Granting access and creating accounts on the Perforce depots at Advanced Micro Devices (AMD) is a 24/7 operation with engineers working around the world. Given the highly sensitive nature of the source code that resides on these depots, access to areas is tightly regulated and may be requested at a moment's notice. The administrators that create accounts and grant access to these areas should be enabled to perform these tasks wherever they are, and they may not necessarily have access to a desktop or have the means to log in to the company network remotely. By creating an interface accessible by Web browser with a pre-defined list of actions, AMD's administrators are able to perform these tasks securely by mobile device. Learn more about AMD's solution, and how you can enable mobile access to Perforce at your own company.
Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...Ajuntament de Barcelona
El Pla per a la igualtat d’oportunitats real i efectiva entre dones i homes és el marc de referència pel que fa a les polítiques de la ciutat dels propers quatre anys, i té per objectiu ser el full de ruta de l’Ajuntament de Barcelona en el seu propòsit de garantir els drets, la promoció i la igualtat d’oportunitats de les dones, així com reforçar les polítiques públiques d’aquesta Administració a través de la perspectiva de gènere, per tal que es pugui avançar cap a la plena ciutadania de les dones.
Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...Ajuntament de Barcelona
El Pla per a la igualtat d’oportunitats real i efectiva entre dones i homes és el marc de referència pel que fa a les polítiques de la ciutat dels propers quatre anys, i té per objectiu ser el full de ruta de l’Ajuntament de Barcelona en el seu propòsit de garantir els drets, la promoció i la igualtat d’oportunitats de les dones, així com reforçar les polítiques públiques d’aquesta Administració a través de la perspectiva de gènere, per tal que es pugui avançar cap a la plena ciutadania de les dones.
DCEU 18: Tips and Tricks of the Docker CaptainsDocker, Inc.
Brandon Mitchell - Solutions Architect, BoxBoat
Docker Captain Brandon Mitchell will help you accelerate your adoption of Docker containers by delivering tips and tricks on getting the most out of Docker. Topics include managing disk usage, preventing subnet collisions, debugging container networking, understanding image layers, getting more value out of the default volume driver, and solving the UID/GID permission issues with volumes in a way that allows images to be portable from any developer laptop and to production.
JDO 2019: Kubernetes logging techniques with a touch of LogSense - Marcin StożekPROIDEA
Kubernetes helps us run our applications across multiple nodes using the standardized, declarative way. While we don’t need to think about where our applications are run physically, we still want to have some insights into how they behave. But we are no longer allowed to log into a specific node and just "read the logs" as it does not make much sense. We need to have a proper, automated solution. Kubernetes allows us to use different techniques to achieve this goal. Let's take a look at these techniques and their pros and cons. Once we have those logs, from multiple different applications where each logs things differently – what’s next? This talk also will provide real-life examples of how LogSense works to make sense of all Kubernetes logs, regardless of the format or structure.
Noah Zoschke took to the Waza 2013 stage to present "Heroku Secrets". For more from Zoschke, ping him at @nzoschke. For more on Waza visit http://waza.heroku.com/2013.
For Waza videos stay tuned at http://blog.heroku.com or visit http://vimeo.com/herokuwaza
http://www.alfresco.com/about/events/ondemand
Watch Richard Im, our prodigy Solutions Engineer, install Alfresco from scratch.
First, doing a custom install, and then, using the Windows installer.
The process will include:
Using the tomcat bundle:
The pros and cons of using the bundle
Custom start up options
Configuring open office connection
Ensuring imagemagick binaries on path
Ensure pdf2swf
Why we have these 3 binaries part of Alfresco.
Configure Alfresco Web Content Management
Configure your database
Configuring CIFS
how linux you configure ports
How to configure Alfresco Share remotely
Starting your evaluation of alfresco Explorer:
- Configuring your own document management scenarios using content models, aspects, rules and actions.
Starting your evaluation of Alfresco Share:
- Creating your own team site so you can start your collaboratin'
And now, doing it all over again!
