Agenda

DevCon represents a powerful tool of learning sessions lead by experts for experts from the tech industry. Check the Agenda of the 2019 edition and craft your own journey with the most important topics of the moment!
  • AI & Machine Learning Nov 12, 2019
  • QA & Testing Con Nov 13, 2019
  • Security Con Nov 13, 2019
  • Java Con Nov 14, 2019
10:00 - 16:00

Moderator

10:00 - 10:15

Welcome to DevCon

10:15 - 10:30

Intro Speech

Welcome to the AI & Machine Learning Conference

  • Alin Turcu Avatar Alin Turcu Mobile & AI Community Manager at Cognizant Softvision
10:30 - 11:15

Building smarter solutions with no expertise in machine learning

ML? API? AutoML? What can we build in only a few hours or days? In this session, we'll see how to benefit from existing ML models and how to create a custom model with AutoML. We’ll also be active players of a live demo, so don't put your smartphone on airplane mode!

11:15 - 11:45

Machine Learning at work in the real world

  • Andrei Demit Avatar Andrei Demit .NET Software Developer at Cognizant Softvision
11:50 - 12:35

MLSec and how your ML applications may be at risk

This talk will give listeners a deep understanding of machine learning adversarial examples.  Similar to fuzzing, adversarial samples/examples exploit weaknesses in how input is processed. Adversarial Examples are an inherent weakness in almost every machine learning model. Come to this talk if you are interested in learning more about MLSec and how your ML applications may be at risk.

12:40 - 12:55

The Secret to the Success of an AI Business

One of the most successful people in Romanian IT will share the key ingredients to launching an AI business and setting it on a path for success.

14:00 - 14:45

Deploying optimized computer vision solutions on multiple platforms

This talk will cover development tools and examples for optimized computer vision and deep learning solutions running on the Cloud or on Edge devices

14:50 - 15:25

Reinforcement Learning for Engineers

We'll discuss the basic concepts of Reinforcement Learning, see it in context of other types of Machine Learning and analyse most popular use cases and applications. Target public - engineers with no previous knowledge of RL.

  • Andrei Suiu Avatar Andrei Suiu Data Scientist at Ness Digital Engineering
15:30 - 15:45

Coffee Break

15:45 - 16:30

The Future of Machine Learning – Is Winter Coming?

Join me in this exploratory foray into the future perspectives of Machine Learning to gain a better understanding of what lies ahead in one of computer science’s most important and impactful fields.

10:00 - 16:00

Moderator

10:00 - 10:30

QuickFire Special Intro

10:30 - 11:15

Faster, Cheaper, Leaner: Horizontally Scaling a... CI Pipeline

We all know CI should be done by the time we’ve made ourselves a cup of coffee. What we don’t always know is how to do that, especially when a single run takes hours or days. In this talk we will walk you through how we made that happen, by horizontally scaling the CI workload for Red Hat 3scale.

11:15 - 11:45

Mental Models: Figuring out how life and software work

We make decisions every day, every hour and every minute. They affect every aspect of our life, from how we eat to how we work and even who we make friends with. But do you really know why you make those decisions ?

11:50 - 12:35

How King uses AI to test Candy Crush Saga

Candy Crush Saga is one of the biggest mobile games today that has been around for over 5 years. It is increasingly a challenge to test a game that has technical debt combined with new features being added for millions of players. Alexander Andelkovic shows you how King is training artificial intelligence (AI) programs (bots) to test its games by mimicking human players. 

12:40 - 12:55

Future of Testing

Development practices have tried to replicate, in the past, manufacturing practices. With all the digitalisation that pushed forward the IT industry, can we still have a look at manufacturing, to understand what will be the future of testing?

14:00 - 14:45

Just watch and let monkeys test for you

Following an unscripted test path, an exploratory session is always good to identify crashes, hangs or less obvious bugs. The more exploratory testing you do, the better, since your chances of finding a great bug increase. But we don’t really have the time or manpower to do a lot of exploratory testing. In addition, since testers have to sleep and eat as well, we can’t run uninterrupted test sessions for days on end. Still, maybe you wondered fearfully how your app would handle hours long, even multiple days long of continuous usage.

  • Ciprian Balea Avatar Ciprian Balea Scrum Master and Senior QA Automation Engineer at Toptal
14:50 - 15:25

How AI can be used to improve QA

AI is becoming more and more accessible and you no longer have to use specialized tools in order to leverage it.  You can now, more than ever, easily use open-source libraries and create your own ML/AI models and use them in your day-to-day job. In this presentation we will quickly go over several applications based on ML that can be easily built and used to improve your work as a QA.

15:30 - 15:45

Coffee Break

15:45 - 16:30

5 reasons why you shouldn't be a test manager

This presentation does not want to focus on the "bad" of test management but wants, through the reasons I will present, to inspire/teach others to thrive as test managers, appreciate more the test managers they worked with and to focus on remaining relevant in their preferred role and becoming better at it, since test management is not necessarily the ultimate finish line even in many cultural settings this is the ultimate goal.    

