Virality Score
Adding more information (description, tags, category) makes it easier for others to find your content. The score increases as you add each item.
If a tree falls in a forest and no one is around to hear it, does it make a sound?
The presentation explains symbolic and entitative transformations used in MetaJS to generate missed parts of source code. Also gives concrete answer to the well-known question: how deep does the rabbit hole go?
Virality Score
Adding more information (description, tags, category) makes it easier for others to find your content. The score increases as you add each item.
If a tree falls in a forest and no one is around to hear it, does it make a sound?
The presentation explains symbolic and entitative transformations used in MetaJS to generate missed parts of source code. Also gives concrete answer to the well-known question: how deep does the rabbit hole go?
The presentation from SPb Python Interest Group community meetup.
The presentation tells about the dictionaries in Python, reviews the implementation of dictionary in CPython 2.x, dictionary in CPython 3.x, and also recent changes in CPython 3.6. In addition to CPython the dictionaries in alternative Python implementations such as PyPy, IronPython and Jython are reviewed.
Using Moose provides many immediate and obvious benefits, starting with the
obviation of typing "use strict" and "use warnings" in your classes.
The real power of Moose, however, rests in its extensibility. By subclassing
Moose's metaclasses, you can augment and change Moose's behavior to suit your
application's needs. This extensibility is powered by the meta-object protocol
of Moose's foundation, Class::MOP.
The motivating example for extending Moose will be the creation of a small web
framework to empower a Twitter-alike. The focus will be creating meta-level
roles so that metaclasses may select exactly which changes in behavior they
wish to exhibit. Modules that will be used include Moose::Exporter (to define
sugary keywords) and Moose::Util::MetaRole (to extend classes composably).
Experience with using Moose to create regular classes is expected. Having some
familiarity with roles will let you get more out of the talk. No experience
with metaprogramming is required.
PHP Data Objects (PDO) provides a clear, simple (but powerful), unified API for working with all our favorite databases. Features include prepared statements with bound parameters (for all databases, even those that don’t natively support them), transactions, cursors, LOBs, and flexible error handling.
Der Vortrag "Zend Framework meets Doctrine 2" von Paul Seiffert erklärt die Verwendung von Doctrine 2 in Projekten, die auf Zend Framework (ZF) basieren. Zuerst wird Paul dabei auf das Doctrine 2 ORM und dessen
grundsätzliche Verwendung eingehen (es wird also kein Doctrine 2 - Wissen vorausgesetzt), im weiteren Verlauf wird er die Einbindung des ORMs in ZF-Projekte erklären. Zum Schluss zeigt Paul ein kleines Beispiel-Projekt, in dem ZF und Doctrine 2 gemeinsam zum Einsatz kommen.
The presentation from SPb Python Interest Group community meetup.
The presentation tells about the dictionaries in Python, reviews the implementation of dictionary in CPython 2.x, dictionary in CPython 3.x, and also recent changes in CPython 3.6. In addition to CPython the dictionaries in alternative Python implementations such as PyPy, IronPython and Jython are reviewed.
Using Moose provides many immediate and obvious benefits, starting with the
obviation of typing "use strict" and "use warnings" in your classes.
The real power of Moose, however, rests in its extensibility. By subclassing
Moose's metaclasses, you can augment and change Moose's behavior to suit your
application's needs. This extensibility is powered by the meta-object protocol
of Moose's foundation, Class::MOP.
The motivating example for extending Moose will be the creation of a small web
framework to empower a Twitter-alike. The focus will be creating meta-level
roles so that metaclasses may select exactly which changes in behavior they
wish to exhibit. Modules that will be used include Moose::Exporter (to define
sugary keywords) and Moose::Util::MetaRole (to extend classes composably).
Experience with using Moose to create regular classes is expected. Having some
familiarity with roles will let you get more out of the talk. No experience
with metaprogramming is required.
PHP Data Objects (PDO) provides a clear, simple (but powerful), unified API for working with all our favorite databases. Features include prepared statements with bound parameters (for all databases, even those that don’t natively support them), transactions, cursors, LOBs, and flexible error handling.
Der Vortrag "Zend Framework meets Doctrine 2" von Paul Seiffert erklärt die Verwendung von Doctrine 2 in Projekten, die auf Zend Framework (ZF) basieren. Zuerst wird Paul dabei auf das Doctrine 2 ORM und dessen
grundsätzliche Verwendung eingehen (es wird also kein Doctrine 2 - Wissen vorausgesetzt), im weiteren Verlauf wird er die Einbindung des ORMs in ZF-Projekte erklären. Zum Schluss zeigt Paul ein kleines Beispiel-Projekt, in dem ZF und Doctrine 2 gemeinsam zum Einsatz kommen.
U-SQL Query Execution and Performance TuningMichael Rys
This 400 level presentation explains the U-SQL Query Execution in Azure Data Lake and provides several Performance Tuning tips: What tools are available and some best practices.
This document has more than 100 PHP interview questions for experienced professionals. The most important thing in the corporate world that you must know about which type of questions you are going to face in an Interview. Some of the Interview Questions totally depend on projects of the company working on, and also PHP has many MVC frameworks like Laravel, CodeIgniter, Magento, and WordPress.
In this presentation, I covered following topics:
1. Introduction
2. Characteristics of PHP
3. PHP Tag
4. Variables and type of variables
5. Datatypes
6. Operators
7. Decision-making Statements
8. Looping Statements
9. Arrays
10. Functions
11. Cookies
12. PHP and MySQL
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
1. FNT Software Solutions Pvt Ltd, Bangalore
PHP Interview Questions
PHP Interview Questions:
1. What's PHP?
The PHP Hypertext Preprocessor is a programming language that allows web developers to create
dynamic content that interacts with databases. PHP is basically used for developing web based software
applications.
2. How can we know the number of days between two given dates using PHP?
$date1 = date('Y-m-d');
$date2 = '2006-07-01';
$days = (strtotime($date1) - strtotime($date2)) / (60 * 60 * 24);
echo "Number of days since '2006-07-01': $days";
3. How do you define a constant?
define ("MYCONSTANT", 100);
4. What is meant by urlencode and urldecode?
urlencode() returns the URL encoded version of the given string. URL coding converts special characters
into % signs followed by two hex digits.
For example:
urlencode("10.00%") will return "10%2E00%25". URL encoded strings are safe to be used as part of
URLs.
urldecode() returns the URL decoded version of the given string.
5. How To Get the Uploaded File Information in the Receiving Script?
Uploaded file information is organized in $_FILES as a two-dimensional array as:
$_FILES[$fieldName]['name'] - The Original file name on the browser system.
$_FILES[$fieldName]['type'] - The file type determined by the browser.
$_FILES[$fieldName]['size'] - The Number of bytes of the file content.
$_FILES[$fieldName]['tmp_name'] - The temporary filename of the file in which the uploaded file was
stored on the server.
$_FILES[$fieldName]['error'] - The error code associated with this file upload.
2. FNT Software Solutions Pvt Ltd, Bangalore
PHP Interview Questions
6. What is the difference between mysql_fetch_object and mysql_fetch_array?
MySQL fetch object will collect first single matching record where mysql_fetch_array will collect all
matching records from the table in an array
7. How do you pass a variable by value?
Just like in C++, put an ampersand in front of it, like $a = &$b.
8. How can we send mail using JavaScript?
No. There is no way to send emails directly using JavaScript.
But you can use JavaScript to execute a client side email program send the email using the "mailto"
code. Here is an example:
function myfunction(form)
{
tdata=document.myform.tbox1.value;
location="mailto:mailid@domain.com?subject=...";
return true;
}
9. What is the difference between ereg_replace() and eregi_replace()?
eregi_replace() function is identical to ereg_replace() except that it ignores case distinction when
matching alphabetic characters.
10. How do I find out the number of parameters passed into function ?
func_num_args() function returns the number of parameters passed in.
11. Are objects passed by value or by reference?
Everything is passed by value.
12. What are the differences between DROP a table and TRUNCATE a table?
DROP TABLE table_name - This will delete the table and its data.
TRUNCATE TABLE table_name - This will delete the data of the table, but not the table definition.
3. FNT Software Solutions Pvt Ltd, Bangalore
PHP Interview Questions
13. How do you call a constructor for a parent class?
parent::constructor($value)
14. How can we submit a form without a submit button?
If you don't want to use the Submit button to submit a form, you can use normal hyper links to submit a
form. But you need to use some JavaScript code in the URL of the link.
