O que são filas (queue)? Para que servem? Aonde e como utilizar com PHP?
Falar um pouco sobre amqp, como utilizar e quando é necessário e no final mostrar um exemplo de producer e consumer usando RabbitMQ e PHP.
SparkPost's Director of Support Scott Habicht talks through the new features in PMTA 5.0 and explains how companies can make the most of the new version.
O que são filas (queue)? Para que servem? Aonde e como utilizar com PHP?
Falar um pouco sobre amqp, como utilizar e quando é necessário e no final mostrar um exemplo de producer e consumer usando RabbitMQ e PHP.
SparkPost's Director of Support Scott Habicht talks through the new features in PMTA 5.0 and explains how companies can make the most of the new version.
Работаем с RabbitMQ в Python используя kombu + gevent. (Rinat khabibiev)IT-Доминанта
Хабибиев Ринат - Senior Python Developer / Россия, Москва
Тема доклада - показать как легко и просто начать использовать очереди сообщений в Python в асинхронных воркерах, использующих gevent.
http://www.it-sobytie.ru/events/2040
Xin Wang(Apache Storm Committer/PMC member)'s topic covered the relations between streaming and messaging platform, and the challenges and tips in Storm usage.
In this JBug, Tom will use an example driven format to illustrate some of the new features that have been added into Narayana recently. We will look at:
1. Why you need a transaction manager - a brief revision course
2. Using Narayana inside none-EE containers, mainly focussing on Tomcat
SOAP IS:
Lightweight communication protocol
For communication between applicationsone-way, request/response, multicast, etc..
Designed to communicate via HTTP
Not tied to any component technology
Not tied to any programming language
Based on XML
Simple and extensible
We'll be talking about the latest version of the Kohana Framework which is built based on HMVC.
The talk will cover the following items:
- foundation of the Kohana Framework
- setting up the Framework and common gotchas
- how Cracked.com is currently using it
- how Cracked.com scaled based on Kohana Framework
Rich Hickey gave us an amazing talk “Simple made easy” about how to leverage Clojure to build simple solutions. But what can we do if the problem we’re solving is intrinsically complex?
This talk will show how we can leverage Clojure simplicity to solve complex problems that evolve over time based on the Nubank experience of building a 6 year long system that we managed to solve for the complexity in a bearable way.
https://www.youtube.com/watch?v=ct5aWqhHARs
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Jeremiah Grossman
Many diligent security professionals take active steps to limit the amount of system specific information a publicly available system may yield to a remote user. These preventative measures may take the form of modifying service banners, firewalls, web site information, etc.
Software utilities such as NMap have given the security community an excellent resource to discover what type of Operating System and version is listening on a particular IP. This process is achieved by mapping subtle, yet, distinguishable nuances unique to each OS. But, this is normally where the fun ends, as NMap does not enable we user's to determine what version of services are listening. This is up to us to guess or to find out through other various exploits.
This is where we start our talk, fingerprinting Web Servers. These incredibly diverse and useful widespread services notoriously found listening on port 80 and 443 just waiting to be explored. Many web servers by default will readily give up the type and version of the web server via the "Server" HTTP response header. However, many administrators aware of this fact have become increasingly clever in recent months by removing or altering any and all traces of this telltale information.
These countermeasures lead us to the obvious question; could it STILL possible to determine a web servers platform and version even after all known methods of information leakage prevention have been exhausted (either by hack or configuration)?
The simple answer is "yes"; it is VERY possible to still identify the web server. But, the even more interesting question is; just how much specific information can we obtain remotely?
Are we able to determine?
* Supported HTTP Request Methods.
* Current Service Pack.
* Patch Levels.
* Configuarations.
* If an Apache Server suffers from a "chunked" vulnerability.
Is really possible to determine this specific information using a few simple HTTP requests? Again, the simple answer is yes, the possibility exists.
Proof of concept tools and command line examples will be demonstrated throughout the talk to illustrate these new ideas and techniques. Various countermeasures will also be explored to protect your IIS or Apache web server from various fingerprinting techniques.
Prerequisites:
General understanding of Web Server technology and HTTP.
There are plenty of patterns and literature about how to organize systems in traditional languages like Java or C#. The same isn’t exactly true for functional programming languages, specially Clojure. At Nubank we had to figure it out over 3 years of writing tens of microservices in Clojure, using some of our knowledge from other languages and some creativity.
Several patterns emerged, several mistakes were made and eventually we came up with a very sustainable and scalable way to write new code even for developers which are new to Clojure. This talk will explore those learnings.
Presented at Clojure Remote 2017
Работаем с RabbitMQ в Python используя kombu + gevent. (Rinat khabibiev)IT-Доминанта
Хабибиев Ринат - Senior Python Developer / Россия, Москва
Тема доклада - показать как легко и просто начать использовать очереди сообщений в Python в асинхронных воркерах, использующих gevent.
http://www.it-sobytie.ru/events/2040
Xin Wang(Apache Storm Committer/PMC member)'s topic covered the relations between streaming and messaging platform, and the challenges and tips in Storm usage.
In this JBug, Tom will use an example driven format to illustrate some of the new features that have been added into Narayana recently. We will look at:
1. Why you need a transaction manager - a brief revision course
2. Using Narayana inside none-EE containers, mainly focussing on Tomcat
SOAP IS:
Lightweight communication protocol
For communication between applicationsone-way, request/response, multicast, etc..
Designed to communicate via HTTP
Not tied to any component technology
Not tied to any programming language
Based on XML
Simple and extensible
We'll be talking about the latest version of the Kohana Framework which is built based on HMVC.
The talk will cover the following items:
- foundation of the Kohana Framework
- setting up the Framework and common gotchas
- how Cracked.com is currently using it
- how Cracked.com scaled based on Kohana Framework
Rich Hickey gave us an amazing talk “Simple made easy” about how to leverage Clojure to build simple solutions. But what can we do if the problem we’re solving is intrinsically complex?
This talk will show how we can leverage Clojure simplicity to solve complex problems that evolve over time based on the Nubank experience of building a 6 year long system that we managed to solve for the complexity in a bearable way.
https://www.youtube.com/watch?v=ct5aWqhHARs
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...Jeremiah Grossman
Many diligent security professionals take active steps to limit the amount of system specific information a publicly available system may yield to a remote user. These preventative measures may take the form of modifying service banners, firewalls, web site information, etc.
Software utilities such as NMap have given the security community an excellent resource to discover what type of Operating System and version is listening on a particular IP. This process is achieved by mapping subtle, yet, distinguishable nuances unique to each OS. But, this is normally where the fun ends, as NMap does not enable we user's to determine what version of services are listening. This is up to us to guess or to find out through other various exploits.
This is where we start our talk, fingerprinting Web Servers. These incredibly diverse and useful widespread services notoriously found listening on port 80 and 443 just waiting to be explored. Many web servers by default will readily give up the type and version of the web server via the "Server" HTTP response header. However, many administrators aware of this fact have become increasingly clever in recent months by removing or altering any and all traces of this telltale information.
These countermeasures lead us to the obvious question; could it STILL possible to determine a web servers platform and version even after all known methods of information leakage prevention have been exhausted (either by hack or configuration)?
The simple answer is "yes"; it is VERY possible to still identify the web server. But, the even more interesting question is; just how much specific information can we obtain remotely?
Are we able to determine?
* Supported HTTP Request Methods.
* Current Service Pack.
* Patch Levels.
* Configuarations.
* If an Apache Server suffers from a "chunked" vulnerability.
Is really possible to determine this specific information using a few simple HTTP requests? Again, the simple answer is yes, the possibility exists.
Proof of concept tools and command line examples will be demonstrated throughout the talk to illustrate these new ideas and techniques. Various countermeasures will also be explored to protect your IIS or Apache web server from various fingerprinting techniques.
Prerequisites:
General understanding of Web Server technology and HTTP.
There are plenty of patterns and literature about how to organize systems in traditional languages like Java or C#. The same isn’t exactly true for functional programming languages, specially Clojure. At Nubank we had to figure it out over 3 years of writing tens of microservices in Clojure, using some of our knowledge from other languages and some creativity.
Several patterns emerged, several mistakes were made and eventually we came up with a very sustainable and scalable way to write new code even for developers which are new to Clojure. This talk will explore those learnings.
Presented at Clojure Remote 2017
This webinar explains why PISA chips are inevitable, provides overview of machine architecture of such switches, presents a brief primer on the P4 language with sample programs for a variety of networks and demonstrates a powerful network diagnostics application implemented in P4.
Programmability in SDNs is confined to the network control plane. The forwarding plane is still largely dictated by fixed-function switching chips. Our goal is to change that, and to allow programmers to define how packets are to be processed all the way down to the wire.
This is made possible by a new generation of high-performance forwarding chips. At the high-end, PISA (Protocol-Independent Switch Architecture) chips promise multi-Tb/s of packet processing. At the mid- and low-end of the performance spectrum, CPUs, GPUs, FPGAs, and NPUs already offer great flexibility with performance of a few tens to hundreds of Gb/s.
In addition to programmable forwarding chips, we also need a high-level language to dictate the forwarding behavior in a target independent fashion. "P4" (www.p4.org) is such a language. In P4, the programer declares how packets are to be processed, and a compiler generates a configuration for a PISA chip, or a programmable target in general. For example, the programmer might program the switch to be a top-of-rack switch, a firewall, or a load-balancer; and might add features to run automatic diagnostics and novel congestion control algorithms.
Neutralized Network Operating System
- Operating system like quagga, zebos and cisco IOS.
- Targeting the open network operating system platform
which supports all types of network equipment
in the world.
- Neutralized Architecture
The Next Generation of Streaming
https://www.meetup.com/new-york-city-apache-pulsar-meetup/events/291048765/
https://www.meetup.com/risingwave-community/events/291294056/
The Next Generation of Streaming
David Kjerrumgaard, Developer Advocate
Tim Spann
Building a cloud-native streaming application requires a team, from the start of events to the final analytics. I'll walk you through using Apache Pulsar as your central messaging hub to distribute events and real-time messages from and to everywhere it needs to be. All instantly. The next step is to stream into continuous SQL.
Agenda
9:00 -- 9:20 The Next Generation of Streaming by Tim Spann,
Developer Advocate at StreamNative
9:20 -- 9:40 RisingWave: Cloud-Native Streaming SQL over Pulsar by Rayees Pasha, Head of Product at RisingWave Labs
23-feb-2023 12:15pm EST
https://github.com/tspannhw/Flow-SGP30-MLX90640
Apache NiFi, Apache Pulsar, Apache Kafka, MQTT, RabbitMQ, AMQP, Source, Sink, Stream Processing
Devfest uk & ireland using apache nifi with apache pulsar for fast data on-r...Timothy Spann
Devfest uk & ireland using apache nifi with apache pulsar for fast data on-ramp 2022
As the Pulsar communities grows, more and more connectors will be added. To enhance the availability of sources and sinks and to make use of the greater Apache Streaming community, joining forces between Apache NiFi and Apache Pulsar is a perfect fit. Apache NiFi also adds the benefits of ELT, ETL, data crunching, transformation, validation and batch data processing. Once data is ready to be an event, NiFi can launch it into Pulsar at light speed.
I will walk through how to get started, some use cases and demos and answer questions.
https://www.devfest-uki.com/schedule
https://linktr.ee/tspannhw
Quando o planejamento da infraestrutura leva ao sucessoIvan Rosolen
Exemplos reais de arquiteturas que prejudicam quando temos uma queda de servidor ou aplicação. Cases de arquiteturas que são simples e funcionais para poucos usuários até muitos usuários e irão aguentar uma queda, um rollback e uma recuperação de desastre fácil.
Case: PHP como Base de Digital Asset Management – arizona.flowIvan Rosolen
Case: PHP como Base de Digital Asset Management – arizona.flow
Uma pequena introdução sobre DAM e algumas das ferramenta utilizadas para o desenvolvimento junto com PHP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Ivan Rosolen
Graduado em Sistemas de Informação
Pós-graduado em Gerência de Projetos
Desenvolvedor a 15+ anos
Autor de vários PHPT (testes para o PHP)
Entusiasta de novas tecnologias
Head of Innovation @ Arizona
CTO @ Mokation