Prezentacja z meetupu grupy "Uszanowanko Programowanko", tematyka Bezpieczeństwo: http://www.uszanowanko.pl/bezpieczenstwo
Autor: James III Ruffer
For new and veteran PHP programmers alike, it’s often difficult to find the right place to ask questions and find the best answers and solutions to programming challenges. This month, Ben Ramsey takes us on a journey through the PHP Community to discover the websites the experts use to get PHP news and information and the places they go to ask for help (because even experts need help). He’ll wrap up the talk with a brief who’s who in the PHP Community, introducing you to some of the core developers and familiar faces around the community.
Being productive is all about being in the zone. There are many distractions from that goal, both internal and external. This talk will give you several tips and tricks of the trade to avoid those distractions that are avoidable and tactics to mitigate the effects of those that are unavoidable.
Some of the concepts touched upon include: remote working, co-working, office hours, meeting schedules, the fear of success and the fear of failure.
This isn't a PHP specific talk!
Dave Ross gave a presentation on profiling PHP and JavaScript performance. He recommended using the Xdebug profiler for PHP, which provides profiling information that can be viewed in tools like Webgrind. For JavaScript profiling, he suggested using the Firebug console to turn profiling on and off and view profiling results within the Firebug interface. The goal of profiling is to identify sections of code to optimize for better speed or lower memory usage.
Raising the bar 2, Using Puppet to install enterprise middleware applicationsBert Hajee
This document discusses raising the bar by using EasyType to create custom Puppet types. It provides an overview of how to install EasyType, create a module, define a type with properties and parameters, generate the type, and test it by creating and destroying resources. Creating custom types with EasyType reduces the need for extensive Puppet knowledge and allows users to focus on defining object configurations.
En esta charla vamos a hablar de desarrollo web front-end. Empezaremos por entender bien en qué consiste el desarrollo front-end y por qué las empresas están contratando mucho este perfil profesional. Haremos un repaso de las tecnologías que se utilizan para desarrollo front-end, desde HTML semántico, pasando por preprocesadores CSS, hasta ES6 y librerías como React. Y también revisaremos qué herramientas que utiliza un desarrollador front-end en 2018, desde un editor decente, las devtools del navegador, hasta automatizadores de tareas como gulp. Al final tendrás una buena perspectiva de la profesión de front-end y cómo aúna habilidades técnicas de programación con otras muy distintas, como estética visual y atención al detalle.
This document provides information about the book "Mosby's Review Questions & Answers For Veterinary Boards: Ancillary Topics" by Paul Pratt VMD. The book has 312 pages and was published in 1997 by Mosby. It contains review questions and answers to help readers prepare for veterinary board exams in ancillary topics.
This document discusses using the Stimulus JavaScript framework for frontend development. Stimulus is described as having modest ambitions and not seeking to take over the entire frontend like larger frameworks. It is designed to augment HTML with minimal behavior rather than handle rendering. Key aspects discussed include controllers, actions, targets, values, and the framework's lifecycle methods. The document suggests Stimulus lets developers easily write JavaScript and know where it should go.
This document discusses strategies for maximizing benefits from frequent flyer programs, such as earning elite status or upgrades, through mileage runs and credit card signups. It notes that these programs are run as cartels by major airlines and encourages finding creative routing solutions to earn miles without spending excessively on unnecessary flights. Tools mentioned include mileage calculators and frequent flyer discussion forums.
Being productive is all about being in the zone. There are many distractions from that goal, both internal and external. This talk will give you several tips and tricks of the trade to avoid those distractions that are avoidable and tactics to mitigate the effects of those that are unavoidable.
Some of the concepts touched upon include: remote working, co-working, office hours, meeting schedules, the fear of success and the fear of failure.
This isn't a PHP specific talk!
This document discusses how to report issues with WordPress. It covers basic troubleshooting steps like defining the problem, reproducing it, identifying solutions, and testing solutions. It also reviews determining if an issue is a bug and the process for reporting bugs to WordPress Trac or forums. Key steps for reporting include providing a detailed description and steps to reproduce the issue along with relevant version information.
10 things you are doing wrong in JoomlaAshwin Date
1. File paths in Joomla templates and components should use forward slashes instead of DS to separate directories for readability and compatibility across operating systems.
2. PHP files should not include a closing PHP tag at the end to avoid corrupting JSON or HTTP headers.
3. Components and templates should be tested with debug and SEF URLs turned on to avoid issues when these settings are enabled.
State Of The Art Image Recognition In 7 Lines Of PythonNejc Zupan
In the past few months, I’ve been going through the latest updates in the Artificial Intelligence field. Turns out that the tooling has matured considerably and it is no longer required that one has a Ph.D. in math to use deep learning and similar techniques. Quite on the contrary! Any Python coder, with basic high school math, can build and train highly accurate models for categorizing images, translation machines, recommender systems and more.
