31 Gallery Hall Opening Keynote 09:50 10:10 Beyond Inspiration: Turning Learning into ActionTRISHA GEE
14 Gallery Hall Conference 15:20 16:10 The Gatherer API: the tool that was missing in the Stream APIJOSé PAUMARD
14 Gallery Hall Conference 17:40 18:30 Passkeys in practice: implementing passwordless appsDANIEL GARNIER-MOIROUX
7 Auditorium Byte Size Session 13:50 14:05 Combining tracing with profiling: inferred spansJACK SHIRAZI
10 Auditorium Byte Size Session 14:15 14:30 Count-Min Sketch: An efficient probabilistic Data StructureRAPHAEL DE LIO
11 Auditorium Tools-in-Action 14:40 15:10 End-to-End Encryption for Streaming Data PipelinesHANS-PETER GRAHSL
9 Auditorium Conference 15:20 16:10 What is multimodal RAG, and can we build a village with it?ALEXANDER CHATZIZACHARIAS
5 Auditorium Conference 16:40 17:30 The art of structuring real-time data streams into actionable insightsOLENA KUTSENKO
14 Auditorium Conference 17:40 18:30 Unlocking the Full Power of AI Coding Tools: Practical advice for DevelopersSTEVE POOLE
15 Room A Conference 11:00 11:50 Concerto for Java and AI - Building Production-Ready LLM ApplicationsTHOMAS VITALE
20 Room A Conference 12:00 12:50 Things You Thought You Didn’t Need To Care About That Have a Big Impact On Your JobHOLLY CUMMINS
11 Room B Conference 12:00 12:50 Software Excellence in Large Orgs through Technical CoachingEMILY BACHE
7 Room D Tools-in-Action 14:40 15:10 Design It, Describe It, Deploy It: Bridge the Design-Dev GapFRANCESCO LEARDINI
4 Room D Conference 16:40 17:30 Understanding Probabilistic Data Structures with 112,092 UFO SightingsGUY ROYSE
9 Exec Centre Conference 11:00 11:50 What's next for JS: Upcoming features in 2025 and beyondALVARO BERRUGA
12 Exec Centre Byte Size Session 14:15 14:30 Platform Engineering: Evolution, Trends, and Future Impact on Software DeliveryPAULA KENNEDY
10 Exec Centre Tools-in-Action 14:40 15:10 🎮 Mastering Prompt Engineering for Immersive Text-Based AdventuresCHARLES-PHILIPPE BERNARD
11 Exec Centre Conference 15:20 16:10 A door with no locks? Let’s talk about threat modelingBáRBARA TERUGGI
2 Exec Centre Conference 17:40 18:30 Piggybacking auth to trace SOCKS requests in a distributed systemDAFYDD THOMAS
8 Coding Cafe Mini Lab 13:50 15:20 Create AI-Infused Apps with LangChain4j (and Quarkus)DANIEL OHKEVIN DUBOISHOLLY CUMMINS
4 Coding Cafe Mini Lab 16:40 18:10 Building an Internal Developer Platform in 90 minutesSéBASTIEN BLANC