Dmytro Ovcharenko Solutions Architect
I have over 10 years of experience in IT industry. Strong experience in web enterprise systems (clustering, distribution, resilience, failover). I have strong experience in OOD, OOP, component design, and design patterns. I have strong understanding of the object-oriented concepts and design patterns. Most of my technological expertise lies in the area of WEB/Mobile technologies.I have good understanding Service Oriented concepts and experience with Agile, Scrum, XP, RUP, and Software Development Life Cycle (SDLC). 
Architecture Ramp-up program
Topic about our Architecture ramp-up program: why, who can attend, results, etc

Andriy Shapochka System Architect
Andriy - System Architect at SoftServe. Lives in Chernivtsi.
Case Study: Moving Legacy Business to Cloud
We will discuss the architectural perspective of an actual case of successful(?!) move of the legacy on-premise platform to the AWS cloud and lessons learned along the way.

The video is only for internal usage.

Denys Doronin Technical Leader
Blockchain enthusiast, mobile blockchain technical leader
IBM Call For Code: How to f**k up and mega-china-coders
This year SoftServe blockchain team took participation in IBM call for code event - hackathon dedicated to natural disaster mitigation. We've provided a complete blockchain solution hosted on IBM Watson, so it's time to share the implementation and architecture details and discuss outcomes

Petro Sasnyk Architect
Multidisciplinary Solutions Architect, Engineering Manager, Technical Product Manager with experience in multiple business domains.
The lights and darks of an embedded analytics market
Brief story how we were looking for embedded analytics platform, choose Power BI, regret of it and still using it.

Anastasiia Voitova Product Engineer at Cossack Labs – Software engineer with a wide background.
– Focused on cryptography and applied security, now I'm building security tools for protecting data in both huge infrastructures and small applications. 
– Maintaining open-source security library Themis. 
– Consulting and conducting workshops for other companies to make their software more secure. 
– Speaking often at international conferences. 
Protecting sensitive data in modern multi-component systems
We will take a deep look into the data lifecycle, risk, trust and how they affect security architecture, encryption, and key management techniques. We will illustrate typical SDL patterns: narrowing trust, monitoring intrusions, zero knowledge architectures, distributing trust. 
The goal of the talk is to give a general thinking framework and enough ideas about tools for senior engineers to plan their solutions securely, regarding sensitive data contained within.

Ivan Kutuzov Senior Software Engineer
More than 13 years of experience at development. Main technology is Golang on a daily basis for more than 3 years. For that time have launched several systems (from scratch till maintenance and regular releases) and took part in architecture design/assessment of other projects at a background. Supports community development at Ukraine and lead Lviv's part. Investigates and applies the best practices that make work with code base more easier and pleasant.
Architecture components of cloud-based solutions
Cloud become one of the main platforms nowadays. It helps to scale and deal with different load with low efforts. Does this influence of the way how a service should be built? Let’s go through existing architectural patterns that may help to solve your problem.

Illya Kravchuk Application Architect
Currently I'm working in Software Development office and most of my work now related to the software development practice excellence which includes different kind of project assessments, code reviews, development of best practice as well as development of SDO Software Development Platform
SDO Software Development Platform
SDO Software Development Platform is a new, advanced solution to accelerate software development. Imagine yourself at a Market Place, like AppStore, where you, as Technical Lead or Architect, can select automatization, acceleration, and optimization for your project. Platform will use data analysis to provide advice, automate routines, identify artifacts worth to reuse or pitfalls to be avoided.

Video is only for internal usage!

Humberto Cervantes Professor of Software Engineering at Universidad Autonoma Metropolitana - Iztapalapa
Dr. Humberto Cervantes is a professor and researcher at Universidad Autónoma Metropolitana–Iztapalapa in Mexico City. His primary research interests include software architecture development methods and their adoption in industrial settings. Dr. Cervantes is also a consultant for software development companies in topics related to software architecture. He holds the Software Architecture Professional and ATAM Evaluator certificates from the SEI. He is the co-author of the book "Designing Software Architectures: A Practical Approach".
Approaching Security from an Architecture First Perspective
While software security is an increasing concern for software and system architects, few architects approach this quality concern strategically. Architects and developers typically focus on functionality, and they often apply security as a Band-Aid solution after developing an application. In this presentation, we report on three case studies of real-world projects—two industrial and one open source—for which we attempted to measure the consequences of three architectural approaches to security. These architectural approaches differ on the degree of adoption of security frameworks for the development projects: “no adoption,” where no security frameworks are used; “partial adoption,” where security frameworks are introduced in the middle of the lifetime of a software application; and “full adoption,” where one or more security frameworks are adopted from the beginning of the development process. We conducted the case studies by interviewing architects about the security tactics implemented in their projects and by scanning the systems to identify their vulnerabilities using a commercial security scanner (IBM’s AppScan). The results of our case studies indicate that a strategic, system-wide, architectural approach to security, implemented through the partial or full adoption of security frameworks, results in the best outcome from both security and maintenance cost perspectives.