This document discusses developing web applications for both humans and robots. It covers several key points about how each interact with websites. For humans, it mentions various attributes like feelings, habits, languages, cultures and impairments that must be accounted for in web design. It then covers various types of web robots like crawlers, spiders and both good and bad robots. It provides recommendations for using a robots.txt file to control how robots interact with a website and discusses other tags and techniques for managing robots.
The document promotes the features of the PhpStorm IDE for developing WordPress plugins and themes. It summarizes the major features such as intelligent PHP and HTML/CSS editing, debugging and testing tools, code formatting and refactoring tools, and support for version control and databases. The document encourages developers to try the 30-day free trial of PhpStorm.
Rails is not enough, by Javier Ramirez, at Conferencia Rails 2010 in Madrid, ...javier ramirez
We rails people tend to think of Rails as the center-piece of web development. The same thing can be said of .net, Spring/Java Server Faces, Drupal, Python or name-your-web-framework-of-choice-here people.
Web frameworks are just a component of web applications, and if you want to succeed you better know the miriads of other components beyond your rockstar code.
In my session I will talk about things you must take into account and tools/techniques you should master if you want to make a difference in web development, independently of your development language/framework.
Talk delivered at conferencia rails 2010 in Madrid, Spain.
This document provides information about the speaker, including their name, contact information, work experience, projects, and interests. They are a security researcher who previously worked as a VA and now works for HP Application Security Center. They enjoy talking about hacking and drinking beer and gin and tonics. The document also outlines an upcoming workshop they will be conducting on web hacking tools and techniques.
This presentation discusses PHP and argues that it does not inherently suck. While PHP has some flaws in its early design and inconsistent naming conventions, the quality of code depends more on the programmer than the language. The presentation provides tips for writing better PHP such as learning the language thoroughly, testing code, using version control, sharing and reusing quality code from others, adopting a clear coding style, and using frameworks to enforce best practices. It acknowledges PHP is improving with new features in version 5.4 and that the overall quality of PHP programming depends more on how developers utilize tools and techniques than criticisms of the language itself.
How do volunteer open-source projects create and maintain so many
compelling, competitive products? What is the Open Source Secret
Sauce? Join open-source insider, Ted Husted, as he takes us deep
inside the Apache Software Foundation, to show how the sausages are
made.
In this session, you will learn
* Why open source matters;
* How open source development works at the ASF;
* What makes open source projects successful.
Lincoln Baxter presented on URL-rewriting for improving security and usability. He discussed common issues like missing resources, unreadable URLs, revealing sensitive information, and validating user input. He demonstrated how URL-rewriting can help with redirection, parameterization, validation, and more. While client-side applications offer alternatives, URL-rewriting remains important for bookmarks, context, and server-side functionality.
Legal and efficient web app testing without permissionAbraham Aranguren
The document discusses efficient and legal web application testing techniques that can be performed without permission. It introduces the Open Web Testing Framework (OWTF) which allows pentesters to run tools and analyze results in parallel through a reporting interface. OWTF utilizes "cheating tactics" like passive information gathering and semi-passive testing to identify vulnerabilities and attack vectors before the official test begins. The document provides examples of how tools in OWTF can be used to profile websites, discover entry points, and identify vulnerabilities in a pre-engagement or reconnaissance phase without active interaction with the target.
The document discusses various topics related to becoming a better developer such as choosing the right programming language, following coding standards, writing code for humans, creating goals, and whether to focus on web or mobile development. It also touches on native vs. cross-platform mobile development and some challenges of learning programming like the fact that learning never finishes and "no pain, no gain". The author introduces himself as having 22 years of experience writing code and founding a software company.
Make your app idea a reality with Ruby On RailsNataly Tkachuk
This document provides an overview of Ruby on Rails including what it is, how to get started, learning resources, and why it may be suitable for building an app idea. Ruby on Rails is an open-source web application framework that is simple to learn, promotes programmer happiness through conventions, and has a large ecosystem of plugins and a supportive community. The document outlines options for learning Ruby on Rails such as online courses, books, screencasts, and community resources and emphasizes that it offers development simplicity and a lifestyle that can help bring ideas to life.
If you want to build cool stuff and not just be a code monkey in a cubicle, then I recommend you start hacking today.
This is my intro talk for Yahoo's HackU program.
The document discusses Joel Spolsky's "Joel Test" which evaluates software development teams. It applies the test's 12 questions to PHP teams and provides recommendations. Key points include using source control, continuous integration, bug tracking, specifications, estimating tasks, and providing developers with resources to do their jobs.
PHP is the most commonly used server-side programming and deployed more than 80% in web server all over the world. However, PHP is a 'grown' language rather than deliberately engineered, making writing insecure PHP applications far too easy and common. If you want to use PHP securely, then you should be aware of all its pitfalls.
This talk was originally titled “I'm tired of defenders crying”, but thought better of it. This talk is about the tidbits that I've seen piecemeal across the multitude of businesses big and small that were innovated and highly effective, yet free, or mostly free and stopped me dead in my tracks. Going over a number of free, or nearly free methods, tactics, and software setups that will cut down intrusions significantly that you can deploy or start deployment of the hour after the talk is done.
Mubix is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United States Marine.
This document provides suggestions for free or low-cost defenses that can frustrate attackers, including enabling EMET, blocking Java user agents at the proxy, port forwarding honeypots, authenticated splash proxies, and deploying "evil canaries" to detect intruders on the network. It emphasizes logging, vulnerability scanning, and getting penetration testers and the help desk involved in security efforts. The document aims to demonstrate mostly free techniques that can significantly improve the security of an organization.
The document discusses DDoS attacks and countermeasures. It begins with an overview of common DDoS attack types like botnet attacks and distributed reflected DNS attacks. It then discusses challenges like how easy it is to build botnets and buy them online. The document also covers the xFlash attack technique and new capabilities in Flash 9. The second part discusses countermeasures, emphasizing performance tuning, caching, scalability through architecture like shared nothing, and implementing defense in depth. It concludes by thanking the audience and asking for questions.
This document discusses strategies for maximizing benefits from frequent flyer programs, such as earning elite status or upgrades, through mileage runs and credit card signups. It notes that these programs are run as cartels by major airlines and encourages finding creative routing solutions to earn miles without spending excessively on unnecessary flights. Tools mentioned include mileage calculators and frequent flyer discussion forums.
Being productive is all about being in the zone. There are many distractions from that goal, both internal and external. This talk will give you several tips and tricks of the trade to avoid those distractions that are avoidable and tactics to mitigate the effects of those that are unavoidable.
Some of the concepts touched upon include: remote working, co-working, office hours, meeting schedules, the fear of success and the fear of failure.
This isn't a PHP specific talk!
This document discusses how to report issues with WordPress. It covers basic troubleshooting steps like defining the problem, reproducing it, identifying solutions, and testing solutions. It also reviews determining if an issue is a bug and the process for reporting bugs to WordPress Trac or forums. Key steps for reporting include providing a detailed description and steps to reproduce the issue along with relevant version information.
10 things you are doing wrong in JoomlaAshwin Date
1. File paths in Joomla templates and components should use forward slashes instead of DS to separate directories for readability and compatibility across operating systems.
2. PHP files should not include a closing PHP tag at the end to avoid corrupting JSON or HTTP headers.
3. Components and templates should be tested with debug and SEF URLs turned on to avoid issues when these settings are enabled.
State Of The Art Image Recognition In 7 Lines Of PythonNejc Zupan
In the past few months, I’ve been going through the latest updates in the Artificial Intelligence field. Turns out that the tooling has matured considerably and it is no longer required that one has a Ph.D. in math to use deep learning and similar techniques. Quite on the contrary! Any Python coder, with basic high school math, can build and train highly accurate models for categorizing images, translation machines, recommender systems and more.
This document discusses developing web applications for both humans and robots. It covers several key points about how each interact with websites. For humans, it mentions various attributes like feelings, habits, languages, cultures and impairments that must be accounted for in web design. It then covers various types of web robots like crawlers, spiders and both good and bad robots. It provides recommendations for using a robots.txt file to control how robots interact with a website and discusses other tags and techniques for managing robots.
The document promotes the features of the PhpStorm IDE for developing WordPress plugins and themes. It summarizes the major features such as intelligent PHP and HTML/CSS editing, debugging and testing tools, code formatting and refactoring tools, and support for version control and databases. The document encourages developers to try the 30-day free trial of PhpStorm.
Rails is not enough, by Javier Ramirez, at Conferencia Rails 2010 in Madrid, ...javier ramirez
We rails people tend to think of Rails as the center-piece of web development. The same thing can be said of .net, Spring/Java Server Faces, Drupal, Python or name-your-web-framework-of-choice-here people.
Web frameworks are just a component of web applications, and if you want to succeed you better know the miriads of other components beyond your rockstar code.
In my session I will talk about things you must take into account and tools/techniques you should master if you want to make a difference in web development, independently of your development language/framework.
Talk delivered at conferencia rails 2010 in Madrid, Spain.
This document provides information about the speaker, including their name, contact information, work experience, projects, and interests. They are a security researcher who previously worked as a VA and now works for HP Application Security Center. They enjoy talking about hacking and drinking beer and gin and tonics. The document also outlines an upcoming workshop they will be conducting on web hacking tools and techniques.
This presentation discusses PHP and argues that it does not inherently suck. While PHP has some flaws in its early design and inconsistent naming conventions, the quality of code depends more on the programmer than the language. The presentation provides tips for writing better PHP such as learning the language thoroughly, testing code, using version control, sharing and reusing quality code from others, adopting a clear coding style, and using frameworks to enforce best practices. It acknowledges PHP is improving with new features in version 5.4 and that the overall quality of PHP programming depends more on how developers utilize tools and techniques than criticisms of the language itself.
How do volunteer open-source projects create and maintain so many
compelling, competitive products? What is the Open Source Secret
Sauce? Join open-source insider, Ted Husted, as he takes us deep
inside the Apache Software Foundation, to show how the sausages are
made.
In this session, you will learn
* Why open source matters;
* How open source development works at the ASF;
* What makes open source projects successful.
Lincoln Baxter presented on URL-rewriting for improving security and usability. He discussed common issues like missing resources, unreadable URLs, revealing sensitive information, and validating user input. He demonstrated how URL-rewriting can help with redirection, parameterization, validation, and more. While client-side applications offer alternatives, URL-rewriting remains important for bookmarks, context, and server-side functionality.
Legal and efficient web app testing without permissionAbraham Aranguren
The document discusses efficient and legal web application testing techniques that can be performed without permission. It introduces the Open Web Testing Framework (OWTF) which allows pentesters to run tools and analyze results in parallel through a reporting interface. OWTF utilizes "cheating tactics" like passive information gathering and semi-passive testing to identify vulnerabilities and attack vectors before the official test begins. The document provides examples of how tools in OWTF can be used to profile websites, discover entry points, and identify vulnerabilities in a pre-engagement or reconnaissance phase without active interaction with the target.
The document discusses various topics related to becoming a better developer such as choosing the right programming language, following coding standards, writing code for humans, creating goals, and whether to focus on web or mobile development. It also touches on native vs. cross-platform mobile development and some challenges of learning programming like the fact that learning never finishes and "no pain, no gain". The author introduces himself as having 22 years of experience writing code and founding a software company.
Make your app idea a reality with Ruby On RailsNataly Tkachuk
This document provides an overview of Ruby on Rails including what it is, how to get started, learning resources, and why it may be suitable for building an app idea. Ruby on Rails is an open-source web application framework that is simple to learn, promotes programmer happiness through conventions, and has a large ecosystem of plugins and a supportive community. The document outlines options for learning Ruby on Rails such as online courses, books, screencasts, and community resources and emphasizes that it offers development simplicity and a lifestyle that can help bring ideas to life.
If you want to build cool stuff and not just be a code monkey in a cubicle, then I recommend you start hacking today.
This is my intro talk for Yahoo's HackU program.
The document discusses Joel Spolsky's "Joel Test" which evaluates software development teams. It applies the test's 12 questions to PHP teams and provides recommendations. Key points include using source control, continuous integration, bug tracking, specifications, estimating tasks, and providing developers with resources to do their jobs.
PHP is the most commonly used server-side programming and deployed more than 80% in web server all over the world. However, PHP is a 'grown' language rather than deliberately engineered, making writing insecure PHP applications far too easy and common. If you want to use PHP securely, then you should be aware of all its pitfalls.
This talk was originally titled “I'm tired of defenders crying”, but thought better of it. This talk is about the tidbits that I've seen piecemeal across the multitude of businesses big and small that were innovated and highly effective, yet free, or mostly free and stopped me dead in my tracks. Going over a number of free, or nearly free methods, tactics, and software setups that will cut down intrusions significantly that you can deploy or start deployment of the hour after the talk is done.
Mubix is a Senior Red Teamer. His professional experience starts from his time on active duty as United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest is FATHER, HUSBAND and United States Marine.
This document provides suggestions for free or low-cost defenses that can frustrate attackers, including enabling EMET, blocking Java user agents at the proxy, port forwarding honeypots, authenticated splash proxies, and deploying "evil canaries" to detect intruders on the network. It emphasizes logging, vulnerability scanning, and getting penetration testers and the help desk involved in security efforts. The document aims to demonstrate mostly free techniques that can significantly improve the security of an organization.
The document discusses DDoS attacks and countermeasures. It begins with an overview of common DDoS attack types like botnet attacks and distributed reflected DNS attacks. It then discusses challenges like how easy it is to build botnets and buy them online. The document also covers the xFlash attack technique and new capabilities in Flash 9. The second part discusses countermeasures, emphasizing performance tuning, caching, scalability through architecture like shared nothing, and implementing defense in depth. It concludes by thanking the audience and asking for questions.
This document describes several vulnerable web applications that can be used for penetration testing education and skills development. It provides links and brief descriptions for vulnerable apps including OWASP Broken Web Apps, BadStore, Damn Vulnerable Web App, Hacme Travel, Mutillidae, Moth, and Vicnum. The apps are built using technologies like PHP, Perl, Java, and .NET and can run on Windows or Linux platforms. Screenshots and demo videos are shown for some apps.
How Laravel framework is shaping the future.pptxReformedTech
Laravel: The Future of Web Development
Discover how this powerful PHP framework is revolutionizing the digital landscape with elegant syntax, robust security, and seamless scalability. Ready to build the next big thing? #Laravel #WebDevelopment #ReformedTech"
This document summarizes a presentation about how to build a successful business by developing free and open source software products and standards. It recommends choosing technologies for speed like Linux, Ruby on Rails, MySQL and Sphinx. It emphasizes the importance of an agile development team with intelligence and autonomy. It also stresses adopting open standards like microformats, OAuth and OpenWeb to engage communities and be accessible in many places online. The presentation encourages having fun and being engaged with online communities.