Except this time with the Windows installer.
This will be a very hands-on webinar. So come prepared to take notes, and do some work yourself.
Surf Code Camp walkthrough 2 gives the student their first exposure to CMIS. It shows how to use E4X in JavaScript to parse a CMIS response.
Full solution source code is at http://ecmarchitect.com/images/green-energy-code-camp.zip
PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...Puppet
Here are the slides from David Lutterkort's PuppetConf 2016 presentation called The Challenges with Container Configuration. Watch the videos at https://www.youtube.com/playlist?list=PLV86BgbREluVjwwt-9UL8u2Uy8xnzpIqa
Introducing containers into your infrastructure brings new capabilities, but also new challenges, in particular around configuration. This talk will take a look under the hood at some of those operational challenges including:
* The difference between runtime and build-time configuration, and the importance of relating the two together.
* Configuration drift, immutable mental models and mutable container file systems.
* Who configures the orchestrators?
* Emergent vs. model driven configuration.
In the process we will identify some common problems and talk about potential solutions.
Talk from PuppetConf 2016
This talk will give you tips and tricks to get better build time performance and smaller images. The most important take-away is: you should be using multi-stage Dockerfiles and enable BuildKit.
Securing Prometheus exporters using HashiCorp VaultBram Vogelaar
Things like Infrastructure as Code, Service Discovery and Config Management can and have helped us to quickly build and rebuild infrastructure but we haven't nearly spend enough time to train our self to review, monitor and respond to outages. Does our platform degrade in a graceful way or what does a high cpu load really mean? What can we learn from level 1 outages to be able to run our platforms more reliably.
This talk will focus on on creating a secure prometheus exporter ecosystem using HashiCorp Vault where we can we be sure that we are not leaking any business metrics from our observability stack. After which we ll investigate how to automatically rotate the certificates we created to do so.
How to Organize Game Developers With Different Planning NeedsPerforce
Different skills have different needs when it comes to planning. For a coder it may make perfect sense to plan work in two-week sprints, but for an artist, an asset may take longer than two weeks to complete.
How do you allow different skills to plan the way that works best for them? Some studios may choose to open up for flexibility – do whatever you like! But that tends to cause issues with alignment and siloes of data, resulting in loss of vision. Lost vision in the sense that it is difficult to understand, but also — and maybe more importantly — the risk of losing the vision of what the game will be.
With the right approach, however, you can avoid these obstacles. Join backlog expert Johan Karlsson to learn:
-The balance of team autonomy and alignment.
-How to use the product backlog to align the project vision.
-How to use tools to support the flexibility you need.
Looking for a planning and backlog tool? You can try Hansoft for free.
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...Perforce
How do regulations impact your product requirements? How do you ensure that you identify all the needed requirements changes to meet these regulations?
Ideally, your regulations should live alongside your product requirements, so you can trace among each related item. Getting to that point can be quite an undertaking, however. Ultimately you want a process that:
-Saves money
-Ensures quality
-Avoids fines
If you want help achieving these goals, this webinar is for you. Watch Tom Totenberg, Senior Solutions Engineer for Helix ALM, show you:
-How to import a regulation document into Helix ALM.
-How to link to requirements.
-How to automate impact analysis from regulatory updates.
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Perforce
Be sure to register for a demo, if you would like to see how Klocwork can help ensure that your code is secure, reliable, and compliant.
https://www.perforce.com/products/klocwork/live-demo
If it’s not documented, it didn’t happen.
When it comes to compliance, if you’re doing the work, you need to prove it. That means having well-documented SOPs (standard operating procedures) in place for all your regulated workflows.
It also means logging your efforts to enforce these SOPs. They show that you took appropriate action in any number of scenarios, which can be related to regulations, change requests, firing of an employee, logging an HR compliant, or anything else that needs a structured workflow.
But when do you need to do this, and how do you go about it?
In this webinar, Tom Totenberg, our Helix ALM senior solutions engineer, clarifies workflow enforcement SOPs, along with a walkthrough of how Perforce manages GDPR (General Data Protection Regulation) requests. He’ll cover:
-What are SOPs?
-Why is it important to have this documentation?
-Example: walking through our internal Perforce GDPR process.
-What to beware of.
-Building the workflow in ALM.
Branching Out: How To Automate Your Development ProcessPerforce
If you could ship 20% faster, what would it mean for your business? What could you build? Better question, what’s slowing your teams down?
Teams struggle to manage branching and merging. For bigger teams and projects, it gets even more complex. Tracking development using a flowchart, team wiki, or a white board is ineffective. And attempts to automate with complex scripting are costly to maintain.
Remove the bottlenecks and automate your development your way with Perforce Streams –– the flexible branching model in Helix Core.
Join Brad Hart, Chief Technology Officer and Brent Schiestl, Senior Product Manager for Perforce version control to learn how Streams can:
-Automate and customize development and release processes.
-Easily track and propagate changes across teams.
-Boost end user efficiency while reducing errors and conflicts.
-Support multiple teams, parallel releases, component-based development, and more.
How to Do Code Reviews at Massive Scale For DevOpsPerforce
Code review is a critical part of your build process. And when you do code review right, you can streamline your build process and achieve DevOps.
Most code review tools work great when you have a team of 10 developers. But what happens when you need to scale code review to 1,000s of developers? Many will struggle. But you don’t need to.
Join our experts Johan Karlsson and Robert Cowham for a 30-minute webinar. You’ll learn:
-The problems with scaling code review from 10s to 100s to 1,000s of developers along with other dimensions of scale (files, reviews, size).
-The solutions for dealing with all dimensions of scale.
-How to utilize Helix Swarm at massive scale.
Ready to scale code review and streamline your build process? Get started with Helix Swarm, a code review tool for Helix Core.
By now many of us have had plenty of time to clean and tidy up our homes. But have you given your product backlog and task tracking software as much attention?
To keep your digital tools organized, it is important to avoid hoarding on to inefficient processes. By removing the clutter in your product backlog, you can keep your teams focused.
It’s time to spark joy by cleaning up your planning tools!
Join Johan Karlsson — our Agile and backlog expert — to learn how to:
-Apply digital minimalism to your tracking and planning.
-Organize your work by category.
-Motivate teams by transitioning to a cleaner way of working.
TRY HANSOFT FREE
Going Remote: Build Up Your Game Dev Team Perforce
Everyone’s working remote as a result of the coronavirus (COVID-19). And while game development has always been done with remote teams, there’s a new challenge facing the industry.
Your audience has always been mostly at home – now they may be stuck there. And they want more games to stay happy and entertained.
So, how can you enable your developers to get files and feedback faster to meet this rapidly growing demand?
In this webinar, you’ll learn:
-How to meet the increasing demand.
-Ways to empower your remote teams to build faster.
-Why Helix Core is the best way to maximize productivity.
Plus, we’ll share our favorite games keeping us happy in the midst of a pandemic.
Shift to Remote: How to Manage Your New WorkflowPerforce
The spread of coronavirus has fundamentally changed the way people work. Companies around the globe are making an abrupt shift in how they manage projects and teams to support their newly remote workers.
Organizing suddenly distributed teams means restructuring more than a standup. To facilitate this transition, teams need to update how they collaborate, manage workloads, and maintain projects.
At Perforce, we are here to help you maintain productivity. Join Johan Karlsson — our Agile expert — to learn how to:
Keep communication predictable and consistent.
-Increase visibility across teams.
-Organize projects, sprints, Kanban boards and more.
-Empower and support your remote workforce.
Hybrid Development Methodology in a Regulated WorldPerforce
In a regulated industry, collaboration can be vital to building quality products that meet compliance. But when an Agile team and a Waterfall team need to work together, it can feel like mixing oil with water.
If you're used to Agile methods, Waterfall can feel slow and unresponsive. From a Waterfall perspective, pure Agile may lack accountability and direction. Misaligned teams can slow progress, and expose your development to mistakes that undermine compliance.
It's possible to create the best of both worlds so your teams can operate together harmoniously. This is how to develop products quickly, and still make regulators happy.
Join ALM Solutions Engineer Tom Totenberg in this webinar to learn how teams can:
- Operate efficiently with differing methodologies.
- Glean best practices for their tailored hybrid.
- Work together in a single environment.
Watch the webinar, and when you're ready for a tool to help you with the hybrid, know that you can try Helix ALM for free.
Better, Faster, Easier: How to Make Git Really Work in the EnterprisePerforce
There's a lot of reasons to love Git. (Git is awesome at what it does.) Let’s look at the 3 major use cases for Git in the enterprise:
1. You work with third party or outsourced development teams.
2. You use open source in your products.
3. You have different workflow needs for different teams.
Making the best of Git can be difficult in an enterprise environment. Trying to manage all the moving parts is like herding cats.
So, how do you optimize your teams’ use of Git — and make it all fit into your vision of the enterprise SDLC?
You’ll learn about:
-The challenges that accompany each use case — third parties, open source code, different workflows.
-Ways to solve these problems.
-How to make Git better, faster, and easier — with Perforce
Easier Requirements Management Using Diagrams In Helix ALMPerforce
Sometimes requirements need visuals. Whether it’s a diagram that clarifies an idea or a screenshot to capture information, images can help you manage requirements more efficiently. And that means better quality products shipped faster.
In this webinar, Helix ALM Professional Services Consultant Gerhard Krüger will demonstrate how to use visuals in ALM to improve requirements. Learn how to:
-Share information faster than ever.
-Drag and drop your way to better teamwork.
-Integrate various types of visuals into your requirements.
-Utilize diagram and flowchart software for every need.
-And more!
Immediately apply the information in this webinar for even better requirements management using Helix ALM.
It’s common practice to keep a product backlog as small as possible, probably just 10-20 items. This works for single teams with one Product Owner and perhaps a Scrum Master.
But what if you have 100 Scrum teams managing a complex system of hardware and software components? What do you need to change to manage at such a massive scale?
Join backlog expert Johan Karlsson to learn how to:
-Adapt Agile product backlog practices to manage many backlogs.
-Enhance collaboration across disciplines.
-Leverage backlogs to align teams while giving them flexibility.
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...Perforce
In Part 3, we will look at what the future might hold for embedded programming languages and development tools. And, we will look at the future for software safety and security standards.
How to Scale With Helix Core and Microsoft Azure Perforce
Microsoft Azure helps teams increase their speed, gain flexibility, and save time. Using Helix Core with Azure you maximizes cloud benefits. You can scale to meet both current and future deployment demands. And this powerful combination helps secure your most valuable IP assets.
So, where do you start? What do you need to set up your teams for success? How can you expedite your pipelines to deliver ahead of your competitors?
Join Chuck Gehman from Perforce to learn more about:
-Compute, storage, and security options from Azure.
-Strategies that boost your cloud investment.
-Tips to secure your data.
-Best practices for global deployments.
Achieving Software Safety, Security, and Reliability Part 2Perforce
In Part 2, we will focus on the automotive industry, as it leads the way in enforcing safety, security, and reliability standards as well as best practices for software development. We will then examine how other industries could adopt similar practices.
Modernizing an application’s architecture is often a necessary multi-year project in the making. The goal –– to stabilize code, detangle dependencies, and adopt a toolset that ignites innovation.
Moving your monolith repository to a microservices/component based development model might be on trend. But is it right for you?
Before you break up with anything, it is vital to assess your needs and existing environment to construct the right plan. This can minimize business risks and maximize your development potential.
Join Tom Tyler and Chuck Gehman to learn more about:
-Why you need to plan your move with the right approach.
-How to reduce risk when refactoring your monolithic repository.
-What you need to consider before migrating code.
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Perforce
In part one of our three-part webinar series, we examine common software development challenges, review the safety and security standards adopted by different industries, and examine the best practices that can be applied to any software development team.
The features you’ve been waiting for! Helix ALM’s latest update expands usability and functionality to bring solid improvements to your processes.
Watch Helix ALM Senior Product Manager Paula Rome demonstrate how new features:
-Simplify workflows.
-Expand report analysis.
-Boost productivity in the Helix ALM web client.
All this and MORE packed into an exciting 30 minutes! Get inspired. Be extraordinary with the new Helix ALM.
Companies that track requirements, create traceability matrices, and complete audits - especially for compliance - run into many problems using only Word and Excel to accomplish these tasks.
Most notably, manual processes leave employees vulnerable to making costly mistakes and wasting valuable time.
These outdated tracking procedures rob organizations of benefiting from four keys to productivity and efficiency:
-Automation
-Collaboration
-Visibility
-Traceability
However, modern application lifecycle management (ALM) tools solve all of these problems, linking and organizing information into a single source of truth that is instantly auditable.
Gerhard Krüger, senior consultant for Helix ALM, explains how the right software supports these fundamentals, generating improvements that save time and money.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
2. THE PROBLEM
• Granting access is a 24/7 operation
3. THE PROBLEM
• Granting access is a 24/7 operation
• Engineering teams span across the world
4. THE PROBLEM
• Granting access is a 24/7 operation
• Engineering teams span across the world
• Access to areas is tightly regulated
5. THE PROBLEM
• Granting access is a 24/7 operation
• Engineering teams span across the world
• Access to areas is tightly regulated
• A single team is authorized to give access
6. THE PROBLEM
• Granting access is a 24/7 operation
• Engineering teams span across the world
• Access to areas is tightly regulated
• A single team is authorized to give access
• Be able to perform this task whenever and wherever
8. THE SOLUTION
• Leverage the mobile device
• Create an interface accessible by web browser
9. THE SOLUTION
• Leverage the mobile device
• Create an interface accessible by web browser
• Use the browser on the mobile device
10. THE SOLUTION
• Leverage the mobile device
• Create an interface accessible by web browser
• Use the browser on the mobile device
• Do it securely
11. CONTEXT
This presentation touches on:
• Breadth of the organization
• Permissions in the protection table
• Centralized authorization process
12. CONTEXT
This presentation touches on:
• Breadth of the organization
• Permissions in the protection table
• Centralized authorization process
Then I discuss:
• Evolution of the solution
• Simplicity
• Where to go from here
32. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...
w bm_merc //depot/main/merc/... depot
r ACC_merc //depot/main/merc/...
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
stg main rel
r ACC_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
33. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc
w bm_merc //depot/main/merc/...
r ACC_merc //depot/main/merc/...
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
r ACC_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
34. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc
w bm_merc //depot/main/merc/...
r ACC_merc //depot/main/merc/...
src
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
r ACC_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
35. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
r ACC_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
36. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
r ACC_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
s grp_admins //...
37. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src
w ACC_merc //depot/stg/merc/src/... venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
s grp_admins //...
38. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src
w ACC_merc //depot/stg/merc/src/... venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
s grp_admins //...
39. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc 8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src merc
w ACC_merc //depot/stg/merc/src/... venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
s grp_admins //...
40. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc 8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src merc
w ACC_merc //depot/stg/merc/src/... venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
s grp_admins //...
41. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc 8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src merc
w ACC_merc //depot/stg/merc/src/... venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
s grp_admins //...
42. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc 8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src merc
w ACC_merc //depot/stg/merc/src/... venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
s grp_admins //...
43. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc 8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src merc
w ACC_merc //depot/stg/merc/src/... venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
s grp_admins //...
44. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc 8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src merc
w ACC_merc //depot/stg/merc/src/... venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc
nda venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
nda
s grp_admins //...
45. DEPOT STRUCTURE & PERMISSIONS
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
stg main rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... merc merc 8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
src merc
w ACC_merc //depot/stg/merc/src/... venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/... doc
nda venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/... venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/... src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt doc
nda
s grp_admins //...
