09:00
09:10
09:20
09:30
09:40
09:50
10:00
10:10
10:20
10:30
10:40
10:50
11:00
11:10
11:20
11:30
11:40
11:50
12:00
12:10
12:20
12:30
12:40
12:50
13:00
13:10
13:20
13:30
13:40
13:50
14:00
14:10
14:20
14:30
14:40
14:50
15:00
15:10
15:20
15:30
15:40
15:50
16:00
16:10
16:20
16:30
16:40
16:50
17:00
17:10
17:20
17:30
17:40
17:50
18:00
18:10
18:20
18:30
18:40
18:50
19:00
19:10
19:20
19:30
19:40
19:50
Framework hell π¨ - hvordan bidro Spring Boot Actuator til Γ₯ lekke kjΓΈretΓΈysdata om 800k kunder i Europa
π 15:25-15:45 20m β‘ πͺ Room VI SnΓΈkaos, appkrΓ¦sj og total togstans β Vys digitale mareritt
π 13:55-14:15 20m β‘ πͺ Room VI Open source-sikkerhet: sandboxing og permission-modeller som siste forsvarslinje
π 15:00-15:20 20m β‘ πͺ Room VI Git Hinsides Push & Pull
π 11:00-11:20 20m β‘ πͺ Room VI Why Secrets Belong in Git
π 11:25-11:45 20m β‘ πͺ Room VI Dark Patterns to Rule Them All
π 13:00-13:45 45m π¬ πͺ Room IV A Story of a Painful Migration: Upgrading Java (11β21+) is Easy; Upgrading Spring (4β6) and Hibernate (5β6) is NOT
π 15:40-16:25 45m π¬ πͺ Room IV Kotlin variance modifiers and Covariant Nothing Object pattern
π 11:40-12:25 45m π¬ πͺ Room III Software vi kan leve med
π 17:00-18:00 60m π¬ πͺ Room I 30 Years of Java - How Did We Get Here?
π 10:20-11:20 60m π¬ πͺ Room I Lessons from the Columbia Space Shuttle Disaster for Software Development
π 09:00-10:00 60m π¬ πͺ Room I From Ballots to Code: Exploring Election Security
π 14:20-15:20 60m π¬ πͺ Room VII Top 10 REST API Design Pitfalls
π 11:40-12:40 60m π¬ πͺ Room VII Bruk av Fakes - The Good, the Bad and the Ugly
π 14:20-15:20 60m π¬ πͺ Room III 09:00
09:10
09:20
09:30
09:40
09:50
10:00
10:10
10:20
10:30
10:40
10:50
11:00
11:10
11:20
11:30
11:40
11:50
12:00
12:10
12:20
12:30
12:40
12:50
13:00
13:10
13:20
13:30
13:40
13:50
14:00
14:10
14:20
14:30
14:40
14:50
15:00
15:10
15:20
15:30
15:40
15:50
16:00
16:10
16:20
16:30
16:40
16:50
17:00
17:10
17:20
17:30
17:40
17:50