id":"p-3209", | |
"name":"Jon McCoy" | |
}, | |
{ | |
"id":"p-30176", | |
"name":"Topher Timzen" | |
} | |
], | |
"tags":[ | |
"Security" | |
] | |
}, | |
{ | |
"id":"0-t-30274", | |
"conferenceId":"t-30274", | |
"day":0, | |
"md5":"6fe2448767ef2559340225b41fa9c8cc", | |
"slot":"16:20-17:20", | |
"track":"room1", | |
"title":"To NoSQL or Not to NoSQL, That Is the Question", | |
"speakers":[ | |
{ | |
"id":"p-4442", | |
"name":"David Ostrovsky" | |
} | |
], | |
"tags":[ | |
"Big Data", | |
"Database" | |
] | |
}, | |
{ | |
"id":"0-t-31319", | |
"conferenceId":"t-31319", | |
"day":0, | |
"md5":"2ec8850afc688e818174f8427717e2b5", | |
"slot":"16:20-17:20", | |
"track":"room2", | |
"title":"Embedded Linux development using the Yocto Project", | |
"speakers":[ | |
{ | |
"id":"p-28150", | |
"name":"Isak Styf" | |
} | |
], | |
"tags":[ | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"0-t-30193", | |
"conferenceId":"t-30193", | |
"day":0, | |
"md5":"4c7607b41fa0f2a5484bb49e71b524cc", | |
"slot":"16:20-17:20", | |
"track":"room3", | |
"title":"Monitoring Sensor Data in RealTime over Azure", | |
"speakers":[ | |
{ | |
"id":"p-4286", | |
"name":"Uffe Björklund" | |
} | |
], | |
"tags":[ | |
"Cloud", | |
"IoT" | |
] | |
}, | |
{ | |
"id":"0-t-30278", | |
"conferenceId":"t-30278", | |
"day":0, | |
"md5":"4eda1e88c56a855b80ac74576d500d8f", | |
"slot":"16:20-17:20", | |
"track":"room4", | |
"title":"Seriously, you should start testing that JavaScript code", | |
"speakers":[ | |
{ | |
"id":"p-22859", | |
"name":"Kuba Walinski" | |
} | |
], | |
"tags":[ | |
"Agile", | |
"Testing", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"0-t-30206", | |
"conferenceId":"t-30206", | |
"day":0, | |
"md5":"9e1c4f800fea5e662abe65a6c2d1ced8", | |
"slot":"16:20-17:20", | |
"track":"room5", | |
"title":"Front-end Fun with Sass and Coffee", | |
"speakers":[ | |
{ | |
"id":"p-25948", | |
"name":"Dylan Beattie" | |
} | |
], | |
"tags":[ | |
"Web", | |
"UI", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"0-t-32351", | |
"conferenceId":"t-32351", | |
"day":0, | |
"md5":"a01343a3b9e7db0bc8ebb299f2dc660b", | |
"slot":"16:20-17:20", | |
"track":"room6", | |
"title":"History and Spirit of C and C++", | |
"speakers":[ | |
{ | |
"id":"p-3318", | |
"name":"Olve Maudal" | |
} | |
], | |
"tags":[ | |
"C++" | |
] | |
}, | |
{ | |
"id":"0-t-30315", | |
"conferenceId":"t-30315", | |
"day":0, | |
"md5":"5927704708a86f4f39bda7711fea232f", | |
"slot":"16:20-17:20", | |
"track":"room7", | |
"title":"50 Shades of AppSec", | |
"speakers":[ | |
{ | |
"id":"p-5646", | |
"name":"Troy Hunt" | |
} | |
], | |
"tags":[ | |
"Security" | |
] | |
}, | |
{ | |
"id":"0-t-30225", | |
"conferenceId":"t-30225", | |
"day":0, | |
"md5":"cd610bf5cc2e53080b219efd57b7a4f7", | |
"slot":"16:20-17:20", | |
"track":"room8", | |
"title":"Ads in Mobile Apps and Games 101", | |
"speakers":[ | |
{ | |
"id":"p-3243", | |
"name":"Alan Mendelevich" | |
} | |
], | |
"tags":[ | |
"mobile" | |
] | |
}, | |
{ | |
"id":"0-t-31343", | |
"conferenceId":"t-31343", | |
"day":0, | |
"md5":"3f07b77cdd20ef2a58925065a2a07380", | |
"slot":"16:20-17:20", | |
"track":"room9", | |
"title":"Computation expression in context : a history of the otter king", | |
"speakers":[ | |
{ | |
"id":"p-2733", | |
"name":"Andrea Magnorsky" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"0-t-30340", | |
"conferenceId":"t-30340", | |
"day":0, | |
"md5":"7e37e5850e86e52b6cdedbedbc9dc613", | |
"slot":"16:20-17:20", | |
"track":"workshops", | |
"title":"Lightning Talks", | |
"speakers":[ | |
{ | |
"id":"p-4214", | |
"name":"Pete Smith" | |
}, | |
{ | |
"id":"p-3357", | |
"name":"Ashfaq Ahmed" | |
}, | |
{ | |
"id":"p-3263", | |
"name":"Meg Gotshall" | |
}, | |
{ | |
"id":"p-21747", | |
"name":"Fredrik Johnsson" | |
} | |
], | |
"tags":[ | |
] | |
}, | |
{ | |
"id":"0-t-30159", | |
"conferenceId":"t-30159", | |
"day":0, | |
"md5":"e6dc3bd27a0cd8f6b4101a089f0e7acc", | |
"slot":"17:40-18:40", | |
"track":"room1", | |
"title":"Modelling complex game economy with Neo4j", | |
"speakers":[ | |
{ | |
"id":"p-17738", | |
"name":"Yan Cui" | |
} | |
], | |
"tags":[ | |
"Database" | |
] | |
}, | |
{ | |
"id":"0-t-31334", | |
"conferenceId":"t-31334", | |
"day":0, | |
"md5":"6915fcc8225f988927f1e12dcf99d518", | |
"slot":"17:40-18:40", | |
"track":"room2", | |
"title":"Introducing Bluetooth Low Energy", | |
"speakers":[ | |
{ | |
"id":"p-28131", | |
"name":"Eirik Midttun" | |
} | |
], | |
"tags":[ | |
"IoT" | |
] | |
}, | |
{ | |
"id":"0-t-30250", | |
"conferenceId":"t-30250", | |
"day":0, | |
"md5":"5edffa4868f6fe703ea5b4d7687335c5", | |
"slot":"17:40-18:40", | |
"track":"room3", | |
"title":"Applying S.O.L.I.D. Principles in .NET/C#", | |
"speakers":[ | |
{ | |
"id":"p-27000", | |
"name":"Chris Klug" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
"Agile", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"0-t-30248", | |
"conferenceId":"t-30248", | |
"day":0, | |
"md5":"2a6efcf5dcbdb67d072785478062d8b2", | |
"slot":"17:40-18:40", | |
"track":"room4", | |
"title":"Shazam mobile apps - data driven project management", | |
"speakers":[ | |
{ | |
"id":"p-26996", | |
"name":"Tomasz Kustrzynski" | |
} | |
], | |
"tags":[ | |
"People", | |
"Agile", | |
"mobile" | |
] | |
}, | |
{ | |
"id":"0-t-30207", | |
"conferenceId":"t-30207", | |
"day":0, | |
"md5":"2ec9fd399cae8d31c634e4e210fcaa8b", | |
"slot":"17:40-18:40", | |
"track":"room5", | |
"title":"Designing and Programming Accessible Website and App UIs", | |
"speakers":[ | |
{ | |
"id":"p-25951", | |
"name":"Rachel Appel" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Design", | |
"UI", | |
"UX" | |
] | |
}, | |
{ | |
"id":"0-t-31326", | |
"conferenceId":"t-31326", | |
"day":0, | |
"md5":"45df2227b6d661876225f6cc49205dd5", | |
"slot":"17:40-18:40", | |
"track":"room6", | |
"title":"Performance of STL containers", | |
"speakers":[ | |
{ | |
"id":"p-4416", | |
"name":"Hubert Matthews" | |
} | |
], | |
"tags":[ | |
"C++" | |
] | |
}, | |
{ | |
"id":"0-t-30332", | |
"conferenceId":"t-30332", | |
"day":0, | |
"md5":"5e155b44677fc976716a9103f0f92ae5", | |
"slot":"17:40-18:40", | |
"track":"room7", | |
"title":"PrivateEye", | |
"speakers":[ | |
{ | |
"id":"p-397", | |
"name":"Greg Young" | |
} | |
], | |
"tags":[ | |
] | |
}, | |
{ | |
"id":"0-t-30229", | |
"conferenceId":"t-30229", | |
"day":0, | |
"md5":"56c53abc29e33f73d757199773beb652", | |
"slot":"17:40-18:40", | |
"track":"room8", | |
"title":"JavaScript Forensics", | |
"speakers":[ | |
{ | |
"id":"p-4528", | |
"name":"Todd H Gardner" | |
} | |
], | |
"tags":[ | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"0-t-30343", | |
"conferenceId":"t-30343", | |
"day":0, | |
"md5":"c084a249b422101978b598536432411f", | |
"slot":"17:40-18:40", | |
"track":"room9", | |
"title":"Type-Driven Development", | |
"speakers":[ | |
{ | |
"id":"p-4446", | |
"name":"Mark Seemann" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
} | |
] | |
}, | |
{ | |
"order":"1", | |
"name":"Thursday", | |