46. PERMISSIONS: HIGH-LEVEL TEAMS
r ACC_rel //depot/rel/...
bm_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt bm_merc
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... nda_merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/... reg_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/... bm_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
nda_venus
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/... reg_venus
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/... grp_admins
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
47. PERMISSIONS: HIGH-LEVEL TEAM EXAMPLES
r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/... bm_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/... grp_admins
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
48. PERMISSIONS: ACCESS GROUPS
r ACC_rel //depot/rel/...
ACC_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt REG_rel
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... ACC_main
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/... ACC_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/... ACC_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
49. PERMISSIONS: ACCESS GROUP EXAMPLE
r ACC_rel //depot/rel/...
ACC_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... ACC_main
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/... ACC_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
grp_shanghai
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
50. PERMISSIONS: ACCESS GROUP EXAMPLE
r ACC_rel //depot/rel/...
ACC_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... ACC_main
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/... ACC_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/... ACC_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
grp_northamerica
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
51. PERMISSIONS: COMBINATION EXAMPLE
r ACC_rel //depot/rel/...
ACC_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/... ACC_main
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/... ACC_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/... ACC_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
bm_venus
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
grp_northamerica
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
65. ADVANTAGES WITH WEB APPS
• Newer versions available right away.
• Experimental versions can be easily tested.
66. ADVANTAGES WITH WEB APPS
• Newer versions available right away.
• Experimental versions can be easily tested.
• Real-time validation on inputs.
67. ADVANTAGES WITH WEB APPS
• Newer versions available right away.
• Experimental versions can be easily tested.
• Real-time validation on inputs.
• OS-independent.
83. SECURITY
Wireless Solutions
• BlackBerry Enterprise Solution for Blackberries
• Secure VPN for iOS devices
84. SECURITY
Wireless Solutions
• BlackBerry Enterprise Solution for Blackberries
• Secure VPN for iOS devices
HTTP is not secure, use HTTPS!
• Encrypts the HTTP message prior to transmission
• Decrypts the message upon arrival
• Requires the use of CA certificates
85. SECURITY
Wireless Solutions
• BlackBerry Enterprise Solution for Blackberries
• Secure VPN for iOS devices
HTTP is not secure, use HTTPS!
• Encrypts the HTTP message prior to transmission
• Decrypts the message upon arrival
• Requires the use of CA certificates
User Authentication and Identification
• REMOTE_USER environment variable
86. REDUCING RISK
Keep the location of the web page unknown
• Only known to Perforce admins
87. REDUCING RISK
Keep the location of the web page unknown
• Only known to Perforce admins
Limit what can be done on the web page
• Create a new user account
• Display information from p4 protects and p4 groups
• Add an existing user to currently existing groups
• Remove the user from a group
• Reset the password of an existing user
88. WHAT NEXT?
Server-side APIs
• P4Java, P4Perl, P4Ruby, P4Python, P4PHP
• ASP.NET with Perforce C/C++ API
89. WHAT NEXT?
Server-side APIs
• P4Java, P4Perl, P4Ruby, P4Python, P4PHP
• ASP.NET with Perforce C/C++ API
Client-side Technologies
• jQuery, jQuery Mobile, HTML5
90. WHAT NEXT?
Server-side APIs
• P4Java, P4Perl, P4Ruby, P4Python, P4PHP
• ASP.NET with Perforce C/C++ API
Client-side Technologies
• jQuery, jQuery Mobile, HTML5
More Features!
• Monitor and restart servers
• Most-used commands can be called
91. CONCLUSION
The result:
• Simple mechanism
• Took advantage of existing resources
• Latest web technologies were not necessary
• Quick development, fast deployment
92. CONCLUSION
The result:
• Simple mechanism
• Took advantage of existing resources
• Latest web technologies were not necessary
• Quick development, fast deployment
The advantages:
• Web page + mobile device allows rich feature set
• Write once, run on all
• Feel at home with the same interface
• Not just work hard, but work SMART