This document provides an introduction to PHP by summarizing its history and key features. PHP was created in 1994 by Rasmus Lerdorf as a set of Common Gateway Interface scripts for tracking visits to his online resume. It has since evolved into a full-featured programming language used widely by major companies like Google, Facebook, and Bank of America. The document outlines PHP's core syntax like variables, constants, includes, and flow control structures. It also discusses databases, MVC patterns, classes, and tools that employers seek like contributions to open source projects.
Jak kraść miliony, czyli o błędach bezpieczeństwa, które mogą spotkać również...The Software House
Często zdarza się, że na testy bezpieczeństwa nie ma czasu lub budżetu. Testy te często są wykonywane na sam koniec, gdy nie ma możliwości na dłuższą analizę. Przez takie myślenie, padają firmy lub zwykli obywatele tracą dostęp do swoich danych czy po prostu te dane wyciekają. Przeanalizujemy kilka ostatnich ataków, zastanowimy się jak można było temu zapobiec.
Ostatnia prezentacja w historii Uszanowanka Programowanka. O przemianach, jakie przechodził meetup, rozwoju i zabawnych sytuacjach opowiada CTO The Software House.
W ciągu ostatnich 7 miesięcy przeszedłem drogę z poziomu Cloud Practitioner do Solutions Architect Professional, zdobywając nie tylko 5 certyfikatów, ale przede wszystkim wiedzę i praktykę, dzięki którym dziś pracuje mi się łatwiej i efektywniej. Na tym spotkaniu opowiem o motywacjach, wyzwaniach, strategiach nauki oraz najbardziej wartościowych źródłach wiedzy, dzięki którym zaplanujesz swoją drogę do certyfikatów. I to bez względu na to, czy dopiero zaczynasz swoją przygodę z AWS, czy masz już za sobą masę doświadczeń, które chcesz potwierdzić “na papierze”.
Dostępność, accessibility, a11y, WCAG… Dla niektórych to tylko dodatkowe tematy do przerobienia w projektach, które pochłaniają więcej czasu i budżetu. Według mnie to jednak ważny element, który zmienia internet w przyjazne miejsce dla wszystkich użytkowników. Jak reaguje twoja mobilna apka w słoneczny dzień? Czy buttony są wystarczająco duże, żeby wszyscy (nawet niedowidzący czy seniorzy) je zauważyli? Czy da się skorzystać z systemu, który tworzysz za pomocą klawiatury? I w końcu czy ta cała dostępność to tylko “hot topic”, a może faktyczna potrzeba? Odpowiem na te pytania głównie z perspektywy biznesu, ale nie zabraknie konkretnych wskazówek technicznych. Będzie o dostępności w pigułce.
Case study naszego wdrożenia rozwiązania czatu tekstowego przy użyciu zestawu Amazon Chime SDK. Moja prezentacja będzie składać się z przeglądu projektu, dlaczego w ogóle potrzebowaliśmy czatu tekstowego, podróży wdrożeniowej i wyzwań, przed którymi stanęliśmy (takich jak ograniczanie żądań i problemy ze skalowalnością). Wspomnę też pokrótce o innych funkcjonalnościach Amazon Chime, z których nie korzystaliśmy.
Pamiętacie jeszcze stare programy lub aplikacje pisane przy użyciu C, Assemblera lub innych bardzo przestarzałych technologii? Ja też nie. Za to jeden z naszych klientów pamięta i przyszedł z prośbą o przeniesienie danych z jego starej aplikacji do nowej. Podczas tej prezentacji będziecie mogli zobaczyć, jak poradziliśmy sobie z problemami wynikającymi z istniejących aplikacji oraz jak stworzyliśmy oprogramowanie migrujące dane na podstawie usług dostępnych w AWS.
Architektura serverless zyskuje na popularności każdego dnia. Większość developerów napotka to na swojej drodze kariery. Jak się z tym zmierzyć, jakich narzędzi użyć aby nie zwariować i uciec w Bieszczady? Jak wdrożyć sprawdzoną strukturę? Porozmawiajmy o tym jak dość płynnie wejść w świat architektury typu serverless.
Analiza semantyczna artykułów prasowych w 5 sprintów z użyciem AWSThe Software House
Case study na temat narzędzia, które zestawia analizę artykułów pod kątem płci z danymi o odbiorcach z Google Analytics, co pozwala na optymalizację treści i lepsze przyciąganie rzeszy czytelników. Dzięki wykorzystaniu AWS błyskawicznie przygotowaliśmy działające MVP.
