Skip to content

Instantly share code, notes, and snippets.

@clausasbjorn
Last active August 29, 2015 14:22
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save clausasbjorn/290e1a2770d67513dd85 to your computer and use it in GitHub Desktop.
Save clausasbjorn/290e1a2770d67513dd85 to your computer and use it in GitHub Desktop.
NDC 2015 Agenda
{
"name":"NDC Oslo 2015",
"days":[
{
"order":"0",
"name":"Wednesday",
"slots":[
{
"id":"09:00-10:00",
"from":"09:00",
"to":"10:00",
"sort":900,
"allTracks":true,
"isBreak":false
},
{
"id":"10:00-10:20",
"from":"10:00",
"to":"10:20",
"sort":1000,
"allTracks":true,
"isBreak":true
},
{
"id":"10:20-11:20",
"from":"10:20",
"to":"11:20",
"sort":1020,
"allTracks":false,
"isBreak":false
},
{
"id":"11:20-11:40",
"from":"11:20",
"to":"11:40",
"sort":1120,
"allTracks":true,
"isBreak":true
},
{
"id":"11:40-12:40",
"from":"11:40",
"to":"12:40",
"sort":1140,
"allTracks":false,
"isBreak":false
},
{
"id":"12:40-13:40",
"from":"12:40",
"to":"13:40",
"sort":1240,
"allTracks":true,
"isBreak":true
},
{
"id":"13:40-14:40",
"from":"13:40",
"to":"14:40",
"sort":1340,
"allTracks":false,
"isBreak":false
},
{
"id":"14:40-15:00",
"from":"14:40",
"to":"15:00",
"sort":1440,
"allTracks":true,
"isBreak":true
},
{
"id":"15:00-16:00",
"from":"15:00",
"to":"16:00",
"sort":1500,
"allTracks":false,
"isBreak":false
},
{
"id":"16:00-16:20",
"from":"16:00",
"to":"16:20",
"sort":1600,
"allTracks":true,
"isBreak":true
},
{
"id":"16:20-17:20",
"from":"16:20",
"to":"17:20",
"sort":1620,
"allTracks":false,
"isBreak":false
},
{
"id":"17:20-17:40",
"from":"17:20",
"to":"17:40",
"sort":1720,
"allTracks":true,
"isBreak":true
},
{
"id":"17:40-18:40",
"from":"17:40",
"to":"18:40",
"sort":1740,
"allTracks":false,
"isBreak":false
}
],
"tracks":[
{
"id":"room1",
"name":"Room 1"
},
{
"id":"room2",
"name":"Room 2"
},
{
"id":"room3",
"name":"Room 3"
},
{
"id":"room4",
"name":"Room 4"
},
{
"id":"room5",
"name":"Room 5"
},
{
"id":"room6",
"name":"Room 6"
},
{
"id":"room7",
"name":"Room 7"
},
{
"id":"room8",
"name":"Room 8"
},
{
"id":"room9",
"name":"Room 9"
},
{
"id":"workshops",
"name":"Workshops"
}
],
"sessions":[
{
"id":"0-t-30314",
"conferenceId":"t-30314",
"day":0,
"md5":"fae3431abebdb01e44b41f329a40b56c",
"slot":"09:00-10:00",
"track":"room1",
"title":"Keynote - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World",
"speakers":[
{
"id":"p-28153",
"name":"Bruce Schneier"
}
],
"tags":[
"Security"
]
},
{
"id":"0-t-30289",
"conferenceId":"t-30289",
"day":0,
"md5":"03b5c3e3eb8d24e6e9ae1f995b66ad44",
"slot":"10:20-11:20",
"track":"room1",
"title":"This is not the search you are looking for",
"speakers":[
{
"id":"p-25969",
"name":"Toby Henderson"
}
],
"tags":[
"Architecture",
"Database",
"Search"
]
},
{
"id":"0-t-31333",
"conferenceId":"t-31333",
"day":0,
"md5":"30fd8112af22befe9e8d0c0669d58902",
"slot":"10:20-11:20",
"track":"room2",
"title":"Linux Device Driver Best Practices",
"speakers":[
{
"id":"p-28145",
"name":"Bill Gatliff"
}
],
"tags":[
"Embedded"
]
},
{
"id":"0-t-30160",
"conferenceId":"t-30160",
"day":0,
"md5":"aa2edcb4a2b5708878f2be17f14066cc",
"slot":"10:20-11:20",
"track":"room3",
"title":"The Art of Software Gardening",
"speakers":[
{
"id":"p-6686",
"name":"Patroklos Papapetrou"
}
],
"tags":[
"People"
]
},
{
"id":"0-t-30300",
"conferenceId":"t-30300",
"day":0,
"md5":"15382bc63ab377d8502e84f1cb8df735",
"slot":"10:20-11:20",
"track":"room4",
"title":"Duplicating data or replicating data in Micro Services",
"speakers":[
{
"id":"p-2787",
"name":"Dennis van der Stelt"
}
],
"tags":[
"Architecture"
]
},
{
"id":"0-t-30297",
"conferenceId":"t-30297",
"day":0,
"md5":"254625f22b3784e92a3d34ce081fda4a",
"slot":"10:20-11:20",
"track":"room5",
"title":"Practical CSS tips & tricks for backend developers",
"speakers":[
{
"id":"p-28125",
"name":"Alex York"
}
],
"tags":[
"Web",
"Design",
"UI"
]
},
{
"id":"0-t-31321",
"conferenceId":"t-31321",
"day":0,
"md5":"034f6c4b3e07fcc119f4eb36e700fe08",
"slot":"10:20-11:20",
"track":"room6",
"title":"The Real Price of Shared Pointers in C++",
"speakers":[
{
"id":"p-7717",
"name":"Nico Josuttis"
}
],
"tags":[
"C++"
]
},
{
"id":"0-t-30321",
"conferenceId":"t-30321",
"day":0,
"md5":"e33635876acd78d881782b2cfd14b194",
"slot":"10:20-11:20",
"track":"room7",
"title":"ASP.NET 5 & DNX: It’s a X-Platform Party!",
"speakers":[
{
"id":"p-1887",
"name":"Damian Edwards"
}
],
"tags":[
"Web",
"Microsoft"
]
},
{
"id":"0-t-30202",
"conferenceId":"t-30202",
"day":0,
"md5":"da454f8710956ee9f8041f6b6253fd5e",
"slot":"10:20-11:20",
"track":"room8",
"title":"The New JavaScript: ES6",
"speakers":[
{
"id":"p-28148",
"name":"Rob Eisenberg"
}
],
"tags":[
"Web",
"JavaScript"
]
},
{
"id":"0-t-31341",
"conferenceId":"t-31341",
"day":0,
"md5":"cff277125fbf35058ef5e26f04c800b5",
"slot":"10:20-11:20",
"track":"room9",
"title":"Lean and Functional Programming",
"speakers":[
{
"id":"p-3278",
"name":"Bryan Hunter"
}
],
"tags":[
"People",
"Agile",
"Functional Programming"
]
},
{
"id":"0-t-32358",
"conferenceId":"t-32358",
"day":0,
"md5":"02cea9340392076e038f63df050c8165",
"slot":"10:20-11:20",
"track":"workshops",
"title":"How to build end to end solutions using Raspberry Pi and Azure",
"speakers":[
{
"id":"p-2832",
"name":"Pedro Dias"
},
{
"id":"p-31178",
"name":"Anders Gill"
}
],
"tags":[
"Microsoft",
"Cloud",
"IoT"
]
},
{
"id":"0-t-30220",
"conferenceId":"t-30220",
"day":0,
"md5":"00a1e903e0df9137b7d287c5261a77f6",
"slot":"11:40-12:40",
"track":"room1",
"title":"Approaches to multi-lingual text search with Elasticsearch and Lucene",
"speakers":[
{
"id":"p-3200",
"name":"Itamar Syn-Hershko"
}
],
"tags":[
"Database",
"Search"
]
},
{
"id":"0-t-31322",
"conferenceId":"t-31322",
"day":0,
"md5":"f9769b9c4de7ccb6c50908390f4df6cd",
"slot":"11:40-12:40",
"track":"room2",
"title":"Fundamentals of Type-Dependent Code Reuse in C++",
"speakers":[
{
"id":"p-28137",
"name":"Mark Isaacson"
}
],
"tags":[
"C++"
]
},
{
"id":"0-t-30242",
"conferenceId":"t-30242",
"day":0,
"md5":"c5f1fb97923482a56c70a0b2d02a0266",
"slot":"11:40-12:40",
"track":"room3",
"title":"Microservices, cutting through the Gordian Knot",
"speakers":[
{
"id":"p-3217",
"name":"Ian Cooper"
}
],
"tags":[
"Architecture"
]
},
{
"id":"0-t-30279",
"conferenceId":"t-30279",
"day":0,
"md5":"39c3568ce38e75141bfeb94b9eed08e0",
"slot":"11:40-12:40",
"track":"room4",
"title":"Asynchronous generators and promises in ES6",
"speakers":[
{
"id":"p-28100",
"name":"Francis Paulin"
}
],
"tags":[
"Web",
"JavaScript"
]
},
{
"id":"0-t-30306",
"conferenceId":"t-30306",
"day":0,
"md5":"0ccf1d6d6402e671eb0fac4d704cf87e",
"slot":"11:40-12:40",
"track":"room5",
"title":"Developing interfaces — Why developers are the new designers",
"speakers":[
{
"id":"p-28134",
"name":"Martin Jensen"
}
],
"tags":[
"Design",
"UI"
]
},
{
"id":"0-t-31338",
"conferenceId":"t-31338",
"day":0,
"md5":"529fb99b3b346d3856c41cd8a2e2eedf",
"slot":"11:40-12:40",
"track":"room6",
"title":"Faking and Mocking Legacy Embedded C",
"speakers":[
{
"id":"p-29160",
"name":"James Grenning"
}
],
"tags":[
"Embedded",
"C++"
]
},
{
"id":"0-t-30200",
"conferenceId":"t-30200",
"day":0,
"md5":"2786dba7df0bdf03787d2d780216e361",
"slot":"11:40-12:40",
"track":"room7",
"title":"No Estimates, Let's Explore the Possibilities",
"speakers":[
{
"id":"p-28107",
"name":"Woody Zuill"
}
],
"tags":[
"People",
"Agile"
]
