Home //

Peter Pavlovich

CTO, Censinet

Peter is the CTO of Censinet, based in Boston, MA.

Before joining Censinet, Peter was the Chief Software Architect at Embue Technologies, an Apartment Building Intelligence platform provider based in Boston, MA. Before joining Embue, Peter was the Principal Architect for EnerNOC Labs, a dedicated R&D group within EnerNOC, a Global provider of Demand Response and Energy Inteligence software located in Boston, MA. Prior to EnerNOC, Peter was a Principal Cloud Engineer with Kronos Incorporated, a global provider of on-premise and cloud-based workforce management solutions. Before Kronos, Peter held the position of Technical Director with Brokat Technologies, a global provider of mobile payment solutions. Prior to that, Peter was a Sr. Architect with GemStone Systems, providing distributed, enterprise-ready data grid and object persistence solutions and J2EE application server technologies.

Peter has a Honors degree in pure mathematics from McMaster University in Hamilton, Ontario, Canada. He is a technology addict and evangelist and has led many grass-roots efforts to introduce leading edge, advanced technologies and development processes.

A lifetime learner, Peter thrives on digesting new technologies and sharing his discoveries with others. He has authored and delivered numerous technical seminars on a variety of topics including React, VueJS, Angular, Ruby on Rails, Grails, Git, Meteor, Flex, GWT and AOP.

To find out more about Peter, check out his LinkedIn profile: https://www.linkedin.com/in/peterpavlovich

Presentations

Smart Speakers and BOTs are all the rage. Everyone is talking about (and TO) these devices and agents. How can you ensure that you are providing a secure integration so only authorized users get access to your User Experience Service endpoints? Join us for a deep dive into strategies and coding examples that you can use today!

Smart Speakers and BOTs are all the rage. Everyone is talking about (and TO) these devices and agents. How can you ensure that you are providing a secure integration so only authorized users get access to your User Experience Service endpoints? Join us for a deep dive into strategies and coding examples that you can use today!

Zero Trust Security and Authentication is on most CISOs, CTOs and architects top 10 'must do' lists and for good cause! Everywhere you read about bad actors, phishing and ransomware attacks with ever increasing frequency. Join us to learn how to implement one of the safest, most hacker-proof means of authenticating your users available today: Hardware-based authenticators!

Hardware based authenticators include security keys as well as device-resident bio-authenticators such as TouchId and Windows Hello. In this presentation, we will explore these devices, how they are accessed, managed and used to provide virtually hacker-proof authentication in modern web applications. We will discuss the current industry standards and specs which govern these devices and their use including FIDO and WebAuthn.

Next Generation User Engagement: Architecture and Best Practices - Video Preview

The traditional 'App' is dead. Engaging your users has never been more important than it is today. Competition for user attention is fierce and ruthless. Web Push Messaging, Smart Speakers and BOTs can thrill your users and give you the edge over your competitors. But it is imperative that you design your apps and services to be both user and developer friendly if you want to take advantage of these next generation engagement technologies. Join us to ensure you are armed with the latest best practices in designing and implementing these game changing devices which will let you delight and retain new and existing users of your services.

Engaging your users has never been more important than it is today. Competition for user attention is fierce and ruthless. Web Push Messaging, Smart Speakers and BOTs can thrill your users and give you the edge over your competitors. But it is imperative that you design your apps and services to be both user and developer friendly if you want to take advantage of these next generation engagement technologies. Join us to ensure you are armed with the latest best practices in designing and implementing these game changing interaction aids.

Resiliency, Reliability and Scalability: Tools and Techniques for the Enterprise - Video Preview

You built the app. You are ready to launch! But how do you proceed from there? You need to ensure that, once deployed, your app remains 'up', healthy, available and secure. For that, you are going to need some serious tools in your belt! Join us as we explore the tools and services you can use to complete your deployment stack and give you all of the monitoring and control that you need for a successful launch!

You built the app. You are ready to launch! But how do you proceed from there? You need to ensure that, once deployed, your app remains 'up', healthy, available and secure. For that, you are going to need some serious tools in your belt! Join us as we explore the tools and services you can use to complete your deployment stack and give you all of the monitoring and control that you need for a successful launch!

Smart Speakers, IVRs and BOTs: Establishing a Branded Digital Presence - Video Preview

The world is changing. Again. Smart Speakers and BOTs are everywhere these days. To ensure your place at the table, you must have an integrated, coordinated and seamless user experience across the entire spectrum of digital presence channels. Join us for an enlightening and interactive discussion of the strategies and tools available to help you establish a successful Branded Digital Presence that will set you apart from your competitors!

The world is changing. Again. Smart Speakers and BOTs are everywhere these days. To ensure your place at the table, you must have an integrated, coordinated and seamless user experience across the entire spectrum of digital presence channels. Join us for an enlightening and interactive discussion of the strategies and tools available to help you establish a successful Branded Digital Presence that will set you apart from your competitors!

The reality of realtime: Strategies and options for Technical Leaders - Video Preview

Join us for this thought provoking journey of discovery as we explore the real strategies that you can apply today as you architect your new or existing stack to satisfy the ever-increasing demand for 'real-time' applications and data services, fed by reactive data sources, regardless of your current technology choices.

Users are demanding applications which keep them informed of new events as soon as they happen. They are no longer willing to accept “Just hit the refresh button” or “It will update in a few minutes by itself” when demanding satisfaction of this new basic requirement. They are collaborating in real time, co-editing, co-authoring, 'co-labor-ating' with colleagues across the country and around the world, chatting over the phone or VOIP while working together via your app. They want their updates to travel from their laptop to their co-workers screens as fast as their voice reaches them through the phone. This is a tough requirement to meet, especially when trying to put a modern face on a legacy app or integrating a shiny, new, reactive app with a legacy, REST-based datasource.

And it is not just your end-users that are clamoring for reactive data sources. No, the requirements for server-to-server communication of changes to data or state have forever changed. REST no longer is King in the world of web services. REST just doesn't cut the mustard any longer. Users of your data services are also demanding more flexible, reactive options when consuming your endpoints. They want to be able to subscribe to specific data sets and be updated in near-real-time when changes occur without the need to poll your APIs for such changes.

Join us for this thought provoking journey of discovery as we explore the real strategies that you can apply today as you architect your new or existing stack to satisfy the ever-increasing demand for 'real-time' applications and data services, fed by reactive data sources, regardless of your current technology choices.

Many of our apps allow users to upload files which then become available for some users to (re)download. Viruses and malware could tailgate these files into your system and infect your users! Join us to learn how to avoid this potential fatal mistake!

Malware and virus-based attacks are on the rise. We have all seen the news stories all around us. How do you easily prevent damage to your corporate reputation and potentially devistating damage to your users from such threats?

Join us for an in-depth discussion and exploration of an effective architecture which detects, isolates and prevents downloading of infected uploaded files. We will also discuss other practical limits you should place on file uploads to avoid performance and UX issues.

VueJS [5]: Database Vue: Realtime and polled database integrations with VueJS - Video Preview

Vue is a new, powerful framework for building real-world applications. Enterprise ready, with a rich and diverse ecosystem, Vue is the currently ranked as the #2 front end framework and is rapidly gaining on its older brother, ReactJS. Join us for this fifth in a comprehensive series of sessions which will take you from blind novitiate to visionary VueJS expert in no time!

You have a great start on your app but now it is time for some care and feeding of your data-side. Join us in this next session in our VueJS presentation series as we explore some of the many options for providing data to your VueJS application including using GraphQL, Prisma and Apollo to implement persistence and realtime data pushes.

Everywhere you look, security breeches, phishing attacks and ransomware attacks are in the news and should be in the forefront of every technical leader's top 10 concerns. An effective strategy to combat such attacks and vulnerabilities begins with a zero-trust inspired authentication strategy, application architecture and deployment infrastructure.

Join us for an in depth analysis of the current options and best practices around implementing zero-trust compliant, modern authentication architectures and systems.

Everywhere you look, security breeches, phishing attacks and ransomware attacks are in the news and should be in the forefront of every technical leader's top 10 concerns. An effective strategy to combat such attacks and vulnerabilities begins with a zero-trust inspired authentication strategy.

Join us for an in depth analysis of the current options and best practices around implementing zero-trust compliant, modern authentication, architectures and systems.

ARE YOU READY TO GET STARTED?

Two and a half days of insightful sessions, inspiring ideas, and meeting your peers. Learn the skills and methods that will take your organization to the next level.

REGISTER NOW