Piątek po południu. Wypuściłeś aktualizację na serwer z nową funkcjonalnością (mimo, że wszyscy ci odradzali). Ale był tam krytyczny fix buga. Nie miałeś innego wyjścia. 5 minut po deployu okazuje się, że system leży – nowa funkcjonalność coś popsuła. Chyba czeka cię długi piątek/weekend. Gdybyś miał Feature Flags w projekcie, to twój piątek wyglądałby zupełnie inaczej. Feature Flags (albo Feature Toggles) pozwalają ukryć funkcjonalność przed użytkownikiem końcowym i wyświetlić ją warunkowo. Dzięki temu można spokojnie merge’ować wszystko do głównej gałęzi. Albo wyłączyć funkcjonalność w ciągu kilku minut, jeśli jest wadliwa. Na prezentacji opowiem, dlaczego w swojej aplikacji JavaScript powinieneś rozważyć Feature Flags. Wady, zalety i praktyczne wskazówki jak sobie z tym radzić. I to wszystko z perspektywy osoby, która korzysta z tego od dłuższego czasu. Po wyjściu z prezentacji będziesz wiedzieć kiedy warto stosować flagi i jak utrzymać je pod kontrolą.
TypeScript na przestrzeni lat udowodnił że da się okiełznać dużą część problemów wynikających z dynamiczności języka JavaScript. Strukturalne typowanie które oferuje potrafi w miarę nieinwazyjnie pomóc w wykrywaniu pułapek, w które wpadlibyśmy, pisząc w czystym JS. Co jednak w przypadku gdy coś kwacze jak kaczka ale nią nie jest? Czy da się zabezpieczyć developera przed pomieszaniem dwóch różnych jednostek, które w historii doprowadziły do nie jednej katastrofy? Na prelekcji przejdziemy przez różne case study i zastanowimy się jak pomóc TypeScriptowi w ostrzeganiu nas przed pułapkami których nie zawsze da się uniknąć w pierwotnym typowaniu strukturalnym.
Automatyzacja tworzenia frontendu z wykorzystaniem GraphQLThe Software House
W ramach tej prezentacji pokażę jak efektywnie wykorzystać GraphQL `codegen` do generowania hooków i typów, które pomogą obsłużyć dowolne query i mutation, czyniąc kod nie tylko czytelniejszym, ale również łatwiejszym w utrzymaniu. W tym celu wspólnie postawimy przykładowy projekt, a także poświęcimy kilka minut na skonfigurowanie IDE. Dzięki temu nasza codzienna praca stanie się przyjemniejsza i efektywniejsza.
Kiedy aplikacja napisana w Serverless Frameworku jest mała, można zamieść niektóre rzeczy pod dywan. Ale co, kiedy po kilku miesiącach zaczyna wychodzić spod niego prawdziwy potwór? Co, kiedy musisz przetestować jedną lambdę na środowisku, a deploy całego stacka trwa 20 minut? No i jak przeorganizować aplikację wiedząc, że ciągle będzie rosła? Dowiedz się, jak rozbiliśmy naszą hurtownię danych wykorzystując Serverless Compose. Jakie przyniosło nam to efekty i o czym dowiedzieliśmy się w trakcie.
Testy API: połączenie z bazą danych czy implementacja w pamięciThe Software House
Testy integracyjne wykonują realne żądania na API. Trzeba zatem zadbać o odpowiednie skonfigurowanie środowiska do testów. Kwestia danych to jedno z podstawowych zagadnień z którym należy sobie poradzić. Do tematu można podejść na kilka sposobów, ale sprowadzają się one do dwóch kategorii: baza danych albo implementacja w pamięci. Dowiedz się, które z nich sprawdzi się w twoim projekcie.
Opowieść o tym, jak w projekcie legacy, który już ledwo dychał, udało się zaimplementować read model oparty na ElasticSearch (choć nie bez przeszkód i czasami pod prąd). Podczas prezentacji aplikacja legacy i walka o przyspieszenie zapytań posłuży jako punkt wyjścia do przeanalizowania konceptu “read modeli”. Po co wdrażamy je do aplikacji? Jakie są metody utrzymania ich w spójności? A w końcu – ich wady i zalety. W przypadku wspomnianej aplikacji zapytania które trwały około 8 minut udało się przyspieszyć do poniżej 1s (choć nie obyło się to bez potknięć). Zobacz jak!
Firestore czyli ognista baza od giganta z Doliny KrzemowejThe Software House
Podczas codziennej pracy każdy z nas korzysta z różnych baz danych,
Każda baza ma zachowania typowe dla siebie. Firestore to nierelacyjna baza od Google, która posiada wiele nietypowych funkcjonalności, wiele ciekawych rozwiązań. W tej prezentacji dowiemy się o paru fajnych zastosowań w Firestore i na co warto uważać przy implementacji tego rozwiązania.
AWS, a w szczególności serverless computing, oferuje nam możliwość skalowania naszych systemów out-of-the-box. W większości przypadków jest to nam bardzo na rękę, ale… Co w sytuacji, gdy potrzebujemy z chirurgiczną precyzją kontrolować, ile aktualnie Lambd jest w użytku? Okazuje się, że nie jest to do końca taka prosta sprawa, gdyż AWS uporczywie robi wszystko, co może, aby wyskalować nasz system, niezależnie czy tego chcemy, czy nie. W tej prelekcji zaprezentuję możliwe sposoby rate limitingu naszych funkcji. Za przykład posłuży nam komunikacja z 3-rd party API, gdzie w większości przypadków jesteśmy ograniczeni ilością requestów, jakie możemy wykonać w jednostce czasu, żeby nie otrzymać 429-tki.
AWS oferuje zbiór niezwykle przydatnych narzędzi i rozwiązań. Potrafi też jednak zaskoczyć. W trakcie swojej prezentacji, Karol przedstawi kilka problemów na które natknął się w projektach, a które wzięły jego zespół z zaskoczenia. Skupi się też na tym, jak skutecznie sobie z nimi poradzić.
The document discusses Storyblok CMS and how it can be used with Next.js. Some key points:
- Storyblok CMS allows non-technical users to build landing pages from predefined components and developers to collaborate asynchronously on new components.
- With Storyblok, content is modeled as the whole website layout rather than just text. It delivers JSON data to render pages.
- Storyblok provides features like live preview, internationalization utilities, and an image service.
- The presentation demonstrates modeling data in Storyblok, receiving it in Next.js, and coding the app to iterate over Storyblok data and map it to components to create pages dynamically.
Amazon Step Functions. Sposób na implementację procesów w chmurzeThe Software House
Zmęczony łańcuchowym (i wieloogniwowym) wywoływaniem AWS Lambd przez inne Lambdy? Śledzenie poszczególnych inwokacji od początkowej do końcowej Lambdy to droga przez mękę? I nawet AWS X-Ray tu nie wystarcza? Rozwiązaniem jest Amazon Step Function, czyli usługa AWS umożliwiająca łączenie poszczególnych kroków logicznych w proces, z jasnym dostępem do historii i szczegółów wywołań.
AWS Amplify Studio jest nowością od AWS’a, która pozwala połączyć komponenty Figma z bazą danych i wygenerować gotowy kod React. Czy to oznacza, że frontend deweloperzy przestaną być potrzebni? A może te narzędzie to tylko chwyt reklamowy? I czemu AWS zainteresował się narzędziami low-code/no-code. Na to wszystko Aleksander odpowie w swojej prezentacji. I pokaże na żywo jak przejść od Figmy do gotowej aplikacji.
Exploring Wayland: A Modern Display Server for the FutureICS
Wayland is revolutionizing the way we interact with graphical interfaces, offering a modern alternative to the X Window System. In this webinar, we’ll delve into the architecture and benefits of Wayland, including its streamlined design, enhanced performance, and improved security features.
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AIdanshalev
If we were building a GenAI stack today, we'd start with one question: Can your retrieval system handle multi-hop logic?
Trick question, b/c most can’t. They treat retrieval as nearest-neighbor search.
Today, we discussed scaling #GraphRAG at AWS DevOps Day, and the takeaway is clear: VectorRAG is naive, lacks domain awareness, and can’t handle full dataset retrieval.
GraphRAG builds a knowledge graph from source documents, allowing for a deeper understanding of the data + higher accuracy.
🌱 Green Grafana 🌱 Essentials_ Data, Visualizations and Plugins.pdfImma Valls Bernaus
eady to harness the power of Grafana for your HackUPC project? This session provides a rapid introduction to the core concepts you need to get started. We'll cover Grafana fundamentals and guide you through the initial steps of building both compelling dashboards and your very first Grafana app. Equip yourself with the essential tools to visualize your data and bring your innovative ideas to life!
Cryptocurrency Exchange Script like Binance.pptxriyageorge2024
This SlideShare dives into the process of developing a crypto exchange platform like Binance, one of the world’s largest and most successful cryptocurrency exchanges.
Societal challenges of AI: biases, multilinguism and sustainabilityJordi Cabot
Towards a fairer, inclusive and sustainable AI that works for everybody.
Reviewing the state of the art on these challenges and what we're doing at LIST to test current LLMs and help you select the one that works best for you
Best Practices for Collaborating with 3D Artists in Mobile Game DevelopmentJuego Studios
Discover effective strategies for working with 3D artists on mobile game projects. Learn how top mobile game development companies streamline collaboration with 3D artists in Dubai for high-quality, optimized game assets.
How can one start with crypto wallet development.pptxlaravinson24
This presentation is a beginner-friendly guide to developing a crypto wallet from scratch. It covers essential concepts such as wallet types, blockchain integration, key management, and security best practices. Ideal for developers and tech enthusiasts looking to enter the world of Web3 and decentralized finance.
AgentExchange is Salesforce’s latest innovation, expanding upon the foundation of AppExchange by offering a centralized marketplace for AI-powered digital labor. Designed for Agentblazers, developers, and Salesforce admins, this platform enables the rapid development and deployment of AI agents across industries.
Email: [email protected]
Phone: +1(630) 349 2411
Website: https://www.fexle.com/blogs/agentexchange-an-ultimate-guide-for-salesforce-consultants-businesses/?utm_source=slideshare&utm_medium=pptNg
Landscape of Requirements Engineering for/by AI through Literature ReviewHironori Washizaki
Hironori Washizaki, "Landscape of Requirements Engineering for/by AI through Literature Review," RAISE 2025: Workshop on Requirements engineering for AI-powered SoftwarE, 2025.
Full Cracked Resolume Arena Latest Versionjonesmichealj2
Resolume Arena is a professional VJ software that lets you play, mix, and manipulate video content during live performances.
This Site is providing ✅ 100% Safe Crack Link:
Copy This Link and paste it in a new tab & get the Crack File
↓
➡ 🌍📱👉COPY & PASTE LINK👉👉👉 👉 https://yasir252.my/
Microsoft AI Nonprofit Use Cases and Live Demo_2025.04.30.pdfTechSoup
In this webinar we will dive into the essentials of generative AI, address key AI concerns, and demonstrate how nonprofits can benefit from using Microsoft’s AI assistant, Copilot, to achieve their goals.
This event series to help nonprofits obtain Copilot skills is made possible by generous support from Microsoft.
What You’ll Learn in Part 2:
Explore real-world nonprofit use cases and success stories.
Participate in live demonstrations and a hands-on activity to see how you can use Microsoft 365 Copilot in your own work!
Who Watches the Watchmen (SciFiDevCon 2025)Allon Mureinik
Tests, especially unit tests, are the developers’ superheroes. They allow us to mess around with our code and keep us safe.
We often trust them with the safety of our codebase, but how do we know that we should? How do we know that this trust is well-deserved?
Enter mutation testing – by intentionally injecting harmful mutations into our code and seeing if they are caught by the tests, we can evaluate the quality of the safety net they provide. By watching the watchmen, we can make sure our tests really protect us, and we aren’t just green-washing our IDEs to a false sense of security.
Talk from SciFiDevCon 2025
https://www.scifidevcon.com/courses/2025-scifidevcon/contents/680efa43ae4f5
F-Secure Freedome VPN 2025 Crack Plus Activation New Versionsaimabibi60507
Copy & Past Link 👉👉
https://dr-up-community.info/
F-Secure Freedome VPN is a virtual private network service developed by F-Secure, a Finnish cybersecurity company. It offers features such as Wi-Fi protection, IP address masking, browsing protection, and a kill switch to enhance online privacy and security .
Not So Common Memory Leaks in Java WebinarTier1 app
This SlideShare presentation is from our May webinar, “Not So Common Memory Leaks & How to Fix Them?”, where we explored lesser-known memory leak patterns in Java applications. Unlike typical leaks, subtle issues such as thread local misuse, inner class references, uncached collections, and misbehaving frameworks often go undetected and gradually degrade performance. This deck provides in-depth insights into identifying these hidden leaks using advanced heap analysis and profiling techniques, along with real-world case studies and practical solutions. Ideal for developers and performance engineers aiming to deepen their understanding of Java memory management and improve application stability.
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Eric D. Schabell
It's time you stopped letting your telemetry data pressure your budgets and get in the way of solving issues with agility! No more I say! Take back control of your telemetry data as we guide you through the open source project Fluent Bit. Learn how to manage your telemetry data from source to destination using the pipeline phases covering collection, parsing, aggregation, transformation, and forwarding from any source to any destination. Buckle up for a fun ride as you learn by exploring how telemetry pipelines work, how to set up your first pipeline, and exploring several common use cases that Fluent Bit helps solve. All this backed by a self-paced, hands-on workshop that attendees can pursue at home after this session (https://o11y-workshops.gitlab.io/workshop-fluentbit).
Secure Test Infrastructure: The Backbone of Trustworthy Software DevelopmentShubham Joshi
A secure test infrastructure ensures that the testing process doesn’t become a gateway for vulnerabilities. By protecting test environments, data, and access points, organizations can confidently develop and deploy software without compromising user privacy or system integrity.
4. Who is attacking you?
● Kiddy scripters
● Dumbasses
● Angry Hacker
● Professional Hacker
● Team of Hackers
5. Who should you protect yourself
against?
● Kiddy Scripters
● Dumbasses
How and Why?
7. HOW?
Know the most common hacking tools:
https://www.concise-courses.com/hacking-
tools/top-ten/
BackTrack now known as https://www.kali.org/
http://www.metasploit.com/
8. Resources to stay up to date on
OWASP
Data Loss DB
Verizon Report
Hack this site
Root this box
www.owasp.org
www.datalossdb.org
www.verizonenterprise.
com/DBIR/
www.hackthissite.
org/pages/index/index.php
9. Please for the love of God...force some
password rules like uppercase with number
and special char...expire 90 days.
Simple Two Factor solutions
Google Two Factor
Password Rules
11. Copy / Paste will save time BUT...
Using other plugins or others code to save time
is commonly done BUT have you actually
looked at the code? Tested the code?
Open Source code is the worst for exploits.
OAuth plugin
https://github.com/intridea/omniauth