"slots":[ | |
{ | |
"id":"09:00-10:00", | |
"from":"09:00", | |
"to":"10:00", | |
"sort":900, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"10:00-10:20", | |
"from":"10:00", | |
"to":"10:20", | |
"sort":1000, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"10:20-11:20", | |
"from":"10:20", | |
"to":"11:20", | |
"sort":1020, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"11:20-11:40", | |
"from":"11:20", | |
"to":"11:40", | |
"sort":1120, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"11:40-12:40", | |
"from":"11:40", | |
"to":"12:40", | |
"sort":1140, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"12:40-13:40", | |
"from":"12:40", | |
"to":"13:40", | |
"sort":1240, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"13:40-14:40", | |
"from":"13:40", | |
"to":"14:40", | |
"sort":1340, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"14:40-15:00", | |
"from":"14:40", | |
"to":"15:00", | |
"sort":1440, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"15:00-16:00", | |
"from":"15:00", | |
"to":"16:00", | |
"sort":1500, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"16:00-16:20", | |
"from":"16:00", | |
"to":"16:20", | |
"sort":1600, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"16:20-17:20", | |
"from":"16:20", | |
"to":"17:20", | |
"sort":1620, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"17:20-17:40", | |
"from":"17:20", | |
"to":"17:40", | |
"sort":1720, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"17:40-18:40", | |
"from":"17:40", | |
"to":"18:40", | |
"sort":1740, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"18:40-19:00", | |
"from":"18:40", | |
"to":"19:00", | |
"sort":1840, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"19:00-19:30", | |
"from":"19:00", | |
"to":"19:30", | |
"sort":1900, | |
"allTracks":true, | |
"isBreak":false | |
}, | |
{ | |
"id":"19:30-00:00", | |
"from":"19:30", | |
"to":"00:00", | |
"sort":1930, | |
"allTracks":true, | |
"isBreak":true | |
} | |
], | |
"tracks":[ | |
{ | |
"id":"room1", | |
"name":"Room 1" | |
}, | |
{ | |
"id":"room2", | |
"name":"Room 2" | |
}, | |
{ | |
"id":"room3", | |
"name":"Room 3" | |
}, | |
{ | |
"id":"room4", | |
"name":"Room 4" | |
}, | |
{ | |
"id":"room5", | |
"name":"Room 5" | |
}, | |
{ | |
"id":"room6", | |
"name":"Room 6" | |
}, | |
{ | |
"id":"room7", | |
"name":"Room 7" | |
}, | |
{ | |
"id":"room8", | |
"name":"Room 8" | |
}, | |
{ | |
"id":"room9", | |
"name":"Room 9" | |
}, | |
{ | |
"id":"workshops", | |
"name":"Workshops" | |
} | |
], | |
"sessions":[ | |
{ | |
"id":"1-t-32343", | |
"conferenceId":"t-32343", | |
"day":1, | |
"md5":"5f76af691f5178b3319fde2e3f45ab45", | |
"slot":"09:00-10:00", | |
"track":"room1", | |
"title":"Hafslund AMS: Drinking from the firehose at a large Internet-of-Things project", | |
"speakers":[ | |
{ | |
"id":"p-22882", | |
"name":"Simen Sommerfeldt" | |
}, | |
{ | |
"id":"p-30161", | |
"name":"Jon Andreas Pretorius" | |
} | |
], | |
"tags":[ | |
"IoT" | |
] | |
}, | |
{ | |
"id":"1-t-31318", | |
"conferenceId":"t-31318", | |
"day":1, | |
"md5":"d39df5e8640e7fd838f55f4218803d04", | |
"slot":"09:00-10:00", | |
"track":"room2", | |
"title":"Video Capture and Colorspaces", | |
"speakers":[ | |
{ | |
"id":"p-29155", | |
"name":"Hans Verkuil" | |
} | |
], | |
"tags":[ | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"1-t-30157", | |
"conferenceId":"t-30157", | |
"day":1, | |
"md5":"121e26bde83fdea368aee6f908931322", | |
"slot":"09:00-10:00", | |
"track":"room3", | |
"title":"Building 3D simulators for oil & gas", | |
"speakers":[ | |
{ | |
"id":"p-23925", | |
"name":"Felix Gorbatsevich" | |
} | |
], | |
"tags":[ | |
"Fun" | |
] | |
}, | |
{ | |
"id":"1-t-30270", | |
"conferenceId":"t-30270", | |
"day":1, | |
"md5":"9cecbdf6d83c1aa8ba83bf9acd58db6f", | |
"slot":"09:00-10:00", | |
"track":"room4", | |
"title":"Declarative REST: State Machines for the Web", | |
"speakers":[ | |
{ | |
"id":"p-2764", | |
"name":"Einar W. Høst" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"1-t-30324", | |
"conferenceId":"t-30324", | |
"day":1, | |
"md5":"52d1094d92549c98864c10c70449d15b", | |
"slot":"09:00-10:00", | |
"track":"room5", | |
"title":"Up and Running with ASP.NET on Linux", | |
"speakers":[ | |
{ | |
"id":"p-4417", | |
"name":"Mark Rendle" | |
} | |
], | |
"tags":[ | |
"Web", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"1-t-31328", | |
"conferenceId":"t-31328", | |
"day":1, | |
"md5":"a6c129bbc5926f5164c8c95ead6b2073", | |
"slot":"09:00-10:00", | |
"track":"room6", | |
"title":"Testdriven C++ with Catch", | |
"speakers":[ | |
{ | |
"id":"p-3269", | |
"name":"Phil Nash" | |
} | |
], | |
"tags":[ | |
"Testing", | |
"C++" | |
] | |
}, | |
{ | |
"id":"1-t-30328", | |
"conferenceId":"t-30328", | |
"day":1, | |
"md5":"fff959d800ffa4438b476a0e658cb53c", | |
"slot":"09:00-10:00", | |
"track":"room7", | |
"title":"Continuous Delivery for Architects", | |
"speakers":[ | |
{ | |
"id":"p-3323", | |
"name":"Neal Ford" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"Devops" | |
] | |
}, | |
{ | |
"id":"1-t-30326", | |
"conferenceId":"t-30326", | |
"day":1, | |
"md5":"c01e6d3646e85e539d74deb7679531d5", | |
"slot":"09:00-10:00", | |
"track":"room8", | |
"title":"Principles Of Microservices", | |
"speakers":[ | |
{ | |
"id":"p-22887", | |
"name":"Sam Newman" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"Devops" | |
] | |
}, | |
{ | |
"id":"1-t-31344", | |
"conferenceId":"t-31344", | |
"day":1, | |
"md5":"0aedd857a706dc19e62c9dd8ea7dedcc", | |
"slot":"09:00-10:00", | |
"track":"room9", | |
"title":"Idioms for building distributed fault-tolerant applications w/ Elixir", | |
"speakers":[ | |
{ | |
"id":"p-29162", | |
"name":"José Valim" | |
} | |
], | |
"tags":[ | |
"Functional Programming", | |
"Programming Languages" | |
] | |
}, | |
{ | |
"id":"1-t-30196", | |
"conferenceId":"t-30196", | |
"day":1, | |
"md5":"8ab4747312bbd71f565fa8b274f61a6c", | |
"slot":"10:20-11:20", | |
"track":"room1", | |
"title":"Typical Pitfalls in Agile Software Development", | |
"speakers":[ | |
{ | |
"id":"p-28147", | |
"name":"Jutta Eckstein" | |
} | |
], | |
"tags":[ | |
"People", | |
"Agile" | |
] | |
}, | |
{ | |
"id":"1-t-31357", | |
"conferenceId":"t-31357", | |
"day":1, | |
"md5":"fbd39b6def37ca4c54fab4e70d9cee54", | |
"slot":"10:20-11:20", | |
"track":"room2", | |
"title":"Continuous Delivery of Embedded Systems", | |
"speakers":[ | |
{ | |
"id":"p-7697", | |
"name":"Mike Long" | |
} | |
], | |
"tags":[ | |
"Devops", | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"1-t-30295", | |
"conferenceId":"t-30295", | |
"day":1, | |
"md5":"65eae0c25d0ce22685c51a673b1adf70", | |
"slot":"10:20-11:20", | |
"track":"room3", | |
"title":"Don't demo facts. Demo stories!", | |
"speakers":[ | |
{ | |
"id":"p-6648", | |
"name":"Tudor Girba" | |
} | |
], | |
"tags":[ | |
"Agile" | |
] | |
}, | |
{ | |
"id":"1-t-30282", | |
"conferenceId":"t-30282", | |
"day":1, | |
"md5":"ff62e9f089ebd013de445b956b59f2e8", | |
"slot":"10:20-11:20", | |
"track":"room4", | |
"title":"Desktop applications using JavaScript and Electron", | |
"speakers":[ | |
{ | |
"id":"p-3288", | |
"name":"Torstein Bjørnstad" | |
} | |
], | |
"tags":[ | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"1-t-30261", | |
"conferenceId":"t-30261", | |
"day":1, | |
"md5":"e984f35c4c60d58f2eed32b87bfe3776", | |
"slot":"10:20-11:20", | |
"track":"room5", | |
"title":"Succeeding in Failing", | |
"speakers":[ | |
{ | |
"id":"p-19746", | |
"name":"Darrel Miller" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Testing" | |
] | |
}, | |
{ | |
"id":"1-t-31327", | |
"conferenceId":"t-31327", | |
"day":1, | |
"md5":"a871fe614765a3df97b42f0d737c56fc", | |
"slot":"10:20-11:20", | |
"track":"room6", | |
"title":"The Set of Natural Code", | |
"speakers":[ | |
{ | |
"id":"p-28137", | |
"name":"Mark Isaacson" | |
} | |
], | |
"tags":[ | |
"C++" | |
] | |
}, | |
{ | |
"id":"1-t-30167", | |
"conferenceId":"t-30167", | |
"day":1, | |
"md5":"3f4568e16bad49c532d92a9c2c4da4c8", | |
"slot":"10:20-11:20", | |
"track":"room7", | |
"title":"What’s new in Visual Studio 2015, ALM + ASP.NET 5: Next Level Development", | |
"speakers":[ | |
{ | |
"id":"p-28070", | |
"name":"Adam Cogan" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Microsoft", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"1-t-30281", | |
"conferenceId":"t-30281", | |
"day":1, | |
"md5":"6ae49d6dc4bd3e9bd06615b10f0fb498", | |
"slot":"10:20-11:20", | |
"track":"room8", | |
"title":"Resolving Conflicts in Collaborative Occasionally Connected Mobile Apps", | |
"speakers":[ | |
{ | |
"id":"p-28102", | |
"name":"Michael L Perry" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"mobile" | |
] | |
}, | |
{ | |
"id":"1-t-31345", | |
"conferenceId":"t-31345", | |
"day":1, | |
"md5":"30e1a230abedce5721088831c4500833", | |
"slot":"10:20-11:20", | |
"track":"room9", | |
"title":"Event Sourcing and DDD with F#", | |
"speakers":[ | |
{ | |
"id":"p-28060", | |
"name":"Jérémie Chassaing" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"1-t-30234", | |
"conferenceId":"t-30234", | |
"day":1, | |
"md5":"c43842c6ac019e5327b2562001cab5f6", | |
"slot":"11:40-12:40", | |
"track":"room1", | |
"title":"The State of DevOps in Windows Land", | |
"speakers":[ | |
{ | |
"id":"p-3211", | |
"name":"Jon Arild Tørresdal" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
"Devops" | |
] | |
}, | |
{ | |
"id":"1-t-31329", | |
"conferenceId":"t-31329", | |
"day":1, | |
"md5":"17be76e07c185d09afe8f2dd2d150157", | |
"slot":"11:40-12:40", | |
"track":"room2", | |
"title":"C++ on the Web: ponies for developers without pwn’ing users", | |
"speakers":[ | |
{ | |
"id":"p-28115", | |
"name":"JF Bastien" | |
} | |
], | |
"tags":[ | |
"Web", | |
"C++" | |
] | |
}, | |
{ | |
"id":"1-t-30169", | |
"conferenceId":"t-30169", | |
"day":1, | |
"md5":"9ed8feaee24e492069c75281ef244886", | |
"slot":"11:40-12:40", | |
"track":"room3", | |
"title":"Migrating your API from Web API 2 to MVC 6", | |
"speakers":[ | |
{ | |
"id":"p-4299", | |
"name":"Filip W" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Microsoft", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"1-t-30305", | |
"conferenceId":"t-30305", | |
"day":1, | |
"md5":"64be3583cff3e8cfffa3ce32fad3c55e", | |
"slot":"11:40-12:40", | |
"track":"room4", | |
"title":"SOLID Architecture in Slices not Layers", | |
"speakers":[ | |
{ | |
"id":"p-3348", | |
"name":"Jimmy Bogard" | |
} | |
], | |
"tags":[ | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"1-t-31339", | |
"conferenceId":"t-31339", | |
"day":1, | |
"md5":"317b8779593020379aa476a4decaf71a", | |
"slot":"11:40-12:40", | |
"track":"room5", | |
"title":"Test Driven Development in C/C++", | |
"speakers":[ | |
{ | |
"id":"p-29160", | |
"name":"James Grenning" | |
} | |
], | |
"tags":[ | |
"Embedded", | |
"C++" | |
] | |
}, | |
{ | |
"id":"1-t-30156", | |
"conferenceId":"t-30156", | |
"day":1, | |
"md5":"61ce9c57979171e9b5ed49f69cc76509", | |
"slot":"11:40-12:40", | |
"track":"room6", | |
"title":"High Performance in the Critical Rendering Path", | |
"speakers":[ | |
{ | |
"id":"p-23920", | |
"name":"Nicolas Bevacqua" | |
} | |
], | |
"tags":[ | |
"Web" | |
] | |
}, | |
{ | |
"id":"1-t-30327", | |
"conferenceId":"t-30327", | |
"day":1, | |
"md5":"c594573697b32192ca68455b0c0ce9f3", | |
"slot":"11:40-12:40", | |
"track":"room7", | |
"title":"This is Water", | |
"speakers":[ | |
{ | |
"id":"p-3323", | |
"name":"Neal Ford" | |
} | |
], | |
"tags":[ | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"1-t-30275", | |
"conferenceId":"t-30275", | |
"day":1, | |
"md5":"699836def6f3a91744713ea892acb258", | |
"slot":"11:40-12:40", | |
"track":"room8", | |
"title":"What business software developers can learn from game developers", | |
"speakers":[ | |
{ | |
"id":"p-5619", | |
"name":"Adam Beres-Deak" | |
} | |
], | |
"tags":[ | |
"Fun" | |
] | |
}, | |
{ | |
"id":"1-t-31346", | |
"conferenceId":"t-31346", | |
"day":1, | |
"md5":"75e96633fc35e9d8fc7da599fcd2f4c8", | |
"slot":"11:40-12:40", | |
"track":"room9", | |
"title":"Phoenix - a framework for the modern web", | |
"speakers":[ | |
{ | |
"id":"p-29163", | |
"name":"Chris Mccord" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"1-t-30336", | |
"conferenceId":"t-30336", | |
"day":1, | |
"md5":"3d5c33754ea59af1665380f7da7bd912", | |
"slot":"13:40-14:40", | |
"track":"room1", | |
"title":"Automating legacy environments with Azure", | |
"speakers":[ | |
{ | |
"id":"p-4506", | |
"name":"David Lindblad" | |
} | |
], | |
"tags":[ | |
"Devops", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"1-t-32341", | |
"conferenceId":"t-32341", | |
"day":1, | |
"md5":"c1f14a6c3a782970799756b0d4b4f5d8", | |
"slot":"13:40-14:40", | |
"track":"room2", | |
"title":"FPGAs - a 1000x performance increase. How? What? Why?", | |
"speakers":[ | |
{ | |
"id":"p-28099", | |
"name":"Espen Tallaksen" | |
} | |
], | |
"tags":[ | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"1-t-30195", | |
"conferenceId":"t-30195", | |
"day":1, | |
"md5":"94b10980935ae27b0af072110acff50c", | |
"slot":"13:40-14:40", | |
"track":"room3", | |
"title":"The Power and Practicalities of Immutability", | |
"speakers":[ | |
{ | |
"id":"p-2860", | |
"name":"Venkat Subramaniam" | |
} | |
], | |
"tags":[ | |
"Functional Programming", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"1-t-30283", | |
"conferenceId":"t-30283", | |
"day":1, | |
"md5":"b7352c8dd6592d4c1cf0e8b23411fed3", | |
"slot":"13:40-14:40", | |
"track":"room4", | |
"title":"Real Communication with Real People in Real Time with WebRTC. For Reals.", | |
"speakers":[ | |
{ | |
"id":"p-28106", | |
"name":"Devin Rader" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Architecture", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"1-t-30317", | |
"conferenceId":"t-30317", | |
"day":1, | |
"md5":"f1677b0a15577ba58f569f5bfdda75e5", | |
"slot":"13:40-14:40", | |
"track":"room5", | |
"title":"Securing Web APIs – Patterns & Anti-Patterns", | |
"speakers":[ | |
{ | |
"id":"p-2786", | |
"name":"Dominick Baier" | |
} | |
], | |
"tags":[ | |
"Security", | |
"Web", | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"1-t-32342", | |
"conferenceId":"t-32342", | |
"day":1, | |
"md5":"7e37e5850e86e52b6cdedbedbc9dc613", | |
"slot":"13:40-14:40", | |
"track":"room6", | |
"title":"Lightning Talks", | |
"speakers":[ | |
{ | |
"id":"p-28088", | |
"name":"Ronald Mavarez" | |
}, | |
{ | |
"id":"p-28084", | |
"name":"Martin Gravråk" | |
}, | |
{ | |
"id":"p-4450", | |
"name":"Glenn F. Henriksen" | |
}, | |
{ | |
"id":"p-3244", | |
"name":"Stian Veum Møllersen" | |
}, | |
{ | |
"id":"p-30162", | |
"name":"Sean Trelford" | |
} | |
], | |
"tags":[ | |
] | |
}, | |
{ | |
"id":"1-t-30164", | |
"conferenceId":"t-30164", | |
"day":1, | |
"md5":"060f7150a4b5ba0a8b8d28ffdf0809d3", | |
"slot":"13:40-14:40", | |
"track":"room7", | |
"title":"Perceived speed is real speed", | |
"speakers":[ | |
{ | |
"id":"p-21747", | |
"name":"Fredrik Johnsson" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"UX" | |
] | |
}, | |
{ | |
"id":"1-t-30209", | |
"conferenceId":"t-30209", | |
"day":1, | |
"md5":"5470c12f5356443e4fd125b164a3f388", | |
"slot":"13:40-14:40", | |
"track":"room8", | |
"title":"Loosely coupled applications with MassTransit and RabbitMq", | |
"speakers":[ | |
{ | |
"id":"p-25931", | |
"name":"Roland Guijt" | |
} | |
], | |
"tags":[ | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"1-t-31347", | |
"conferenceId":"t-31347", | |
"day":1, | |
"md5":"9060fa532f5962091c98a4139454f526", | |
"slot":"13:40-14:40", | |
"track":"room9", | |
"title":"Enterprise Tic-Tac-Toe -- A functional approach", | |
"speakers":[ | |
{ | |
"id":"p-4413", | |
"name":"Scott Wlaschin" | |
} | |
], | |
"tags":[ | |
"Security", | |
"Web", | |
"Architecture", | |
"Functional Programming", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"1-t-30241", | |
"conferenceId":"t-30241", | |
"day":1, | |
"md5":"e58c28b4c49035494bc1294a0f4f66e4", | |
"slot":"15:00-16:00", | |
"track":"room1", | |
"title":"Continuous Delivery - the missing parts", | |
"speakers":[ | |
{ | |
"id":"p-2746", | |
"name":"Paul Stack" | |
} | |
], | |
"tags":[ | |
"Devops" | |
] | |
}, | |
{ | |
"id":"1-t-32344", | |
"conferenceId":"t-32344", | |
"day":1, | |
"md5":"19901ec64fcb4af97a6d3c363695108b", | |
"slot":"15:00-16:00", | |
"track":"room2", | |
"title":"Memory Access Ordering in Complex Embedded Systems", | |
"speakers":[ | |
{ | |
"id":"p-30164", | |
"name":"Chris Shore" | |
} | |
], | |
"tags":[ | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"1-t-30171", | |
"conferenceId":"t-30171", | |
"day":1, | |
"md5":"2ef0d661a81d14e8d8edab641d908b22", | |
"slot":"15:00-16:00", | |
"track":"room3", | |
"title":"Making .NET Applications Faster", | |
"speakers":[ | |
{ | |
"id":"p-3191", | |
"name":"Sasha Goldshtein" | |
} | |
], | |
"tags":[ | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"1-t-30299", | |
"conferenceId":"t-30299", | |
"day":1, | |
"md5":"74ec396f2cd4d0c20d58fcd1943d110d", | |
"slot":"15:00-16:00", | |
"track":"room4", | |
"title":"It's all messages now: where are my abstractions?", | |
"speakers":[ | |
{ | |
"id":"p-24941", | |
"name":"Matt Barrett" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"1-t-30184", | |
"conferenceId":"t-30184", | |
"day":1, | |
"md5":"ac99d64b3966e85b268ac653cf4d51b4", | |
"slot":"15:00-16:00", | |
"track":"room5", | |
"title":"Authentication and authorization in modern JavaScript web applications – how hard can it be?", | |
"speakers":[ | |
{ | |
"id":"p-4237", | |
"name":"Brock Allen" | |
} | |
], | |
"tags":[ | |
"Security", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"1-t-31330", | |
"conferenceId":"t-31330", | |
"day":1, | |
"md5":"f390a9edc924ca7a6610e80cdf731268", | |
"slot":"15:00-16:00", | |
"track":"room6", | |
"title":"Building IoT Device Applications in JavaScript and C++", | |
"speakers":[ | |
{ | |
"id":"p-28072", | |
"name":"Günter Obiltschnig" | |
} | |
], | |
"tags":[ | |
"IoT", | |
"C++", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"1-t-30318", | |
"conferenceId":"t-30318", | |
"day":1, | |
"md5":"ffc2ed797c8dc5147a8126b0b6d6f342", | |
"slot":"15:00-16:00", | |
"track":"room7", | |
"title":"Web Development in 2020", | |
"speakers":[ | |
{ | |
"id":"p-4481", | |
"name":"Steve Sanderson" | |
} | |
], | |
"tags":[ | |
"Web" | |
] | |
}, | |
{ | |
"id":"1-t-30312", | |
"conferenceId":"t-30312", | |
"day":1, | |
"md5":"3293e539657eba429beaab8b4b57750f", | |
"slot":"15:00-16:00", | |
"track":"room8", | |
"title":"How to turn software into competitive business advantage", | |
"speakers":[ | |
{ | |
"id":"p-1901", | |
"name":"Gojko Adzic" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"1-t-30333", | |
"conferenceId":"t-30333", | |
"day":1, | |
"md5":"6bf565eb0af1d9c4319c14b7f1ed3b40", | |
"slot":"15:00-16:00", | |
"track":"room9", | |
"title":"Functional Data", | |
"speakers":[ | |
{ | |
"id":"p-397", | |
"name":"Greg Young" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"1-t-30210", | |
"conferenceId":"t-30210", | |
"day":1, | |
"md5":"4be6d328090b2e60acba41db463b7ac7", | |
"slot":"16:20-17:20", | |
"track":"room1", | |
"title":"The elephant in the room: Continuous Delivery for Databases", | |
"speakers":[ | |
{ | |
"id":"p-22839", | |
"name":"Alex Yates" | |
} | |
], | |
"tags":[ | |
"Devops", | |
"Database" | |
] | |
}, | |
{ | |
"id":"1-t-31320", | |
"conferenceId":"t-31320", | |
"day":1, | |
"md5":"660a44822c5c3d9858a096523e23da75", | |
"slot":"16:20-17:20", | |
"track":"room2", | |
"title":"BDD for Embedded Systems", | |
"speakers":[ | |
{ | |
"id":"p-29156", | |
"name":"Oscar Hellström" | |
} | |
], | |
"tags":[ | |
"Agile", | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"1-t-30175", | |
"conferenceId":"t-30175", | |
"day":1, | |
"md5":"25dde0ed90ea4c2265e4b3f6e7ef605b", | |
"slot":"16:20-17:20", | |
"track":"room3", | |
"title":"Reactive Programming Demystified", | |
"speakers":[ | |
{ | |
"id":"p-4400", | |
"name":"Matthew Podwysocki" | |
} | |
], | |
"tags":[ | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"1-t-30311", | |
"conferenceId":"t-30311", | |
"day":1, | |
"md5":"62bfb95f773a67a179ee027f9956e744", | |
"slot":"16:20-17:20", | |
"track":"room4", | |
"title":"Hacking .NET(C#) Application: Building and Breaking Layered Defense", | |
"speakers":[ | |
{ | |
"id":"p-3209", | |
"name":"Jon McCoy" | |
}, | |
{ | |
"id":"p-30176", | |
"name":"Topher Timzen" | |
} | |
], | |
"tags":[ | |
"Security", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"1-t-30190", | |
"conferenceId":"t-30190", | |
"day":1, | |
"md5":"dc8317f2ea02a6287925aacb3e20b820", | |
"slot":"16:20-17:20", | |
"track":"room5", | |
"title":"Code Gems From the Rosyln and .NET Source Code", | |
"speakers":[ | |
{ | |
"id":"p-3341", | |
"name":"Scott Allen" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"1-t-31331", | |
"conferenceId":"t-31331", | |
"day":1, | |
"md5":"7dd07f19c16cb1d2d84a30a02aa741fa", | |
"slot":"16:20-17:20", | |
"track":"room6", | |
"title":"Encryption in C++", | |
"speakers":[ | |
{ | |
"id":"p-29159", | |
"name":"Jens Weller" | |
} | |
], | |
"tags":[ | |
"C++" | |
] | |
}, | |
{ | |
"id":"1-t-30187", | |
"conferenceId":"t-30187", | |
"day":1, | |
"md5":"87c4b9073cac833541c1c369e1cd528a", | |
"slot":"16:20-17:20", | |
"track":"room7", | |
"title":"Modern architectural patterns for the cloud", | |
"speakers":[ | |
{ | |
"id":"p-3286", | |
"name":"Mahesh Krishnan" | |
}, | |
{ | |
"id":"p-4356", | |
"name":"John S Azariah" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"1-t-30198", | |
"conferenceId":"t-30198", | |
"day":1, | |
"md5":"c89b0f7ba47eaa612c99f31759c609cb", | |
"slot":"16:20-17:20", | |
"track":"room8", | |
"title":"Deliberate creativity", | |
"speakers":[ | |
{ | |
"id":"p-3380", | |
"name":"Andy Hunt" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"1-t-31349", | |
"conferenceId":"t-31349", | |
"day":1, | |
"md5":"b3ee365b03ddc7f4983b1df6b3891903", | |
"slot":"16:20-17:20", | |
"track":"room9", | |
"title":"Crunching through big data with MBrace, Azure and F#", | |
"speakers":[ | |
{ | |
"id":"p-9721", | |
"name":"Mathias Brandewinder" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"1-t-30246", | |
"conferenceId":"t-30246", | |
"day":1, | |
"md5":"da9555b369da9971fb5a09a863bccd20", | |
"slot":"17:40-18:40", | |
"track":"room1", | |
"title":"Running Docker and Containers in Development and Production", | |
"speakers":[ | |
{ | |
"id":"p-2797", | |
"name":"Ben Hall" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"Devops" | |
] | |
}, | |
{ | |
"id":"1-t-31332", | |
"conferenceId":"t-31332", | |
"day":1, | |
"md5":"9030159a304bf46ad19521259f0d0ab3", | |
"slot":"17:40-18:40", | |
"track":"room2", | |
"title":"Functional C++", | |
"speakers":[ | |
{ | |
"id":"p-353", | |
"name":"Kevlin Henney" | |
} | |
], | |
"tags":[ | |
"Functional Programming", | |
"C++" | |
] | |
}, | |
{ | |
"id":"1-t-30337", | |
"conferenceId":"t-30337", | |
"day":1, | |
"md5":"3c029b7bdce522c870d04272e847f20b", | |
"slot":"17:40-18:40", | |
"track":"room3", | |
"title":"Ten simple rules for creating your own compiler on the CLR", | |
"speakers":[ | |
{ | |
"id":"p-25938", | |
"name":"Philip Laureano" | |
} | |
], | |
"tags":[ | |
"Programming Languages", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"1-t-30259", | |
"conferenceId":"t-30259", | |
"day":1, | |
"md5":"1207fd627081ad8dcf989b25194676d0", | |
"slot":"17:40-18:40", | |
"track":"room4", | |
"title":"Taking other peoples money: A guide to online payments", | |
"speakers":[ | |
{ | |
"id":"p-28049", | |
"name":"Ben Cull" | |
} | |
], | |
"tags":[ | |
"Web" | |
] | |
}, | |
{ | |
"id":"1-t-30224", | |
"conferenceId":"t-30224", | |
"day":1, | |
"md5":"f971aff01473253eaf59fe934cec29e9", | |
"slot":"17:40-18:40", | |
"track":"room5", | |
"title":"Microsoft Azure Web Jobs - the new way to run your workloads in the Cloud", | |
"speakers":[ | |
{ | |
"id":"p-3195", | |
"name":"Magnus Mårtensson" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Microsoft", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"1-t-30320", | |
"conferenceId":"t-30320", | |
"day":1, | |
"md5":"3aa63478b6330b89958e0ac73be6269d", | |
"slot":"17:40-18:40", | |
"track":"room6", | |
"title":"Building Isomorphic Applications in JavaScript", | |
"speakers":[ | |
{ | |
"id":"p-28155", | |
"name":"Eirik Langholm Vullum" | |
} | |
], | |
"tags":[ | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"1-t-30313", | |
"conferenceId":"t-30313", | |
"day":1, | |
"md5":"978a5d39280c692d305a5e5dc8c2a6eb", | |
"slot":"17:40-18:40", | |
"track":"room7", | |
"title":".NET Rocks Panel on Application Security", | |
"speakers":[ | |
{ | |
"id":"p-28019", | |
"name":"Barry Dorrans" | |
}, | |
{ | |
"id":"p-5646", | |
"name":"Troy Hunt" | |
}, | |
{ | |
"id":"p-3203", | |
"name":"Niall Merrigan" | |
}, | |
{ | |
"id":"p-424", | |
"name":"Carl Franklin" | |
}, | |
{ | |
"id":"p-402", | |
"name":"Richard Campbell" | |
}, | |
{ | |
"id":"p-28128", | |
"name":"André N. Klingsheim" | |
} | |
], | |
"tags":[ | |
"Security" | |
] | |
}, | |
{ | |
"id":"1-t-30302", | |
"conferenceId":"t-30302", | |
"day":1, | |
"md5":"711d626e3fb5ddd3a048aa4882fe0abb", | |
"slot":"17:40-18:40", | |
"track":"room8", | |
"title":"Getting the first PR into .NET and other tales from an OSS contributor", | |
"speakers":[ | |
{ | |
"id":"p-4505", | |
"name":"Adam Ralph" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"1-t-32356", | |
"conferenceId":"t-32356", | |
"day":1, | |
"md5":"ee964fc9389d43840ba65213e6b51c8a", | |
"slot":"17:40-18:40", | |
"track":"room9", | |
"title":"Implementing the logic for a board game in Elixir", | |
"speakers":[ | |
{ | |
"id":"p-30174", | |
"name":"Torben Hoffmann" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"1-t-30185", | |
"conferenceId":"t-30185", | |
"day":1, | |
"md5":"67c7f973e3598016293c1ba403a0598b", | |
"slot":"19:00-19:30", | |
"track":"room1", | |
"title":"Not Even Close: The State of Computer Security", | |
"speakers":[ | |
{ | |
"id":"p-28149", | |
"name":"James Mickens" | |
} | |
], | |
"tags":[ | |
"Security", | |
"Fun" | |
] | |
} | |
] | |
}, | |
{ | |
"order":"2", | |
"name":"Friday", | |
"slots":[ | |
{ | |
"id":"09:00-10:00", | |
"from":"09:00", | |
"to":"10:00", | |
"sort":900, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"10:00-10:20", | |
"from":"10:00", | |
"to":"10:20", | |
"sort":1000, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"10:20-11:20", | |
"from":"10:20", | |
"to":"11:20", | |
"sort":1020, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"11:20-11:40", | |
"from":"11:20", | |
"to":"11:40", | |
"sort":1120, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"11:40-12:40", | |
"from":"11:40", | |
"to":"12:40", | |
"sort":1140, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"12:40-13:40", | |
"from":"12:40", | |
"to":"13:40", | |
"sort":1240, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"13:40-14:40", | |
"from":"13:40", | |
"to":"14:40", | |
"sort":1340, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"14:40-15:00", | |
"from":"14:40", | |
"to":"15:00", | |
"sort":1440, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"15:00-16:00", | |
"from":"15:00", | |
"to":"16:00", | |
"sort":1500, | |
"allTracks":false, | |
"isBreak":false | |
}, | |
{ | |
"id":"16:00-16:20", | |
"from":"16:00", | |
"to":"16:20", | |
"sort":1600, | |
"allTracks":true, | |
"isBreak":true | |
}, | |
{ | |
"id":"16:20-17:20", | |
"from":"16:20", | |
"to":"17:20", | |
"sort":1620, | |
"allTracks":false, | |
"isBreak":false | |
} | |
], | |
"tracks":[ | |
{ | |
"id":"room1", | |
"name":"Room 1" | |
}, | |
{ | |
"id":"room2", | |
"name":"Room 2" | |
}, | |
{ | |
"id":"room3", | |
"name":"Room 3" | |
}, | |
{ | |
"id":"room4", | |
"name":"Room 4" | |
}, | |
{ | |
"id":"room5", | |
"name":"Room 5" | |
}, | |
{ | |
"id":"room6", | |
"name":"Room 6" | |
}, | |
{ | |