10:00 - 17:15

Moderator

10:15 - 10:30

Intro Speech Verint

10:30 - 11:15

Stopping Cyber Boom

Whenever a user creates a loss, the security profession takes the position that it was an unaware user and the solution is more awareness training. This position is not just specious and too simplistic, it doesn't include the potential for malice and countless other issues. The reality is that the user is just part of a system. Adopting principles from safety science, counterterrorism, and accounting, this presentation shows how to holistically account for what results in 90% of all losses. 

11:15 - 11:45

Harness Technologies to Prevent Terror and Crime

Part of today’s cyber landscape involves constant interaction with people -  in doing this, we leave our online history behind, our unique digital footprint. Verint’s technologies analyze massive network and web-data to reveal the footprints of illicit activities such as crimes, terror and cyber threats among all of Big Data in motion.

11:50 - 12:35

The parts of JWT security nobody talks about

JSON Web Tokens (JWT) have become the de facto standard to transfer application claims between the client and the server. By design, they incorporate the use of signatures to ensure the integrity of the data. However, merely signing the data alone is not enough to guarantee security.

12:40 - 12:55

Let's talk about Advance Persistence Threats: Up your Threat Intel game

  • Dan Demeter Avatar Dan Demeter Security Researcher at KASPERSKY LAB ROMANIA
14:00 - 14:45

One Phish Two Phish Red Phish Blue Phish

Society is changing, consumers are learning the value of their personal data, and will actively avoid organisations that do not treat their information accordingly. Words alone, are simply not enough. So how, when things feel more like they fail by design, can you improve your ability to protect your critical data? We often say that effective cyber security cannot exist without strong human firewalls. The same holds true for cyber security teams.

  • Zoë Rose Avatar Zoë Rose Hands-on cyber security specialist & Ethical Hacker at Baringa Partners
14:50 - 15:25

Why do most of the SOC projects fail?

Building a Cybersecurity Operations Center it’s an objective for a large number of companies around the world, but it seems that a lot of projects in this area are failing to fulfill initial expectations. We’ll use this session to discuss about some of the most common reasons the SOC projects are unsuccessful (things to avoid) and to present a few tips and tricks aimed to increase the success chances (things to do).

  • Catalin Patrascu Avatar Catalin Patrascu Manager, Security Operations and Engineering at Aera Technology
15:30 - 15:45

Coffee Break

15:45 - 16:30

The use of AI for CyberDefense

Name it, and it’s connected! Meet the modern enterprise: from the serves in the datacenter or cloud, to the laptop of the CEO, to the smartphone of new hire, to the Air Conditioning, to the assembly line, to the MRI machine or to the system irrigating the plants, everything is connected!  

The common denominator of all devices in the enterprise environment is the network traffic, making network-centric security the most effective approach in defending modern heterogeneous enterprise environments. We will explore how applying machine learning to network traffic enables network traffic security analytics solutions to improve detection of advanced threats that might target the entire range of network-connected devices.

16:30 - 17:15

Evolving Business Models of Cyber Criminals and The Industry Response

How end users utilise technology has changed radically in recent years.  This has led to a change in aims, methods and technology used by cyber criminals.  Changes in the cyber threat landscape have shaped the reaction by cybersecurity professionals, policy makers and product vendors.  This talk aims to provide a critical analysis of the evolution of this landscape, how we got to where we are and where we will go from here.

  • Paul Bradbury Avatar Paul Bradbury Public Sector Networking and Security Specialist at Softcat plc
10:00 - 16:00

Moderator

10:00 - 10:15

Intro Speech

10:15 - 10:30

Building software or doing banking?

10:30 - 11:15

Quarkus : Supersonic Subatomic Java

Come to this talk to learn about Quarkus, what it brings to the table and how you can get start started with it.

11:15 - 11:45

From Mainframe to NoSQL in real time with Apache Kafka

Using Apache Kafka in real time categorizing of banking transactions

*This talk will be delivered in Romanian

11:50 - 12:35

Hibernating in Spring: Unleash the Magic

The most popular Java Frameworks out there: Hibernate and Spring. Both rely on magic to make things *seem* simple to novices, but both also hide dark tenets that only the initiate will discover. When these two sorcerers work together, their spells are incredibly powerful.

This live-coding session will reveal the truth behind the magic at their integration points, discussing transaction propagation, Spring Data Jpa repositories, audit support, proxies, plus a few more aspects useful for any engineer interested to know what’s under the hood. Grab a coffee and join an entertaining, dynamic session full of jokes, metaphors, stickers and other goodies :)

12:40 - 12:55

The road to the cloud: practical tips for modernizing legacy applications

The cloud, devops, ci/cd, microservices...really cool buzzwords. But most of us are struggling with old, legacy codebases that are fragile and rigid. We are in the trenches trying to meet deadlines and fix regression bugs. How can we get there?

14:00 - 14:45

Reactive Streaming with Akka

14:50 - 15:25

Yet another cloud native Java framework: Helidon

Come and learn about project Helidon which fulfills varying demands and can be your powerful tool to develop cloud native applications.

15:30 - 15:45

Coffee Break

15:45 - 16:30

(R)evolutions in Java on the client: desktop/mobile/embedded

Recent changes in the Java client landscape offer lots of opportunities. In this talk, we will discuss the evolutions in OpenJFX, how using Graal makes it easy to create self-contained client applications, and we will show how Java client apps using JavaFX can easily be deployed to iOS and Android devices.

Hurry up!

Get Your Ticket Now

Partners