},
{
"id":"0-t-30183",
"conferenceId":"t-30183",
"day":0,
"md5":"942068fc9d46ce03164c1a4a7dfb6494",
"slot":"11:40-12:40",
"track":"room8",
"title":"A Lap Around .NET 2015",
"speakers":[
{
"id":"p-28065",
"name":"Anthony D. Green"
}
],
"tags":[
"Microsoft",
".NET Framework"
]
},
{
"id":"0-t-30342",
"conferenceId":"t-30342",
"day":0,
"md5":"8e52ff577b7f7cfdfd9913f69ac18806",
"slot":"11:40-12:40",
"track":"room9",
"title":"A tour of the language landscape",
"speakers":[
{
"id":"p-17738",
"name":"Yan Cui"
}
],
"tags":[
"Functional Programming",
"Programming Languages"
]
},
{
"id":"0-t-32358",
"conferenceId":"t-32358",
"day":0,
"md5":"02cea9340392076e038f63df050c8165",
"slot":"11:40-12:40",
"track":"workshops",
"title":"How to build end to end solutions using Raspberry Pi and Azure",
"speakers":[
{
"id":"p-2832",
"name":"Pedro Dias"
},
{
"id":"p-31178",
"name":"Anders Gill"
}
],
"tags":[
"Microsoft",
"Cloud",
"IoT"
]
},
{
"id":"0-t-30293",
"conferenceId":"t-30293",
"day":0,
"md5":"e3f647a365b2f045d14999dc99fa8682",
"slot":"13:40-14:40",
"track":"room1",
"title":"IMDB showdown - comparing OrigoDB, Redis and SQL Server Hekaton",
"speakers":[
{
"id":"p-7702",
"name":"Robert Friberg"
}
],
"tags":[
"Architecture",
"Database"
]
},
{
"id":"0-t-30253",
"conferenceId":"t-30253",
"day":0,
"md5":"51f9b2afc2546c81828a0a89bb31a448",
"slot":"13:40-14:40",
"track":"room2",
"title":"Omnisharp: .NET sans Microsoft",
"speakers":[
{
"id":"p-4389",
"name":"Mathew McLoughlin"
}
],
"tags":[
".NET Framework"
]
},
{
"id":"0-t-32359",
"conferenceId":"t-32359",
"day":0,
"md5":"867305c5d6ef3c5848fef5353be52da7",
"slot":"13:40-14:40",
"track":"room3",
"title":"Norway, Software and Me",
"speakers":[
{
"id":"p-31181",
"name":"Ted Nelson"
}
],
"tags":[
]
},
{
"id":"0-t-30174",
"conferenceId":"t-30174",
"day":0,
"md5":"52d5be542589c70330335ababc69eb66",
"slot":"13:40-14:40",
"track":"room4",
"title":"Async and Streaming JavaScript, We're All Doing it Wrong!",
"speakers":[
{
"id":"p-4400",
"name":"Matthew Podwysocki"
}
],
"tags":[
"Web",
"JavaScript"
]
},
{
"id":"0-t-30292",
"conferenceId":"t-30292",
"day":0,
"md5":"1af236357eed844340d34f1e4cec5285",
"slot":"13:40-14:40",
"track":"room5",
"title":"‘Don't Make Me Feel Stupid’ – A. User",
"speakers":[
{
"id":"p-4425",
"name":"Liam Westley"
}
],
"tags":[
"UI",
"UX"
]
},
{
"id":"0-t-31323",
"conferenceId":"t-31323",
"day":0,
"md5":"a64591e2229c748f6a658c35c7a51f13",
"slot":"13:40-14:40",
"track":"room6",
"title":"When order does not matter",
"speakers":[
{
"id":"p-29157",
"name":"Bartek Szurgot"
}
],
"tags":[
"C++"
]
},
{
"id":"0-t-30322",
"conferenceId":"t-30322",
"day":0,
"md5":"ba4efbe2c7a476a33a0dd4ed79cb4478",
"slot":"13:40-14:40",
"track":"room7",
"title":"What’s new in ASP.NET 5 and MVC 6",
"speakers":[
{
"id":"p-1887",
"name":"Damian Edwards"
},
{
"id":"p-2778",
"name":"Jon Galloway"
}
],
"tags":[
"Web",
"Microsoft",
".NET Framework"
]
},
{
"id":"0-t-30330",
"conferenceId":"t-30330",
"day":0,
"md5":"2b63c4c771ff373e07df4eedac8e8cb6",
"slot":"13:40-14:40",
"track":"room8",
"title":"CQRS – but different",
"speakers":[
{
"id":"p-21762",
"name":"Udi Dahan"
}
],
"tags":[
]
},
{
"id":"0-t-32354",
"conferenceId":"t-32354",
"day":0,
"md5":"beabf1573909e03033c393e486ba49ab",
"slot":"13:40-14:40",
"track":"room9",
"title":"The Need for Closure",
"speakers":[
{
"id":"p-4466",
"name":"Karl Krukow"
}
],
"tags":[
"Functional Programming",
"Programming Languages"
]
},
{
"id":"0-t-32353",
"conferenceId":"t-32353",
"day":0,
"md5":"6a2b2bd12d15d22585bbadb08f3f42d3",
"slot":"13:40-14:40",
"track":"workshops",
"title":"Breaking .NET(C#) Applications: Hands-On Attack Scenario Class",
"speakers":[
{
"id":"p-3209",
"name":"Jon McCoy"
},
{
"id":"p-30176",
"name":"Topher Timzen"
}
],
"tags":[
"Security"
]
},
{
"id":"0-t-30219",
"conferenceId":"t-30219",
"day":0,
"md5":"e174179892c6f242b4b941e8b04070b0",
"slot":"15:00-16:00",
"track":"room1",
"title":"A guided tour of the BigData technologies zoo",
"speakers":[
{
"id":"p-3200",
"name":"Itamar Syn-Hershko"
}
],
"tags":[
"Big Data",
"Database"
]
},
{
"id":"0-t-30344",
"conferenceId":"t-30344",
"day":0,
"md5":"7031c2cf4ff0334afdadf1c8eefce17b",
"slot":"15:00-16:00",
"track":"room2",
"title":"How TDD and SOLID principles can improve your HW abstraction",
"speakers":[
{
"id":"p-28007",
"name":"Tore Martin Hagen"
}
],
"tags":[
"Architecture",
"Agile",
"Embedded"
]
},
{
"id":"0-t-30298",
"conferenceId":"t-30298",
"day":0,
"md5":"f28cb906bdb958b31c894b94abda59c3",
"slot":"15:00-16:00",
"track":"room3",
"title":".NETCore Blimey!",
"speakers":[
{
"id":"p-4429",
"name":"Matt Ellis"
}
],
"tags":[
"Microsoft",
".NET Framework"
]
},
{
"id":"0-t-30208",
"conferenceId":"t-30208",
"day":0,
"md5":"15dee152ed2036c91c50e1a252456881",
"slot":"15:00-16:00",
"track":"room4",
"title":"All Your Tests Are Belong to Us",
"speakers":[
{
"id":"p-25951",
"name":"Rachel Appel"
}
],
"tags":[
"Web",
"Agile",
"Testing",
".NET Framework"
]
},
{
"id":"0-t-30267",
"conferenceId":"t-30267",
"day":0,
"md5":"58a207b2676174f14f05f154121f1ddf",
"slot":"15:00-16:00",
"track":"room5",
"title":"Form with Function: Adding Behavior with CSS",
"speakers":[
{
"id":"p-3294",
"name":"Tim G. Thomas"
}
],
"tags":[
"Web",
"Design",
"UI"
]
},
{
"id":"0-t-31324",
"conferenceId":"t-31324",
"day":0,
"md5":"9cb92b051261a398ab1e9a95ad876e71",
"slot":"15:00-16:00",
"track":"room6",
"title":"Dealing with noexcept in the C++ Standard Library",
"speakers":[
{
"id":"p-7717",
"name":"Nico Josuttis"
}
],
"tags":[
"C++"
]
},
{
"id":"0-t-30197",
"conferenceId":"t-30197",
"day":0,
"md5":"a8fb1a87675793eadb98eccd7677b6ed",
"slot":"15:00-16:00",
"track":"room7",
"title":"Anti-fragile and feedback. Trying to make up for the failures of \"agile.\"",
"speakers":[
{
"id":"p-3380",
"name":"Andy Hunt"
}
],
"tags":[
"Agile"
]
},
{
"id":"0-t-30257",
"conferenceId":"t-30257",
"day":0,
"md5":"a635e42c9b5d41e5f491ae28676e9610",
"slot":"15:00-16:00",
"track":"room8",
"title":"Extremely scalable cloud applications made easy using the Azure service fabric actor model",
"speakers":[
{
"id":"p-28034",
"name":"Patriek van Dorp"
}
],
"tags":[
"Architecture"
]
},
{
"id":"0-t-30341",
"conferenceId":"t-30341",
"day":0,
"md5":"2fe009f069b6855303473e687226ce12",
"slot":"15:00-16:00",
"track":"room9",
"title":"Learning from Haskell",
"speakers":[
{
"id":"p-2860",
"name":"Venkat Subramaniam"
}
],
"tags":[
"Functional Programming",
"Programming Languages"
]
},
{
"id":"0-t-32353",
"conferenceId":"t-32353",
"day":0,
"md5":"6a2b2bd12d15d22585bbadb08f3f42d3",
"slot":"15:00-16:00",
"track":"workshops",
"title":"Breaking .NET(C#) Applications: Hands-On Attack Scenario Class",
"speakers":[
{
"id":"p-3209",
"name":"Jon McCoy"
},
{
"id":"p-30176",
"name":"Topher Timzen"
}
],
"tags":[
"Security"
]
},
{
"id":"0-t-30274",
"conferenceId":"t-30274",
"day":0,
"md5":"6fe2448767ef2559340225b41fa9c8cc",
"slot":"16:20-17:20",
"track":"room1",
"title":"To NoSQL or Not to NoSQL, That Is the Question",
"speakers":[
{
"id":"p-4442",
"name":"David Ostrovsky"
}
],
"tags":[
"Big Data",
"Database"
]
},
{
"id":"0-t-31319",
"conferenceId":"t-31319",
"day":0,
"md5":"2ec8850afc688e818174f8427717e2b5",
"slot":"16:20-17:20",
"track":"room2",
"title":"Embedded Linux development using the Yocto Project",
"speakers":[
{
"id":"p-28150",
"name":"Isak Styf"
}
],
"tags":[
"Embedded"
]
},
{
"id":"0-t-30193",
"conferenceId":"t-30193",
"day":0,
"md5":"4c7607b41fa0f2a5484bb49e71b524cc",
"slot":"16:20-17:20",
"track":"room3",
"title":"Monitoring Sensor Data in RealTime over Azure",
"speakers":[
{
"id":"p-4286",
"name":"Uffe Björklund"
}
],
"tags":[
"Cloud",
"IoT"
]
},
{
"id":"0-t-30278",
"conferenceId":"t-30278",
"day":0,
"md5":"4eda1e88c56a855b80ac74576d500d8f",
"slot":"16:20-17:20",
"track":"room4",
"title":"Seriously, you should start testing that JavaScript code",
"speakers":[
{
"id":"p-22859",
"name":"Kuba Walinski"
}
],
"tags":[
"Agile",
"Testing",
"JavaScript"
]
},
{
"id":"0-t-30206",
"conferenceId":"t-30206",
"day":0,
"md5":"9e1c4f800fea5e662abe65a6c2d1ced8",
"slot":"16:20-17:20",
"track":"room5",
"title":"Front-end Fun with Sass and Coffee",
"speakers":[
{
"id":"p-25948",
"name":"Dylan Beattie"
}
],
"tags":[
"Web",
"UI",
".NET Framework"
]
},
{
"id":"0-t-32351",
"conferenceId":"t-32351",
"day":0,
"md5":"a01343a3b9e7db0bc8ebb299f2dc660b",
"slot":"16:20-17:20",
"track":"room6",
"title":"History and Spirit of C and C++",
"speakers":[
{
"id":"p-3318",
"name":"Olve Maudal"
}
],
"tags":[
"C++"
]
},
{
"id":"0-t-30315",
"conferenceId":"t-30315",
"day":0,
"md5":"5927704708a86f4f39bda7711fea232f",
"slot":"16:20-17:20",
"track":"room7",
"title":"50 Shades of AppSec",
"speakers":[
{
"id":"p-5646",
"name":"Troy Hunt"
}
],
"tags":[
"Security"
]
},
{
"id":"0-t-30225",
"conferenceId":"t-30225",
"day":0,
"md5":"cd610bf5cc2e53080b219efd57b7a4f7",
"slot":"16:20-17:20",
"track":"room8",
"title":"Ads in Mobile Apps and Games 101",
"speakers":[
{
"id":"p-3243",
"name":"Alan Mendelevich"
}
],
"tags":[
"mobile"
]
},
{
"id":"0-t-31343",
"conferenceId":"t-31343",
"day":0,
"md5":"3f07b77cdd20ef2a58925065a2a07380",
"slot":"16:20-17:20",
"track":"room9",
"title":"Computation expression in context : a history of the otter king",
"speakers":[
{
"id":"p-2733",
"name":"Andrea Magnorsky"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"0-t-30340",
"conferenceId":"t-30340",
"day":0,
"md5":"7e37e5850e86e52b6cdedbedbc9dc613",
"slot":"16:20-17:20",
"track":"workshops",
"title":"Lightning Talks",
"speakers":[
{
"id":"p-4214",
"name":"Pete Smith"
},
{
"id":"p-3357",
"name":"Ashfaq Ahmed"
},
{
"id":"p-3263",
"name":"Meg Gotshall"
},
{
"id":"p-21747",
"name":"Fredrik Johnsson"
}
],
"tags":[
]
},
{
"id":"0-t-30159",
"conferenceId":"t-30159",
"day":0,
"md5":"e6dc3bd27a0cd8f6b4101a089f0e7acc",
"slot":"17:40-18:40",
"track":"room1",
"title":"Modelling complex game economy with Neo4j",
"speakers":[
{
"id":"p-17738",
"name":"Yan Cui"
}
],
"tags":[
"Database"
]
},
{
"id":"0-t-31334",
"conferenceId":"t-31334",
"day":0,
"md5":"6915fcc8225f988927f1e12dcf99d518",
"slot":"17:40-18:40",
"track":"room2",
"title":"Introducing Bluetooth Low Energy",
"speakers":[
{
"id":"p-28131",
"name":"Eirik Midttun"
}
],
"tags":[
"IoT"
]
},
{
"id":"0-t-30250",
"conferenceId":"t-30250",
"day":0,
"md5":"5edffa4868f6fe703ea5b4d7687335c5",
"slot":"17:40-18:40",
"track":"room3",
"title":"Applying S.O.L.I.D. Principles in .NET/C#",
"speakers":[
{
"id":"p-27000",
"name":"Chris Klug"
}
],
"tags":[
"Microsoft",
"Agile",
".NET Framework"
]
},
{
"id":"0-t-30248",
"conferenceId":"t-30248",
"day":0,
"md5":"2a6efcf5dcbdb67d072785478062d8b2",
"slot":"17:40-18:40",
"track":"room4",
"title":"Shazam mobile apps - data driven project management",
"speakers":[
{
"id":"p-26996",
"name":"Tomasz Kustrzynski"
}
],
"tags":[
"People",
"Agile",
"mobile"
]
},
{
"id":"0-t-30207",
"conferenceId":"t-30207",
"day":0,
"md5":"2ec9fd399cae8d31c634e4e210fcaa8b",
"slot":"17:40-18:40",
"track":"room5",
"title":"Designing and Programming Accessible Website and App UIs",
"speakers":[
{
"id":"p-25951",
"name":"Rachel Appel"
}
],
"tags":[
"Web",
"Design",
"UI",
"UX"
]
},
{
"id":"0-t-31326",
"conferenceId":"t-31326",
"day":0,
"md5":"45df2227b6d661876225f6cc49205dd5",
"slot":"17:40-18:40",
"track":"room6",
"title":"Performance of STL containers",
"speakers":[
{
"id":"p-4416",
"name":"Hubert Matthews"
}
],
"tags":[
"C++"
]
},
{
"id":"0-t-30332",
"conferenceId":"t-30332",
"day":0,
"md5":"5e155b44677fc976716a9103f0f92ae5",
"slot":"17:40-18:40",
"track":"room7",
"title":"PrivateEye",
"speakers":[
{
"id":"p-397",
"name":"Greg Young"
}
],
"tags":[
]
},
{
"id":"0-t-30229",
"conferenceId":"t-30229",
"day":0,
"md5":"56c53abc29e33f73d757199773beb652",
"slot":"17:40-18:40",
"track":"room8",
"title":"JavaScript Forensics",
"speakers":[
{
"id":"p-4528",
"name":"Todd H Gardner"
}
],
"tags":[
"Web",
"JavaScript"
]
},
{
"id":"0-t-30343",
"conferenceId":"t-30343",
"day":0,
"md5":"c084a249b422101978b598536432411f",
"slot":"17:40-18:40",
"track":"room9",
"title":"Type-Driven Development",
"speakers":[
{
"id":"p-4446",
"name":"Mark Seemann"
}
],
"tags":[
"Functional Programming"
]
}
]
},
{
"order":"1",
"name":"Thursday",
"slots":[
{
"id":"09:00-10:00",
"from":"09:00",
"to":"10:00",
"sort":900,
"allTracks":false,
"isBreak":false
},
{
"id":"10:00-10:20",
"from":"10:00",
"to":"10:20",
"sort":1000,
"allTracks":true,
"isBreak":true
},
{
"id":"10:20-11:20",
"from":"10:20",
"to":"11:20",
"sort":1020,
"allTracks":false,
"isBreak":false
},
{
"id":"11:20-11:40",
"from":"11:20",
"to":"11:40",
"sort":1120,
"allTracks":true,
"isBreak":true
},
{
"id":"11:40-12:40",
"from":"11:40",
"to":"12:40",
"sort":1140,
"allTracks":false,
"isBreak":false
},
{
"id":"12:40-13:40",
"from":"12:40",
"to":"13:40",
"sort":1240,
"allTracks":true,
"isBreak":true
},
{
"id":"13:40-14:40",
"from":"13:40",
"to":"14:40",
"sort":1340,
"allTracks":false,
"isBreak":false
},
{
"id":"14:40-15:00",
"from":"14:40",
"to":"15:00",
"sort":1440,
"allTracks":true,
"isBreak":true
},
{
"id":"15:00-16:00",
"from":"15:00",
"to":"16:00",
"sort":1500,
"allTracks":false,
"isBreak":false
},
{
"id":"16:00-16:20",
"from":"16:00",
"to":"16:20",
"sort":1600,
"allTracks":true,
"isBreak":true
},
{
"id":"16:20-17:20",
"from":"16:20",
"to":"17:20",
"sort":1620,
"allTracks":false,
"isBreak":false
},
{
"id":"17:20-17:40",
"from":"17:20",
"to":"17:40",
"sort":1720,
"allTracks":true,
"isBreak":true
},
{
"id":"17:40-18:40",
"from":"17:40",
"to":"18:40",
"sort":1740,
"allTracks":false,
"isBreak":false
},
{
"id":"18:40-19:00",
"from":"18:40",
"to":"19:00",
"sort":1840,
"allTracks":true,
"isBreak":true
},
{
"id":"19:00-19:30",
"from":"19:00",
"to":"19:30",
"sort":1900,
"allTracks":true,
"isBreak":false
},
{
"id":"19:30-00:00",
"from":"19:30",
"to":"00:00",
"sort":1930,
"allTracks":true,
"isBreak":true
}
],
"tracks":[
{
"id":"room1",
"name":"Room 1"
},
{
"id":"room2",
"name":"Room 2"
},
{
"id":"room3",
"name":"Room 3"
},
{
"id":"room4",
"name":"Room 4"
},
{
"id":"room5",
"name":"Room 5"
},
{
"id":"room6",
"name":"Room 6"
},
{
"id":"room7",
"name":"Room 7"
},
{
"id":"room8",
"name":"Room 8"
},
{
"id":"room9",
"name":"Room 9"
},
{
"id":"workshops",
"name":"Workshops"
}
],
"sessions":[
{
"id":"1-t-32343",
"conferenceId":"t-32343",
"day":1,
"md5":"5f76af691f5178b3319fde2e3f45ab45",
"slot":"09:00-10:00",
"track":"room1",
"title":"Hafslund AMS: Drinking from the firehose at a large Internet-of-Things project",
"speakers":[
{
"id":"p-22882",
"name":"Simen Sommerfeldt"
},
{
"id":"p-30161",
"name":"Jon Andreas Pretorius"
}
],
"tags":[
"IoT"
]
},
{
"id":"1-t-31318",
"conferenceId":"t-31318",
"day":1,
"md5":"d39df5e8640e7fd838f55f4218803d04",
"slot":"09:00-10:00",
"track":"room2",
"title":"Video Capture and Colorspaces",
"speakers":[
{
"id":"p-29155",
"name":"Hans Verkuil"
}
],
"tags":[
"Embedded"
]
},
{
"id":"1-t-30157",
"conferenceId":"t-30157",
"day":1,
"md5":"121e26bde83fdea368aee6f908931322",
"slot":"09:00-10:00",
"track":"room3",
"title":"Building 3D simulators for oil & gas",
"speakers":[
{
"id":"p-23925",
"name":"Felix Gorbatsevich"
}
],
"tags":[
"Fun"
]
},
{
"id":"1-t-30270",
"conferenceId":"t-30270",
"day":1,
"md5":"9cecbdf6d83c1aa8ba83bf9acd58db6f",
"slot":"09:00-10:00",
"track":"room4",
"title":"Declarative REST: State Machines for the Web",
"speakers":[
{
"id":"p-2764",
"name":"Einar W. Høst"
}
],
"tags":[
"Web",
"Architecture"
]
},
{
"id":"1-t-30324",
"conferenceId":"t-30324",
"day":1,
"md5":"52d1094d92549c98864c10c70449d15b",
"slot":"09:00-10:00",
"track":"room5",
"title":"Up and Running with ASP.NET on Linux",
"speakers":[
{
"id":"p-4417",
"name":"Mark Rendle"
}
],
"tags":[
"Web",
".NET Framework"
]
},
{
"id":"1-t-31328",
"conferenceId":"t-31328",
"day":1,
"md5":"a6c129bbc5926f5164c8c95ead6b2073",
"slot":"09:00-10:00",
"track":"room6",
"title":"Testdriven C++ with Catch",
"speakers":[
{
"id":"p-3269",
"name":"Phil Nash"
}
],
"tags":[
"Testing",
"C++"
]
},
{
"id":"1-t-30328",
"conferenceId":"t-30328",
"day":1,
"md5":"fff959d800ffa4438b476a0e658cb53c",
"slot":"09:00-10:00",
"track":"room7",
"title":"Continuous Delivery for Architects",
"speakers":[
{
"id":"p-3323",
"name":"Neal Ford"
}
],
"tags":[
"Architecture",
"Devops"
]
},
{
"id":"1-t-30326",
"conferenceId":"t-30326",
"day":1,
"md5":"c01e6d3646e85e539d74deb7679531d5",
"slot":"09:00-10:00",
"track":"room8",
"title":"Principles Of Microservices",
"speakers":[
{
"id":"p-22887",
"name":"Sam Newman"
}
],
"tags":[
"Architecture",
"Devops"
]
},
{
"id":"1-t-31344",
"conferenceId":"t-31344",
"day":1,
"md5":"0aedd857a706dc19e62c9dd8ea7dedcc",
"slot":"09:00-10:00",
"track":"room9",
"title":"Idioms for building distributed fault-tolerant applications w/ Elixir",
"speakers":[
{
"id":"p-29162",
"name":"José Valim"
}
],
"tags":[
"Functional Programming",
"Programming Languages"
]
},
{
"id":"1-t-30196",
"conferenceId":"t-30196",
"day":1,
"md5":"8ab4747312bbd71f565fa8b274f61a6c",
"slot":"10:20-11:20",
"track":"room1",
"title":"Typical Pitfalls in Agile Software Development",
"speakers":[
{
"id":"p-28147",
"name":"Jutta Eckstein"
}
],
"tags":[
"People",
"Agile"
]
},
{
"id":"1-t-31357",
"conferenceId":"t-31357",
"day":1,
"md5":"fbd39b6def37ca4c54fab4e70d9cee54",
"slot":"10:20-11:20",
"track":"room2",
"title":"Continuous Delivery of Embedded Systems",
"speakers":[
{
"id":"p-7697",
"name":"Mike Long"
}
],
"tags":[
"Devops",
"Embedded"
]
},
{
"id":"1-t-30295",
"conferenceId":"t-30295",
"day":1,
"md5":"65eae0c25d0ce22685c51a673b1adf70",
"slot":"10:20-11:20",
"track":"room3",
"title":"Don't demo facts. Demo stories!",
"speakers":[
{
"id":"p-6648",
"name":"Tudor Girba"
}
],
"tags":[
"Agile"
]
},
{
"id":"1-t-30282",
"conferenceId":"t-30282",
"day":1,
"md5":"ff62e9f089ebd013de445b956b59f2e8",
"slot":"10:20-11:20",
"track":"room4",
"title":"Desktop applications using JavaScript and Electron",
"speakers":[
{
"id":"p-3288",
"name":"Torstein Bjørnstad"
}
],
"tags":[
"Web",
"JavaScript"
]
},
{
"id":"1-t-30261",
"conferenceId":"t-30261",
"day":1,
"md5":"e984f35c4c60d58f2eed32b87bfe3776",
"slot":"10:20-11:20",
"track":"room5",
"title":"Succeeding in Failing",
"speakers":[
{
"id":"p-19746",
"name":"Darrel Miller"
}
],
"tags":[
"Web",
"Testing"
]
},
{
"id":"1-t-31327",
"conferenceId":"t-31327",
"day":1,
"md5":"a871fe614765a3df97b42f0d737c56fc",
"slot":"10:20-11:20",
"track":"room6",
"title":"The Set of Natural Code",
"speakers":[
{
"id":"p-28137",
"name":"Mark Isaacson"
}
],
"tags":[
"C++"
]
},
{
"id":"1-t-30167",
"conferenceId":"t-30167",
"day":1,
"md5":"3f4568e16bad49c532d92a9c2c4da4c8",
"slot":"10:20-11:20",
"track":"room7",
"title":"What’s new in Visual Studio 2015, ALM + ASP.NET 5: Next Level Development",
"speakers":[
{
"id":"p-28070",
"name":"Adam Cogan"
}
],
"tags":[
"Web",
"Microsoft",
".NET Framework"
]
},
{
"id":"1-t-30281",
"conferenceId":"t-30281",
"day":1,
"md5":"6ae49d6dc4bd3e9bd06615b10f0fb498",
"slot":"10:20-11:20",
"track":"room8",
"title":"Resolving Conflicts in Collaborative Occasionally Connected Mobile Apps",
"speakers":[
{
"id":"p-28102",
"name":"Michael L Perry"
}
],
"tags":[
"Architecture",
"mobile"
]
},
{
"id":"1-t-31345",
"conferenceId":"t-31345",
"day":1,
"md5":"30e1a230abedce5721088831c4500833",
"slot":"10:20-11:20",
"track":"room9",
"title":"Event Sourcing and DDD with F#",
"speakers":[
{
"id":"p-28060",
"name":"Jérémie Chassaing"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"1-t-30234",
"conferenceId":"t-30234",
"day":1,
"md5":"c43842c6ac019e5327b2562001cab5f6",
"slot":"11:40-12:40",
"track":"room1",
"title":"The State of DevOps in Windows Land",
"speakers":[
{
"id":"p-3211",
"name":"Jon Arild Tørresdal"
}
],
"tags":[
"Microsoft",
"Devops"
]
},
{
"id":"1-t-31329",
"conferenceId":"t-31329",
"day":1,
"md5":"17be76e07c185d09afe8f2dd2d150157",
"slot":"11:40-12:40",
"track":"room2",
"title":"C++ on the Web: ponies for developers without pwn’ing users",
"speakers":[
{
"id":"p-28115",
"name":"JF Bastien"
}
],
"tags":[
"Web",
"C++"
]
},
{
"id":"1-t-30169",
"conferenceId":"t-30169",
"day":1,
"md5":"9ed8feaee24e492069c75281ef244886",
"slot":"11:40-12:40",
"track":"room3",
"title":"Migrating your API from Web API 2 to MVC 6",
"speakers":[
{
"id":"p-4299",
"name":"Filip W"
}
],
"tags":[
"Web",
"Microsoft",
".NET Framework"
]
},
{
"id":"1-t-30305",
"conferenceId":"t-30305",
"day":1,
"md5":"64be3583cff3e8cfffa3ce32fad3c55e",
"slot":"11:40-12:40",
"track":"room4",
"title":"SOLID Architecture in Slices not Layers",
"speakers":[
{
"id":"p-3348",
"name":"Jimmy Bogard"
}
],
"tags":[
"Architecture"
]
},
{
"id":"1-t-31339",
"conferenceId":"t-31339",
"day":1,
"md5":"317b8779593020379aa476a4decaf71a",
"slot":"11:40-12:40",
"track":"room5",
"title":"Test Driven Development in C/C++",
"speakers":[
{
"id":"p-29160",
"name":"James Grenning"
}
],
"tags":[
"Embedded",
"C++"
]
},
{
"id":"1-t-30156",
"conferenceId":"t-30156",
"day":1,
"md5":"61ce9c57979171e9b5ed49f69cc76509",
"slot":"11:40-12:40",
"track":"room6",
"title":"High Performance in the Critical Rendering Path",
"speakers":[
{
"id":"p-23920",
"name":"Nicolas Bevacqua"
}
],
"tags":[
"Web"
]
},
{
"id":"1-t-30327",
"conferenceId":"t-30327",
"day":1,
"md5":"c594573697b32192ca68455b0c0ce9f3",
"slot":"11:40-12:40",
"track":"room7",
"title":"This is Water",
"speakers":[
{
"id":"p-3323",
"name":"Neal Ford"
}
],
"tags":[
"Architecture"
]
},
{
"id":"1-t-30275",
"conferenceId":"t-30275",
"day":1,
"md5":"699836def6f3a91744713ea892acb258",
"slot":"11:40-12:40",
"track":"room8",
"title":"What business software developers can learn from game developers",
"speakers":[
{
"id":"p-5619",
"name":"Adam Beres-Deak"
}
],
"tags":[
"Fun"
]
},
{
"id":"1-t-31346",
"conferenceId":"t-31346",
"day":1,
"md5":"75e96633fc35e9d8fc7da599fcd2f4c8",
"slot":"11:40-12:40",
"track":"room9",
"title":"Phoenix - a framework for the modern web",
"speakers":[
{
"id":"p-29163",
"name":"Chris Mccord"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"1-t-30336",
"conferenceId":"t-30336",
"day":1,
"md5":"3d5c33754ea59af1665380f7da7bd912",
"slot":"13:40-14:40",
"track":"room1",
"title":"Automating legacy environments with Azure",
"speakers":[
{
"id":"p-4506",
"name":"David Lindblad"
}
],
"tags":[
"Devops",
"Cloud"
]
},
{
"id":"1-t-32341",
"conferenceId":"t-32341",
"day":1,
"md5":"c1f14a6c3a782970799756b0d4b4f5d8",
"slot":"13:40-14:40",
"track":"room2",
"title":"FPGAs - a 1000x performance increase. How? What? Why?",
"speakers":[
{
"id":"p-28099",
"name":"Espen Tallaksen"
}
],
"tags":[
"Embedded"
]
},
{
"id":"1-t-30195",
"conferenceId":"t-30195",
"day":1,
"md5":"94b10980935ae27b0af072110acff50c",
"slot":"13:40-14:40",
"track":"room3",
"title":"The Power and Practicalities of Immutability",
"speakers":[
{
"id":"p-2860",
"name":"Venkat Subramaniam"
}
],
"tags":[
"Functional Programming",
".NET Framework"
]
},
{
"id":"1-t-30283",
"conferenceId":"t-30283",
"day":1,
"md5":"b7352c8dd6592d4c1cf0e8b23411fed3",
"slot":"13:40-14:40",
"track":"room4",
"title":"Real Communication with Real People in Real Time with WebRTC. For Reals.",
"speakers":[
{
"id":"p-28106",
"name":"Devin Rader"
}
],
"tags":[
"Web",
"Architecture",
"JavaScript"
]
},
{
"id":"1-t-30317",
"conferenceId":"t-30317",
"day":1,
"md5":"f1677b0a15577ba58f569f5bfdda75e5",
"slot":"13:40-14:40",
"track":"room5",
"title":"Securing Web APIs – Patterns & Anti-Patterns",
"speakers":[
{
"id":"p-2786",
"name":"Dominick Baier"
}
],
"tags":[
"Security",
"Web",
"Architecture"
]
},
{
"id":"1-t-32342",
"conferenceId":"t-32342",
"day":1,
"md5":"7e37e5850e86e52b6cdedbedbc9dc613",
"slot":"13:40-14:40",
"track":"room6",
"title":"Lightning Talks",
"speakers":[
{
"id":"p-28088",
"name":"Ronald Mavarez"
},
{
"id":"p-28084",
"name":"Martin Gravråk"
},
{
"id":"p-4450",
"name":"Glenn F. Henriksen"
},
{
"id":"p-3244",
"name":"Stian Veum Møllersen"
},
{
"id":"p-30162",
"name":"Sean Trelford"
}
],
"tags":[
]
},
{
"id":"1-t-30164",
"conferenceId":"t-30164",
"day":1,
"md5":"060f7150a4b5ba0a8b8d28ffdf0809d3",
"slot":"13:40-14:40",
"track":"room7",
"title":"Perceived speed is real speed",
"speakers":[
{
"id":"p-21747",
"name":"Fredrik Johnsson"
}
],
"tags":[
"Architecture",
"UX"
]
},
{
"id":"1-t-30209",
"conferenceId":"t-30209",
"day":1,
"md5":"5470c12f5356443e4fd125b164a3f388",
"slot":"13:40-14:40",
"track":"room8",
"title":"Loosely coupled applications with MassTransit and RabbitMq",
"speakers":[
{
"id":"p-25931",
"name":"Roland Guijt"
}
],
"tags":[
"Architecture"
]
},
{
"id":"1-t-31347",
"conferenceId":"t-31347",
"day":1,
"md5":"9060fa532f5962091c98a4139454f526",
"slot":"13:40-14:40",
"track":"room9",
"title":"Enterprise Tic-Tac-Toe -- A functional approach",
"speakers":[
{
"id":"p-4413",
"name":"Scott Wlaschin"
}
],
"tags":[
"Security",
"Web",
"Architecture",
"Functional Programming",
".NET Framework"
]
},
{
"id":"1-t-30241",
"conferenceId":"t-30241",
"day":1,
"md5":"e58c28b4c49035494bc1294a0f4f66e4",
"slot":"15:00-16:00",
"track":"room1",
"title":"Continuous Delivery - the missing parts",
"speakers":[
{
"id":"p-2746",
"name":"Paul Stack"
}
],
"tags":[
"Devops"
]
},
{
"id":"1-t-32344",
"conferenceId":"t-32344",
"day":1,
"md5":"19901ec64fcb4af97a6d3c363695108b",
"slot":"15:00-16:00",
"track":"room2",
"title":"Memory Access Ordering in Complex Embedded Systems",
"speakers":[
{
"id":"p-30164",
"name":"Chris Shore"
}
],
"tags":[
"Embedded"
]
},
{
"id":"1-t-30171",
"conferenceId":"t-30171",
"day":1,
"md5":"2ef0d661a81d14e8d8edab641d908b22",
"slot":"15:00-16:00",
"track":"room3",
"title":"Making .NET Applications Faster",
"speakers":[
{
"id":"p-3191",
"name":"Sasha Goldshtein"
}
],
"tags":[
".NET Framework"
]
},
{
"id":"1-t-30299",
"conferenceId":"t-30299",
"day":1,
"md5":"74ec396f2cd4d0c20d58fcd1943d110d",
"slot":"15:00-16:00",
"track":"room4",
"title":"It's all messages now: where are my abstractions?",
"speakers":[
{
"id":"p-24941",
"name":"Matt Barrett"
}
],
"tags":[
"Web",
"Architecture"
]
},
{
"id":"1-t-30184",
"conferenceId":"t-30184",
"day":1,
"md5":"ac99d64b3966e85b268ac653cf4d51b4",
"slot":"15:00-16:00",
"track":"room5",
"title":"Authentication and authorization in modern JavaScript web applications – how hard can it be?",
"speakers":[
{
"id":"p-4237",
"name":"Brock Allen"
}
],
"tags":[
"Security",
"JavaScript"
]
},
{
"id":"1-t-31330",
"conferenceId":"t-31330",
"day":1,
"md5":"f390a9edc924ca7a6610e80cdf731268",
"slot":"15:00-16:00",
"track":"room6",
"title":"Building IoT Device Applications in JavaScript and C++",
"speakers":[
{
"id":"p-28072",
"name":"Günter Obiltschnig"
}
],
"tags":[
"IoT",
"C++",
"JavaScript"
]
},
{
"id":"1-t-30318",
"conferenceId":"t-30318",
"day":1,
"md5":"ffc2ed797c8dc5147a8126b0b6d6f342",
"slot":"15:00-16:00",
"track":"room7",
"title":"Web Development in 2020",
"speakers":[
{
"id":"p-4481",
"name":"Steve Sanderson"
}
],
"tags":[
"Web"
]
},
{
"id":"1-t-30312",
"conferenceId":"t-30312",
"day":1,
"md5":"3293e539657eba429beaab8b4b57750f",
"slot":"15:00-16:00",
"track":"room8",
"title":"How to turn software into competitive business advantage",
"speakers":[
{
"id":"p-1901",
"name":"Gojko Adzic"
}
],
"tags":[
"People"
]
},
{
"id":"1-t-30333",
"conferenceId":"t-30333",
"day":1,
"md5":"6bf565eb0af1d9c4319c14b7f1ed3b40",
"slot":"15:00-16:00",
"track":"room9",
"title":"Functional Data",
"speakers":[
{
"id":"p-397",
"name":"Greg Young"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"1-t-30210",
"conferenceId":"t-30210",
"day":1,
"md5":"4be6d328090b2e60acba41db463b7ac7",
"slot":"16:20-17:20",
"track":"room1",
"title":"The elephant in the room: Continuous Delivery for Databases",
"speakers":[
{
"id":"p-22839",
"name":"Alex Yates"
}
],
"tags":[
"Devops",
"Database"
]
},
{
"id":"1-t-31320",
"conferenceId":"t-31320",
"day":1,
"md5":"660a44822c5c3d9858a096523e23da75",
"slot":"16:20-17:20",
"track":"room2",
"title":"BDD for Embedded Systems",
"speakers":[
{
"id":"p-29156",
"name":"Oscar Hellström"
}
],
"tags":[
"Agile",
"Embedded"
]
},
{
"id":"1-t-30175",
"conferenceId":"t-30175",
"day":1,
"md5":"25dde0ed90ea4c2265e4b3f6e7ef605b",
"slot":"16:20-17:20",
"track":"room3",
"title":"Reactive Programming Demystified",
"speakers":[
{
"id":"p-4400",
"name":"Matthew Podwysocki"
}
],
"tags":[
"Web",
"JavaScript"
]
},
{
"id":"1-t-30311",
"conferenceId":"t-30311",
"day":1,
"md5":"62bfb95f773a67a179ee027f9956e744",
"slot":"16:20-17:20",
"track":"room4",
"title":"Hacking .NET(C#) Application: Building and Breaking Layered Defense",
"speakers":[
{
"id":"p-3209",
"name":"Jon McCoy"
},
{
"id":"p-30176",
"name":"Topher Timzen"
}
],
"tags":[
"Security",
".NET Framework"
]
},
{
"id":"1-t-30190",
"conferenceId":"t-30190",
"day":1,
"md5":"dc8317f2ea02a6287925aacb3e20b820",
"slot":"16:20-17:20",
"track":"room5",
"title":"Code Gems From the Rosyln and .NET Source Code",
"speakers":[
{
"id":"p-3341",
"name":"Scott Allen"
}
],
"tags":[
"Microsoft",
".NET Framework"
]
},
{
"id":"1-t-31331",
"conferenceId":"t-31331",
"day":1,
"md5":"7dd07f19c16cb1d2d84a30a02aa741fa",
"slot":"16:20-17:20",
"track":"room6",
"title":"Encryption in C++",
"speakers":[
{
"id":"p-29159",
"name":"Jens Weller"
}
],
"tags":[
"C++"
]
},
{
"id":"1-t-30187",
"conferenceId":"t-30187",
"day":1,
"md5":"87c4b9073cac833541c1c369e1cd528a",
"slot":"16:20-17:20",
"track":"room7",
"title":"Modern architectural patterns for the cloud",
"speakers":[
{
"id":"p-3286",
"name":"Mahesh Krishnan"
},
{
"id":"p-4356",
"name":"John S Azariah"
}
],
"tags":[
"Architecture",
"Cloud"
]
},
{
"id":"1-t-30198",
"conferenceId":"t-30198",
"day":1,
"md5":"c89b0f7ba47eaa612c99f31759c609cb",
"slot":"16:20-17:20",
"track":"room8",
"title":"Deliberate creativity",
"speakers":[
{
"id":"p-3380",
"name":"Andy Hunt"
}
],
"tags":[
"People"
]
},
{
"id":"1-t-31349",
"conferenceId":"t-31349",
"day":1,
"md5":"b3ee365b03ddc7f4983b1df6b3891903",
"slot":"16:20-17:20",
"track":"room9",
"title":"Crunching through big data with MBrace, Azure and F#",
"speakers":[
{
"id":"p-9721",
"name":"Mathias Brandewinder"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"1-t-30246",
"conferenceId":"t-30246",
"day":1,
"md5":"da9555b369da9971fb5a09a863bccd20",
"slot":"17:40-18:40",
"track":"room1",
"title":"Running Docker and Containers in Development and Production",
"speakers":[
{
"id":"p-2797",
"name":"Ben Hall"
}
],
"tags":[
"Architecture",
"Devops"
]
},
{
"id":"1-t-31332",
"conferenceId":"t-31332",
"day":1,
"md5":"9030159a304bf46ad19521259f0d0ab3",
"slot":"17:40-18:40",
"track":"room2",
"title":"Functional C++",
"speakers":[
{
"id":"p-353",
"name":"Kevlin Henney"
}
],
"tags":[
"Functional Programming",
"C++"
]
},
{
"id":"1-t-30337",
"conferenceId":"t-30337",
"day":1,
"md5":"3c029b7bdce522c870d04272e847f20b",
"slot":"17:40-18:40",
"track":"room3",
"title":"Ten simple rules for creating your own compiler on the CLR",
"speakers":[
{
"id":"p-25938",
"name":"Philip Laureano"
}
],
"tags":[
"Programming Languages",
".NET Framework"
]
},
{
"id":"1-t-30259",
"conferenceId":"t-30259",
"day":1,
"md5":"1207fd627081ad8dcf989b25194676d0",
"slot":"17:40-18:40",
"track":"room4",
"title":"Taking other peoples money: A guide to online payments",
"speakers":[
{
"id":"p-28049",
"name":"Ben Cull"
}
],
"tags":[
"Web"
]
},
{
"id":"1-t-30224",
"conferenceId":"t-30224",
"day":1,
"md5":"f971aff01473253eaf59fe934cec29e9",
"slot":"17:40-18:40",
"track":"room5",
"title":"Microsoft Azure Web Jobs - the new way to run your workloads in the Cloud",
"speakers":[
{
"id":"p-3195",
"name":"Magnus Mårtensson"
}
],
"tags":[
"Web",
"Microsoft",
"Cloud"
]
},
{
"id":"1-t-30320",
"conferenceId":"t-30320",
"day":1,
"md5":"3aa63478b6330b89958e0ac73be6269d",
"slot":"17:40-18:40",
"track":"room6",
"title":"Building Isomorphic Applications in JavaScript",
"speakers":[
{
"id":"p-28155",
"name":"Eirik Langholm Vullum"
}
],
"tags":[
"Web",
"JavaScript"
]
},
{
"id":"1-t-30313",
"conferenceId":"t-30313",
"day":1,
"md5":"978a5d39280c692d305a5e5dc8c2a6eb",
"slot":"17:40-18:40",
"track":"room7",
"title":".NET Rocks Panel on Application Security",
"speakers":[
{
"id":"p-28019",
"name":"Barry Dorrans"
},
{
"id":"p-5646",
"name":"Troy Hunt"
},
{
"id":"p-3203",
"name":"Niall Merrigan"
},
{
"id":"p-424",
"name":"Carl Franklin"
},
{
"id":"p-402",
"name":"Richard Campbell"
},
{
"id":"p-28128",
"name":"André N. Klingsheim"
}
],
"tags":[
"Security"
]
},
{
"id":"1-t-30302",
"conferenceId":"t-30302",
"day":1,
"md5":"711d626e3fb5ddd3a048aa4882fe0abb",
"slot":"17:40-18:40",
"track":"room8",
"title":"Getting the first PR into .NET and other tales from an OSS contributor",
"speakers":[
{
"id":"p-4505",
"name":"Adam Ralph"
}
],
"tags":[
"People"
]
},
{
"id":"1-t-32356",
"conferenceId":"t-32356",
"day":1,
"md5":"ee964fc9389d43840ba65213e6b51c8a",
"slot":"17:40-18:40",
"track":"room9",
"title":"Implementing the logic for a board game in Elixir",
"speakers":[
{
"id":"p-30174",
"name":"Torben Hoffmann"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"1-t-30185",
"conferenceId":"t-30185",
"day":1,
"md5":"67c7f973e3598016293c1ba403a0598b",
"slot":"19:00-19:30",
"track":"room1",
"title":"Not Even Close: The State of Computer Security",
"speakers":[
{
"id":"p-28149",
"name":"James Mickens"
}
],
"tags":[
"Security",
"Fun"
]
}
]
},
{
"order":"2",
"name":"Friday",
"slots":[
{
"id":"09:00-10:00",
"from":"09:00",
"to":"10:00",
"sort":900,
"allTracks":false,
"isBreak":false
},
{
"id":"10:00-10:20",
"from":"10:00",
"to":"10:20",
"sort":1000,
"allTracks":true,
"isBreak":true
},
{
"id":"10:20-11:20",
"from":"10:20",
"to":"11:20",
"sort":1020,
"allTracks":false,
"isBreak":false
},
{
"id":"11:20-11:40",
"from":"11:20",
"to":"11:40",
"sort":1120,
"allTracks":true,
"isBreak":true
},
{
"id":"11:40-12:40",
"from":"11:40",
"to":"12:40",
"sort":1140,
"allTracks":false,
"isBreak":false
},
{
"id":"12:40-13:40",
"from":"12:40",
"to":"13:40",
"sort":1240,
"allTracks":true,
"isBreak":true
},
{
"id":"13:40-14:40",
"from":"13:40",
"to":"14:40",
"sort":1340,
"allTracks":false,
"isBreak":false
},
{
"id":"14:40-15:00",
"from":"14:40",
"to":"15:00",
"sort":1440,
"allTracks":true,
"isBreak":true
},
{
"id":"15:00-16:00",
"from":"15:00",
"to":"16:00",
"sort":1500,
"allTracks":false,
"isBreak":false
},
{
"id":"16:00-16:20",
"from":"16:00",
"to":"16:20",
"sort":1600,
"allTracks":true,
"isBreak":true
},
{
"id":"16:20-17:20",
"from":"16:20",
"to":"17:20",
"sort":1620,
"allTracks":false,
"isBreak":false
}
],
"tracks":[
{
"id":"room1",
"name":"Room 1"
},
{
"id":"room2",
"name":"Room 2"
},
{
"id":"room3",
"name":"Room 3"
},
{
"id":"room4",
"name":"Room 4"
},
{
"id":"room5",
"name":"Room 5"
},
{
"id":"room6",
"name":"Room 6"
},
{
"id":"room7",
"name":"Room 7"
},
{
"id":"room8",
"name":"Room 8"
},
{
"id":"room9",
"name":"Room 9"
},
{
"id":"workshops",
"name":"Workshops"
}
],
"sessions":[
{
"id":"2-t-30271",
"conferenceId":"t-30271",
"day":2,
"md5":"0217cc53c222751794308cdbaa0a65c7",
"slot":"09:00-10:00",
"track":"room1",
"title":"Continuous Delivery Patterns for Cloud-based Applications",
"speakers":[
{
"id":"p-28081",
"name":"Mitch Denny"
}
],
"tags":[
"Devops",
"Cloud"
]
},
{
"id":"2-t-30291",
"conferenceId":"t-30291",
"day":2,
"md5":"4e3fd21d036be76300317a986dc11e64",
"slot":"09:00-10:00",
"track":"room2",
"title":"595 billions income - untouched by human hands",
"speakers":[
{
"id":"p-3338",
"name":"Trond Arve Wasskog"
}
],
"tags":[
"Architecture"
]
},
{
"id":"2-t-32346",
"conferenceId":"t-32346",
"day":2,
"md5":"5990aa64f10db84ce9c95ff98c1564fa",
"slot":"09:00-10:00",
"track":"room3",
"title":"Get Unblocked",
"speakers":[
{
"id":"p-3370",
"name":"Denise Jacobs"
}
],
"tags":[
"People"
]
},
{
"id":"2-t-30180",
"conferenceId":"t-30180",
"day":2,
"md5":"6e8a34f821956fb3d442897eacad8c5c",
"slot":"09:00-10:00",
"track":"room4",
"title":"DevOps Yourself: Fast-Track Your Windows Development Environment Setup with Chocolatey and Vagrant",
"speakers":[
{
"id":"p-25936",
"name":"Justin James"
}
],
"tags":[
"Devops"
]
},
{
"id":"2-t-30323",
"conferenceId":"t-30323",
"day":2,
"md5":"24db27b5d849ebe9799f9fa657ea335b",
"slot":"09:00-10:00",
"track":"room5",
"title":"Standing on a Beach, Staring at the C",
"speakers":[
{
"id":"p-353",
"name":"Kevlin Henney"
}
],
"tags":[
"Embedded",
"C++"
]
},
{
"id":"2-t-30301",
"conferenceId":"t-30301",
"day":2,
"md5":"f1b8ca958dec09c2bf9dc0503af33fb6",
"slot":"09:00-10:00",
"track":"room6",
"title":"Boosting security with HTTP headers",
"speakers":[
{
"id":"p-28128",
"name":"André N. Klingsheim"
}
],
"tags":[
"Security",
"Web"
]
},
{
"id":"2-t-30189",
"conferenceId":"t-30189",
"day":2,
"md5":"4e2e1e3cc3ff94a753467dd51d7330c5",
"slot":"09:00-10:00",
"track":"room7",
"title":"AWS vs. Azure - architectures and choices",
"speakers":[
{
"id":"p-5611",
"name":"Lynn Langit"
},
{
"id":"p-25972",
"name":"Michele Leroux Bustamante"
}
],
"tags":[
"Web",
"Cloud"
]
},
{
"id":"2-t-30201",
"conferenceId":"t-30201",
"day":2,
"md5":"380ee5d8d6660403d67d782da38f19ba",
"slot":"09:00-10:00",
"track":"room8",
"title":"Aurelia: Next Generation Web Apps",
"speakers":[
{
"id":"p-28148",
"name":"Rob Eisenberg"
}
],
"tags":[
"Web"
]
},
{
"id":"2-t-31351",
"conferenceId":"t-31351",
"day":2,
"md5":"3b45b5c923130ab34a4bf1d317b265df",
"slot":"09:00-10:00",
"track":"room9",
"title":"F# for C# Developers",
"speakers":[
{
"id":"p-22865",
"name":"Phillip Trelford"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"2-t-30287",
"conferenceId":"t-30287",
"day":2,
"md5":"f81993668d0a4c3966d17b33c63028e5",
"slot":"10:20-11:20",
"track":"room1",
"title":"Advanced Continuous Delivery Scenarios",
"speakers":[
{
"id":"p-3258",
"name":"Jeff French"
}
],
"tags":[
"Devops"
]
},
{
"id":"2-t-30205",
"conferenceId":"t-30205",
"day":2,
"md5":"12b990ed76fd20f1b8cde21c31556f34",
"slot":"10:20-11:20",
"track":"room2",
"title":"The rest of ReST",
"speakers":[
{
"id":"p-25948",
"name":"Dylan Beattie"
}
],
"tags":[
"Web",
"Architecture"
]
},
{
"id":"2-t-30215",
"conferenceId":"t-30215",
"day":2,
"md5":"7975dacaabefce266812cc39e3efe873",
"slot":"10:20-11:20",
"track":"room3",
"title":"Universal Windows Apps – Develop for all Sizes",
"speakers":[
{
"id":"p-23919",
"name":"Lars Klint"
}
],
"tags":[
"Microsoft",
".NET Framework"
]
},
{
"id":"2-t-31355",
"conferenceId":"t-31355",
"day":2,
"md5":"b39e1e769e9e78050cd57d9a068cdbbb",
"slot":"10:20-11:20",
"track":"room4",
"title":"Data exploration and analytics with elasticsearch",
"speakers":[
{
"id":"p-29165",
"name":"Aleksander Stensby"
}
],
"tags":[
"Database",
"Search"
]
},
{
"id":"2-t-30276",
"conferenceId":"t-30276",
"day":2,
"md5":"cf2309b3e202a06123d993d73cc680c9",
"slot":"10:20-11:20",
"track":"room5",
"title":"A security testers toolkit",
"speakers":[
{
"id":"p-3203",
"name":"Niall Merrigan"
}
],
"tags":[
"Security"
]
},
{
"id":"2-t-30214",
"conferenceId":"t-30214",
"day":2,
"md5":"b9adca4cadfc3ade6e6a708de8c545ba",
"slot":"10:20-11:20",
"track":"room6",
"title":"Engagement techniques. How to get people engaged and motivated?",
"speakers":[
{
"id":"p-25958",
"name":"Anna Danes"
}
],
"tags":[
"People"
]
},
{
"id":"2-t-30166",
"conferenceId":"t-30166",
"day":2,
"md5":"7655db86b5f3dd2b6bd40150877fe3a5",
"slot":"10:20-11:20",
"track":"room7",
"title":"Get more than a cache back! The Microsoft Azure (Redis) Cache",
"speakers":[
{
"id":"p-2740",
"name":"Maarten Balliauw"
}
],
"tags":[
"Microsoft",
"Cloud"
]
},
{
"id":"2-t-32347",
"conferenceId":"t-32347",
"day":2,
"md5":"24f2011941feb3f957c5d725b770463c",
"slot":"10:20-11:20",
"track":"room8",
"title":"Theft, Tributes and Collaboration",
"speakers":[
{
"id":"p-30165",
"name":"Carl Smith"
}
],
"tags":[
"People"
]
},
{
"id":"2-t-31353",
"conferenceId":"t-31353",
"day":2,
"md5":"7084768ba0b006e6b4ae0d7a941db910",
"slot":"10:20-11:20",
"track":"room9",
"title":"End-to-end Functional Web Development",
"speakers":[
{
"id":"p-4487",
"name":"Tomas Petricek"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"2-t-30240",
"conferenceId":"t-30240",
"day":2,
"md5":"0635d129a5b775ae9cb872e075ced3d5",
"slot":"11:40-12:40",
"track":"room1",
"title":"How do you scale a logging infrastructure to accept a billion messages a day?",
"speakers":[
{
"id":"p-2746",
"name":"Paul Stack"
}
],
"tags":[
"Architecture",
"Devops"
]
},
{
"id":"2-t-30288",
"conferenceId":"t-30288",
"day":2,
"md5":"2863d2f68cef9d2fcbccd9fd01ef6fa8",
"slot":"11:40-12:40",
"track":"room2",
"title":"Learning Client Hypermedia from the Ground Up",
"speakers":[
{
"id":"p-28112",
"name":"Mike Amundsen"
}
],
"tags":[
"Web",
"Architecture"
]
},
{
"id":"2-t-30163",
"conferenceId":"t-30163",
"day":2,
"md5":"cd50d498429be782aa1b122764d14dcb",
"slot":"11:40-12:40",
"track":"room3",
"title":"Making 2D Games that Run Everywhere using C# and CocosSharp",
"speakers":[
{
"id":"p-24925",
"name":"James Montemagno"
}
],
"tags":[
"mobile",
".NET Framework"
]
},
{
"id":"2-t-30245",
"conferenceId":"t-30245",
"day":2,
"md5":"5e1a1d20518aef3b4ddc0a9f5cccad66",
"slot":"11:40-12:40",
"track":"room4",
"title":"Lifestyles of the rich and frameworkless",
"speakers":[
{
"id":"p-4214",
"name":"Pete Smith"
}
],
"tags":[
"Web"
]
},
{
"id":"2-t-30252",
"conferenceId":"t-30252",
"day":2,
"md5":"0e64fcdf58bb1c80600c927c69d01723",
"slot":"11:40-12:40",
"track":"room5",
"title":"Going beyond OWASP",
"speakers":[
{
"id":"p-28019",
"name":"Barry Dorrans"
}
],
"tags":[
"Security",
"Web"
]
},
{
"id":"2-t-30213",
"conferenceId":"t-30213",
"day":2,
"md5":"e79e085d7b6ed3e3ea096384c141fcbf",
"slot":"11:40-12:40",
"track":"room6",
"title":"Big Scrum: All You Need and It’s Not Enough",
"speakers":[
{
"id":"p-4596",
"name":"Martin Hinshelwood"
}
],
"tags":[
"People",
"Agile"
]
},
{
"id":"2-t-30188",
"conferenceId":"t-30188",
"day":2,
"md5":"d7d36ededff8eb58f8b55b0a4a6cb0ba",
"slot":"11:40-12:40",
"track":"room7",
"title":"Make it Faster - Lessons Learned from Benchmarking NoSQL on the AWS Cloud",
"speakers":[
{
"id":"p-5611",
"name":"Lynn Langit"
}
],
"tags":[
"Database",
"Cloud"
]
},
{
"id":"2-t-32348",
"conferenceId":"t-32348",
"day":2,
"md5":"bef2ed3a685f8f7b509e1e4fe2456082",
"slot":"11:40-12:40",
"track":"room8",
"title":"Let’s Start an Epidemic",
"speakers":[
{
"id":"p-7708",
"name":"Doc Norton"
}
],
"tags":[
"People"
]
},
{
"id":"2-t-31354",
"conferenceId":"t-31354",
"day":2,
"md5":"85d00c6bf4932806bde27c244d0efd42",
"slot":"11:40-12:40",
"track":"room9",
"title":"Maximizing throughput on Multicore Systems",
"speakers":[
{
"id":"p-29164",
"name":"Irina Guberman"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"2-t-30339",
"conferenceId":"t-30339",
"day":2,
"md5":"7e37e5850e86e52b6cdedbedbc9dc613",
"slot":"11:40-12:40",
"track":"workshops",
"title":"Lightning Talks",
"speakers":[
{
"id":"p-26999",
"name":"Trond Marius Øvstetun"
},
{
"id":"p-22839",
"name":"Alex Yates"
},
{
"id":"p-5650",
"name":"Michał Śliwoń"
},
{
"id":"p-4528",
"name":"Todd H Gardner"
},
{
"id":"p-28118",
"name":"Claus Asbjørn Sørensen"
}
],
"tags":[
]
},
{
"id":"2-t-30335",
"conferenceId":"t-30335",
"day":2,
"md5":"37ad56d8555c24496683f4ec39a82a61",
"slot":"13:40-14:40",
"track":"room1",
"title":"Mob Programming, A Whole Team Approach",
"speakers":[
{
"id":"p-28107",
"name":"Woody Zuill"
}
],
"tags":[
"People",
"Agile"
]
},
{
"id":"2-t-32345",
"conferenceId":"t-32345",
"day":2,
"md5":"9c77fad1ba263e589a352ff335030533",
"slot":"13:40-14:40",
"track":"room2",
"title":"Multicore Software Development on ARM",
"speakers":[
{
"id":"p-30164",
"name":"Chris Shore"
}
],
"tags":[
"Embedded"
]
},
{
"id":"2-t-30266",
"conferenceId":"t-30266",
"day":2,
"md5":"97b1654b93862932f18c2834dc2f3d35",
"slot":"13:40-14:40",
"track":"room3",
"title":"Real-time, offline-capable, noBackend web apps with Firebase",
"speakers":[
{
"id":"p-28024",
"name":"David Ed Mellum"
}
],
"tags":[
"Web",
"Database"
]
},
{
"id":"2-t-30262",
"conferenceId":"t-30262",
"day":2,
"md5":"7ac7f8fe72114181bb261f4983f9ba8c",
"slot":"13:40-14:40",
"track":"room4",
"title":"Crafting Evolvable Web API Representations",
"speakers":[
{
"id":"p-19746",
"name":"Darrel Miller"
}
],
"tags":[
"Web",
"Architecture"
]
},
{
"id":"2-t-31356",
"conferenceId":"t-31356",
"day":2,
"md5":"63fa6a026dcb2c4c60346ccfc6549a9d",
"slot":"13:40-14:40",
"track":"room5",
"title":"You can't change this: Immutable JavaScript",
"speakers":[
{
"id":"p-1884",
"name":"Christian Johansen"
}
],
"tags":[
"Web",
"JavaScript"
]
},
{
"id":"2-t-30217",
"conferenceId":"t-30217",
"day":2,
"md5":"cfa729a83142fa8ef6cdd62e39b8c7e0",
"slot":"13:40-14:40",
"track":"room6",
"title":"Why monitoring sucks, and how to improve it",
"speakers":[
{
"id":"p-25961",
"name":"Pavlo Baron"
}
],
"tags":[
"Devops"
]
},
{
"id":"2-t-30316",
"conferenceId":"t-30316",
"day":2,
"md5":"d3e076a197a89567794111eaee86221c",
"slot":"13:40-14:40",
"track":"room7",
"title":"Making Hacking Child’s Play",
"speakers":[
{
"id":"p-5646",
"name":"Troy Hunt"
}
],
"tags":[
"Security"
]
},
{
"id":"2-t-30285",
"conferenceId":"t-30285",
"day":2,
"md5":"a155ba03364be74989e66ffc1a9856a5",
"slot":"13:40-14:40",
"track":"room8",
"title":"Troll Hunting on the Internet",
"speakers":[
{
"id":"p-3333",
"name":"Gary Short"
}
],
"tags":[
"Web",
"Big Data",
"Cloud"
]
},
{
"id":"2-t-31352",
"conferenceId":"t-31352",
"day":2,
"md5":"acf93c003804ec5feb90878821c55cb4",
"slot":"13:40-14:40",
"track":"room9",
"title":"Metaprogramming Elixir",
"speakers":[
{
"id":"p-29163",
"name":"Chris Mccord"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"2-t-32349",
"conferenceId":"t-32349",
"day":2,
"md5":"c0d08fee82b675c6c411defbd5a44f0b",
"slot":"13:40-14:40",
"track":"workshops",
"title":"Creative Collaboration; Tools for Teams",
"speakers":[
{
"id":"p-7708",
"name":"Doc Norton"
},
{
"id":"p-3370",
"name":"Denise Jacobs"
},
{
"id":"p-30165",
"name":"Carl Smith"
}
],
"tags":[
"People"
]
},
{
"id":"2-t-30168",
"conferenceId":"t-30168",
"day":2,
"md5":"6d82edd3128960ca8277ca693c556695",
"slot":"15:00-16:00",
"track":"room1",
"title":"Knowledge is power! The guide to measure what matters.",
"speakers":[
{
"id":"p-22855",
"name":"Mark van Straten"
}
],
"tags":[
"Devops"
]
},
{
"id":"2-t-30264",
"conferenceId":"t-30264",
"day":2,
"md5":"e31c04e48bebdd24f77dec107741514d",
"slot":"15:00-16:00",
"track":"room2",
"title":"Beer analysis using Kibana 4 and elasticsearch",
"speakers":[
{
"id":"p-5614",
"name":"Christoffer Vig"
}
],
"tags":[
"Database",
"Search"
]
},
{
"id":"2-t-30170",
"conferenceId":"t-30170",
"day":2,
"md5":"2e6d71c91d0244f7fc06568a12d04734",
"slot":"15:00-16:00",
"track":"room3",
"title":"Swift: Apple's New Programming Language for iOS and OS X",
"speakers":[
{
"id":"p-3191",
"name":"Sasha Goldshtein"
}
],
"tags":[
"Programming Languages",
"mobile"
]
},
{
"id":"2-t-30277",
"conferenceId":"t-30277",
"day":2,
"md5":"b273e7036ce40dbc98dbd449d983399a",
"slot":"15:00-16:00",
"track":"room4",
"title":"Getting started with Meteor",
"speakers":[
{
"id":"p-22859",
"name":"Kuba Walinski"
}
],
"tags":[
"Web",
"JavaScript"
]
},
{
"id":"2-t-32360",
"conferenceId":"t-32360",
"day":2,
"md5":"2e11d92b47e1b528a4e1138156a52705",
"slot":"15:00-16:00",
"track":"room5",
"title":"Introduction to Windows 10 UWP and Adaptive Design",
"speakers":[
{
"id":"p-4396",
"name":"Andy Wigley"
}
],
"tags":[
"Web",
"Microsoft",
".NET Framework"
]
},
{
"id":"2-t-30346",
"conferenceId":"t-30346",
"day":2,
"md5":"2d2b41be5d6f2ebf30c79fd4fb9f9e34",
"slot":"15:00-16:00",
"track":"room6",
"title":"Patterns and Practices for Embedded TDD in C and C++",
"speakers":[
{
"id":"p-28074",
"name":"Byran Wills-Heath"
}
],
"tags":[
"Testing",
"Embedded"
]
},
{
"id":"2-t-30319",
"conferenceId":"t-30319",
"day":2,
"md5":"4866c1ef804e7055f2423157340d0d7b",
"slot":"15:00-16:00",
"track":"room7",
"title":"Removing barriers",
"speakers":[
{
"id":"p-4516",
"name":"Hadi Hariri"
}
],
"tags":[
"People"
]
},
{
"id":"2-t-30173",
"conferenceId":"t-30173",
"day":2,
"md5":"fedf2f7fcbe0153d8e0e94814a55278c",
"slot":"15:00-16:00",
"track":"room8",
"title":"Cloud-Scale Event Processing with the Reactive Extensions (Rx)",
"speakers":[
{
"id":"p-4400",
"name":"Matthew Podwysocki"
},
{
"id":"p-31176",
"name":"Bart De Smet"
}
],
"tags":[
"Microsoft",
"Cloud"
]
},
{
"id":"2-t-32352",
"conferenceId":"t-32352",
"day":2,
"md5":"e56d0013e54e28659f95eb8c7c353ffa",
"slot":"15:00-16:00",
"track":"room9",
"title":"F# as our day job by 2016",
"speakers":[
{
"id":"p-3219",
"name":"Tomas Jansson"
}
],
"tags":[
"Functional Programming"
]
},
{
"id":"2-t-32349",
"conferenceId":"t-32349",
"day":2,
"md5":"c0d08fee82b675c6c411defbd5a44f0b",
"slot":"15:00-16:00",
"track":"workshops",
"title":"Creative Collaboration; Tools for Teams",
"speakers":[
{
"id":"p-7708",
"name":"Doc Norton"
},
{
"id":"p-3370",
"name":"Denise Jacobs"
},
{
"id":"p-30165",
"name":"Carl Smith"
}
],
"tags":[
"People"
]
},
{
"id":"2-t-30325",
"conferenceId":"t-30325",
"day":2,
"md5":"58efac287b763680588c90803f79539f",
"slot":"16:20-17:20",
"track":"room1",
"title":"Everything I Know About Computers, I Learned From the Movies",
"speakers":[
{
"id":"p-4417",
"name":"Mark Rendle"
}
],
"tags":[
"Fun"
]
},
{
"id":"2-t-32357",
"conferenceId":"t-32357",
"day":2,
"md5":"e1334f6795aacc6f50606c1d01273743",
"slot":"16:20-17:20",
"track":"room2",
"title":"IoT and Machine Learning – a true story of a Smart Grid",
"speakers":[
{
"id":"p-30175",
"name":"Erik Åsberg"
},
{
"id":"p-31170",
"name":"Davide Roverso"
}
],
"tags":[
"Microsoft",
"Architecture",
"Big Data",
"Cloud",
"IoT"
]
},
{
"id":"2-t-30162",
"conferenceId":"t-30162",
"day":2,
"md5":"79a9961425940dd99bdd3648c2f53c11",
"slot":"16:20-17:20",
"track":"room3",
"title":"Xamarin.Forms: Native iOS, Android, and Windows Phone apps from ONE C# Codebase",
"speakers":[
{
"id":"p-24925",
"name":"James Montemagno"
}
],
"tags":[
"mobile",
".NET Framework"
]
},
{
"id":"2-t-30273",
"conferenceId":"t-30273",
"day":2,
"md5":"c853f2b29a1507135298dd760e230dcf",
"slot":"16:20-17:20",
"track":"room4",
"title":"ng-owasp: OWASP Top 10 for AngularJS Applications",
"speakers":[
{
"id":"p-28090",
"name":"Kevin Hakanson"
}
],
"tags":[
"Security",
"Web",
"JavaScript"
]
},
{
"id":"2-t-30331",
"conferenceId":"t-30331",
"day":2,
"md5":"e7114739a0cbb6c8909554c3afee04bc",
"slot":"16:20-17:20",
"track":"room5",
"title":"Business Logic – a different perspective",
"speakers":[
{
"id":"p-21762",
"name":"Udi Dahan"
}
],
"tags":[
"Architecture"
]
},
{
"id":"2-t-30260",
"conferenceId":"t-30260",
"day":2,
"md5":"82828669e9e8b906b4826143499ac034",
"slot":"16:20-17:20",
"track":"room6",
"title":"How to build and be a part of a highly efficient team",
"speakers":[
{
"id":"p-28054",
"name":"Kjell Ljøstad"
}
],
"tags":[
"People"
]
},
{
"id":"2-t-30254",
"conferenceId":"t-30254",
"day":2,
"md5":"60eb1aced35844ba2b8d236ef297e9d2",
"slot":"16:20-17:20",
"track":"room7",
"title":"Evolving architecture for API delivery on Azure",
"speakers":[
{
"id":"p-28020",
"name":"Harald Schult Ulriksen"
}
],
"tags":[
"Architecture",
"Cloud"
]
},
{
"id":"2-t-30265",
"conferenceId":"t-30265",
"day":2,
"md5":"cba2866354a6d4023e07447c22c7fb88",
"slot":"16:20-17:20",
"track":"room8",
"title":"Browserception: Building our own browser with CSS/HTML and Node.js",
"speakers":[
{
"id":"p-28024",
"name":"David Ed Mellum"
}
],
"tags":[
"Web",
"UI",
"JavaScript"
]
},
{
"id":"2-t-32355",
"conferenceId":"t-32355",
"day":2,
"md5":"d366195e46173745f47dd2ad8c0fdba3",
"slot":"16:20-17:20",
"track":"room9",
"title":"Using Elixir to get the fun back in Lego Mindstorms",
"speakers":[
{
"id":"p-30174",
"name":"Torben Hoffmann"
}
],
"tags":[
"Functional Programming"
]
}
]
}
]
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment