Presented at the Agile Alliance Technical Conference, April 2017 in Boston, MA.
Legacy code. It's those dirty brownfield applications that no one wants to work on. How do you make sure that your project never becomes one of those dreaded projects? And if you’ve inherited a dirtfield app, how do you turn it back around into a gorgeous greenfield?
The answer to both of these questions may surprise you: seeding your app with good communication artifacts. In this talk, Andrea Goulet, the CEO of Corgibytes, a shop that specializes in working on legacy code bases, will give you specific and immediately actionable ideas to ensure the legacy of your codebases stays as green as possible. You’ll learn how to:
● Avoid interruptions by effectively “seeding” artifacts throughout your work
● End the dreaded git blame game
● Create code that continues to provide value years after you write it.
If you’re ready to take your code legacy to the next level, this is one talk you won’t want to miss!
Makers and Menders: Putting the Right Developers on the Right ProjectsAndrea Goulet
As presented at the PhillyETE conference in April 2017.
When you think of a developer what comes to mind? A brogrammer living in San Francisco working 23 hours a day on the next Facebook? If so, you wouldn’t be alone. Like so many industries, software development is rife with stereotypes. And one that is particularly pervasive is the idea that all developers, if given the chance, would opt for a complete rewrite of an application.
While it’s true that there are many software developers who do enjoy starting with a clean slate, there is also a group who loves working on making existing applications better. Rather than starting from scratch and building an 80% solution, these developers are ideal for taking over a project once it’s become stable, and nurturing it for a long time. Neither developer is better. Both are needed in the software world. In this talk, you’ll learn what motivates the small but passionate group of “menders” — people who love taking an existing project and making it better over time.
Understanding Technical Debt: A Primer for Product Owners and FoundersAndrea Goulet
As presented at ProductCamp Boston June 2017.
Technical debt gets accrued when you move fast and break things, which is awesome in the early stages of a startup. Left unchecked, technical debt can slow a development team to a grinding halt, frustrating founders and product owners. In this session, we'll demystify technical debt. You'll leave with a good understanding of what it is, when to accrue it, and how to pay it down.
Epistemological Problem of Application SecurityJames Wickett
Over the years, AppSec has made progress but it has also made some mis-steps. We focus almost solely on development practices and training as remediation. This isn't sustainable and arguably does little good. There is a better way, but we have to separate ourselves from the core assumptions we have made that got us here. Lets journey together to find old truths and better approaches to Application Security.
How to Effect Change in the Epistemological Wasteland of Application SecurityJames Wickett
From GOTO London 2015
Over the years, application security (appsec) has made progress, but it has also made some considerable mis-steps. Appsec focuses almost solely on developer awareness and secure development training as remediation. This isn't sustainable and arguably does little good. There is a better way, but we have to separate ourselves from the core assumptions we have made that got us here. Lets journey together to find old truths and better approaches.
We will explore ways to make a change for the better across all levels of the development lifecycle, but we will focus on security testing early on in the development process. From this session, you will learn pragmatic approaches and tooling that will affect your development processes and delivery pipelines. You will walk away with code examples and tools that you can put into practice right away for security and rugged testing.
Disruptive Product Positioning with A/B TestingOptimizely
Claire Hunsaker, VP of Marketing, Stormpath
Building a new market with an innovative and deeply technical product: it's a tall order for a small company. With few resources, extremely limited time, and well-funded incumbent competition - how do you describe a new product few people have heard of, much less thought of?
Stormpath has used Optimizely (along with other analytics tools) to carve out a new market in a deeply technical - and skeptical - audience. More importantly, the small team has been able to nimbly test into great positioning that larger competitors can't touch, without spending money on expensive agencies, or burdening the team. Through a series of A/B tests, they discovered:
- How users identified our product as a great solution.
- How to set themselves apart from the confusingly-adjacent competition.
- How to describe functionality in terms customers understand.
In this presentation, Claire Hunsaker, VP of Marketing at Stormpath, covers actionable lessons from positioning tests, tips on how to structure A/B tests for new product positioning, and how to interpret results.
New Farming Methods in the Epistemological Wasteland of Application SecurityJames Wickett
Over the years, application security (appsec) has made progress, but it has also made some considerable mis-steps. Appsec focuses almost solely on developer awareness and secure development training as remediation. This isn't sustainable and arguably does little good. There is a better way, but we have to separate ourselves from the core assumptions we have made that got us here. Lets journey together to find old truths and better approaches.
We will explore ways to make a change for the better across all levels of the development lifecycle, but we will focus on security testing early on in the development process. From this session, you will learn pragmatic approaches and tooling that will affect your development processes and delivery pipelines. You will walk away with code examples and tools that you can put into practice right away for security and rugged testing.
http://lascon.org
http://lascon2015.sched.org/event/175e3c828095386b2fa0fc660b2502a3
Shift Left. Wait, what? No, Shift Right!!!Phillip Maddux
Presented on November 7, 2018 at Triangle DevOps (https://www.meetup.com/triangle-devops/).
Recently in the DevSecOps world there has been a call to shift left. However, application security has been shifting left for years already. What we should be doing is shifting application security to the right (production). This can be done by instrumenting applications for security.
Makers and Menders: Putting the Right Developers on the Right ProjectsAndrea Goulet
As presented at the PhillyETE conference in April 2017.
When you think of a developer what comes to mind? A brogrammer living in San Francisco working 23 hours a day on the next Facebook? If so, you wouldn’t be alone. Like so many industries, software development is rife with stereotypes. And one that is particularly pervasive is the idea that all developers, if given the chance, would opt for a complete rewrite of an application.
While it’s true that there are many software developers who do enjoy starting with a clean slate, there is also a group who loves working on making existing applications better. Rather than starting from scratch and building an 80% solution, these developers are ideal for taking over a project once it’s become stable, and nurturing it for a long time. Neither developer is better. Both are needed in the software world. In this talk, you’ll learn what motivates the small but passionate group of “menders” — people who love taking an existing project and making it better over time.
Understanding Technical Debt: A Primer for Product Owners and FoundersAndrea Goulet
As presented at ProductCamp Boston June 2017.
Technical debt gets accrued when you move fast and break things, which is awesome in the early stages of a startup. Left unchecked, technical debt can slow a development team to a grinding halt, frustrating founders and product owners. In this session, we'll demystify technical debt. You'll leave with a good understanding of what it is, when to accrue it, and how to pay it down.
Epistemological Problem of Application SecurityJames Wickett
Over the years, AppSec has made progress but it has also made some mis-steps. We focus almost solely on development practices and training as remediation. This isn't sustainable and arguably does little good. There is a better way, but we have to separate ourselves from the core assumptions we have made that got us here. Lets journey together to find old truths and better approaches to Application Security.
How to Effect Change in the Epistemological Wasteland of Application SecurityJames Wickett
From GOTO London 2015
Over the years, application security (appsec) has made progress, but it has also made some considerable mis-steps. Appsec focuses almost solely on developer awareness and secure development training as remediation. This isn't sustainable and arguably does little good. There is a better way, but we have to separate ourselves from the core assumptions we have made that got us here. Lets journey together to find old truths and better approaches.
We will explore ways to make a change for the better across all levels of the development lifecycle, but we will focus on security testing early on in the development process. From this session, you will learn pragmatic approaches and tooling that will affect your development processes and delivery pipelines. You will walk away with code examples and tools that you can put into practice right away for security and rugged testing.
Disruptive Product Positioning with A/B TestingOptimizely
Claire Hunsaker, VP of Marketing, Stormpath
Building a new market with an innovative and deeply technical product: it's a tall order for a small company. With few resources, extremely limited time, and well-funded incumbent competition - how do you describe a new product few people have heard of, much less thought of?
Stormpath has used Optimizely (along with other analytics tools) to carve out a new market in a deeply technical - and skeptical - audience. More importantly, the small team has been able to nimbly test into great positioning that larger competitors can't touch, without spending money on expensive agencies, or burdening the team. Through a series of A/B tests, they discovered:
- How users identified our product as a great solution.
- How to set themselves apart from the confusingly-adjacent competition.
- How to describe functionality in terms customers understand.
In this presentation, Claire Hunsaker, VP of Marketing at Stormpath, covers actionable lessons from positioning tests, tips on how to structure A/B tests for new product positioning, and how to interpret results.
New Farming Methods in the Epistemological Wasteland of Application SecurityJames Wickett
Over the years, application security (appsec) has made progress, but it has also made some considerable mis-steps. Appsec focuses almost solely on developer awareness and secure development training as remediation. This isn't sustainable and arguably does little good. There is a better way, but we have to separate ourselves from the core assumptions we have made that got us here. Lets journey together to find old truths and better approaches.
We will explore ways to make a change for the better across all levels of the development lifecycle, but we will focus on security testing early on in the development process. From this session, you will learn pragmatic approaches and tooling that will affect your development processes and delivery pipelines. You will walk away with code examples and tools that you can put into practice right away for security and rugged testing.
http://lascon.org
http://lascon2015.sched.org/event/175e3c828095386b2fa0fc660b2502a3
Shift Left. Wait, what? No, Shift Right!!!Phillip Maddux
Presented on November 7, 2018 at Triangle DevOps (https://www.meetup.com/triangle-devops/).
Recently in the DevSecOps world there has been a call to shift left. However, application security has been shifting left for years already. What we should be doing is shifting application security to the right (production). This can be done by instrumenting applications for security.
The left is not wrong, just not right; It's time to shift right!Phillip Maddux
In the last few years of AppSec and DevOps, we've heard the calls to shift left. But how far left can we go, and is it really going to help eliminate exploitable bugs or scale your AppSec program? What if we consider a different direction, shifting right! Can a focus on shifting to the right be more effective in mitigating real-world threats and prioritization? In this presentation, I'll explore these questions and propose concepts that show why shifting right is right!
devopsdays Amsterdam 2018 - Chaos while deploying AI and making sure it doesn...Thiago de Faria
Presentation + Demo at devopsdays Amsterdam 2018 - June 29th.
AI is such a buzzword, with its futuristic implementations and sophisticated machine learning algorithms (Hello, Deep learning!). We are using ML when we need external data to reach a working product because it would be impossible to solve it with the regular for/if/loops. What are the next steps? Moreover, what about Test, Release, and Deployment? We always value data and call our organizations “data-driven,” but now the impact is even more significant. If you are using an ML component, misused/dirty/problematic data will affect not your internal reports as before… but your application deployment and quality of service. Let’s hear discuss some AI implementations stories (its advantages/problems) finding common mistakes and future challenges for such a hyped theme.
Big, Impossible Projects are exciting, transformative, and begin with an overwhelming number of unanswered questions. Developing against a moving target is never easy — you might find yourself going against best practices such as designing solutions without knowing all the parameters, or encountering dependencies you didn’t even think were possible. Big, Impossible projects can start out looking small and simple, but like an iceberg, they have much more to them once you get up close. In this talk for both new and seasoned leaders you will learn to navigate the icebergs and bring your next Big, Impossible Project to a successful conclusion.
DOES SFO 2016 - Sam Guckenheimer & Ed Blankenship "Moving to One Engineering ...Gene Kim
Microsoft has been on a transformation both culturally as well as technically by consolidating engineering systems to One Engineering System. Along the way, we've had many learnings that we'll share from soup to nuts: adopting Git at scale, realigning our talent competencies, reorganizing, becoming data driven, and delivering continuously through lots of automation & cloud adoption.
devopsdays Riga 2018 - Chaos while deploying AI and making sure it doesn’t hu...Thiago de Faria
Presentation + Demo at devopsdays Riga 2018 - September 28th.
AI is such a buzzword, with its futuristic implementations and sophisticated machine learning algorithms (Hello, Deep learning!). We are using ML when we need external data to reach a working product because it would be impossible to solve it with the regular for/if/loops. What are the next steps? Moreover, what about Test, Release, and Deployment? We always value data and call our organizations “data-driven,” but now the impact is even more significant. If you are using an ML component, misused/dirty/problematic data will affect not your internal reports as before… but your application deployment and quality of service. Let’s hear discuss some AI implementations stories (its advantages/problems) finding common mistakes and future challenges for such a hyped theme.
SecOps Armageddon: A look into the future of security & operationsPhillip Maddux
Presented on November 7, 2018 at Triangle DevOps (https://www.meetup.com/triangle-devops/).
With the continuing evolution of the shift to the cloud and automation, this talk explores what the future might look like for security and operations. Will security and operations be abstracted away, resulting in only developers having jobs?
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napocajerryhargrove
Whether you’re building an application in a DevOps + Security culture, or have already bridged the gap with DevSecOps, the task remains the same: How do you ensure that security best practices are understood, architected for and integrated into your application from day 1 AND remain relevant year 1. During this talk I’ll focus on how to achieve these goals amidst the ever changing landscape of people, process, and technology in the cloud, in the context of various compute environments like instances, containers and serverless functions. and how to do so using off-the-shelf AWS services and features. I’ll complete the story by accompanying this discussion with a reference application architecture and examples. Attendees of this talk will receive actionable best practices and guidance, with specific implementation details for AWS
devopsdays Kiel 2018 - Can the AI hype & ML algorithms harm your devops initi...Thiago de Faria
The talk was given at devopsdays Kiel 2018 on 16/May/2018. It is a discussion around the AI Hype and how implementing CI/CD concepts is one of the most important concepts to improve team's velocity around Machine Learning applications.
The Dark Side of Low Code – André Eriksson @ Encore.devMarcus Kohlberg
André Eriksson from Encore.dev talks about the dark side of low code tools, common pitfalls, and when to avoid using them to build your backend.
Originally presented at API Days in Helsinki, March 2021.
CSA Raleigh application security and deception in the cloudPhillip Maddux
Presented on January 17, 2019 at Raleigh/Durham/RTP - Cloud Security Alliance Chapter (https://www.meetup.com/Raleigh-Durham-RTP-Cloud-Security-Alliance-Chapter/).
Over the last several years there has been a steady and increasing march towards shifting applications to the cloud. To keep pace with this cloud adoption, in some cases multi-cloud adoption, security teams need consistent real-time threat visibility over their web applications production. In this talk, we'll discuss some of the foundational concepts that comprise a practical approach to threat visibility and securing applications in the cloud. In addition, extending visibility to breaches in progress, deception can be a valuable layer in your defense in depth strategy. We'll discuss the concept of deception and how it can be deployed in the cloud. Overall, the audience will gain a greater insight into application security and deception for the cloud. As we head into 2019, we need to prepare for a year that will prove these concepts are critical for defending deployments in the cloud.
Failure is inevitable but it isn't permanentTom Stiehm
Agile Transformation is harder than it needs to be because we often find ways to consciously or subconsciously sabotage our efforts if we can recognize this behavior it is possible to intervene and make a change for the positive.
Good project from scratch - from developer's point of viewPaweł Lewtak
Slides for my talk at PHPExperience 2018 in São Paulo.
It's about 10 things I believe are important in order to have a successful long-term IT project.
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConTom Stiehm
DevSecOps adds on the DevOps by making Application Security part of the daily workflow of the team in order to improve the quality and security of a product. Shift AppSec practices left is the key enabler to making AppSec a first-class citizen in the development effort rather than an afterthought with limited ability to be successful.
Mobile Security & Analytics: What Works and What Doesn'tSkycure
Watch webinar recording: http://hubs.ly/H01dH3v0
Hadi Nahari, Chief Security Architect, Mobile and Software Platforms, at NVIDIA, discusses why analytics-driven security is considered the state of the art in mobile and IoT security.
Designing for the web changed from an artisan template design to a more modern LEGO builder approach. Creating a personalized library of UI&UX bricks with intelligent behaviors helps an organization to build a real product. Reusable components can be combined in more complex structures, widgets and templates thus providing higher fidelity to design and decreasing the time to market. Through real project examples, this talk will introduce the design methodology and process to translate a UX model into a set of components, and the recommended development practices to implement.
The building blocks of the next web, from Customer Journey to UI Components. ...Codemotion
Designing for the web changed from an artisan template design to a more modern LEGO builder approach. Creating a personalized library of UI&UX bricks with intelligent behaviors helps an organization to build a real product. Reusable components can be combined in more complex structures, widgets and templates thus providing higher fidelity to design and decreasing the time to market. Through real project examples, this talk will introduce the design methodology and process to translate a UX model into a set of components, and the recommended development practices to implement.
Businesses must prepare for the convergence of two of the most transformative trends in technology - open source and the Internet of Things (IoT).
The IoT, put simply, involves using devices to collect, transmit, and analyse data. It has tremendous potential to transform industries from healthcare to automotive. However open source technologies will be critical to support and underpin the proliferation of the IoT.
In this webinar, Belatrix`s expert, Sergio Infante, will analyze the rise of open source, and how it will impact the Internet of Things. He will detail how technology leaders can respond and prepare for this transformation. In particular:
Why the IoT will rely on open source software
Different open source approaches to the IoT
Case studies of open source IoT
How you can contribute to the open source community
The left is not wrong, just not right; It's time to shift right!Phillip Maddux
In the last few years of AppSec and DevOps, we've heard the calls to shift left. But how far left can we go, and is it really going to help eliminate exploitable bugs or scale your AppSec program? What if we consider a different direction, shifting right! Can a focus on shifting to the right be more effective in mitigating real-world threats and prioritization? In this presentation, I'll explore these questions and propose concepts that show why shifting right is right!
devopsdays Amsterdam 2018 - Chaos while deploying AI and making sure it doesn...Thiago de Faria
Presentation + Demo at devopsdays Amsterdam 2018 - June 29th.
AI is such a buzzword, with its futuristic implementations and sophisticated machine learning algorithms (Hello, Deep learning!). We are using ML when we need external data to reach a working product because it would be impossible to solve it with the regular for/if/loops. What are the next steps? Moreover, what about Test, Release, and Deployment? We always value data and call our organizations “data-driven,” but now the impact is even more significant. If you are using an ML component, misused/dirty/problematic data will affect not your internal reports as before… but your application deployment and quality of service. Let’s hear discuss some AI implementations stories (its advantages/problems) finding common mistakes and future challenges for such a hyped theme.
Big, Impossible Projects are exciting, transformative, and begin with an overwhelming number of unanswered questions. Developing against a moving target is never easy — you might find yourself going against best practices such as designing solutions without knowing all the parameters, or encountering dependencies you didn’t even think were possible. Big, Impossible projects can start out looking small and simple, but like an iceberg, they have much more to them once you get up close. In this talk for both new and seasoned leaders you will learn to navigate the icebergs and bring your next Big, Impossible Project to a successful conclusion.
DOES SFO 2016 - Sam Guckenheimer & Ed Blankenship "Moving to One Engineering ...Gene Kim
Microsoft has been on a transformation both culturally as well as technically by consolidating engineering systems to One Engineering System. Along the way, we've had many learnings that we'll share from soup to nuts: adopting Git at scale, realigning our talent competencies, reorganizing, becoming data driven, and delivering continuously through lots of automation & cloud adoption.
devopsdays Riga 2018 - Chaos while deploying AI and making sure it doesn’t hu...Thiago de Faria
Presentation + Demo at devopsdays Riga 2018 - September 28th.
AI is such a buzzword, with its futuristic implementations and sophisticated machine learning algorithms (Hello, Deep learning!). We are using ML when we need external data to reach a working product because it would be impossible to solve it with the regular for/if/loops. What are the next steps? Moreover, what about Test, Release, and Deployment? We always value data and call our organizations “data-driven,” but now the impact is even more significant. If you are using an ML component, misused/dirty/problematic data will affect not your internal reports as before… but your application deployment and quality of service. Let’s hear discuss some AI implementations stories (its advantages/problems) finding common mistakes and future challenges for such a hyped theme.
SecOps Armageddon: A look into the future of security & operationsPhillip Maddux
Presented on November 7, 2018 at Triangle DevOps (https://www.meetup.com/triangle-devops/).
With the continuing evolution of the shift to the cloud and automation, this talk explores what the future might look like for security and operations. Will security and operations be abstracted away, resulting in only developers having jobs?
From Zero to DevSecOps in 60 Minutes - DevTalks Romania - Cluj-Napocajerryhargrove
Whether you’re building an application in a DevOps + Security culture, or have already bridged the gap with DevSecOps, the task remains the same: How do you ensure that security best practices are understood, architected for and integrated into your application from day 1 AND remain relevant year 1. During this talk I’ll focus on how to achieve these goals amidst the ever changing landscape of people, process, and technology in the cloud, in the context of various compute environments like instances, containers and serverless functions. and how to do so using off-the-shelf AWS services and features. I’ll complete the story by accompanying this discussion with a reference application architecture and examples. Attendees of this talk will receive actionable best practices and guidance, with specific implementation details for AWS
devopsdays Kiel 2018 - Can the AI hype & ML algorithms harm your devops initi...Thiago de Faria
The talk was given at devopsdays Kiel 2018 on 16/May/2018. It is a discussion around the AI Hype and how implementing CI/CD concepts is one of the most important concepts to improve team's velocity around Machine Learning applications.
The Dark Side of Low Code – André Eriksson @ Encore.devMarcus Kohlberg
André Eriksson from Encore.dev talks about the dark side of low code tools, common pitfalls, and when to avoid using them to build your backend.
Originally presented at API Days in Helsinki, March 2021.
CSA Raleigh application security and deception in the cloudPhillip Maddux
Presented on January 17, 2019 at Raleigh/Durham/RTP - Cloud Security Alliance Chapter (https://www.meetup.com/Raleigh-Durham-RTP-Cloud-Security-Alliance-Chapter/).
Over the last several years there has been a steady and increasing march towards shifting applications to the cloud. To keep pace with this cloud adoption, in some cases multi-cloud adoption, security teams need consistent real-time threat visibility over their web applications production. In this talk, we'll discuss some of the foundational concepts that comprise a practical approach to threat visibility and securing applications in the cloud. In addition, extending visibility to breaches in progress, deception can be a valuable layer in your defense in depth strategy. We'll discuss the concept of deception and how it can be deployed in the cloud. Overall, the audience will gain a greater insight into application security and deception for the cloud. As we head into 2019, we need to prepare for a year that will prove these concepts are critical for defending deployments in the cloud.
Failure is inevitable but it isn't permanentTom Stiehm
Agile Transformation is harder than it needs to be because we often find ways to consciously or subconsciously sabotage our efforts if we can recognize this behavior it is possible to intervene and make a change for the positive.
Good project from scratch - from developer's point of viewPaweł Lewtak
Slides for my talk at PHPExperience 2018 in São Paulo.
It's about 10 things I believe are important in order to have a successful long-term IT project.
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConTom Stiehm
DevSecOps adds on the DevOps by making Application Security part of the daily workflow of the team in order to improve the quality and security of a product. Shift AppSec practices left is the key enabler to making AppSec a first-class citizen in the development effort rather than an afterthought with limited ability to be successful.
Mobile Security & Analytics: What Works and What Doesn'tSkycure
Watch webinar recording: http://hubs.ly/H01dH3v0
Hadi Nahari, Chief Security Architect, Mobile and Software Platforms, at NVIDIA, discusses why analytics-driven security is considered the state of the art in mobile and IoT security.
Designing for the web changed from an artisan template design to a more modern LEGO builder approach. Creating a personalized library of UI&UX bricks with intelligent behaviors helps an organization to build a real product. Reusable components can be combined in more complex structures, widgets and templates thus providing higher fidelity to design and decreasing the time to market. Through real project examples, this talk will introduce the design methodology and process to translate a UX model into a set of components, and the recommended development practices to implement.
The building blocks of the next web, from Customer Journey to UI Components. ...Codemotion
Designing for the web changed from an artisan template design to a more modern LEGO builder approach. Creating a personalized library of UI&UX bricks with intelligent behaviors helps an organization to build a real product. Reusable components can be combined in more complex structures, widgets and templates thus providing higher fidelity to design and decreasing the time to market. Through real project examples, this talk will introduce the design methodology and process to translate a UX model into a set of components, and the recommended development practices to implement.
Businesses must prepare for the convergence of two of the most transformative trends in technology - open source and the Internet of Things (IoT).
The IoT, put simply, involves using devices to collect, transmit, and analyse data. It has tremendous potential to transform industries from healthcare to automotive. However open source technologies will be critical to support and underpin the proliferation of the IoT.
In this webinar, Belatrix`s expert, Sergio Infante, will analyze the rise of open source, and how it will impact the Internet of Things. He will detail how technology leaders can respond and prepare for this transformation. In particular:
Why the IoT will rely on open source software
Different open source approaches to the IoT
Case studies of open source IoT
How you can contribute to the open source community
No Silver Bullet - Essence and Accidents of Software EngineeringAditi Abhang
”There is no single development, in either technology or in management technique, that by itself promises even one order of magnitude improvement in productivity, in reliability, in simplicity.”
[Keynote] James Higgs - Quality is a variableCodemotion
Software engineering practices have matured tremendously in recent years, but too often they are applied thoughtlessly and without a true understanding of why or when they might be applicable. Frequently, engineers will debate the "best" or "correct" way to do things without wider reference to the problem at hand. In this talk I will show how a pragmatic approach to quality is required if we are to truly make digital products that matter.
Software engineering practices have matured tremendously in recent years, but too often they are applied thoughtlessly and without a true understanding of why or when they might be applicable. Frequently, engineers will debate the "best" or "correct" way to do things without wider reference to the problem at hand. In this talk I will show how a pragmatic approach to quality is required if we are to truly make digital products that matter.
Codemotion Milan 2018 - AI with a devops mindset: experimentation, sharing an...Thiago de Faria
AI is the buzzword while ML is the underlying component... but when do we use ML? To solve problems that machines can find patterns without explicitly programming them to do so. But do you have a team building an ML model? How far are they from the IT team? Do they know how to deploy and serve that? Testing? And sharing what they have done? That's where a devops mindset comes in: reduce the batch size, continuous-everything and a culture of failure/experimentation are vital for your data team! In the end, I will show how the workflow of a data scientist can be in real life with a live demo!
Thiago de Faria - AI with a devops mindset - experimentation, sharing and eas...Codemotion
AI is the buzzword while ML is the underlying component... but when do we use ML? To solve problems that machines can find patterns without explicitly programming them to do so. But do you have a team building an ML model? How far are they from the IT team? Do they know how to deploy and serve that? Testing? And sharing what they have done? That's where a devops mindset comes in: reduce the batch size, continuous-everything and a culture of failure/experimentation are vital for your data team! In the end, I will show how the workflow of a data scientist can be on the real life with a live demo!
Identify Development Pains and Resolve Them with Idea FlowTechWell
With the explosion of new frameworks, a mountain of automation, and our applications distributed across hundreds of services in the cloud, the level of complexity in software development is growing at an insane pace. With increased complexity comes increased costs and risks. When diagnosing unexpected behavior can take days, weeks, or sometimes months, all while our release is on the line, our projects plunge into chaos. In the invisible world of software development, how do we identify what's causing our pain? How do we escape the chaos? Janelle Klein presents a novel approach to measuring the chaos, identifying the causes, and systematically driving improvement with a data-driven feedback loop. Rather than measuring the problems in the code, Janelle suggests measuring the "friction in Idea Flow", the time it takes a developer to diagnose and resolve unexpected confusion, which disrupts the flow of progress during development. With visibility of the symptoms, we can identify the cause—whether it's bad architecture, collaboration problems, or technical debt. Janelle discusses how to measure Idea Flow, why it matters, and the implications for our teams, our organizations, and our industry.
What makes an open-source project successful? How hard is it to add external people to an open project?
We at Nethesis have open source in our core with more than 400 public repositories that hold all of our company code. With the upcoming release of NethServer, we’re facing the excruciating question: how do we make it more appealing for developers?
Follow me in the changes we want to make to our processes to ease development and contributions, using big projects as examples and how even you can make a difference in the smallest of all codebases.
To cope with privacy laws, big data players face a new need: synthetic data.
At Real Impact Analytics, we specialize in modelling telecom data. Here is how we created our own synthetic data generator.
website realimpactanalytics.com
email info@realimpactanalytics.com
This CodeIT company presentation gives a short description of the way CodeIT outsourcing company provides software development services and cooperate with clients from 32 countries around the world.
Similar to Communication Artifacts: What's Your Code's Legacy? (20)
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Andrea Goulet
In his book, The Nature of the Physical World, Sir Arthur Eddington commented that “We have to appeal to the one outstanding law — the second law of thermodynamics — to put some sense into the world.” This sense-making goes beyond the physical world, too. Entropy is also essential in the fields of
information and communication theory.
During this lecture for the Princeton Plasma Physics Laboratory, lecturer Andrea Goulet discussed the application of entropy-related concepts in two communication systems: software and collaborative teams. She examined how concepts that help us understand systemic statistical disorder, such as ergodic systems, Lyapunov exponents, Kolmogorov-Sinai entropy, and Shannon-entropy can help us optimize for both software quality and innovation. She also provided several domain-specific models: Lehman’s Laws and Conway’s Law for software, as well as new models from her own research that relate to entropy and innovation.
Entropy helps us understand the world and achieve great things. There is an underlying beauty in its principles that we can use to advance scientific discovery. When we understand the subtleties related to balancing surprise and structure, we increase our chances for effective collaboration and finding novel solutions to complex problems.
Community is Just as Important as Code by Andrea GouletAndrea Goulet
Nearly a decade ago, a small group of menders (and one maker) found community with each other at a conference and Legacy Code Rocks was born. Since then, the Legacy Code Rocks community has grown to over 1000 people, 150 podcast episodes, a weekly meetup and of course, MenderCon.
In this talk, Andrea Goulet, the maker who kindled the spark, will take us back to those early days and reflect on how the bedrock of the Legacy Code Rocks community has always been creating a sense of belonging. Compassion and empathy are at the core of being a mender. Mending is caring deeply, seeing potential, and being willing to work through the frustration of making things better one small step at a time. This commitment to helping others feel seen instead of shame is why the Legacy Code Rocks community is so special — and it’s exactly why having the heart of the mender is what our world needs now more than ever.
The Marriage of Communication and Code: How Strategists and Technicians Can E...Andrea Goulet
Building software these days often requires working with people whose skillsets and backgrounds are vastly different from yours. But sometimes, it can seem like our thinking styles just don’t align and working together is impossible. In this talk, Andrea Goulet, (a strategist), will share her story of building a business with M. Scott Ford (a technician) and the unusual communication tricks they had to develop to finally understand each other. You’ll walk away with specific and immediately implementable ideas on how to communicate with your team — especially the folks who think differently from you.
Becoming Technical: Overcome Your Fear of Coding and Supercharge Your CareerAndrea Goulet
Why do so many smart and accomplished people immediately discount their abilities and call themselves “non-technical”? Software isn’t magic. It’s a skill. One that can be learned — if you have the right mindset. You don’t have to go to a fancy school, spend thousands of dollars, or move across the country. This knowledge is available to you no matter where you live and no matter what industry you come from. All you need to do is change the way you think. In this talk, Andrea Goulet will share her journey from not knowing how to code to becoming a industry leader. You'll get immediately actionable insights that will help you shatter glass ceilings, increase confidence, and grow your technical prowess.
Becoming Technical: Overcome Your Fear of Coding and Supercharge Your CareerAndrea Goulet
Why do so many smart and accomplished people immediately discount their abilities and call themselves “non-technical”? Software isn’t magic. It’s a skill. One that can be learned — if you have the right mindset. You don’t have to go to a fancy school, spend thousands of dollars, or move across the country. This knowledge is available to you no matter where you live and no matter what industry you come from. All you need to do is change the way you think. In this talk, Andrea Goulet will share her journey from not knowing how to code to becoming an industry leader. You'll get immediately actionable insights that will help you shatter glass ceilings, increase confidence, and grow your technical prowess.
Should I Estimate That? Complicated VS Complex ProjectsAndrea Goulet
Legacy code is notoriously difficult to produce an accurate estimate. Why is that? In this talk, we’ll explore the difference between complicated projects, which are easy to replicate and estimate, and complex projects, which are near impossible to predict due to the number of interdependencies in the system. You’ll walk away understanding when to reach for a tightly-scoped fixed-price proposal and when an exploratory time and materials approach is more appropriate.
You’ll walk away understanding not if you should estimate a project, but rather when and how.
When you think of a developer what comes to mind? A brogrammer living in San Francisco working 23 hours a day on the next Facebook? If so, you wouldn’t be alone. Like so many industries, software development is rife with stereotypes. And one that is particularly pervasive is the idea that all developers, if given the chance, would opt for a complete rewrite of an application.
While it’s true that there are many software developers who do enjoy starting with a clean slate, there is also a group who loves working on making existing applications better. Rather than starting from scratch and building an 80% solution, these developers are ideal for taking over a project once it has become stable, and nurturing it for a long time. Neither developer is better. Both are needed in the software world. In this talk, you’ll learn what motivates the small but passionate group of "menders" — people who love taking an existing project and making it better over time.
Vulnerability: The Key to Successful Agile AdoptionAndrea Goulet
Software development culture has been dominated by the hero. Rock stars, ninjas, and 10Xers have been the center of attention, giving the skewed perception that great software is the result of a single amazing developer. But this couldn't be further from the truth.
In this talk, Andrea Goulet, the CEO of Corgibytes, will share her experiences using vulnerability and empathy as drivers for Agile adoption and culture building.
Presented at AgileDC 2016
Why I Type In Dvorak (And What The Heck That Is)Andrea Goulet
Dvorak is a simplified keyboard layout that I've been using for the past six years. Here's a quick presentation about what it is, why I use it, and how you can get started.
So a Baby Walks Into a Tech Conference: Confronting Maternal Bias in the Soft...Andrea Goulet
In August 2015, my business/life partner and I both wanted to attend a national software development conference. The only catch? I had a ten week old baby at home. We used Agile software development practices to help us decide what to do and learned some interesting things during our experience.
Audience Analysis: Getting the Right Message to the Right PeopleAndrea Goulet
One of the keys to developing an effective message is understanding your audience. In this presentation, you'll learn about segmentation, demographics, psychographics, personas, archetypes, and more. They all work together to help you define your audience.
Copywriting for Startups and EntrepreneursAndrea Goulet
So, you've decided to start your own business. Awesome! Now it's time to connect with potential customers, investors and employees through your website. It needs to impress your readers, be engaging, and make your idea shine. Having a website that clearly presents your idea can be the difference between success and failure. No pressure, right?
Andrea Goulet Ford of BrandVox™ shares her tips from writing hundreds of websites over the past decade.
Culture of Content: Bridging the Gap Between Content Leadership and Creative ...Andrea Goulet
What holds brands back from creating engaging, effective content typically isn’t talent, but rather a complex cobweb of rules, regulations and business processes that get in the way.
The best content marketing brands embrace a “culture of content.” They have a collaborative spirit. Leaders know how to articulate visions. Messaging foundations are documented. Approvals are swift and nimble. And creative professionals have the resources they need to execute engaging content in real time.
How to Build a Culture of Content in Your BusinessAndrea Goulet
If you want more sales, happier customers, more engaged employees, and better brand awareness, you need to start creating a Culture of Content. It's the first step to creating a brand voice that stands out in a crowded marketplace.
Content Personalities: Working with Others without Going InsaneAndrea Goulet
Content strategists and creators work with a wide variety of personalities and empathy is a big part of doing our job well. This presentation goes over the pros and cons of four distinct content personalities (Artists, Admins, Analysts, and Absentees) and provides suggestions for working with each.
How to Source, Organize, and Publish Quality Social Media Content (Without Lo...Andrea Goulet
Do you feel like you have to quit your day job just to keep on top of your social media efforts? This presentation will help you bring sanity back to your content. You'll learn about:
* 4 challenges for publishing in social media
* How to use a consistent brand voice across your organization
* 3 types of content and what should be pre-scheduled
* Apps to help manage your social media workflow
* Exercises to get you up and running
To your success,
Andrea Goulet Ford
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Anthony Dahanne
Les Buildpacks existent depuis plus de 10 ans ! D’abord, ils étaient utilisés pour détecter et construire une application avant de la déployer sur certains PaaS. Ensuite, nous avons pu créer des images Docker (OCI) avec leur dernière génération, les Cloud Native Buildpacks (CNCF en incubation). Sont-ils une bonne alternative au Dockerfile ? Que sont les buildpacks Paketo ? Quelles communautés les soutiennent et comment ?
Venez le découvrir lors de cette session ignite
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus
As part of the DOE Integrated Research Infrastructure (IRI) program, NERSC at Lawrence Berkeley National Lab and ALCF at Argonne National Lab are working closely with General Atomics on accelerating the computing requirements of the DIII-D experiment. As part of the work the team is investigating ways to speedup the time to solution for many different parts of the DIII-D workflow including how they run jobs on HPC systems. One of these routes is looking at Globus Compute as a way to replace the current method for managing tasks and we describe a brief proof of concept showing how Globus Compute could help to schedule jobs and be a tool to connect compute at different facilities.
Into the Box Keynote Day 2: Unveiling amazing updates and announcements for modern CFML developers! Get ready for exciting releases and updates on Ortus tools and products. Stay tuned for cutting-edge innovations designed to boost your productivity.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Your Digital Assistant.
Making complex approach simple. Straightforward process saves time. No more waiting to connect with people that matter to you. Safety first is not a cliché - Securely protect information in cloud storage to prevent any third party from accessing data.
Would you rather make your visitors feel burdened by making them wait? Or choose VizMan for a stress-free experience? VizMan is an automated visitor management system that works for any industries not limited to factories, societies, government institutes, and warehouses. A new age contactless way of logging information of visitors, employees, packages, and vehicles. VizMan is a digital logbook so it deters unnecessary use of paper or space since there is no requirement of bundles of registers that is left to collect dust in a corner of a room. Visitor’s essential details, helps in scheduling meetings for visitors and employees, and assists in supervising the attendance of the employees. With VizMan, visitors don’t need to wait for hours in long queues. VizMan handles visitors with the value they deserve because we know time is important to you.
Feasible Features
One Subscription, Four Modules – Admin, Employee, Receptionist, and Gatekeeper ensures confidentiality and prevents data from being manipulated
User Friendly – can be easily used on Android, iOS, and Web Interface
Multiple Accessibility – Log in through any device from any place at any time
One app for all industries – a Visitor Management System that works for any organisation.
Stress-free Sign-up
Visitor is registered and checked-in by the Receptionist
Host gets a notification, where they opt to Approve the meeting
Host notifies the Receptionist of the end of the meeting
Visitor is checked-out by the Receptionist
Host enters notes and remarks of the meeting
Customizable Components
Scheduling Meetings – Host can invite visitors for meetings and also approve, reject and reschedule meetings
Single/Bulk invites – Invitations can be sent individually to a visitor or collectively to many visitors
VIP Visitors – Additional security of data for VIP visitors to avoid misuse of information
Courier Management – Keeps a check on deliveries like commodities being delivered in and out of establishments
Alerts & Notifications – Get notified on SMS, email, and application
Parking Management – Manage availability of parking space
Individual log-in – Every user has their own log-in id
Visitor/Meeting Analytics – Evaluate notes and remarks of the meeting stored in the system
Visitor Management System is a secure and user friendly database manager that records, filters, tracks the visitors to your organization.
"Secure Your Premises with VizMan (VMS) – Get It Now"
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...informapgpstrackings
Keep tabs on your field staff effortlessly with Informap Technology Centre LLC. Real-time tracking, task assignment, and smart features for efficient management. Request a live demo today!
For more details, visit us : https://informapuae.com/field-staff-tracking/
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
Tim Combridge from Sensible Giraffe and Salesforce Ben presents some important tips that all developers should know when dealing with Flows in Salesforce.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
14. ANY ORGANIZATION THAT DESIGNS A SYSTEM
WILL PRODUCE A DESIGN WHOSE STRUCTURE
IS A COPY OF THE ORGANIZATION'S
COMMUNICATION STRUCTURE
CONWAY’S LAW
@andreagouletSource: http://www.melconway.com/Home/Conways_Law.html
18. AUTOMATIC TOOLS SHOULD CAPTURE “WHO AND WHEN”
CODE SHOULD REVEAL “WHAT AND HOW”
USE COMMITS & DESCRIPTIONS TO PRESERVE “WHY”
HOW MUCH?
@andreagoulet
19. REDUCE FUTURE INTERRUPTIONS
RAMP UP QUICKLY AFTER MENTAL MODEL DISAPPEARS
BUILDS TRUST WITH BUSINESS TEAM
WHY BOTHER?
@andreagoulet
23. @andreagoulet
USE METAPHORS
Metaphors are invaluable
communication tools. It’s
how our brains are wired to
share abstract concepts.
XP practices encourage the
use of system metaphors.
25. @andreagoulet
USE METAPHORS
1. Ground it in a shared
experience.
2. Agree on a concept.
3. Build the concept with
supportive metaphorical
expressions.
27. @andreagoulet
WRITING USEFUL COMMITS
“Commit messages should be shorter than
a tweet. Descriptions should be a blog
post if necessary.” -Dave Bock
Commits are tied to source control
Alias `git blame` as `git history`
Present tense (adds, restores, etc.)
31. @andreagoulet
LEARNING TO LOVE TESTS
Tests are insurance.
You’re already checking your work.
Automated tests preserve your intentions and
assumptions in the code.
Reduces the chances of the vicious cycle of bug
swapping occurring.
Easier to add edge cases later.
33. @andreagoulet
A SECOND PAIR OF EYES
Open the pull request early (not when you’re done).
Drafts should always be okay.
Describe what’s being done and why. Context matters,
especially when the project isn’t top of mind.
Constructive criticism makes you a better developer.
Learn to value it.
When leaving feedback, try this framework:
This solution is strong because…
It could be even stronger if you…
35. @andreagoulet
EVEN TIMESHEETS HAVE VALUE
Operations and finance people really value this
information.
If you’re tempted to put an 8, split it into discrete tasks.
This data may feel pedantic to you, but it could be
incredibly valuable to others on your team.
If you communicate in a time sheet, you won’t get
interrupted later.
Discourages ghosting. Keeps you honest and reveals
the true cost of development.
37. @andreagoulet
WRITE USEFUL ERROR MESSAGES
Write messages directly to the user, not to the
computer.
Use the active voice instead of the
passive voice, when possible.
Ease the pain with politeness and a conversational
tone. (Ex: Mac chord = first thing you hear after a crash)
In addition to explaining what’s wrong, suggest an
alternative. (Ex: Unrecognized command: statsu. Did
you mean status?)
38. IS A SKILL — SOMETHING YOU CAN ACQUIRE
DEVELOPED BY LISTENING & UNDERSTANDING
APPLIED BY PERSPECTIVE TAKING
EMPATHY
@andreagouletSource: Practical Empathy by Indi Young
39. @andreagoulet
TYPES OF EMPATHY
Source: Practical Empathy by Indi Young
MIRRORED EMPATHY
AFFECTIVE EMPATHY
EMPATHETIC CONCERN
PERSONAL DISTRESS
SELF EMPATHY
COGNITIVE EMPATHY