"id":"room7", | |
"name":"Room 7" | |
}, | |
{ | |
"id":"room8", | |
"name":"Room 8" | |
}, | |
{ | |
"id":"room9", | |
"name":"Room 9" | |
}, | |
{ | |
"id":"workshops", | |
"name":"Workshops" | |
} | |
], | |
"sessions":[ | |
{ | |
"id":"2-t-30271", | |
"conferenceId":"t-30271", | |
"day":2, | |
"md5":"0217cc53c222751794308cdbaa0a65c7", | |
"slot":"09:00-10:00", | |
"track":"room1", | |
"title":"Continuous Delivery Patterns for Cloud-based Applications", | |
"speakers":[ | |
{ | |
"id":"p-28081", | |
"name":"Mitch Denny" | |
} | |
], | |
"tags":[ | |
"Devops", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"2-t-30291", | |
"conferenceId":"t-30291", | |
"day":2, | |
"md5":"4e3fd21d036be76300317a986dc11e64", | |
"slot":"09:00-10:00", | |
"track":"room2", | |
"title":"595 billions income - untouched by human hands", | |
"speakers":[ | |
{ | |
"id":"p-3338", | |
"name":"Trond Arve Wasskog" | |
} | |
], | |
"tags":[ | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"2-t-32346", | |
"conferenceId":"t-32346", | |
"day":2, | |
"md5":"5990aa64f10db84ce9c95ff98c1564fa", | |
"slot":"09:00-10:00", | |
"track":"room3", | |
"title":"Get Unblocked", | |
"speakers":[ | |
{ | |
"id":"p-3370", | |
"name":"Denise Jacobs" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"2-t-30180", | |
"conferenceId":"t-30180", | |
"day":2, | |
"md5":"6e8a34f821956fb3d442897eacad8c5c", | |
"slot":"09:00-10:00", | |
"track":"room4", | |
"title":"DevOps Yourself: Fast-Track Your Windows Development Environment Setup with Chocolatey and Vagrant", | |
"speakers":[ | |
{ | |
"id":"p-25936", | |
"name":"Justin James" | |
} | |
], | |
"tags":[ | |
"Devops" | |
] | |
}, | |
{ | |
"id":"2-t-30323", | |
"conferenceId":"t-30323", | |
"day":2, | |
"md5":"24db27b5d849ebe9799f9fa657ea335b", | |
"slot":"09:00-10:00", | |
"track":"room5", | |
"title":"Standing on a Beach, Staring at the C", | |
"speakers":[ | |
{ | |
"id":"p-353", | |
"name":"Kevlin Henney" | |
} | |
], | |
"tags":[ | |
"Embedded", | |
"C++" | |
] | |
}, | |
{ | |
"id":"2-t-30301", | |
"conferenceId":"t-30301", | |
"day":2, | |
"md5":"f1b8ca958dec09c2bf9dc0503af33fb6", | |
"slot":"09:00-10:00", | |
"track":"room6", | |
"title":"Boosting security with HTTP headers", | |
"speakers":[ | |
{ | |
"id":"p-28128", | |
"name":"André N. Klingsheim" | |
} | |
], | |
"tags":[ | |
"Security", | |
"Web" | |
] | |
}, | |
{ | |
"id":"2-t-30189", | |
"conferenceId":"t-30189", | |
"day":2, | |
"md5":"4e2e1e3cc3ff94a753467dd51d7330c5", | |
"slot":"09:00-10:00", | |
"track":"room7", | |
"title":"AWS vs. Azure - architectures and choices", | |
"speakers":[ | |
{ | |
"id":"p-5611", | |
"name":"Lynn Langit" | |
}, | |
{ | |
"id":"p-25972", | |
"name":"Michele Leroux Bustamante" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"2-t-30201", | |
"conferenceId":"t-30201", | |
"day":2, | |
"md5":"380ee5d8d6660403d67d782da38f19ba", | |
"slot":"09:00-10:00", | |
"track":"room8", | |
"title":"Aurelia: Next Generation Web Apps", | |
"speakers":[ | |
{ | |
"id":"p-28148", | |
"name":"Rob Eisenberg" | |
} | |
], | |
"tags":[ | |
"Web" | |
] | |
}, | |
{ | |
"id":"2-t-31351", | |
"conferenceId":"t-31351", | |
"day":2, | |
"md5":"3b45b5c923130ab34a4bf1d317b265df", | |
"slot":"09:00-10:00", | |
"track":"room9", | |
"title":"F# for C# Developers", | |
"speakers":[ | |
{ | |
"id":"p-22865", | |
"name":"Phillip Trelford" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"2-t-30287", | |
"conferenceId":"t-30287", | |
"day":2, | |
"md5":"f81993668d0a4c3966d17b33c63028e5", | |
"slot":"10:20-11:20", | |
"track":"room1", | |
"title":"Advanced Continuous Delivery Scenarios", | |
"speakers":[ | |
{ | |
"id":"p-3258", | |
"name":"Jeff French" | |
} | |
], | |
"tags":[ | |
"Devops" | |
] | |
}, | |
{ | |
"id":"2-t-30205", | |
"conferenceId":"t-30205", | |
"day":2, | |
"md5":"12b990ed76fd20f1b8cde21c31556f34", | |
"slot":"10:20-11:20", | |
"track":"room2", | |
"title":"The rest of ReST", | |
"speakers":[ | |
{ | |
"id":"p-25948", | |
"name":"Dylan Beattie" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"2-t-30215", | |
"conferenceId":"t-30215", | |
"day":2, | |
"md5":"7975dacaabefce266812cc39e3efe873", | |
"slot":"10:20-11:20", | |
"track":"room3", | |
"title":"Universal Windows Apps – Develop for all Sizes", | |
"speakers":[ | |
{ | |
"id":"p-23919", | |
"name":"Lars Klint" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"2-t-31355", | |
"conferenceId":"t-31355", | |
"day":2, | |
"md5":"b39e1e769e9e78050cd57d9a068cdbbb", | |
"slot":"10:20-11:20", | |
"track":"room4", | |
"title":"Data exploration and analytics with elasticsearch", | |
"speakers":[ | |
{ | |
"id":"p-29165", | |
"name":"Aleksander Stensby" | |
} | |
], | |
"tags":[ | |
"Database", | |
"Search" | |
] | |
}, | |
{ | |
"id":"2-t-30276", | |
"conferenceId":"t-30276", | |
"day":2, | |
"md5":"cf2309b3e202a06123d993d73cc680c9", | |
"slot":"10:20-11:20", | |
"track":"room5", | |
"title":"A security testers toolkit", | |
"speakers":[ | |
{ | |
"id":"p-3203", | |
"name":"Niall Merrigan" | |
} | |
], | |
"tags":[ | |
"Security" | |
] | |
}, | |
{ | |
"id":"2-t-30214", | |
"conferenceId":"t-30214", | |
"day":2, | |
"md5":"b9adca4cadfc3ade6e6a708de8c545ba", | |
"slot":"10:20-11:20", | |
"track":"room6", | |
"title":"Engagement techniques. How to get people engaged and motivated?", | |
"speakers":[ | |
{ | |
"id":"p-25958", | |
"name":"Anna Danes" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"2-t-30166", | |
"conferenceId":"t-30166", | |
"day":2, | |
"md5":"7655db86b5f3dd2b6bd40150877fe3a5", | |
"slot":"10:20-11:20", | |
"track":"room7", | |
"title":"Get more than a cache back! The Microsoft Azure (Redis) Cache", | |
"speakers":[ | |
{ | |
"id":"p-2740", | |
"name":"Maarten Balliauw" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"2-t-32347", | |
"conferenceId":"t-32347", | |
"day":2, | |
"md5":"24f2011941feb3f957c5d725b770463c", | |
"slot":"10:20-11:20", | |
"track":"room8", | |
"title":"Theft, Tributes and Collaboration", | |
"speakers":[ | |
{ | |
"id":"p-30165", | |
"name":"Carl Smith" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"2-t-31353", | |
"conferenceId":"t-31353", | |
"day":2, | |
"md5":"7084768ba0b006e6b4ae0d7a941db910", | |
"slot":"10:20-11:20", | |
"track":"room9", | |
"title":"End-to-end Functional Web Development", | |
"speakers":[ | |
{ | |
"id":"p-4487", | |
"name":"Tomas Petricek" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"2-t-30240", | |
"conferenceId":"t-30240", | |
"day":2, | |
"md5":"0635d129a5b775ae9cb872e075ced3d5", | |
"slot":"11:40-12:40", | |
"track":"room1", | |
"title":"How do you scale a logging infrastructure to accept a billion messages a day?", | |
"speakers":[ | |
{ | |
"id":"p-2746", | |
"name":"Paul Stack" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"Devops" | |
] | |
}, | |
{ | |
"id":"2-t-30288", | |
"conferenceId":"t-30288", | |
"day":2, | |
"md5":"2863d2f68cef9d2fcbccd9fd01ef6fa8", | |
"slot":"11:40-12:40", | |
"track":"room2", | |
"title":"Learning Client Hypermedia from the Ground Up", | |
"speakers":[ | |
{ | |
"id":"p-28112", | |
"name":"Mike Amundsen" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"2-t-30163", | |
"conferenceId":"t-30163", | |
"day":2, | |
"md5":"cd50d498429be782aa1b122764d14dcb", | |
"slot":"11:40-12:40", | |
"track":"room3", | |
"title":"Making 2D Games that Run Everywhere using C# and CocosSharp", | |
"speakers":[ | |
{ | |
"id":"p-24925", | |
"name":"James Montemagno" | |
} | |
], | |
"tags":[ | |
"mobile", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"2-t-30245", | |
"conferenceId":"t-30245", | |
"day":2, | |
"md5":"5e1a1d20518aef3b4ddc0a9f5cccad66", | |
"slot":"11:40-12:40", | |
"track":"room4", | |
"title":"Lifestyles of the rich and frameworkless", | |
"speakers":[ | |
{ | |
"id":"p-4214", | |
"name":"Pete Smith" | |
} | |
], | |
"tags":[ | |
"Web" | |
] | |
}, | |
{ | |
"id":"2-t-30252", | |
"conferenceId":"t-30252", | |
"day":2, | |
"md5":"0e64fcdf58bb1c80600c927c69d01723", | |
"slot":"11:40-12:40", | |
"track":"room5", | |
"title":"Going beyond OWASP", | |
"speakers":[ | |
{ | |
"id":"p-28019", | |
"name":"Barry Dorrans" | |
} | |
], | |
"tags":[ | |
"Security", | |
"Web" | |
] | |
}, | |
{ | |
"id":"2-t-30213", | |
"conferenceId":"t-30213", | |
"day":2, | |
"md5":"e79e085d7b6ed3e3ea096384c141fcbf", | |
"slot":"11:40-12:40", | |
"track":"room6", | |
"title":"Big Scrum: All You Need and It’s Not Enough", | |
"speakers":[ | |
{ | |
"id":"p-4596", | |
"name":"Martin Hinshelwood" | |
} | |
], | |
"tags":[ | |
"People", | |
"Agile" | |
] | |
}, | |
{ | |
"id":"2-t-30188", | |
"conferenceId":"t-30188", | |
"day":2, | |
"md5":"d7d36ededff8eb58f8b55b0a4a6cb0ba", | |
"slot":"11:40-12:40", | |
"track":"room7", | |
"title":"Make it Faster - Lessons Learned from Benchmarking NoSQL on the AWS Cloud", | |
"speakers":[ | |
{ | |
"id":"p-5611", | |
"name":"Lynn Langit" | |
} | |
], | |
"tags":[ | |
"Database", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"2-t-32348", | |
"conferenceId":"t-32348", | |
"day":2, | |
"md5":"bef2ed3a685f8f7b509e1e4fe2456082", | |
"slot":"11:40-12:40", | |
"track":"room8", | |
"title":"Let’s Start an Epidemic", | |
"speakers":[ | |
{ | |
"id":"p-7708", | |
"name":"Doc Norton" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"2-t-31354", | |
"conferenceId":"t-31354", | |
"day":2, | |
"md5":"85d00c6bf4932806bde27c244d0efd42", | |
"slot":"11:40-12:40", | |
"track":"room9", | |
"title":"Maximizing throughput on Multicore Systems", | |
"speakers":[ | |
{ | |
"id":"p-29164", | |
"name":"Irina Guberman" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"2-t-30339", | |
"conferenceId":"t-30339", | |
"day":2, | |
"md5":"7e37e5850e86e52b6cdedbedbc9dc613", | |
"slot":"11:40-12:40", | |
"track":"workshops", | |
"title":"Lightning Talks", | |
"speakers":[ | |
{ | |
"id":"p-26999", | |
"name":"Trond Marius Øvstetun" | |
}, | |
{ | |
"id":"p-22839", | |
"name":"Alex Yates" | |
}, | |
{ | |
"id":"p-5650", | |
"name":"Michał Śliwoń" | |
}, | |
{ | |
"id":"p-4528", | |
"name":"Todd H Gardner" | |
}, | |
{ | |
"id":"p-28118", | |
"name":"Claus Asbjørn Sørensen" | |
} | |
], | |
"tags":[ | |
] | |
}, | |
{ | |
"id":"2-t-30335", | |
"conferenceId":"t-30335", | |
"day":2, | |
"md5":"37ad56d8555c24496683f4ec39a82a61", | |
"slot":"13:40-14:40", | |
"track":"room1", | |
"title":"Mob Programming, A Whole Team Approach", | |
"speakers":[ | |
{ | |
"id":"p-28107", | |
"name":"Woody Zuill" | |
} | |
], | |
"tags":[ | |
"People", | |
"Agile" | |
] | |
}, | |
{ | |
"id":"2-t-32345", | |
"conferenceId":"t-32345", | |
"day":2, | |
"md5":"9c77fad1ba263e589a352ff335030533", | |
"slot":"13:40-14:40", | |
"track":"room2", | |
"title":"Multicore Software Development on ARM", | |
"speakers":[ | |
{ | |
"id":"p-30164", | |
"name":"Chris Shore" | |
} | |
], | |
"tags":[ | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"2-t-30266", | |
"conferenceId":"t-30266", | |
"day":2, | |
"md5":"97b1654b93862932f18c2834dc2f3d35", | |
"slot":"13:40-14:40", | |
"track":"room3", | |
"title":"Real-time, offline-capable, noBackend web apps with Firebase", | |
"speakers":[ | |
{ | |
"id":"p-28024", | |
"name":"David Ed Mellum" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Database" | |
] | |
}, | |
{ | |
"id":"2-t-30262", | |
"conferenceId":"t-30262", | |
"day":2, | |
"md5":"7ac7f8fe72114181bb261f4983f9ba8c", | |
"slot":"13:40-14:40", | |
"track":"room4", | |
"title":"Crafting Evolvable Web API Representations", | |
"speakers":[ | |
{ | |
"id":"p-19746", | |
"name":"Darrel Miller" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"2-t-31356", | |
"conferenceId":"t-31356", | |
"day":2, | |
"md5":"63fa6a026dcb2c4c60346ccfc6549a9d", | |
"slot":"13:40-14:40", | |
"track":"room5", | |
"title":"You can't change this: Immutable JavaScript", | |
"speakers":[ | |
{ | |
"id":"p-1884", | |
"name":"Christian Johansen" | |
} | |
], | |
"tags":[ | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"2-t-30217", | |
"conferenceId":"t-30217", | |
"day":2, | |
"md5":"cfa729a83142fa8ef6cdd62e39b8c7e0", | |
"slot":"13:40-14:40", | |
"track":"room6", | |
"title":"Why monitoring sucks, and how to improve it", | |
"speakers":[ | |
{ | |
"id":"p-25961", | |
"name":"Pavlo Baron" | |
} | |
], | |
"tags":[ | |
"Devops" | |
] | |
}, | |
{ | |
"id":"2-t-30316", | |
"conferenceId":"t-30316", | |
"day":2, | |
"md5":"d3e076a197a89567794111eaee86221c", | |
"slot":"13:40-14:40", | |
"track":"room7", | |
"title":"Making Hacking Child’s Play", | |
"speakers":[ | |
{ | |
"id":"p-5646", | |
"name":"Troy Hunt" | |
} | |
], | |
"tags":[ | |
"Security" | |
] | |
}, | |
{ | |
"id":"2-t-30285", | |
"conferenceId":"t-30285", | |
"day":2, | |
"md5":"a155ba03364be74989e66ffc1a9856a5", | |
"slot":"13:40-14:40", | |
"track":"room8", | |
"title":"Troll Hunting on the Internet", | |
"speakers":[ | |
{ | |
"id":"p-3333", | |
"name":"Gary Short" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Big Data", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"2-t-31352", | |
"conferenceId":"t-31352", | |
"day":2, | |
"md5":"acf93c003804ec5feb90878821c55cb4", | |
"slot":"13:40-14:40", | |
"track":"room9", | |
"title":"Metaprogramming Elixir", | |
"speakers":[ | |
{ | |
"id":"p-29163", | |
"name":"Chris Mccord" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"2-t-32349", | |
"conferenceId":"t-32349", | |
"day":2, | |
"md5":"c0d08fee82b675c6c411defbd5a44f0b", | |
"slot":"13:40-14:40", | |
"track":"workshops", | |
"title":"Creative Collaboration; Tools for Teams", | |
"speakers":[ | |
{ | |
"id":"p-7708", | |
"name":"Doc Norton" | |
}, | |
{ | |
"id":"p-3370", | |
"name":"Denise Jacobs" | |
}, | |
{ | |
"id":"p-30165", | |
"name":"Carl Smith" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"2-t-30168", | |
"conferenceId":"t-30168", | |
"day":2, | |
"md5":"6d82edd3128960ca8277ca693c556695", | |
"slot":"15:00-16:00", | |
"track":"room1", | |
"title":"Knowledge is power! The guide to measure what matters.", | |
"speakers":[ | |
{ | |
"id":"p-22855", | |
"name":"Mark van Straten" | |
} | |
], | |
"tags":[ | |
"Devops" | |
] | |
}, | |
{ | |
"id":"2-t-30264", | |
"conferenceId":"t-30264", | |
"day":2, | |
"md5":"e31c04e48bebdd24f77dec107741514d", | |
"slot":"15:00-16:00", | |
"track":"room2", | |
"title":"Beer analysis using Kibana 4 and elasticsearch", | |
"speakers":[ | |
{ | |
"id":"p-5614", | |
"name":"Christoffer Vig" | |
} | |
], | |
"tags":[ | |
"Database", | |
"Search" | |
] | |
}, | |
{ | |
"id":"2-t-30170", | |
"conferenceId":"t-30170", | |
"day":2, | |
"md5":"2e6d71c91d0244f7fc06568a12d04734", | |
"slot":"15:00-16:00", | |
"track":"room3", | |
"title":"Swift: Apple's New Programming Language for iOS and OS X", | |
"speakers":[ | |
{ | |
"id":"p-3191", | |
"name":"Sasha Goldshtein" | |
} | |
], | |
"tags":[ | |
"Programming Languages", | |
"mobile" | |
] | |
}, | |
{ | |
"id":"2-t-30277", | |
"conferenceId":"t-30277", | |
"day":2, | |
"md5":"b273e7036ce40dbc98dbd449d983399a", | |
"slot":"15:00-16:00", | |
"track":"room4", | |
"title":"Getting started with Meteor", | |
"speakers":[ | |
{ | |
"id":"p-22859", | |
"name":"Kuba Walinski" | |
} | |
], | |
"tags":[ | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"2-t-32360", | |
"conferenceId":"t-32360", | |
"day":2, | |
"md5":"2e11d92b47e1b528a4e1138156a52705", | |
"slot":"15:00-16:00", | |
"track":"room5", | |
"title":"Introduction to Windows 10 UWP and Adaptive Design", | |
"speakers":[ | |
{ | |
"id":"p-4396", | |
"name":"Andy Wigley" | |
} | |
], | |
"tags":[ | |
"Web", | |
"Microsoft", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"2-t-30346", | |
"conferenceId":"t-30346", | |
"day":2, | |
"md5":"2d2b41be5d6f2ebf30c79fd4fb9f9e34", | |
"slot":"15:00-16:00", | |
"track":"room6", | |
"title":"Patterns and Practices for Embedded TDD in C and C++", | |
"speakers":[ | |
{ | |
"id":"p-28074", | |
"name":"Byran Wills-Heath" | |
} | |
], | |
"tags":[ | |
"Testing", | |
"Embedded" | |
] | |
}, | |
{ | |
"id":"2-t-30319", | |
"conferenceId":"t-30319", | |
"day":2, | |
"md5":"4866c1ef804e7055f2423157340d0d7b", | |
"slot":"15:00-16:00", | |
"track":"room7", | |
"title":"Removing barriers", | |
"speakers":[ | |
{ | |
"id":"p-4516", | |
"name":"Hadi Hariri" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"2-t-30173", | |
"conferenceId":"t-30173", | |
"day":2, | |
"md5":"fedf2f7fcbe0153d8e0e94814a55278c", | |
"slot":"15:00-16:00", | |
"track":"room8", | |
"title":"Cloud-Scale Event Processing with the Reactive Extensions (Rx)", | |
"speakers":[ | |
{ | |
"id":"p-4400", | |
"name":"Matthew Podwysocki" | |
}, | |
{ | |
"id":"p-31176", | |
"name":"Bart De Smet" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"2-t-32352", | |
"conferenceId":"t-32352", | |
"day":2, | |
"md5":"e56d0013e54e28659f95eb8c7c353ffa", | |
"slot":"15:00-16:00", | |
"track":"room9", | |
"title":"F# as our day job by 2016", | |
"speakers":[ | |
{ | |
"id":"p-3219", | |
"name":"Tomas Jansson" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
}, | |
{ | |
"id":"2-t-32349", | |
"conferenceId":"t-32349", | |
"day":2, | |
"md5":"c0d08fee82b675c6c411defbd5a44f0b", | |
"slot":"15:00-16:00", | |
"track":"workshops", | |
"title":"Creative Collaboration; Tools for Teams", | |
"speakers":[ | |
{ | |
"id":"p-7708", | |
"name":"Doc Norton" | |
}, | |
{ | |
"id":"p-3370", | |
"name":"Denise Jacobs" | |
}, | |
{ | |
"id":"p-30165", | |
"name":"Carl Smith" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"2-t-30325", | |
"conferenceId":"t-30325", | |
"day":2, | |
"md5":"58efac287b763680588c90803f79539f", | |
"slot":"16:20-17:20", | |
"track":"room1", | |
"title":"Everything I Know About Computers, I Learned From the Movies", | |
"speakers":[ | |
{ | |
"id":"p-4417", | |
"name":"Mark Rendle" | |
} | |
], | |
"tags":[ | |
"Fun" | |
] | |
}, | |
{ | |
"id":"2-t-32357", | |
"conferenceId":"t-32357", | |
"day":2, | |
"md5":"e1334f6795aacc6f50606c1d01273743", | |
"slot":"16:20-17:20", | |
"track":"room2", | |
"title":"IoT and Machine Learning – a true story of a Smart Grid", | |
"speakers":[ | |
{ | |
"id":"p-30175", | |
"name":"Erik Åsberg" | |
}, | |
{ | |
"id":"p-31170", | |
"name":"Davide Roverso" | |
} | |
], | |
"tags":[ | |
"Microsoft", | |
"Architecture", | |
"Big Data", | |
"Cloud", | |
"IoT" | |
] | |
}, | |
{ | |
"id":"2-t-30162", | |
"conferenceId":"t-30162", | |
"day":2, | |
"md5":"79a9961425940dd99bdd3648c2f53c11", | |
"slot":"16:20-17:20", | |
"track":"room3", | |
"title":"Xamarin.Forms: Native iOS, Android, and Windows Phone apps from ONE C# Codebase", | |
"speakers":[ | |
{ | |
"id":"p-24925", | |
"name":"James Montemagno" | |
} | |
], | |
"tags":[ | |
"mobile", | |
".NET Framework" | |
] | |
}, | |
{ | |
"id":"2-t-30273", | |
"conferenceId":"t-30273", | |
"day":2, | |
"md5":"c853f2b29a1507135298dd760e230dcf", | |
"slot":"16:20-17:20", | |
"track":"room4", | |
"title":"ng-owasp: OWASP Top 10 for AngularJS Applications", | |
"speakers":[ | |
{ | |
"id":"p-28090", | |
"name":"Kevin Hakanson" | |
} | |
], | |
"tags":[ | |
"Security", | |
"Web", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"2-t-30331", | |
"conferenceId":"t-30331", | |
"day":2, | |
"md5":"e7114739a0cbb6c8909554c3afee04bc", | |
"slot":"16:20-17:20", | |
"track":"room5", | |
"title":"Business Logic – a different perspective", | |
"speakers":[ | |
{ | |
"id":"p-21762", | |
"name":"Udi Dahan" | |
} | |
], | |
"tags":[ | |
"Architecture" | |
] | |
}, | |
{ | |
"id":"2-t-30260", | |
"conferenceId":"t-30260", | |
"day":2, | |
"md5":"82828669e9e8b906b4826143499ac034", | |
"slot":"16:20-17:20", | |
"track":"room6", | |
"title":"How to build and be a part of a highly efficient team", | |
"speakers":[ | |
{ | |
"id":"p-28054", | |
"name":"Kjell Ljøstad" | |
} | |
], | |
"tags":[ | |
"People" | |
] | |
}, | |
{ | |
"id":"2-t-30254", | |
"conferenceId":"t-30254", | |
"day":2, | |
"md5":"60eb1aced35844ba2b8d236ef297e9d2", | |
"slot":"16:20-17:20", | |
"track":"room7", | |
"title":"Evolving architecture for API delivery on Azure", | |
"speakers":[ | |
{ | |
"id":"p-28020", | |
"name":"Harald Schult Ulriksen" | |
} | |
], | |
"tags":[ | |
"Architecture", | |
"Cloud" | |
] | |
}, | |
{ | |
"id":"2-t-30265", | |
"conferenceId":"t-30265", | |
"day":2, | |
"md5":"cba2866354a6d4023e07447c22c7fb88", | |
"slot":"16:20-17:20", | |
"track":"room8", | |
"title":"Browserception: Building our own browser with CSS/HTML and Node.js", | |
"speakers":[ | |
{ | |
"id":"p-28024", | |
"name":"David Ed Mellum" | |
} | |
], | |
"tags":[ | |
"Web", | |
"UI", | |
"JavaScript" | |
] | |
}, | |
{ | |
"id":"2-t-32355", | |
"conferenceId":"t-32355", | |
"day":2, | |
"md5":"d366195e46173745f47dd2ad8c0fdba3", | |
"slot":"16:20-17:20", | |
"track":"room9", | |
"title":"Using Elixir to get the fun back in Lego Mindstorms", | |
"speakers":[ | |
{ | |
"id":"p-30174", | |
"name":"Torben Hoffmann" | |
} | |
], | |
"tags":[ | |
"Functional Programming" | |
] | |
} | |
] | |
} | |
] | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment