Improving the Design of Existing SoftwareSteven Smith
Combat technical debt and keep your code maintainable using these principles, heuristics, and refactoring techniques. Presented October 2017 at DogfoodCon in Columbus, OH. Learn more at http://bit.ly/PS-Refactoring
JShell: An Interactive Shell for the Java PlatformJavaDayUA
Read-Execute-Print-Loops (REPLs) have emerged as powerful tools for learning and prototyping. JShell brings this power to Java. Targeted for JDK 9, and tightly integrated with the Java compiler and virtual machine, JShell enhances the programming experience for the Java language. Learn how to use JShell to explore new APIs, prototype code, or learn the Java language. Interactively explore new features of JDK 9. See the features that speed up coding.
Oracle Enterprise Manager Security: A Practitioners GuideCourtney Llamas
East Coast Oracle Users Group 2015 - Oracle Enterprise Manager 12c security framework can be quite overwhelming for the EM administrator. It's often hard to understand how the components interact and how to best leverage them for your organization. Learn how to take advantage of Enterprise Manager roles, groups and named credentials to properly grant permissions and privileges to users. Utilizing EM privileges, we'll show how you can safely grant access to application teams and developers, without the worry of changes being made.
Every development shop is unique, and sometimes that uniqueness can hinder using tools. SQL Developer and Data Modeler have multiple mechanisms that allow for customizations. These customizations can range from simple to complex and can help tailor the tooling to any environment. Some are as simple as colored warning to remind the user what is production vs. development. Some could auto-generate code by walking over a data model. The most complex can change anything at all in the tool. Ever think of a command that should be in SQL Plus scripting? Want to auto-generate table APIs?
What is DevOps? A lot of people think it means a lot of different things. We tend to think it has two complimentary aspects: culture and technology changes. Culture is what creates DevOps, technology enables it. Thanks, Kelly Goetsch, for the slide work.
Improving The Quality of Existing SoftwareSteven Smith
Presented at DevReach 2013.
As developers, most of our time is spent working on existing software. Sure, occasionally we get the chance to fire up a new Solution in Visual Studio, and that can be exciting. But after the first day, we find ourselves once more having to deal with the work we did yesterday. And today, we know more than we did yesterday, so there are things we’d do differently, if we had it to do over.
Over time, software rots. If we’re not diligent, our beautiful code can degrade into a worthless mess. Keeping our code in working condition is no different than changing the oil in our car – it’s preventive maintenance. In this session, Steve will look at some common places to look for signs of degradation in existing applications, and steps to take to improve the code. Examples will use C# and primarily ASP.NET.
Improving the Design of Existing SoftwareSteven Smith
Combat technical debt and keep your code maintainable using these principles, heuristics, and refactoring techniques. Presented October 2017 at DogfoodCon in Columbus, OH. Learn more at http://bit.ly/PS-Refactoring
JShell: An Interactive Shell for the Java PlatformJavaDayUA
Read-Execute-Print-Loops (REPLs) have emerged as powerful tools for learning and prototyping. JShell brings this power to Java. Targeted for JDK 9, and tightly integrated with the Java compiler and virtual machine, JShell enhances the programming experience for the Java language. Learn how to use JShell to explore new APIs, prototype code, or learn the Java language. Interactively explore new features of JDK 9. See the features that speed up coding.
Oracle Enterprise Manager Security: A Practitioners GuideCourtney Llamas
East Coast Oracle Users Group 2015 - Oracle Enterprise Manager 12c security framework can be quite overwhelming for the EM administrator. It's often hard to understand how the components interact and how to best leverage them for your organization. Learn how to take advantage of Enterprise Manager roles, groups and named credentials to properly grant permissions and privileges to users. Utilizing EM privileges, we'll show how you can safely grant access to application teams and developers, without the worry of changes being made.
Every development shop is unique, and sometimes that uniqueness can hinder using tools. SQL Developer and Data Modeler have multiple mechanisms that allow for customizations. These customizations can range from simple to complex and can help tailor the tooling to any environment. Some are as simple as colored warning to remind the user what is production vs. development. Some could auto-generate code by walking over a data model. The most complex can change anything at all in the tool. Ever think of a command that should be in SQL Plus scripting? Want to auto-generate table APIs?
What is DevOps? A lot of people think it means a lot of different things. We tend to think it has two complimentary aspects: culture and technology changes. Culture is what creates DevOps, technology enables it. Thanks, Kelly Goetsch, for the slide work.
Improving The Quality of Existing SoftwareSteven Smith
Presented at DevReach 2013.
As developers, most of our time is spent working on existing software. Sure, occasionally we get the chance to fire up a new Solution in Visual Studio, and that can be exciting. But after the first day, we find ourselves once more having to deal with the work we did yesterday. And today, we know more than we did yesterday, so there are things we’d do differently, if we had it to do over.
Over time, software rots. If we’re not diligent, our beautiful code can degrade into a worthless mess. Keeping our code in working condition is no different than changing the oil in our car – it’s preventive maintenance. In this session, Steve will look at some common places to look for signs of degradation in existing applications, and steps to take to improve the code. Examples will use C# and primarily ASP.NET.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. 08 | Getting prepared for automation
Jeffrey Snover | Distinguished Engineer & Lead Architect
Jason Helmick | Senior Technologist, Concentrated
Technology
2. Course Topics
Getting Started with PowerShell
01 | Don’t fear the shell
06 | The pipeline : Deeper
02 | The Help system
07 | The Power in the Shell - Remoting
03 | The pipeline : Getting connected
08 | Getting prepared for automation
04 | Extending the shell
09 | Automation in scale - Remoting
05 | Objects for the Admin
10 | Introducing scripting and toolmaking
3. Module Overview
• PowerShell security goals
• Execution Policy
• Variables : a place to store stuff
• Fun with Quotes
• Getting and displaying input
• Other output for scripts and automation
4. PowerShell security goals
• Secured by default
• Prevents mistakes by
unintentional admins and
users
• No Script Execution
• .Ps1 associated with notepad
• Must type path to execute a
script
5. Execution Policy
• By default, PowerShell does
not run scripts.
• Get/Set-ExecutionPolicy
• Restricted
• Unrestricted
• AllSigned
• RemoteSigned
• Bypass
• Undefined
• Can be set with Group Policy
6. Variables: A place to store stuff
• Use $ to create and use
variables
• Can contain letters, numbers,
spaces and underscores
• Don’t persist after Shell exits
• New-Variable
• Set-Variable
• Get-Variable
• Clear-Variable
• Remove-Variable
• Can force a type – [int]$var
Note: The $ is not part of the variable
name, it’s a cue to access the contents
of the variable
7. Fun with Quotes
• Double Quotes resolve all
variables
• Can use Sub-Expressions
• Single Quotes prevent
substitution
• Get-Help
About_Quoting_Rules
• Back-tick/Grave-Accent
prevents individual substitution