What do you need to keep in mind when using ORM, how it will affect your needs and what are the disadvantages of using and advantages of not using ORM.
This document discusses Object Relational Mapping (ORM) and whether to use an ORM or not when developing applications. It begins by introducing the speaker and defining ORM. It then explains the Active Record and Data Mapper patterns. Potential issues with ORM are outlined along with ways to work around them. Finally, considerations for choosing an ORM for a CodeIgniter project are provided along with brief discussions of several ORM options.
Build software like a bag of marbles, not a castle of LEGO®Hannes Lowette
Hannes Lowette discusses how to structure software code like a bag of marbles rather than a LEGO castle. The document describes challenges faced with a tightly coupled codebase and how adopting an onion architecture approach using plugins allowed for more modular and maintainable code. Key points include defining clean dependencies and interfaces, making core business logic decoupled and testable, and enabling new features to be added and removed through plugins without polluting the core codebase.
This document discusses Object Relational Mapping (ORM), which maps objects in an application to tables and rows in a relational database. ORM provides benefits like leveraging object-oriented programming skills and abstracting away SQL. Common ORM operations like create, read, update, and delete records are demonstrated. Associations between objects like one-to-one, one-to-many, and many-to-many are covered. Popular ORM frameworks for languages like Ruby on Rails, Java, .NET, PHP, and iOS are listed.
Володимир Гоцик. Getting maximum of python, django with postgres 9.4. PyCon B...Alina Dolgikh
Postgres предоставляет много встроенных возможностей для создания эфективных приложений, использующих базы данных. А в версии 9.4 появляется еще и полноценное JSON поле, при правильном использовании которого, отпадает необходимость использвания NoSQL баз данных. В докладе мы рассмотрим, как использовать этот потенциал по максимуму в своих Python/Django приложениях.
During the past six months here at Wimdu, we have been working on making our front end pure, by incrementally introducing Redux, ImmutableJS, and higher-order components, all under the restrictions of a Rails application and constant requests for new features. I will share the techniques, tools, and processes we have been using along with pitfalls to avoid.
This speech was presented at Berlin React meetup on 30 May 2016 (http://www.meetup.com/React-Berlin/events/231265387/)
ORM London is a customer experience agency that helps businesses improve their digital customer experiences through research, strategy, design and build services. The document provides an introduction to customer research, explaining that research involves studying real people to understand who they are, what they need and how they use products. It discusses why research is important by debunking common myths, explaining when different research methods should be used, and giving tips on how to get started with customer research.
This document provides an overview of object-relational mapping (ORM) and how it works using the Doctrine ORM framework. It discusses some key ORM concepts like impedance mismatch between objects and relational databases, metadata mapping of entities to database tables, and the identity map that allows retrieving entities without querying the database. It also covers the unit of work pattern used by Doctrine to track changes to entities and flush multiple changes together in a transaction to the database.
A Quick Preview of What You'll See at Qt World Summit 2016Qt
This year at #QtWS16, The Qt Company and our ecosystem will deliver several inspirational keynotes, insightful breakouts, take a look into the future of IoT and how Qt will be the enabler, putting you and your project ahead of the curve.
Here is a sneak peek at some of the things you will see in San Francisco at the Qt World Summit.
This document provides an overview of Entity Framework (EF), an object-relational mapping (ORM) framework that allows .NET applications to access and manipulate relational data as objects. It discusses EF concepts like the DbContext class, entity classes, associations, and change tracking. It demonstrates basic EF workflows and shows how to perform CRUD operations, execute LINQ queries, extend entity classes, and attach/detach objects. The document also provides homework assignments related to using EF with the Northwind sample database.
New methods for exploiting ORM injections in Java applicationsMikhail Egorov
This document summarizes new methods for exploiting ORM injections in Java applications. It begins with introductions to ORM, JPA, and common ORM libraries. It then outlines several exploitation techniques, including using special functions in EclipseLink and TopLink to call database functions, abusing string handling and quote processing in OpenJPA, and leveraging features in Hibernate and specific databases like string escaping, quoted strings, magic functions, and Unicode delimiters. Code examples and demonstrations are provided for most of the techniques.
Este documento compara diferentes ORM (Object Relational Mapping) en Python, incluyendo SQLAlchemy, SQLObject, PonyORM, Peewee y el ORM de Django. Explica conceptos básicos de ORM como mapeo de objetos a tablas y patrones como Active Record. También compara las características de cada ORM como soporte de bases de datos, herencia, consultas y seguridad.
This document discusses object-relational mapping (ORM) in PHP. It describes how ORM manages the translation between objects and relational databases. It then covers some common ORM patterns like active record, table gateways and data mappers. It also discusses performance issues with ORM and alternatives like object databases, document databases and JSON storage. Overall, the document suggests carefully choosing an ORM library and considering whether ORM is really needed or if alternative data storage may be better suited.
Из презентации вы узнаете:
— как работает database/sql;
— интерфейс и реализации database/sql/driver;
— обзор популярных ORM и что с ними не так;
— как мы делали свой лучший ORM;
— и почему столько раз его переделывали.
Hibernate ORM: Tips, Tricks, and Performance TechniquesBrett Meyer
DevNexus 2014
Out-of-the-box, Hibernate ORM offers limited overhead and decent throughput. Early-stage applications enjoy the convenience of ORM/JPA with great performance. However, scaling your application into an enterprise-level system introduces more demanding needs.
This talk will describe numerous tips and techniques to both increase Hibernate ORM performance, as well as decrease overhead. These include some basic tricks, such as mapping and fetching strategies. Entity enhancement instrumentation, third-party second level caching, Hibernate Search, and more complex considerations will also be discussed. The talk will include live demonstrations techniques and their before-and-after results.
Brett Meyer gave an overview of Hibernate ORM and JPA. He discussed that ORM maps Java objects to relational databases for persistence beyond the life of a program. JPA is the Java standard for ORM that provides portability, while Hibernate is a full-featured JPA implementation with additional native features. Hibernate allows focusing on business logic rather than data access details and provides performance, concurrency, and extensibility benefits over traditional JDBC usage.
This document discusses operational risk and provides details on its definition, measurement, and management. It defines operational risk as losses resulting from inadequate or failed internal processes, people, and systems or from external events. It describes the Basic Indicator Approach, Standardized Approach, and Advanced Measurement Approach for calculating operational risk capital charges under Basel II. It also outlines the data elements, risk categories, and tools used to measure and manage operational risk.
Super feats of integration x pages with symphony sharepoint and officeJohn Head
The document discusses integration between IBM Notes/Domino and other applications like Microsoft Office, Lotus Symphony, and web applications. It provides an agenda for an upcoming webinar that will cover getting started with basic integration examples, more advanced integration from the Notes client and other applications, and looking toward the future. It also references polls on sessions from previous years and reviews the history of integration technologies.
It's a Jungle Out There – IoT and MRubymatustomlein
This document discusses the Internet of Things (IoT) and challenges in developing applications for embedded devices that are part of the IoT. It introduces MRuby, a lightweight Ruby interpreter that can run on embedded devices and overcomes some of the challenges. MRuby allows developing applications using Ruby syntax and deploying them to many different embedded devices. It has very low memory usage and can be integrated into C applications. The document argues that MRuby is well-suited for developing IoT applications where logic runs both on devices and in the cloud.
Processing Twitter Stream with Oracle Event Processing (OEP)Guido Schmutz
This session will present how to connect to the Twitter Streaming API and process and analyse the tweets in real-time by using Oracle Event Processing. We will see how typical analytics on a such social media data can be done directly on the event stream using Java and/or the Continuous Query Language (CQL). How do we best store the results, so that they can be made available continously to a dashboard for presentation will be shown as well. Additionally the so-called Lambda architecture will be presented, where such an event streaming solution plays a critical part, in combination with a Big Data batch processing layer.
The document provides an overview of tasks and skills to learn for a career in data science and analytics. It lists technologies like SQL Server, Linux, networking protocols, Python, TensorFlow, Kafka, Terraform, and tools like Tableau. It also mentions companies in Pakistan and Dubai to explore for work opportunities and lists top companies employing data scientists in Dubai. Finally, it provides some YouTube video links on related topics like Spark vs Hadoop, data center standards, and networking fundamentals.
Check out our informative PDF document, "What is IETM and How does it Work?" to learn more about the buzzing world of Interactive Electronic Technical Manuals (IETMs). It delves into the capabilities of IETM Level 4 software for handling challenging electronic systems, how it transforms manual access using SQL databases, and the standards that regulate IETMs, including the expertise of Code and Pixels in developing strong frameworks.
This document discusses the evolution of computing technologies over time. It notes that as technologies become outdated or limited, the industry shifts to new approaches. Specifically, it outlines shifts from low-level machine instructions to high-level languages and virtual machines, desktop applications to web applications, and distributed components to web services and service-oriented architectures. The document suggests that cloud computing is the current shift and poses questions about what may come next, such as full utilization of business process management, mobile integration, and more distributed and scalable operating systems and frameworks.
Pareto will tell you to stop using your ORM - Mateo CollinaWey Wey Web
This document discusses choosing technologies for software projects. It argues that ORMs do not scale well and promote spaghetti code because models take on too many responsibilities. Modular monoliths and microservices help address these issues by separating concerns. The author promotes Platformatic as a tool that can remove repetitive tasks while still allowing complex features by extending databases through code.
Stackato presentation done at the Nordic Perl Workshop 2012 in Stockholm, Sweden
More information available at: https://logiclab.jira.com/wiki/display/OPEN/Stackato
A few to get started with ODK. Move away from the paper-based questionnaire to digital questionnaire, it will save you money and time. Its easy and its free
This document provides an overview of IT infrastructure management. It discusses the key components of an IT infrastructure including networks, desktops, operating systems, software, backups, printers, CCTV, internet access and more. It then covers specific topics like Windows versions, Microsoft Office, cloud solutions, telecommunications protocols, servers, backups and helpdesk operations. The presentation aims to educate about setting up and managing an organization's full IT system and infrastructure.
A Quick Preview of What You'll See at Qt World Summit 2016Qt
This year at #QtWS16, The Qt Company and our ecosystem will deliver several inspirational keynotes, insightful breakouts, take a look into the future of IoT and how Qt will be the enabler, putting you and your project ahead of the curve.
Here is a sneak peek at some of the things you will see in San Francisco at the Qt World Summit.
This document provides an overview of Entity Framework (EF), an object-relational mapping (ORM) framework that allows .NET applications to access and manipulate relational data as objects. It discusses EF concepts like the DbContext class, entity classes, associations, and change tracking. It demonstrates basic EF workflows and shows how to perform CRUD operations, execute LINQ queries, extend entity classes, and attach/detach objects. The document also provides homework assignments related to using EF with the Northwind sample database.
New methods for exploiting ORM injections in Java applicationsMikhail Egorov
This document summarizes new methods for exploiting ORM injections in Java applications. It begins with introductions to ORM, JPA, and common ORM libraries. It then outlines several exploitation techniques, including using special functions in EclipseLink and TopLink to call database functions, abusing string handling and quote processing in OpenJPA, and leveraging features in Hibernate and specific databases like string escaping, quoted strings, magic functions, and Unicode delimiters. Code examples and demonstrations are provided for most of the techniques.
Este documento compara diferentes ORM (Object Relational Mapping) en Python, incluyendo SQLAlchemy, SQLObject, PonyORM, Peewee y el ORM de Django. Explica conceptos básicos de ORM como mapeo de objetos a tablas y patrones como Active Record. También compara las características de cada ORM como soporte de bases de datos, herencia, consultas y seguridad.
This document discusses object-relational mapping (ORM) in PHP. It describes how ORM manages the translation between objects and relational databases. It then covers some common ORM patterns like active record, table gateways and data mappers. It also discusses performance issues with ORM and alternatives like object databases, document databases and JSON storage. Overall, the document suggests carefully choosing an ORM library and considering whether ORM is really needed or if alternative data storage may be better suited.
Из презентации вы узнаете:
— как работает database/sql;
— интерфейс и реализации database/sql/driver;
— обзор популярных ORM и что с ними не так;
— как мы делали свой лучший ORM;
— и почему столько раз его переделывали.
Hibernate ORM: Tips, Tricks, and Performance TechniquesBrett Meyer
DevNexus 2014
Out-of-the-box, Hibernate ORM offers limited overhead and decent throughput. Early-stage applications enjoy the convenience of ORM/JPA with great performance. However, scaling your application into an enterprise-level system introduces more demanding needs.
This talk will describe numerous tips and techniques to both increase Hibernate ORM performance, as well as decrease overhead. These include some basic tricks, such as mapping and fetching strategies. Entity enhancement instrumentation, third-party second level caching, Hibernate Search, and more complex considerations will also be discussed. The talk will include live demonstrations techniques and their before-and-after results.
Brett Meyer gave an overview of Hibernate ORM and JPA. He discussed that ORM maps Java objects to relational databases for persistence beyond the life of a program. JPA is the Java standard for ORM that provides portability, while Hibernate is a full-featured JPA implementation with additional native features. Hibernate allows focusing on business logic rather than data access details and provides performance, concurrency, and extensibility benefits over traditional JDBC usage.
This document discusses operational risk and provides details on its definition, measurement, and management. It defines operational risk as losses resulting from inadequate or failed internal processes, people, and systems or from external events. It describes the Basic Indicator Approach, Standardized Approach, and Advanced Measurement Approach for calculating operational risk capital charges under Basel II. It also outlines the data elements, risk categories, and tools used to measure and manage operational risk.
Super feats of integration x pages with symphony sharepoint and officeJohn Head
The document discusses integration between IBM Notes/Domino and other applications like Microsoft Office, Lotus Symphony, and web applications. It provides an agenda for an upcoming webinar that will cover getting started with basic integration examples, more advanced integration from the Notes client and other applications, and looking toward the future. It also references polls on sessions from previous years and reviews the history of integration technologies.
It's a Jungle Out There – IoT and MRubymatustomlein
This document discusses the Internet of Things (IoT) and challenges in developing applications for embedded devices that are part of the IoT. It introduces MRuby, a lightweight Ruby interpreter that can run on embedded devices and overcomes some of the challenges. MRuby allows developing applications using Ruby syntax and deploying them to many different embedded devices. It has very low memory usage and can be integrated into C applications. The document argues that MRuby is well-suited for developing IoT applications where logic runs both on devices and in the cloud.
Processing Twitter Stream with Oracle Event Processing (OEP)Guido Schmutz
This session will present how to connect to the Twitter Streaming API and process and analyse the tweets in real-time by using Oracle Event Processing. We will see how typical analytics on a such social media data can be done directly on the event stream using Java and/or the Continuous Query Language (CQL). How do we best store the results, so that they can be made available continously to a dashboard for presentation will be shown as well. Additionally the so-called Lambda architecture will be presented, where such an event streaming solution plays a critical part, in combination with a Big Data batch processing layer.
The document provides an overview of tasks and skills to learn for a career in data science and analytics. It lists technologies like SQL Server, Linux, networking protocols, Python, TensorFlow, Kafka, Terraform, and tools like Tableau. It also mentions companies in Pakistan and Dubai to explore for work opportunities and lists top companies employing data scientists in Dubai. Finally, it provides some YouTube video links on related topics like Spark vs Hadoop, data center standards, and networking fundamentals.
Check out our informative PDF document, "What is IETM and How does it Work?" to learn more about the buzzing world of Interactive Electronic Technical Manuals (IETMs). It delves into the capabilities of IETM Level 4 software for handling challenging electronic systems, how it transforms manual access using SQL databases, and the standards that regulate IETMs, including the expertise of Code and Pixels in developing strong frameworks.
This document discusses the evolution of computing technologies over time. It notes that as technologies become outdated or limited, the industry shifts to new approaches. Specifically, it outlines shifts from low-level machine instructions to high-level languages and virtual machines, desktop applications to web applications, and distributed components to web services and service-oriented architectures. The document suggests that cloud computing is the current shift and poses questions about what may come next, such as full utilization of business process management, mobile integration, and more distributed and scalable operating systems and frameworks.
Pareto will tell you to stop using your ORM - Mateo CollinaWey Wey Web
This document discusses choosing technologies for software projects. It argues that ORMs do not scale well and promote spaghetti code because models take on too many responsibilities. Modular monoliths and microservices help address these issues by separating concerns. The author promotes Platformatic as a tool that can remove repetitive tasks while still allowing complex features by extending databases through code.
Stackato presentation done at the Nordic Perl Workshop 2012 in Stockholm, Sweden
More information available at: https://logiclab.jira.com/wiki/display/OPEN/Stackato
A few to get started with ODK. Move away from the paper-based questionnaire to digital questionnaire, it will save you money and time. Its easy and its free
This document provides an overview of IT infrastructure management. It discusses the key components of an IT infrastructure including networks, desktops, operating systems, software, backups, printers, CCTV, internet access and more. It then covers specific topics like Windows versions, Microsoft Office, cloud solutions, telecommunications protocols, servers, backups and helpdesk operations. The presentation aims to educate about setting up and managing an organization's full IT system and infrastructure.
Возможности интерпретатора Python в NX-OSCisco Russia
The document discusses a webinar presented by Cisco TAC Engineer Anton Tugai about the capabilities of the Python interpreter in NX-OS. Some key points:
- Tugai gave a presentation on trends in Cisco SDN and current solutions.
- The webinar covered an introduction to Python, how Python is integrated into NX-OS, examples, and a demonstration.
- Native Python interpreter is available on Nexus switches starting from certain software versions, allowing Python scripts to run directly on the switch and execute CLI commands.
Sviluppo IoT - Un approccio standard da Nerd ad Impresa, prove pratiche di Me...Codemotion
Codemotion Rome 2015 - Gli anni passati a veder nascere e crescere tecnologie e tendenze ci aiutano a comprendere come l'Internet delle Cose sia diventata matura per il mercato delle imprese. L’intervento, che include una panoramica sulle tendenze attuali e future dell’IoT, è centrato sullo sviluppo di soluzioni basate su standard industriali in ascesa (eg. Z-Wave), mettendo in evidenza gli inevitabili vantaggi e limiti derivanti dall’adozione di una metodologia industriale: solo un approccio industriale può rappresentare il vero e proprio salto di qualità per proporre prodotti efficaci per un mercato a doppia cifra.
The document discusses Robert Reiz's experience founding software companies and moving to cloud computing. It summarizes his experience founding PLOIN GmbH in 2008, exiting to Reutax AG in 2010, becoming managing director of WildGig San Francisco in 2011, and founding VersionEye GmbH in 2012. It notes the advantages of cloud computing including computing power on demand and paying for software as a service. It encourages companies to focus on their core competence rather than servers and software.
[Dec./2017] My Personal/Professional Journey after Graduate Univ.Hayoung Yoon
This document provides biographical information about Hayoung Yoon and summarizes her educational and professional experiences. It describes her background in wireless networking research and her work developing solutions for Wi-Fi Direct and mobile video-on-demand applications. It also outlines her experience founding zVolti to develop automated testing solutions for wireless connectivity products.
Review of basic XML
Review of XML in Domino
Web Services defined
XML and SOAP
Finding Web Services "Out There"
Building Web Services "In Here"
Domino as WS client
Domino as WS server
Security?
The Road Ahead
When it comes to Microsoft .NET-connected development, more and more frameworks are entering the market, both from Microsoft and from open source. Think of ASP.NET MVC, Castle, Windows Workflow Foundation (WF), Entity Framework, Unity, Linq2SQL, ADO.NET Data Services, Windows Communication Foundation (WCF), nHibernate, Spring.NET, CSLA, NUnit, Enterprise Library, MEF or ADF.
Once you apply one or more frameworks to a project, the trouble begins. What if you require features that aren’t implemented in the framework? What if you decide that another framework would have been better and want to switch halfway through your project? What if the author of your favorite open source framework suddenly stops developing? What if the framework contains bugs or omissions? And what if a new version of the framework is released that is implemented differently?
These and many more everyday problems can bring your project a halt, or at least require serious refactoring. During this highly interactive talk, Sander Hoogendoorn, chief architect of Capgemini’s agile Accelerated Delivery Platform and member of Microsoft’s Partner Advisory Council .NET, demonstrates pragmatic architectures and patterns that will help your projects avoid framework issues and to keep code independent of framework choices. Sander presents models of layered architectures, and looks at applying bridge patterns, managers-providers, dependency injection, descriptors and layer super-types, accompanied by lots of demos and (bad) code examples using blocks from Microsoft’s Enterprise Library, NHibernate, Log4Net, and the Entity Framework.
Join this interactive discussion to share your experience of improving the structure and quality of your software architecture and code, and to discuss how to avoid common pitfalls of applying frameworks to .NET software development.
JavaScript is finding its way further and further out of the browser. Only a couple of years ago, if someone had said they wanted to build robots only using JS you'd think they were crazy. Having tried it at the time those naysayers were correct - it was a disaster.
Recently, particularly as a result of the nodebots project, JS Robotics has started to come of age and it's now possible to build simple robots using JavaScript for the majority of the stack - everything from control and sensing to motors to lights, AI and computer vision.
This talk will give an overview of what's currently possible, where the current gotchas are, how to get started and have some interactive elements that can be played with during or after the session.
Andrew is a creator & destroyer of things that combine mobile web, ubicomp and lots of data. Sometime programmer, interaction researcher & CTO @ JBA.
Be Responsive meetup / Melbourne Geek Night Crossover night
September 2014
The document aims to analyze in detail the main phases of a penetration test, in particular: how to become silent, how to performe information gathering and service information gathering, how to find exploits and how you can actually use them.
By the way … the platform used to perform the penetration test is Kali (not Kali 2.0 because at the moment it works but not perfectly)..
MWLUG 2011: The Never Ending Integration StoryJohn Head
This document outlines an agenda for a presentation on integrating Lotus Notes, Domino, and LotusLive applications with Microsoft Office, .NET, and Lotus Symphony. The presentation covers introductions, getting started with basic integration demos, advanced integration from the Notes client, other applications, and the web. It also discusses looking forward and taking questions. Integration history and tools are reviewed. Advanced demos include using the OpenNTF Contacts Experience template and document generation without a desktop app using OOXML, ODF and PDF standards.
Status of WebRTC across Asia by Alan Quayle +++Alan Quayle
Status of WebRTC across Asia by Alan Quayle, and a group of leading experts contributing to the reality, not the hype, of WebRTC.
It’s 2020, WebRTC (Web Real Time Communications) became known in 2011 when Google open sourced intellectual property it had bought in previous years. Gossip about those acquisitions began in 2009. The IETF (Internet Engineering Task Force) was already laying the groundwork with Opus (voice codec) officially in 2010, and back in 2009 the discussion process started that became WebRTC. It’s been roughly one decade. Did WebRTC change everything? Is WebRTC everywhere?
WebRTC myths and misconceptions. Understanding the two components of WebRTC, the open source project, and the standards track.
Reviewing the achievements of WebRTC across Asia.
Understanding why ‘WebRTC’ companies such as Vidyo and Tokbox did not achieve big exits.
What is the current status of WebRTC, where are the standards, where is the innovation edge?
What is happening across Asia on WebRTC? Understanding the difference service providers adoption of WebRTC. Across telcos, CPaaS, UCaaS. CCaaS, in-app communication platforms, and enterprises.
Case studies on WebRTC implementation across Asia.
Recommendations for WebRTC in Asia.
Víceúrovňová obrana vysvětlená na Cross-Site ScriptinguMichal Špaček
Jak se pomocí více úrovní obrany bránit proti notoricky známému útoku Cross-Site Scripting (XSS). Jaké vrstvy zabezpečení existují a kdy se používají. O vlastnostech prohlížečů a Content Security Policy (CSP).
Fantom Opery, "VPN" a Secure Proxy v OpeřeMichal Špaček
Jak jsem pomocí prohlížeče přišel na to, že Opera VPN není VPN aneb co všechno na sebe Chrome prozradí v chrome://net-internals/ a jak to můžete použít pro ladění nebo zkoumání různých udělátek a extenzí.
Jak zlepšit zabezpečení čtvrtiny celého webuMichal Špaček
WordPress prý používá 27 % webu. Na následujících slajdech bych chtěl naznačit, co bychom ve WordPressu mohli zlepšit z pohledu bezpečnosti,protože když to uděláme, tak se zvýší zabezpečení poměrně hodně webů. Já vím, ne všichni aktualizují, ale o tom někdy jindy.
Would you voluntarily share how your web app stores passwords? Some companies indeed do share, for example Facebook and LastPass to name just a few. Some share involuntarily. Some don't share at all because they feel that it will make them more vulnerable. Here's why you should do that and how.
Pár praktických ukázek, ve kterých ukážu, proč se věnovat zabezpečení e-shopů a co se stane, když se na to vykašlete. A že když to budete řešit, až se když se něco bude dít, tak už může být pozdě.
Securitas, res publica.
V posledních pár letech se s bezpečnostními incidenty roztrhl pytel. Tady unikl seznam uživatelů, tady i jejich hesla, tady jen jejich objednávky. V této přednášce spojíme moje dvě oblíbená rčení a to, že každý web je dostatečně dobrý na hacknutí a že opakování je matkou moudrosti. Zopakujeme si, koho už u nás hacknuli a poněvadž by to byla nekonečně dlouhá přednáška, tak se raději zaměříme jen na zveřejněné případy.
Bezpečnost, věc veřejná.
… a chtělo svoje útoky zpět. Útok Cross-Site Scripting (XSS) byl poprvé popsán v roce 1999 a od té doby je tu stále s námi. Proč je tak nebezpečný a jak se mu bránit, když to vývojáři evidentně nezvládají?
Jako odborníci v IT už asi víte, že máte používat nějaký password manager, že? Ale jaký a jaké jsou rozdíly mezi nimi? A v čem se liší 1Password od LastPassu, tedy kromě ceny?
Operations security (OPSEC) is a term originating in U.S. military jargon. In IT, it says what to do to protect your servers, developers, information, and other resources. Targeting developers, new trend in computer security, is becoming increasingly common because they usually have access to production servers and other critical infrastructure.
Lehce osvětová přednáška o tom, proč by HTTPS mělo být úplně všude, nejen na přihlašovacím formuláři. A že šifrování není jenom o HTTPS. Jako obvykle si něco i ukážeme.
HTTP Strict Transport Security (HSTS), English versionMichal Špaček
HTTP Strict Transport Security (HSTS) provides secure transport of data, by removing the possibility of HTTPS stripping. HSTS is an HTTP header issued by the server. After receiving such header, the browser will perform internal redirects from http:// to https:// for given amount of seconds.
Základy webové bezpečnosti pro PR a marketingMichal Špaček
Na dotazy ohledně ukládání hesel raději odpovídejte až zhlédnutí této přednášky. Proč je důležité správné ukládání hesel a co se pod tím vlastně skrývá? Nebojte se, do zbytečných technických detailů zabíhat nebudeme. Podíváme se také na šifrovaný přenos přihlašovacích údajů, bezpečnostní otázky a na příkladech si ukážeme špatné odpovědi na různé zapeklité otázky ohledně zabezpečení některých webů. Po této přednášce byste měli vědět, jak na sociálních sítích správně odpovídat nejen na moje dotazy.
I forgot my password – what a secure password reset needs to have and whyMichal Špaček
Users often forget their passwords, so applications often must have a password reset mechanism. There are several options for how to do it; some of them are good, most of them not so good. Generate a password and send it in an email? No. Security questions? No way. Reset passwords via a phone call? Rather not. This talk presents some really creative examples of botched password reset implementations, as well as a proven method for resetting passwords securely.
Jak vytvářet hesla, co je to password manager a proč ho nutně potřebujete.
Zapomínáte hesla? Já taky ne. Používáte heslo pro přístup k vašemu emailu i pro přístup k jiným službám? Pokud ano, tak to není moc dobrý nápad. Prozradím vám, jak to dělat lépe.
HTTP Strict Transport Security (HSTS), zajistí zabezpečený „převoz“ informací bez možnosti odstranění HTTPS (SSL Strip). HSTS je HTTP hlavička, kterou posílá server. Browser poté bude po X sekund interně přesměrovávat http:// na https://.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
Generative Artificial Intelligence (GenAI) in BusinessDr. Tathagat Varma
My talk for the Indian School of Business (ISB) Emerging Leaders Program Cohort 9. In this talk, I discussed key issues around adoption of GenAI in business - benefits, opportunities and limitations. I also discussed how my research on Theory of Cognitive Chasms helps address some of these issues
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
Semantic Cultivators : The Critical Future Role to Enable AIartmondano
By 2026, AI agents will consume 10x more enterprise data than humans, but with none of the contextual understanding that prevents catastrophic misinterpretations.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Dev Dives: Automate and orchestrate your processes with UiPath MaestroUiPathCommunity
This session is designed to equip developers with the skills needed to build mission-critical, end-to-end processes that seamlessly orchestrate agents, people, and robots.
📕 Here's what you can expect:
- Modeling: Build end-to-end processes using BPMN.
- Implementing: Integrate agentic tasks, RPA, APIs, and advanced decisioning into processes.
- Operating: Control process instances with rewind, replay, pause, and stop functions.
- Monitoring: Use dashboards and embedded analytics for real-time insights into process instances.
This webinar is a must-attend for developers looking to enhance their agentic automation skills and orchestrate robust, mission-critical processes.
👨🏫 Speaker:
Andrei Vintila, Principal Product Manager @UiPath
This session streamed live on April 29, 2025, 16:00 CET.
Check out all our upcoming Dev Dives sessions at https://community.uipath.com/dev-dives-automation-developer-2025/.
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
Quantum Computing Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Procurement Insights Cost To Value Guide.pptxJon Hansen
Procurement Insights integrated Historic Procurement Industry Archives, serves as a powerful complement — not a competitor — to other procurement industry firms. It fills critical gaps in depth, agility, and contextual insight that most traditional analyst and association models overlook.
Learn more about this value- driven proprietary service offering here.
Big Data Analytics Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
6. ORM… … maps relational databases to objects says František Tröster
7. ORM… … maps relational databases to objects says František Tröster … maps objects to relational databases says Jiří Knesl
8. ORM… … maps relational databases to objects says František Tröster … maps objects to relational databases says Jiří Knesl … is a technique for converting data between incompatible type systems in OOP languages says Wiki Pedia