Sunday, June 22, 2025
HomeJavaQCon New York 2023: Day One Recap

QCon New York 2023: Day One Recap


Day One of many ninth annual QCon New York convention was held on June thirteenth, 2023 on the New York Marriott on the Brooklyn Bridge in Brooklyn, New York. This three-day occasion is organized by C4Media, a software program media firm targeted on unbiased content material and data within the enterprise improvement group and creators of InfoQ and QCon. It included a keynote handle by Radia Perlman and shows from these 4 tracks:

There was additionally one sponsored options monitor.

Dio Synodinos, president of C4Media, Pia von Beren, Venture Supervisor & Range Lead at C4Media, and Danny Latimer, Content material Product Supervisor at C4Media, kicked off the day one actions by welcoming the attendees and offering detailed convention info. The aforementioned monitor leads for Day One launched themselves and described the shows of their respective tracks.

Keynote Handle

Radia Perlman, Pioneer of Community Design, Inventor of the Spanning Tree Protocol and Fellow at Dell Applied sciences, offered a keynote entitled, The Many Aspects of “Id”. Based mostly on the historical past of training authentication strategies, Perlman offered a really insightful take a look at how the phrase “the id drawback” will not be as well-understood. She maintained that “most individuals suppose they know the definition of ‘id’…type of.” Perlman went on to explain the various dimensions of “id” together with: human and DNS naming; learn how to show possession of a human or DNS title; and what a browser must know to correctly authenticate an internet site. The idea of DNS is “stunning,” as she described, however in actuality, a browser search typically returns an obscure URL string. Due to this, Perlman as soon as fell sufferer to a rip-off whereas making an attempt to return her driver’s license. She then mentioned how it’s troublesome for people to correctly observe password guidelines, questioned the feasibility of safety questions, and beneficial that individuals ought to use id suppliers. Perlman characterised the Public Key Infrastructure (PKI) as “nonetheless loopy in spite of everything these years” and mentioned how a certificates authority, a tool that indicators a message saying “This title has this public key,” needs to be related to the registry from which DNS title is returned. She then described the issue with X.509 certificates such that Web protocols use DNS names, not X.500 names. “If having the ability to obtain at a particular IP handle is safe, we do not want any of this fancy crypto stuff,” Perlman stated. She then in contrast the top-down and bottom-up fashions with DNS hierarchical namespaces wherein every node within the namespace represents a certificates authority. Perlman beneficial the bottom-up mannequin, created by Charlie Kaufman circa 1988, as a result of organizations would not must pay for certifications. Additionally, there may be nonetheless a monopoly on the root stage and root can impersonate everybody within the top-down mannequin. In abstract, Perlman stated that nothing is sort of proper right this moment as a result of names are meaningless strings and acquiring a certification certificates is messy and insecure. In conclusion, Perlman urged to all the time begin with the query, “What drawback am I fixing?” and to check varied approaches. In a humorous second early in her presentation, she remarked, “I hate computer systems” when she had problem manipulating her presentation slides. Perlman is the writer of the books, Community Safety: Personal Communication in a Public World and Interconnections: Bridges, Routers, Switches, and Internetworking Protocols.

Highlighted Displays

Laying the Foundations for a Kappa Structure – The Yellow Brick Street by Sherin Thomas, Employees Software program Engineer at Chime. Thomas launched the Kappa Structure as an alternative choice to the Lambda Structure, each deployment fashions for information processing that mix a standard batch pipeline with a quick real-time stream pipeline for information entry. She questioned why the Lambda Structure continues to be in style primarily based on the underlying assumption of Lambda: “that stream processors can’t present consistency is not true because of fashionable stream processors like Flink.” The Kappa Structure has its roots from this 2014 weblog submit by Kafka Co-Creator Jay Kreps, Co-Founder and CEO at Confluent. Thomas characterised the Kappa Structure as a streaming first, single path resolution that may deal with real-time processing in addition to reprocessing and backfills. She demonstrated how builders can construct a multi-purpose information platform that may assist a spread of purposes on the latency and consistency spectrum utilizing rules from a Kappa structure. Thomas mentioned the Beam Mannequin, learn how to write to each streams and information lakes and learn how to convert an information lake to a stream. She concluded by sustaining that the Kappa Structure is nice, however it’s not a silver bullet. The identical is true for the Lambda Structure as a result of twin code path making it tougher to handle. A backward appropriate, price efficient, versatile and simple to handle information platform could possibly be a mixture of the Kappa and Lambda architectures.

Sigstore: Safe and Scalable Infrastructure for Signing and Verifying Software program by Billy Lynch, Employees Software program Engineer at Chainguard, and Zack Newman, Analysis Scientist at Chainguard. To handle the rise of safety assaults throughout each stage of the event lifecycle, Lynch and Newman launched Sigstore, an open-source mission that goals to offer a clear and safe strategy to signal and confirm software program artifacts. Software program signing can decrease the compromise of account credentials and package deal repositories, and checks {that a} software program package deal is signed by the “proprietor.” Nonetheless, it would not stop assaults corresponding to regular vulnerabilities and construct system compromises. Challenges with conventional software program signing embrace: key administration, rotation, compromise detection, revocation and id. Software program signing is presently broadly supported in open-source software program, however not broadly used. By default, instruments do not verify signatures attributable to usability points and key administration. Sigstore frees builders from key administration and depends on present account safety practices corresponding to two-factor authentication. With Sigstore, customers authenticate by way of OAuth (OIDC) and an ephemeral X.509 code signing certificates is issued to bind to the id of the person. Lynch and Newman offered overviews and demonstrations of Sigstore to incorporate sub-projects: Sigstore Cosign, signing for containers; Sigstore Gitsign, Git commit signing; Sigstore Fulcio, customers authentication by way of OAuth; Sigstore Rekor, an append-only transparency log such that the certificates is legitimate if the signature is legitimate; Sigstore Coverage Controller, a Kubernetes-based admission controller; and Sigstore Public Good Operations, a particular curiosity group comprised of a bunch of volunteer engineers from varied corporations collaborating to function and preserve the Sigstore Public Good occasion. Impressed by RFC 9162, Certificates Transparency Model 2.0, the Sigstore workforce supplies a cryptographically tamper-proof public log of every thing they do. The Sigstore workforce concluded by stating: there is no such thing as a single or one-size suits all resolution; software program signing is just not a silver bullet, however is a helpful protection; software program signing is essential for any DevSecOps; and builders ought to begin verifying signatures together with your individual software program. When requested by InfoQ about safety considerations with X.509, as mentioned in Perlman’s keynote handle, Newman said that certificates are very advanced and acknowledged that vulnerabilities can nonetheless make their manner into certificates. Nonetheless, Sigstore is happy with the mature libraries obtainable to course of X.509 certifications. Newman additionally said that an alternate could be to scrap the present apply and begin from scratch. Nonetheless, that method may introduce much more vulnerabilities.

Construct Options Quicker With WebAssembly Parts by Bailey Hayes, Director at Cosmonic. Hayes kicked off her presentation by defining WebAssembly (Wasm) Modules as: a compilation goal supported by many languages; just one .wasm file required for a whole software; and constructed from one goal language. She then launched the WebAssembly System Interface (WASI), a modular system interface for WebAssembly, that Hayes claims ought to actually be often called the WebAssembly Commonplace Interfaces as a result of it is troublesome to deploy modules in POSIX. She then described how Wasm modules work together with the WASI by way of the WebAssembly Runtime and the various ways in which a Wasm module could be executed, particularly: plugin instruments corresponding to Extism and Atmo, FaaS suppliers, Docker and Kubernetes. This was adopted by a demo of a Wasm software. Hayes then launched the WebAssembly Element Mannequin, a proposed extension of the WebAssembly specification that helps high-level varieties inside Wasm corresponding to strings, information and variants. After describing the constructing blocks of Wasm parts with the WASI, she described the method of learn how to construct a element adopted by a reside demo of an software, written in Go and Rust, that was constructed and transformed to a element.

Digital Threads for Light-weight Concurrency and Different JVM Enhancements by Ron Pressler, Technical Lead OpenJDK’s Venture Loom at Oracle. Pressler offered a complete background on the emergence of digital threads that included many mathematical theories. A comparability of parallelism vs. concurrency outlined efficiency measures in latency (time length) and throughput (job/time unit), respectively. For any steady system with long-term averages, he launched Little’s Legislation as L = λW, such that:

  • L = common variety of gadgets in a system
  • λ = common arrival fee = exit fee = throughput
  • W = common wait time in a system for an merchandise (length inside)

A comparability of threads vs. async/await when it comes to scheduling/interleaving factors, implementation and recursion/digital calls outlined the languages that assist these attributes, particularly: JavaScript, Kotlin and C++/Rust, respectively. After introducing asynchronous programming, syntactic coroutines (async/await) and the impression of context switching with servers, Pressler tied every thing collectively by discussing threads and digital threads within the Java programming language. Digital threads is a comparatively new characteristic that was initially launched in JDK 19 as a preview. After a second preview in JDK 20, digital threads will likely be a remaining characteristic in JDK 21, scheduled to be launched in September 2023. He concluded by defining the phrase “deceptive familiarity” as “there may be a lot to be taught, however there may be a lot to unlearn.”

Abstract

In abstract, day one featured a complete of 28 shows with matters corresponding to: architectures, engineering, language platforms and software program provide chains.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments