Curl is an open source command line tool and library for transferring data using various internet protocols. The document discusses curl's history, features, usage, and options. Curl supports many protocols including HTTP, HTTPS, FTP, FTPS, and more. It has over 230 command line options and has been ported to many operating systems. The document provides examples of common curl commands and options for making HTTP requests, handling cookies and redirects, uploading and downloading files, and more.
HTTP/3 is designed to improve in areas where HTTP/2 still has some shortcomings, primarily by changing the transport layer. HTTP/3 is the first major protocol to step away from TCP and instead it uses QUIC.
HTTP/3 is the designated name for the coming next version of the protocol that is currently under development within the QUIC working group in the IETF.
HTTP/3 is designed to improve in areas where HTTP/2 still has some shortcomings, primarily by changing the transport layer. HTTP/3 is the first major protocol to step away from TCP and instead it uses QUIC.
Daniel Stenberg does a presentation about HTTP/3 and QUIC. Why the new protocols are deemed necessary, how they work, how they change how things are sent over the network and what some of the coming deployment challenges will be.
Daniel Stenberg gave a presentation on HTTP/3 and how to enable it in curl. He discussed how HTTP/3 uses QUIC to improve on HTTP/1 and HTTP/2 by eliminating head of line blocking, enabling faster handshakes and earlier data, and always using encryption. He explained how to build curl with either the Quiche or ngtcp2 libraries to support HTTP/3 and demonstrated commands to test HTTP/3 functionality. While the implementation is still experimental, Stenberg welcomed help from the community to further develop HTTP/3 and QUIC support in curl.
Daniel Stenberg discusses the progress being made to enable HTTP/3 support in the curl tool and libcurl library. HTTP/3 uses QUIC as its underlying transport protocol. Several challenges remain, including fallback options, stability testing, and full browser/server support. Stenberg explains how to build curl with various QUIC libraries like Quiche and ngtcp2. HTTP/3 support in curl is still experimental but aims to provide a similar user experience to HTTP/1. Support may be included in future releases as QUIC and HTTP/3 specifications continue development and more servers/browsers are deployed.
Daniel Stenberg gave a presentation on the evolution of HTTP from versions 1 to 2 to the upcoming version 3. He explained the problems with HTTP/1 and how HTTP/2 aimed to address these by using a single TCP connection with multiple streams. However, middleboxes in the internet slow the adoption of upgrades. QUIC was developed as a new transport protocol to run over UDP and enable always-encrypted connections with fewer head-of-line blocking problems. HTTP/3 defines how HTTP can be run over QUIC, providing features like independent streams and faster handshakes while keeping the basic request-response model of HTTP the same. Several challenges around implementations and tooling remain before HTTP/3 is widely adopted.
Daniel Stenberg discusses some of the most common mistakes users are doing when using libcurl and what to do about them.
Video: https://youtu.be/0KfDdIAirSI
Daniel Stenberg goes through some basic libcurl fundamentals and API design and explain how easily you can get your first transfers going in your own application. libcurl is the defacto standard library for Internet transfers and runs on virtually all platforms. The language focus will be on C/C++ but the concepts are generally applicable even if you use libcurl bindings for other languages.
curl - a hobby project that conquered the worldDaniel Stenberg
This document summarizes the open source project curl, a command line tool and library for transferring data with various protocols. It began as a hobby project in 1998 and has grown significantly over time to support many protocols, platforms, and use by thousands of companies. It is developed openly on GitHub by a small core team and many volunteers contributors over its 20+ year history.
- The document summarizes Daniel Stenberg's presentation on HTTP/3 and QUIC.
- It describes how QUIC improves on TCP by allowing multiple streams over a single connection and enabling faster handshakes. HTTP/3 runs over QUIC and provides improvements like 0-RTT handshakes.
- There are still challenges to widespread HTTP/3 adoption like CPU overhead and lack of standardization, but implementations are progressing and benefits include faster page loads.
Curl is an open source command line tool and library for transferring data with various internet protocols. It supports many protocols including HTTP, HTTPS, FTP, FTPS, SFTP, SCP, SMTP, IMAP, POP3, and more. Curl has over 2,000 contributors and is widely used across operating systems like Linux, Windows, macOS, and others. The presentation discussed curl's history, features, usage examples, and how it can be used to mimic browser behavior and inspect HTTPS traffic.
Daniel Stenberg gave a presentation about security best practices for curl and open source projects. He discussed how curl implements thorough testing, code reviews, fuzz testing, and monitoring of dependencies to minimize vulnerabilities. Stenberg also noted that curl employs a full-time maintainer, responds quickly to issues, and has an active bug bounty program to further improve security.
Daniel Stenberg explains HTTP/3 and QUIC at GOTO 10, January 22, 2019. This is the slideset, see https://daniel.haxx.se/blog/2019/01/23/http-3-talk-on-video/ for the video.
HTTP/3 is the designated name for the coming next version of the protocol that is currently under development within the QUIC working group in the IETF.
HTTP/3 is designed to improve in areas where HTTP/2 still has some shortcomings, primarily by changing the transport layer. HTTP/3 is the first major protocol to step away from TCP and instead it uses QUIC.
Why the new protocols are deemed necessary, how they work, how they change how things are sent over the network and what some of the coming deployment challenges will be.
As you will see in this film, there are a lot of questions from an interested and educated audience.
Daniel Stenberg is the founder and lead developer of the curl project. He has worked on HTTP implementations for over twenty years. He has been involved in the HTTPbis working group in IETF for ten years and he worked with HTTP in Firefox for years before he left Mozilla. He participates in the QUIC working group and is the author of the widely read documents ”HTTP2 explained” and ”HTTP/3 explained”.
Daniel Stenberg takes us through how the curl project is doing today. git activity, contributors, committers, mailing list, growth, money and sponsors, his own role and much more. Video here: https://youtu.be/6ueyZGhtj1Q
Daniel Stenberg gave a presentation on using Rust with curl. He discussed how curl has traditionally used C but now supports alternative backends implemented in other languages like Rust. He described challenges in integrating the Hyper, rustls, and quiche Rust crates but curl now supports HTTP/1-2 with Hyper and TLS with rustls in an experimental way. Future work includes improving test coverage when using Rust backends and potentially enabling them by default.
stackconf 2020 | Speeding up Linux disk encryption by Ignat KorchaginNETWAYS
Encrypting data at rest is a must-have for any modern SaaS company. And if you run your software stack on Linux, LUKS/dm-crypt [1] is the usual go-to solution. However, as the storage becomes faster, the IO latency, introduced by dm-crypt becomes rather noticeable, especially on IO intensive workloads.
At first glance it may seem natural, because data encryption is considered an expensive operation. But most modern hardware (specifically x86 and arm64) platforms have hardware optimisations to make encryption fast and less CPU intensive. Nevertheless, even on such hardware transparent disk encryption performs quite poorly.
2018 IterateConf Deconstructing and Evolving REST SecurityDavid Blevins
The learning curve for security is severe and unforgiving. Specifications promise infinite flexibility, habitually give old concepts new names, offer endless extensions, and almost seem designed to deliberately confuse. With an eye on architecturual impact, actual HTTP messages, and aggressive distaste for fancy terminology, this session delves into OAuth 2.0 as it pertains to REST and shows how it falls into two camps: stateful and stateless. It then explores a competing Amazon-style approach called HTTP Signatures, ideal for B2B APIs. Finally, it discusses a new internet draft launched this year that combines them both into the perfect two-factor system that could provide a one-stop shop for business as well as mobile REST scenarios.
Learn about HTTP/2 and its relationship to HTTP 1.1 and SPDY. Understand core features and how they benefit security and browser efficiency. More that a "what's new" this talk will leave you with an understanding of why choices in HTTP/2 were made. You'll leave knowing what HTTP/2 is and why it is better for clients and servers.
Learning Python with Minecraft and my Dad - PyOhio 2018Hank Preston
This is a presentation I put together and delivered with my son, Alexander, about how we've explored and learned Python and programming through Minecraft.
Abstract:
My name is Alexander Preston, I’m nine years old, and I love coding with my Dad. To me, coding is like a “sport”. It’s a fun activity you can do, and become better at. I’m hoping to become a video game developer, because (almost) everyone likes games. I learned about coding by watching my dad, and asking what he was working on. I started programming by using Scratch on a Raspberry Pi and building some games, and now I’m learning to code in Python with Minecraft. I think that lots of kids would love to code, and I’d like to give some ideas about how to help them get started.
In this talk I, with some help from my dad, will show how you can use Python with Minecraft to connect to and control the world. We'll build buildings, blow them up, see what happens when Zombies invade, and other fun stuff we come up with.
Useful Python Libraries for Network Engineers - PyOhio 2018Hank Preston
Python has quickly become THE language for network automation and programmability due to it’s combined simplicity and power. Add to that the robust assortment of tools, libraries and modules related to networking available to “import" and I doubt another language will take over the title anytime soon. In this session we’ll explore some of the most useful libraries for network engineers and developers looking to interact with the network from a configuration and operational perspective. Plenty of code will be shown, and all examples will be available to take away and leverage in your own environments.
Through the session you'll learn how to leverage the tried and true interfaces of CLI and SNMP to manage your network before we jump up to newer options like NETCONF, RESTCONF and REST APIs. We'll even explore full configuration management solutions and discuss when and how they should fit into your overall automation strategy.
Some of the great modules that will be covered include:
netmiko
PySNMP
ncclient
requests
Ansible
NAPALM
This document summarizes tools and techniques for open source network testing, including testing routers and Wi-Fi networks with multiple concurrent clients to evaluate performance under real-world conditions. It describes using tools like net-hydra, netburn, and whenits to automate testing across multiple client devices and collect throughput and latency statistics. The document advocates an approach of testing networks with multiple concurrent activities like downloading, browsing, VoIP calls, and streaming to evaluate how equipment handles collision domains under more challenging real-world loads.
HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0Cory Forsyth
This document summarizes the evolution of HTTP from versions 0.9 to 2. It discusses key aspects of HTTP/1.0 and HTTP/1.1 such as persistent connections and pipelining. It also covers how these features were abused to optimize page load performance. Finally, it provides an overview of HTTP/2 and how it differs from previous versions through the use of binary format, header compression, and multiplexing requests over a single TCP connection.
Modern Reconnaissance Phase on APT - protection layerShakacon
The document discusses 5 case studies of modern reconnaissance techniques used by advanced persistent threat (APT) actors. Each case study examines a different infection vector involving documents with embedded objects that first perform reconnaissance on the target system before deciding whether to deploy a final payload. The case studies demonstrate evolving tactics to avoid exposing valuable code and thwart analysis.
This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to block exfiltration from their network: they use http(s) proxies, DLP, IPS technologies to protect their data, but are they protected against tunnelling? There are so many interesting questions to answer for users, abusers, companies and malware researchers. Mitigation and bypass techniques will be shown you during this presentation, which can be used to filter any tunnelling on your network or to bypass misconfigured filters.
Dock ir incident response in a containerized, immutable, continually deploy...Shakacon
This document discusses incident response strategies in a containerized and immutable infrastructure environment like Docker. It addresses challenges like lack of system and software inventory visibility due to rapid container changes, and lack of agent-based security due to single-purpose containers. It proposes solutions like establishing managed base container OSs, whitelisting allowed containers and files, and leveraging logs and sidecar containers to monitor for detections. Response challenges around long investigation timeframes due to short container lifetimes and lack of access are addressed with strategies like comprehensive logging, filesystem artifact preservation, and automating remote response capabilities.
Daniel Stemberg's presentation on how curl works. From the basic command line use, to URLs, options, curl basics into HTTP specifics.
YouTube:
https://youtu.be/V5vZWHP-RqU?si=IkGJdHqvguYLffeG
curl - a hobby project that conquered the worldDaniel Stenberg
This document summarizes the open source project curl, a command line tool and library for transferring data with various protocols. It began as a hobby project in 1998 and has grown significantly over time to support many protocols, platforms, and use by thousands of companies. It is developed openly on GitHub by a small core team and many volunteers contributors over its 20+ year history.
- The document summarizes Daniel Stenberg's presentation on HTTP/3 and QUIC.
- It describes how QUIC improves on TCP by allowing multiple streams over a single connection and enabling faster handshakes. HTTP/3 runs over QUIC and provides improvements like 0-RTT handshakes.
- There are still challenges to widespread HTTP/3 adoption like CPU overhead and lack of standardization, but implementations are progressing and benefits include faster page loads.
Curl is an open source command line tool and library for transferring data with various internet protocols. It supports many protocols including HTTP, HTTPS, FTP, FTPS, SFTP, SCP, SMTP, IMAP, POP3, and more. Curl has over 2,000 contributors and is widely used across operating systems like Linux, Windows, macOS, and others. The presentation discussed curl's history, features, usage examples, and how it can be used to mimic browser behavior and inspect HTTPS traffic.
Daniel Stenberg gave a presentation about security best practices for curl and open source projects. He discussed how curl implements thorough testing, code reviews, fuzz testing, and monitoring of dependencies to minimize vulnerabilities. Stenberg also noted that curl employs a full-time maintainer, responds quickly to issues, and has an active bug bounty program to further improve security.
Daniel Stenberg explains HTTP/3 and QUIC at GOTO 10, January 22, 2019. This is the slideset, see https://daniel.haxx.se/blog/2019/01/23/http-3-talk-on-video/ for the video.
HTTP/3 is the designated name for the coming next version of the protocol that is currently under development within the QUIC working group in the IETF.
HTTP/3 is designed to improve in areas where HTTP/2 still has some shortcomings, primarily by changing the transport layer. HTTP/3 is the first major protocol to step away from TCP and instead it uses QUIC.
Why the new protocols are deemed necessary, how they work, how they change how things are sent over the network and what some of the coming deployment challenges will be.
As you will see in this film, there are a lot of questions from an interested and educated audience.
Daniel Stenberg is the founder and lead developer of the curl project. He has worked on HTTP implementations for over twenty years. He has been involved in the HTTPbis working group in IETF for ten years and he worked with HTTP in Firefox for years before he left Mozilla. He participates in the QUIC working group and is the author of the widely read documents ”HTTP2 explained” and ”HTTP/3 explained”.
Daniel Stenberg takes us through how the curl project is doing today. git activity, contributors, committers, mailing list, growth, money and sponsors, his own role and much more. Video here: https://youtu.be/6ueyZGhtj1Q
Daniel Stenberg gave a presentation on using Rust with curl. He discussed how curl has traditionally used C but now supports alternative backends implemented in other languages like Rust. He described challenges in integrating the Hyper, rustls, and quiche Rust crates but curl now supports HTTP/1-2 with Hyper and TLS with rustls in an experimental way. Future work includes improving test coverage when using Rust backends and potentially enabling them by default.
stackconf 2020 | Speeding up Linux disk encryption by Ignat KorchaginNETWAYS
Encrypting data at rest is a must-have for any modern SaaS company. And if you run your software stack on Linux, LUKS/dm-crypt [1] is the usual go-to solution. However, as the storage becomes faster, the IO latency, introduced by dm-crypt becomes rather noticeable, especially on IO intensive workloads.
At first glance it may seem natural, because data encryption is considered an expensive operation. But most modern hardware (specifically x86 and arm64) platforms have hardware optimisations to make encryption fast and less CPU intensive. Nevertheless, even on such hardware transparent disk encryption performs quite poorly.
2018 IterateConf Deconstructing and Evolving REST SecurityDavid Blevins
The learning curve for security is severe and unforgiving. Specifications promise infinite flexibility, habitually give old concepts new names, offer endless extensions, and almost seem designed to deliberately confuse. With an eye on architecturual impact, actual HTTP messages, and aggressive distaste for fancy terminology, this session delves into OAuth 2.0 as it pertains to REST and shows how it falls into two camps: stateful and stateless. It then explores a competing Amazon-style approach called HTTP Signatures, ideal for B2B APIs. Finally, it discusses a new internet draft launched this year that combines them both into the perfect two-factor system that could provide a one-stop shop for business as well as mobile REST scenarios.
Learn about HTTP/2 and its relationship to HTTP 1.1 and SPDY. Understand core features and how they benefit security and browser efficiency. More that a "what's new" this talk will leave you with an understanding of why choices in HTTP/2 were made. You'll leave knowing what HTTP/2 is and why it is better for clients and servers.
Learning Python with Minecraft and my Dad - PyOhio 2018Hank Preston
This is a presentation I put together and delivered with my son, Alexander, about how we've explored and learned Python and programming through Minecraft.
Abstract:
My name is Alexander Preston, I’m nine years old, and I love coding with my Dad. To me, coding is like a “sport”. It’s a fun activity you can do, and become better at. I’m hoping to become a video game developer, because (almost) everyone likes games. I learned about coding by watching my dad, and asking what he was working on. I started programming by using Scratch on a Raspberry Pi and building some games, and now I’m learning to code in Python with Minecraft. I think that lots of kids would love to code, and I’d like to give some ideas about how to help them get started.
In this talk I, with some help from my dad, will show how you can use Python with Minecraft to connect to and control the world. We'll build buildings, blow them up, see what happens when Zombies invade, and other fun stuff we come up with.
Useful Python Libraries for Network Engineers - PyOhio 2018Hank Preston
Python has quickly become THE language for network automation and programmability due to it’s combined simplicity and power. Add to that the robust assortment of tools, libraries and modules related to networking available to “import" and I doubt another language will take over the title anytime soon. In this session we’ll explore some of the most useful libraries for network engineers and developers looking to interact with the network from a configuration and operational perspective. Plenty of code will be shown, and all examples will be available to take away and leverage in your own environments.
Through the session you'll learn how to leverage the tried and true interfaces of CLI and SNMP to manage your network before we jump up to newer options like NETCONF, RESTCONF and REST APIs. We'll even explore full configuration management solutions and discuss when and how they should fit into your overall automation strategy.
Some of the great modules that will be covered include:
netmiko
PySNMP
ncclient
requests
Ansible
NAPALM
This document summarizes tools and techniques for open source network testing, including testing routers and Wi-Fi networks with multiple concurrent clients to evaluate performance under real-world conditions. It describes using tools like net-hydra, netburn, and whenits to automate testing across multiple client devices and collect throughput and latency statistics. The document advocates an approach of testing networks with multiple concurrent activities like downloading, browsing, VoIP calls, and streaming to evaluate how equipment handles collision domains under more challenging real-world loads.
HTTP by Hand: Exploring HTTP/1.0, 1.1 and 2.0Cory Forsyth
This document summarizes the evolution of HTTP from versions 0.9 to 2. It discusses key aspects of HTTP/1.0 and HTTP/1.1 such as persistent connections and pipelining. It also covers how these features were abused to optimize page load performance. Finally, it provides an overview of HTTP/2 and how it differs from previous versions through the use of binary format, header compression, and multiplexing requests over a single TCP connection.
Modern Reconnaissance Phase on APT - protection layerShakacon
The document discusses 5 case studies of modern reconnaissance techniques used by advanced persistent threat (APT) actors. Each case study examines a different infection vector involving documents with embedded objects that first perform reconnaissance on the target system before deciding whether to deploy a final payload. The case studies demonstrate evolving tactics to avoid exposing valuable code and thwart analysis.
This presentation will sum up how to do tunnelling with different protocols and will have different perspectives detailed. For example, companies are fighting hard to block exfiltration from their network: they use http(s) proxies, DLP, IPS technologies to protect their data, but are they protected against tunnelling? There are so many interesting questions to answer for users, abusers, companies and malware researchers. Mitigation and bypass techniques will be shown you during this presentation, which can be used to filter any tunnelling on your network or to bypass misconfigured filters.
Dock ir incident response in a containerized, immutable, continually deploy...Shakacon
This document discusses incident response strategies in a containerized and immutable infrastructure environment like Docker. It addresses challenges like lack of system and software inventory visibility due to rapid container changes, and lack of agent-based security due to single-purpose containers. It proposes solutions like establishing managed base container OSs, whitelisting allowed containers and files, and leveraging logs and sidecar containers to monitor for detections. Response challenges around long investigation timeframes due to short container lifetimes and lack of access are addressed with strategies like comprehensive logging, filesystem artifact preservation, and automating remote response capabilities.
Daniel Stemberg's presentation on how curl works. From the basic command line use, to URLs, options, curl basics into HTTP specifics.
YouTube:
https://youtu.be/V5vZWHP-RqU?si=IkGJdHqvguYLffeG
The document discusses several Internet Engineering Task Force (IETF) working groups related to the Internet of Things (IoT). It describes the mission and status of the Constrained RESTful Environments (CoRE) working group, including several draft documents. It also summarizes discussions from Birds of a Feather sessions on DTLS in Constrained Environments, IPv6 over Low-Power Wireless Personal Area Networks, and IPv6 over the IEEE 802.15.4e Time-Slotted Channel Hopping mode.
Distributed Deep Learning At Scale On Apache Spark With BigDLYulia Tell
This document provides an agenda and details for a co-hosted meetup between Intel and Databricks on March 23, 2017 about BigDL. The agenda includes opening remarks, two tech talks (one from Intel and one from Databricks), and a mingling session. It also provides WiFi access details and background on Intel's Big Data Technologies group and BigDL. BigDL is an open-source distributed deep learning library for Apache Spark that allows users to run deep learning applications on Spark.
This document proposes using Locator/ID Separation Protocol (LISP) to simplify routing in networks that use IPsec VPN devices (IVDs). LISP separates endpoint identifiers from routing locators, allowing more efficient routing between secure routers connected via IVDs without needing full-mesh generic routing encapsulation (GRE) tunnels. LISP uses IP/UDP encapsulation that works seamlessly over IVDs, and limits the number of IP prefixes IVDs must store to simplify operations. The document compares LISP to the current GRE tunnel approach and outlines how LISP's separation of identifiers and locators can improve routing scalability and mobility in IVD networks.
Deploying deep learning models with Docker and KubernetesPetteriTeikariPhD
Short introduction for platform agnostic production deployment with some medical examples.
Alternative download: https://www.dropbox.com/s/qlml5k5h113trat/deep_cloudArchitecture.pdf?dl=0
Global Azure Bootcamp 2017 - Azure IoT Hub with LoRa ConnectivityAndri Yadi
Should have posted 1 year ago. In this Global Azure Bootcamp 2017, I had a chance to share how to connect IoT devices to Azure IoT Hub by leveraging LoRa/LoRaWAN connectivity.
Introduction to Tungsten Fabric and the vRouterLiz Warner
Tungsten Fabric is an open source software-defined networking solution with key components including the Tungsten Fabric Controller and Tungsten Fabric virtual router (vRouter). The Controller manages network policies and models networks, typically running on multiple servers for high availability. The vRouter performs packet forwarding and enforces policies in each host running workloads. It uses DPDK for fast packet processing. Tungsten Fabric provides routing, switching, load balancing, security and other network functions through its architecture with an Ethernet/IP underlay and the Controller and vRouters at the edge.
Kubernetes Operability Tooling (GOTO Chicago 2019)bridgetkromhout
The document is a transcript of a presentation about containers, Kubernetes, and cloud native tooling. It discusses what containers are, the history and basics of Kubernetes, tools for managing Kubernetes clusters like Helm and Terraform, event-driven scripting with Brigade and Kashti, packaging apps with CNAB/Duffle/Porter, and a vision for the future of containers and cloud native technologies.
Container Networking: the Gotchas (Mesos London Meetup 11 May 2016)Andrew Randall
Presentation for the London Mesos Users Meetup, 11 May 2016.
An overview of the current state of the art in container networking, with lessons learned over the last 12 months or so deploying Project Calico in the real world.
AWS re:Invent 2016 - Scality's Open Source AWS S3 ServerScality
Presented by Giorgio Regni, CTO
Try Scality S3 Server Today!
https://s3.scality.com/
http://www.scality.com/scality-s3-server/
https://hub.docker.com/r/scality/s3server/
Packet is a bare metal cloud platform that provisions premium server configurations within 5 minutes globally. It offers the best of cloud (fast deployment, flexible pricing, global footprint) combined with colocation benefits (premium hardware, best networks, no co-tenancy). Packet aims to simplify infrastructure through next-gen software and hardware, with curated server types available starting at $0.05/hour and a performance network optimized for optimal routes and access. It integrates with leading platforms and offers private deployments, with a focus on containers and future technologies.
A Primer on FPGAs - Field Programmable Gate ArraysTaylor Riggan
A focus on the use of FPGAs by cloud service providers. Includes Microsoft Azure Catapult, Google Tensor Processors, and Amazon EC2 F1 instances. Also includes background info on how to get started with FPGAs
Security Patterns for Microservice Architectures - London Java Community 2020Matt Raible
Are you securing your microservice architectures by hiding them behind a firewall? That works, but there are better ways to do it. This presentation recommends 11 patterns to secure microservice architectures.
1. Be Secure by Design
2. Scan Dependencies
3. Use HTTPS Everywhere
4. Use Access and Identity Tokens
5. Encrypt and Protect Secrets
6. Verify Security with Delivery Pipelines
7. Slow Down Attackers
8. Use Docker Rootless Mode
9. Use Time-Based Security
10. Scan Docker and Kubernetes Configuration for Vulnerabilities
11. Know Your Cloud and Cluster Security
Blog post: https://developer.okta.com/blog/2020/03/23/microservice-security-patterns
My presentation slides from the #HappyHackingDay 2014 at @HAAGAHELIAamk. The story of Harry and Hermione hackers on their way to rule the cloud magic.
The event was for hackers, and my topic was about pointing ways and tools to hack in the cloudy world. There is many places within the cloud engines and tools around cloud to hack. Plenty of interesting open source projects for hackers to find, and perfect their skills.
Harry the hacker fell on a keyboard as he was a baby, hitting his forehead to letter 'H'. That left a scar into his forehead. He is eager to do rush into action, and he is very skilled. He trains his skills by practice, and listening to elder open source community members.
Hermione is extremely talented hacker as well. She has more interest on how things are done, learning continuously more and more. She spends also lot of her time on reading and writing community docs, active member on forums, and
knows lot of spells.
Bad guys in the story are... well, bad guys.
Any similarities to other characters is pure co-incidense ;)
Keywords are: open source, openstack, heat, puppet, chef, automation, oz, horizon, cloud-init
Security Patterns for Microservice Architectures - Oktane20Matt Raible
Matt Raible presented 11 security patterns for microservice architectures: 1) be secure by design, 2) scan dependencies, 3) use HTTPS everywhere, 4) use access and identity tokens, 5) encrypt and protect secrets, 6) verify security with delivery pipelines, 7) slow down attackers, 8) use Docker rootless mode, 9) use time-based security, 10) scan Docker and Kubernetes configurations for vulnerabilities, and 11) know your cloud and cluster security. He discussed each pattern in detail and provided examples and recommendations for implementation.
I would like to speak about what I am actually doing at InfluxData. Sharing with you some ideas about how an orchestrator should work. We will start from a bit of history about distributed system, containers, runtime and so on. Hoping to have a good chat about the future of scheduling and orchestrator.
What comes after world domination with Daniel Stenberg, April 2025Daniel Stenberg
Open Source has in many ways already won. It is used in every product by every company, to a very a large degree. But we are not done. We can improve: we can take this further, we can make our projects better, we can enhance our communities and make sure it is done sustainably. The future is ours.
Tightening every bolt at FOSDEM 2025 by Daniel StenbergDaniel Stenberg
Things to do in order to sleep well while having your C code in twenty billion installations. A talk about what the curl project does to minimize security risks: Security, Safety, Reproducibility, Vulnerability handling and the processes and tooling around it.
As BDFL of the curl project, Daniel talks about what this project does to avoid it causing the world to burn. From code style, reviews and tests to signings, reproducibility, running a bug-bounty and becoming a CNA to filter bogus CVEs. curl aims to be top of the class in (Open Source) software security. Here's your chance to point finger and tell us what we should do better.
This document discusses using libcurl's share API to share data like cookies and DNS caches between multiple easy handles. It explains that some curl state is kept in the easy handle, so transfers using different handles may not be fully independent. The share API allows creating share objects that specify what data to share, such as cookies and DNS caches. Easy handles can then specify which share objects to use to share data between transfers and achieve better performance than using separate handles independently.
This document discusses curl security practices such as continuous integration testing on many platforms, custom test servers, tools used for analysis like Valgrind and Clang sanitizers, and "torture tests" that inject errors. It notes that while testing all combinations is impossible, common setups and architectures are tested. The curl bug bounty program is mentioned as paying $40,900 so far. An upcoming code audit and ensuring decreasing CVEs and fuzzing reports over time are discussed as signs the efforts are working. Recent CVE trends and introductions like "dynbuf" are also summarized.
This document provides an overview of curl, an open source command line tool and library for transferring data with Internet protocols. It discusses curl's history starting in 1998, its widespread usage across operating systems, CPU architectures, and planets. It also outlines curl's many supported features and protocols, large number of contributors and commits, extensive testing, and commitment to security and open development. The future of curl is discussed in the context of the growing Internet of Things and connectivity of everyday devices and appliances.
HTTP/3 over QUIC. All is new but still the same!Daniel Stenberg
HTTP/3 is the designated name for the coming next version of the protocol that is currently under development within the QUIC working group in the IETF. HTTP/3 is designed to improve in areas where HTTP/2 still has some shortcomings, primarily by changing the transport layer. HTTP/3 is the first major protocol to step away from TCP and instead it uses QUIC.
Daniel Stenberg does a presentation about HTTP/3 and QUIC. Why the new protocols are deemed necessary, how they work, how they change how things are sent over the network and what some of the coming deployment challenges will be.
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPathCommunity
Nous vous convions à une nouvelle séance de la communauté UiPath en Suisse romande.
Cette séance sera consacrée à un retour d'expérience de la part d'une organisation non gouvernementale basée à Genève. L'équipe en charge de la plateforme UiPath pour cette NGO nous présentera la variété des automatisations mis en oeuvre au fil des années : de la gestion des donations au support des équipes sur les terrains d'opération.
Au délà des cas d'usage, cette session sera aussi l'opportunité de découvrir comment cette organisation a déployé UiPath Automation Suite et Document Understanding.
Cette session a été diffusée en direct le 7 mai 2025 à 13h00 (CET).
Découvrez toutes nos sessions passées et à venir de la communauté UiPath à l’adresse suivante : https://community.uipath.com/geneva/.
TrsLabs - Fintech Product & Business ConsultingTrs Labs
Hybrid Growth Mandate Model with TrsLabs
Strategic Investments, Inorganic Growth, Business Model Pivoting are critical activities that business don't do/change everyday. In cases like this, it may benefit your business to choose a temporary external consultant.
An unbiased plan driven by clearcut deliverables, market dynamics and without the influence of your internal office equations empower business leaders to make right choices.
Getting things done within a budget within a timeframe is key to Growing Business - No matter whether you are a start-up or a big company
Talk to us & Unlock the competitive advantage
Viam product demo_ Deploying and scaling AI with hardware.pdfcamilalamoratta
Building AI-powered products that interact with the physical world often means navigating complex integration challenges, especially on resource-constrained devices.
You'll learn:
- How Viam's platform bridges the gap between AI, data, and physical devices
- A step-by-step walkthrough of computer vision running at the edge
- Practical approaches to common integration hurdles
- How teams are scaling hardware + software solutions together
Whether you're a developer, engineering manager, or product builder, this demo will show you a faster path to creating intelligent machines and systems.
Resources:
- Documentation: https://on.viam.com/docs
- Community: https://discord.com/invite/viam
- Hands-on: https://on.viam.com/codelabs
- Future Events: https://on.viam.com/updates-upcoming-events
- Request personalized demo: https://on.viam.com/request-demo
Slides for the session delivered at Devoxx UK 2025 - Londo.
Discover how to seamlessly integrate AI LLM models into your website using cutting-edge techniques like new client-side APIs and cloud services. Learn how to execute AI models in the front-end without incurring cloud fees by leveraging Chrome's Gemini Nano model using the window.ai inference API, or utilizing WebNN, WebGPU, and WebAssembly for open-source models.
This session dives into API integration, token management, secure prompting, and practical demos to get you started with AI on the web.
Unlock the power of AI on the web while having fun along the way!
Hybridize Functions: A Tool for Automatically Refactoring Imperative Deep Lea...Raffi Khatchadourian
Efficiency is essential to support responsiveness w.r.t. ever-growing datasets, especially for Deep Learning (DL) systems. DL frameworks have traditionally embraced deferred execution-style DL code—supporting symbolic, graph-based Deep Neural Network (DNN) computation. While scalable, such development is error-prone, non-intuitive, and difficult to debug. Consequently, more natural, imperative DL frameworks encouraging eager execution have emerged but at the expense of run-time performance. Though hybrid approaches aim for the “best of both worlds,” using them effectively requires subtle considerations to make code amenable to safe, accurate, and efficient graph execution—avoiding performance bottlenecks and semantically inequivalent results. We discuss the engineering aspects of a refactoring tool that automatically determines when it is safe and potentially advantageous to migrate imperative DL code to graph execution and vice-versa.
UiPath Agentic Automation: Community Developer OpportunitiesDianaGray10
Please join our UiPath Agentic: Community Developer session where we will review some of the opportunities that will be available this year for developers wanting to learn more about Agentic Automation.
Canadian book publishing: Insights from the latest salary survey - Tech Forum...BookNet Canada
Join us for a presentation in partnership with the Association of Canadian Publishers (ACP) as they share results from the recently conducted Canadian Book Publishing Industry Salary Survey. This comprehensive survey provides key insights into average salaries across departments, roles, and demographic metrics. Members of ACP’s Diversity and Inclusion Committee will join us to unpack what the findings mean in the context of justice, equity, diversity, and inclusion in the industry.
Results of the 2024 Canadian Book Publishing Industry Salary Survey: https://publishers.ca/wp-content/uploads/2025/04/ACP_Salary_Survey_FINAL-2.pdf
Link to presentation recording and transcript: https://bnctechforum.ca/sessions/canadian-book-publishing-insights-from-the-latest-salary-survey/
Presented by BookNet Canada and the Association of Canadian Publishers on May 1, 2025 with support from the Department of Canadian Heritage.
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAll Things Open
Presented at All Things Open RTP Meetup
Presented by Brent Laster - President & Lead Trainer, Tech Skills Transformations LLC
Talk Title: AI 3-in-1: Agents, RAG, and Local Models
Abstract:
Learning and understanding AI concepts is satisfying and rewarding, but the fun part is learning how to work with AI yourself. In this presentation, author, trainer, and experienced technologist Brent Laster will help you do both! We’ll explain why and how to run AI models locally, the basic ideas of agents and RAG, and show how to assemble a simple AI agent in Python that leverages RAG and uses a local model through Ollama.
No experience is needed on these technologies, although we do assume you do have a basic understanding of LLMs.
This will be a fast-paced, engaging mixture of presentations interspersed with code explanations and demos building up to the finished product – something you’ll be able to replicate yourself after the session!
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
fennec fox optimization algorithm for optimal solutionshallal2
Imagine you have a group of fennec foxes searching for the best spot to find food (the optimal solution to a problem). Each fox represents a possible solution and carries a unique "strategy" (set of parameters) to find food. These strategies are organized in a table (matrix X), where each row is a fox, and each column is a parameter they adjust, like digging depth or speed.
UiPath Agentic Automation: Community Developer OpportunitiesDianaGray10
Please join our UiPath Agentic: Community Developer session where we will review some of the opportunities that will be available this year for developers wanting to learn more about Agentic Automation.
Webinar - Top 5 Backup Mistakes MSPs and Businesses Make .pptxMSP360
Data loss can be devastating — especially when you discover it while trying to recover. All too often, it happens due to mistakes in your backup strategy. Whether you work for an MSP or within an organization, your company is susceptible to common backup mistakes that leave data vulnerable, productivity in question, and compliance at risk.
Join 4-time Microsoft MVP Nick Cavalancia as he breaks down the top five backup mistakes businesses and MSPs make—and, more importantly, explains how to prevent them.
The FS Technology Summit
Technology increasingly permeates every facet of the financial services sector, from personal banking to institutional investment to payments.
The conference will explore the transformative impact of technology on the modern FS enterprise, examining how it can be applied to drive practical business improvement and frontline customer impact.
The programme will contextualise the most prominent trends that are shaping the industry, from technical advancements in Cloud, AI, Blockchain and Payments, to the regulatory impact of Consumer Duty, SDR, DORA & NIS2.
The Summit will bring together senior leaders from across the sector, and is geared for shared learning, collaboration and high-level networking. The FS Technology Summit will be held as a sister event to our 12th annual Fintech Summit.
GyrusAI - Broadcasting & Streaming Applications Driven by AI and MLGyrus AI
Gyrus AI: AI/ML for Broadcasting & Streaming
Gyrus is a Vision Al company developing Neural Network Accelerators and ready to deploy AI/ML Models for Video Processing and Video Analytics.
Our Solutions:
Intelligent Media Search
Semantic & contextual search for faster, smarter content discovery.
In-Scene Ad Placement
AI-powered ad insertion to maximize monetization and user experience.
Video Anonymization
Automatically masks sensitive content to ensure privacy compliance.
Vision Analytics
Real-time object detection and engagement tracking.
Why Gyrus AI?
We help media companies streamline operations, enhance media discovery, and stay competitive in the rapidly evolving broadcasting & streaming landscape.
🚀 Ready to Transform Your Media Workflow?
🔗 Visit Us: https://gyrus.ai/
📅 Book a Demo: https://gyrus.ai/contact
📝 Read More: https://gyrus.ai/blog/
🔗 Follow Us:
LinkedIn - https://www.linkedin.com/company/gyrusai/
Twitter/X - https://twitter.com/GyrusAI
YouTube - https://www.youtube.com/channel/UCk2GzLj6xp0A6Wqix1GWSkw
Facebook - https://www.facebook.com/GyrusAI
2. Daniel Stenberg
Swedish, living in
Sweden
Lead developer and
architect of curl
Employed by and
works for wolfSSL
Started the curl
project in March 1998
@bagder@bagder
3. Roadmapping in a volunteer worldRoadmapping in a volunteer world
Release cycleRelease cycle
How things are mergedHow things are merged
On the roadmapOn the roadmap
Brain-storm stuffBrain-storm stuff
Q&AQ&A
@bagder@bagder
5. Daniel’s Roadmap
Ideas Daniel and wolfSSL plan to work on in 2020
Curl is open source and everyone is welcome to bring
features and work that we haven’t planned or anticipated
We only merge code into curl that is “curl worthy”
There’s no guarantee that this actually will happen
@bagder@bagder
6. Daniel’s Roadmap guide
Remain “Swiss army knife of Internet Protocols”
Power the world of Internet enabled devices and tools
Aid protocol developers and tinkerers
Support bleeding edge protocol versions and features
Security and privacy are prioritized areas
@bagder@bagder
7. wolfSSL curl
Attempt to “listen in” what users want
wolfSSL is the best and only commercial curl support
option
wolfSSL employs Daniel
@bagder@bagder
8. The curl release cycle explained
Release on Wednesday, every 8 weeks (unless
circumstances make us change)
The first 4 weeks we allow merging new features (changes)
The subsequent 4 weeks we only merge bug-fixes
Repeat, forever
@bagder@bagder
9. How we merge changes
✔ Submit pull-request on github.com/curl/curl (yes, Daniel
as well)
✔ Get feedback
✔ Adjust to feedback
✔ Make sure the CI builds are green
✔ Merge into master
✔ Ship in next release
@bagder@bagder
11. On the mapOn the map
HTTP/3
HSTS
ESNI
Thread-safe curl_global_init
Thread-safe connection-
sharing
@bagder@bagder
Tinier tiny-curl
MQTT
DNS-over-TLS
Hardcoded localhost
*
12. HTTP/3HTTP/3
Protocol is being defined
Initial support has landed
Built on quiche or ngtcp2/nghttp3
Further work remain (including alt-svc)
@bagder@bagder
13. HSTSHSTS
Preload a set
Parse incoming headers
Cache dynamically
“Internal redirects” from HTTP to HTTPS
Not so much to load the full browser preload set
@bagder@bagder
14. ESNI (Encrypted Server Name Indication)ESNI (Encrypted Server Name Indication)
Removes the last clear text part in TLS
The spec is still in draft
Cloudflare deploys an old draft
https://github.com/curl/curl/pull/4468
https://tools.ietf.org/html/draft-ietf-tls-esni-06
@bagder@bagder
16. Thread-safe connection-sharingThread-safe connection-sharing
Sharing the connection “cache” among threads
allows applications to scale and perform better
libcurl already offers this feature, but it is buggy
and not done right
Solving this proper will take some rearranging. It
isn’t clear yet exactly how or what.
@bagder@bagder
18. MQTTMQTT
MQTT is not a perfect fit, but commonly used
Voted popular feature in recent poll
Base on wolfMQTT
@bagder@bagder
19. DNS-over-TLS (DoT)DNS-over-TLS (DoT)
Offers another way to secure name resolves
Used similarly to DoH (DNS-over-HTTPS)
Can share some of the code written for DoH
@bagder@bagder
21. Customize roadmapCustomize roadmap
What features do you need?
What Internet protocol changes and demands do
you see coming in 2020?
Which of these roadmap entries should be
prioritized? (And which should not)
@bagder@bagder
22. No command line tool changes?
Nothing planned
Things will turn up and get done anyway
Suggestions?
@bagder@bagder
26. C++ binding?C++ binding?
“Blessed” and provided by the curl project
Tighter integration between libcurl and C++
Keep up with libcurl
The binding that never was
But do we need it?
@bagder@bagder