XCONF - A conference ALL about technology

Register Now


XConf is a one-day conference that showcases the latest thinking from ThoughtWorks and friends on a broad range of technology topics. XConf provides a platform for passionate technologists in Hamburg who are looking for inspiration and a chance to network with their peers. There will be two tracks and more than 12 talks covering topics such as Continuous Delivery & Security, the powerfulness of correct user tracking, how to prepare for a tech lead role and many more!

There will also be ample time for discussions and networking. 


Please note: In order to confirm your space at the conference please don't forget to buy a ticket 

€35 - Early bird (until 7 June)

€50 - Full price

Click here for XConf Manchester

Watch the highlights from last year:

Time Title Speaker Break?
9.30 - 9.45amWelcome

9.45 - 10.45amKeynote: You can't be agile when you are knee deep in mud - Rachel Laycock

10.50 - 11.35amThe power of small abstractions - Josep M. BachHighway to heaven - Building Microservices in the cloud - Christian Deger & Wolf Schlegel

11.35 - 11.50amBreak
11.50 - 12.30pmPromise of a better future - a talk about a concurrency model called futures - Rahul Phulore
Securing the Pipeline - Continuous delivery without sacrificing security - Tom Duckering & Patrick Downey

12.30 - 1.30pmLunch
1.30 - 2.15pmTech Lead skills for developers - Patrick Kua - A New Approach to Content Management - Taheerah Atchia & Mircea Moise

2.20 - 3.05pmTrack Your User Actions: Learnings From A Massive E-Commerce Site - Anastasia Belozertseva
Dipping Your Toes Into Threat Modeling - Folker Bernitt

3.05 - 3.20pmBreak
3.20 - 4.05pmJourney Through the Looking Glass, and What I Found There - Chris Ford
Building a cross-platform development Tool using JavaScript - Erich Gamma

4.10 - 4.45pmOpen Space

from 4.45pmClose & Networking

Image Name Title Bio

Anastasia Belozertseva
Applications DeveloperAnastasia is a Consultant and Software Developer at ThoughtWorks. Problems excite her and she loves solving them through technology. While having experience with both backend and front-end systems, she has had more focus on the front-end side of things on her recent projects. She is a passionate advocate for diversity in STEM. She’s also a physics nerd and a keen traveller, and she never misses a chance to explore new places and meet new people.

Christian Deger

Josep M. Bach
Developer, Codegram

Joseph is a general enthusiast, based in Berlin but originally from Barcelona. He programs in Ruby, Clojure, Scala and sometimes Haskell when it's snowy outside. He loves functional programming, and among his obsessions you can find food, compilers, coffee, virtual machines, making music, cooking, programming language theory, food and more recently type theory and logic. And food. Together with his company, Codegram, he also organizes Full Stack Fest (Barcelona Ruby Conference and Barcelona Future JS).

Patrick DowneyConsultant

Patrick KuaLead Developer and Agile Coach

Patrick is the author of "The Retrospective Handbook" and "Talking with Tech Leads" who brings a balanced focus on people, organisation and technology to the organisations and teams he works with. He is a deep systems thinker, with over a decade of experience in agile and lean development processes. He considers himself a life-long learner, keen on travel and is often found in cafes where they serve good coffee. 

// Rachel LaycockMarket Technical PrincipalRachel is a Market Technical Principal at ThoughtWorks, New York. She has over 10 years of experience in systems development, having worked on a wide range of technologies and the integration of many disparate systems. At ThoughtWorks, she has coached teams on Agile and Continuous Delivery technical practices and has played the role of coach, trainer, technical lead, architect, and developer. She is also a member of the Technical Advisory Board to the CTO, which regularly produces the ThoughtWorks Technology Radar She is fascinated by problem solving and has discovered that people problems are often more difficult to solve than software ones.

Tom Duckering

Wolf Schlegel

Image Name Title
// Belozertseva.jpeg
Anastasia BelozertsevaApplications Developer[br]ThoughtWorks
Chris FordLead Developer[br]ThoughtWorks
Christian Deger
Coding Architect[br]Autoscout24
Erich GammaDistinguished Engineer[br]Microsoft
// Bernitt_248px-BW.jpg
Folker BernittDeveloper[br]ThoughtWorks

Josep M. Bach



Mircea MoiseSenior Developer[br]ThoughtWorks


Pat Downey

// Kua.png

Pat KuaLead Developer and Agile Coach[br]ThoughtWorks
Rachel LaycockMarket Technology Principal[br]ThoughtWorks
Rahul Phulore
Backend Engineer[br]SoundCloud
Taheerah AtchiaSenior QA[br]ThoughtWorks
Tom Duckering
Lead Consultant[br]ThoughtWorks
Wolf Schlegel
Coding Architect[br]ThoughtWorks

You can't be agile when you are knee deep in mud - Rachel Laycock

To be effective with agile software development, you need to have solid technical practices. But many organisations are still only implementing process changes to their software delivery cycles. Rachel will explain why you need technical practices like testing, refactoring, continuous delivery and evolutionary architecture. She will cover a brief history of these practices and explain how without them you will end up with "ball of mud architectures" that slow you down no matter what process changes you make. 

Tech Lead skills for developers - Patrick Kua

The skills you learn as a developer do nothing to prepare you for leading teams. When you suddenly find yourself in an Architect or a Tech Lead role, you're winging it, unsure about what the role entails and what skills you need. Come to this talk to find out how you can better prepare yourself for the unexpected.

Track Your User Actions: Learnings From A Massive E-Commerce SiteAnastasia Belozertseva

If done correctly, tracking user activity can be a powerful software quality tool. It can give us invaluable insights on what promotions and products are more popular in relation to others, what the preferences of the user are, and what features turn out to be more or less successful and performant.

I am currently a part of building one of the biggest e-commerce websites in Germany. Each team is responsible for collecting all the tracking data for the features they develop. My team’s approach to tracking has gone through multiple iterations and learnings that I would like to share, including answers we found to challenges like how to tackle code complexity in the frontend layer, where to store the tracking data, how to integration test the data collection, or how to find a common language between business analysts and software designers.

Securing the Pipeline - Continuous delivery without sacrificing security - Tom Duckering & Patrick Downey

In the past 5 years Continuous Delivery has gained much attention. Its benefits of rapid, iterative change are well understood, all the way up to board level. However, CD often encounters an adversary; Security. Protection of data and computer systems seems to stand on concepts like infrequent change, segregation of duties and bureaucratic heavyweight process . But are CD and Security really at odds?

We don’t think so. Whilst we’ll show you the dangers of unfettered CD pipelines and the risk of letting security spread fear. We will also share ways in which we’ve managed to balance speed and security in our pipelines–considering both the technical and organisational aspects. In fact we hope you’ll see that not only is there a way, but it’s a far better way.

The power of small abstractions - Josep M. Bach

Every time we solve an everyday programming problem we learn from its solution. When we come across a similar problem later on, we think “aha! I’ve seen this before! I know how to solve it!”. Many of us are also familiar with design patterns, which are abstractions that solve entire classes of problems.

There also exists, however, a different kind of pattern. But, as opposed to help you structure a whole compiler or business application, these patterns love hiding in small things like methods of functions, or even binary operations. They whisper to you when you concatenate two strings. They leave a trail of breadcrumbs every time you map over a list.

These abstractions have superpowers, too. They can separate the what from the when, or even from the how. They can add together things other than numbers. They can control time, or take over the control flow of your program entirely.

In this talk you will discover the amazing power of small abstractions. After that you’ll start hearing their whispers and seeing their breadcrumb trails. And only then you will be ready to let them unfold their full potential in your programs.

Building a cross-platform development Tool using JavaScript - Erich Gamma

Microsoft recently announced Visual Studio Code a new choice of developer tool that combines the simplicity of a code editor with the best of what developers need for their core code-edit-debug cycle. Under the covers Visual Studio Code is a JavaScript application. We started the journey four years ago developing components for writing code inside a browser using plain JavaScript. Along the way our code base became one of the largest TypeScript code bases. Eventually, we let the components run as normal desktop applications building on GitHub's Electron framework. Finally, the architecture evolved towards a tools service architecture which enables rich code analysis for C# and TypeScript. In this talk I'll look back on this fun journey and describe what practices have worked for us to ship such an application. - A New Approach to Content Management - Taheerah Atchia & Mircea Moise

Managing content today can be fast, slick and extensible. When it came to handling content on the website, we wanted to discard the shackles of a bloated, off-the-shelf CMS solution and come up with something lightweight but powerful, that could cope with translations and keeping track of content status. Now open sourced, is the product of this idea, and this talk explores our journey in developing, our approach to handling content using Git, and what we’ve learned along the way.

Highway to heaven - Building Microservices in the cloud - Christian Deger & Wolf Schlegel

Fed up with stop and go in your data center? Why not shift into overdrive and pull into the fast lane? Learn how AutoScout24 are building their Autobahn in the cloud to become the market leader in Europe's vehicle classified business. 

Reinventing themselves by making a radical transition from monoliths to microservices, from .NET on Windows to Scala on Linux, from data center to AWS and from built by devs and run by ops to a devops mindset.
While the current stack keeps running, ever more microservices will go live as you listen to stories from the trenches.

Key takeaways from this talk include: How to...
… become cloud native
… evolve the architecture
… create “you build it you run it” teams
… involve business people in the transformation

Journey Through the Looking Glass, and What I Found There - Chris Ford

Lenses are a beautiful functional abstraction that subsume the getters and setters of object languages like Ruby and Java - without relying on mutable data. This is important, because mutable data impedes reuse and is a key cause of complexity and bugs. Lenses are highly relevant to Clojure development, because they bridge the gap between the immutable data structures that functional programming provides and convenient access for getting things done. One challenge with implementing Lenses for Clojure is that they have traditionally been used in languages with strong type systems like Haskell. In this talk, I will reflect upon the lessons learned porting concepts originally framed in terms of types to a dynamic language like Clojure.
Promise of a better future - a talk about a concurrency model called futures - Rahul Phulore

Concurrency is hard. Necessarily so. However our tools make it harder than it has to be. Promises and futures is a concurrency abstraction that cater to many common use cases for concurrency, and make writing correct and concurrent software easier. In this talk, we will see what the status quo looks like, what the problems with the existing approaches are, and how promises and futures can help us do better. I will talk about what we learned in past two and half years, about where these techniques shine, and where you are better off using some other tools. The examples will make use of Java, JavaScript, and Scala, and some knowledge of functional programming would help digest concepts better. 
Dipping Your Toes Into Threat Modeling - Folker Bernitt

Security, though part of software development since its early days, has recently become increasingly important. Still, thinking about security is often something that only happens at the beginning and at the end of a project. During the early phase of a project, a lot of concerns and possible mitigations are brought up on the drawing table in a euphoric atmosphere. Then a (longer) period of development often follows, i.e. implementation. When the release is looming, someone brings up penetration testing, which then produces a bunch of issues that have to be fixed before the initial go-live. Is there a better approach to your project’s security than the notorious “security sandwich”? Is there a more structured way to identify threats and make threat modeling part of every story and a continuous project companion? Are there tools that might provide you a little bit of support? How can you best decide whether a threat is a real risk for your company? This talk tries to give a brief overview of threat modeling and provide a good starting point for your project.


Eifflerstraße 43, 22769 Hamburg

<iframe src="!1m18!1m12!1m3!1d2369.7319515000263!2d9.960122499999999!3d53.5625523!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x47b18f42b81b4c73%3A0x8af7c3f9c95f5eb!2sEifflerstra%C3%9Fe+43%2C+22769+Hamburg%2C+Germany!5e0!3m2!1sen!2s!4v1431361093145" width="438" height="293" frameborder="0" style="height: 293px !important; border:0"></iframe><br/><small><a href=",+22769+Hamburg,+Germany/@53.5625523,9.9601225,17z/data=!4m7!1m4!3m3!1s0x47b18f42b81b4c73:0x8af7c3f9c95f5eb!2sEifflerstra%C3%9Fe+43,+22769+Hamburg,+Germany!3b1!3m1!1s0x47b18f42b81b4c73:0x8af7c3f9c95f5eb!6m1!1e1" style="color:#0000FF;text-align:left">View Larger Map</a></small>//

All attendees, speakers and volunteers at our conference are required to agree with the following code of conduct. Organisers will enforce this code throughout the event. We are expecting cooperation from all participants to help ensuring a safe environment for everybody.

tl;dr: Be excellent with each other

Need Help?

Please contact Bettina on [email protected]

The Quick Version

Our conference is dedicated to providing a harassment-free conference experience for everyone, regardless of gender, age, sexual orientation, disability, physical appearance, body size, race, or religion (or lack thereof). We do not tolerate harassment of conference participants in any form. Sexual language and imagery is not appropriate for any conference venue, including talks, workshops, parties, Twitter and other online media. Conference participants violating these rules may be sanctioned or expelled from the conference without a refund at the discretion of the conference organisers.

The Less Quick Version

Harassment includes offensive verbal comments related to gender, age, sexual orientation, disability, physical appearance, body size, race, religion, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention.

Participants asked to stop any harassing behavior are expected to comply immediately.

If a participant engages in harassing behavior, the conference organisers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.

If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of conference staff immediately. Conference staff can be identified as they'll be wearing ThoughtWorks branded apparel or marked badges.

Conference staff will be happy to help participants contact hotel/venue security or local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. We value your attendance.

We expect participants to follow these rules at conference and workshop venues and conference-related social events.

Original source and credit: & The Ada Initiative. This work is licensed under a Creative Commons Attribution 3.0 Unported License

XConf Verhaltensregeln

Alle Besucher_innen, Redner_innen und Freiwilligen auf dieser Konferenz werden aufgefordert, sich an folgende Verhaltensregeln zu halten. Diese werden vom Personal auf der gesamten Konferenz durchgesetzt. Wir erbitten uns die Mitarbeit aller Anwesenden, um diese Konferenz zu einem sicheren und angenehmen Ort für alle zu machen.

Brauchst du Hilfe?

Melde dich gerne bei Bettina unter [email protected].

tl;dr: Be excellent with each other

Die Kurzfassung

Wir möchten unseren Teilnehmer_innen eine belästigungsfreie Konferenzerfahrung bieten, unabhängig von Geschlecht, sexueller Orientierung, Behinderung, Aussehen, Körperbau, Ethnizität oder Religionszugehörigkeit (oder Nichtvorhandensein einer solchen). Wir tolerieren keinerlei Belästigung von Konferenzbesucher_innen. Sexualisierte Sprache und Darstellungen sind auf der Konferenz unerwünscht. Dies umfasst den Veranstaltungsort, die Vorträge, Workshops, Socialising zwischen den Vorträgen, sowie Twitter und andere Medien. Teilnehmer_innen, die gegen diese Regeln verstoßen, müssen mit Sanktionen durch das Veranstaltungspersonal rechnen, inklusive eines Verweises der Konferenz ohne Anspruch auf Rückerstattung des Eintrittspreises.

Die längere Fassung

„Belästigung“ umfasst unter anderem beleidigende Aussagen über Geschlecht, sexuelle Orientierung, Behinderung, körperliches Aussehen wie Körperbau, Ethnizität oder Religionszugehörigkeit (oder Nichtvorhandensein einer solchen), sexualisierende Darstellungen in öffentlichen Räumen, bewusste Einschüchterung, Stalking, Verfolgung, unerwünschtes Fotografieren oder Aufnehmen, wiederholte Störung von Vorträgen und anderen Veranstaltungen, unerwünschten körperlichen Kontakt und unerwünschte sexuelle Aufmerksamkeit.

Teilnehmer_innen, die wegen solchen Verhaltens ermahnt werden, haben dieses sofort einzustellen.

Sollten Teilnehmer_innen durch belästigendes Verhalten auffallen, steht es dem Konferenzpersonal frei, entsprechende Maßnahmen zu ergreifen, die es für angemessen hält. Dies schließt Ermahnungen bis hin zum Verweis von der Konferenz ein. Im Falle eines Verweises besteht kein Anspruch auf Rückerstattung des Eintrittspreises.

Solltest du dich belästigt fühlen oder mitbekommen, dass jemand anders belästigt wird oder sonstige Probleme auftreten, wende dich bitte sofort an ein Mitglied des Veranstaltungspersonals. Diese sind an ihren entsprechend markierten T-Shirts oder Namensschildern zu erkennen.

Mitglieder des Konferenzpersonals können euch bei allen Problemen helfen. Dies schließt Kontakt mit dem Security-Personal des Veranstaltungsorts und/oder den Behörden mit ein. Darüber hinaus können wir Begleitungen vermitteln und auch weitere Maßnahmen ergreifen, um Belästigten einen sicheren und angenehmen Besuch der Konferenz zu ermöglichen. Wir schätzen deine Anwesenheit sehr.

Wir erwarten von allen Teilnehmern die Einhaltung dieser Regeln auf der gesamten Konferenz, den Workshops und auf allen weiteren Zusammenkünften im Zusammenhang mit dieser Konferenz.

Quelle: & The Ada Initiative

Dieses Werk steht unter der Creative Commons Attribution 3.0 Unported License

Form Title


Aenean Parte

Aenean lacinia bibendum nulla inceptos bibendum fusce sed consectetur.

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.


Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.


OCT 23
Time Title Speaker