<a href="javascript: document.myform.submit();">Submit Me</a>
15. How can we extract string 'abc.com ' from a string http://info@abc.com using regular expression
of php?
We can use the preg_match() function with "/.*@(.*)$/" as the regular expression pattern.
For example:
preg_match("/.*@(.*)$/","http://info@abc.com",$data);
echo $data[1];
16. What is the difference between the functions unlink and unset?
unlink() is a function for file system handling. It will simply delete the file in context.
unset() is a function for variable management. It will make a variable undefined.
17. What is the difference between characters 047 and x47?
The first one is octal 47, the second is hex 47.
18. How can we create a database using PHP and mysql?
We can create MySQL database with the use of mysql_create_db($databaseName) to create a database.
19. How can we destroy the session, how can we unset the variable of a session?
session_unregister() - Unregister a global variable from the current session
session_unset() - Free all session variables
20. How can we know the count/number of elements of an array?
a) sizeof($array) - This function is an alias of count()
4. FNT Software Solutions Pvt Ltd, Bangalore
PHP Interview Questions
b) count($urarray) - This function returns the number of elements in an array.
Interestingly if you just pass a simple var instead of an array, count() will return 1
21. How many values can the SET function of MySQL take?
MySQL SET function can take zero or more values, but at the maximum it can take 64 values.
22. What are the other commands to know the structure of a table using MySQL commands except
EXPLAIN command?
DESCRIBE table_name;
23. How can we find the number of rows in a table using MySQL?
SELECT COUNT(*) FROM table_name;
24. How can we find the number of rows in a result set using PHP?
$result = mysql_query($any_valid_sql, $database_link);
$num_rows = mysql_num_rows($result);
echo "$num_rows rows found";
25. What is the difference between CHAR and VARCHAR data types?
CHAR is a fixed length data type. CHAR(n) will take n characters of storage even if you enter less than n
characters to that column. For example, "Hello!" will be stored as "Hello! " in CHAR(10) column.
VARCHAR is a variable length data type. VARCHAR(n) will take only the required storage for the actual
number of characters entered to that column. For example, "Hello!" will be stored as "Hello!" in
VARCHAR(10) column.
26. What are the differences between mysql_fetch_array(), mysql_fetch_object(), mysql_fetch_row()?
mysql_fetch_array - Fetch a result row as an associative array and a numeric array.
mysql_fetch_object - Returns an object with properties that correspond to the fetched row and moves
the internal data pointer ahead. Returns an object with properties that correspond to the fetched row,
or FALSE if there are no more rows
mysql_fetch_row() - Fetches one row of data from the result associated with the specified result
identifier. The row is returned as an array. Each result column is stored in an array offset, starting at
offset 0.
5. FNT Software Solutions Pvt Ltd, Bangalore
PHP Interview Questions
27. What is the difference between htmlentities() and htmlspecialchars()?
htmlspecialchars() - Convert some special characters to HTML entities (Only the most widely used)
htmlentities() - Convert ALL special characters to HTML entities
28. How can we get the properties (size, type, width, height) of an image using php image functions?
image size use getimagesize() function
image width use imagesx() function
image height use imagesy() function
29. How can we increase the execution time of a php script?
By the use of void set_time_limit(int seconds)
30. What are the difference between abstract class and interface?
Abstract class: abstract classes are the class where one or more methods are abstract but not
necessarily all method has to be abstract. Abstract methods are the methods, which are declare in its
class but not define. The definition of those methods must be in its extending class.
Interface: Interfaces are one type of class where all the methods are abstract. That means all the
methods only declared but not defined. All the methods must be define by its implemented class.
31. What is the maximum size of a file that can be uploaded using PHP and how can we change this?
change maximum size of a file set upload_max_filesize variable in php.ini file
32. Explain the ternary conditional operator in PHP?
Expression preceding the ? is evaluated, if it’s true, then the expression preceding the : is executed,
otherwise, the expression following : is executed.
33. What’s the difference between include and require?
It’s how they handle failures. If the file is not found by require(), it will cause a fatal error and halt the
execution of the script. If the file is not found by include(), a warning will be issued, but execution will
continue.
34. How many ways can we get the value of current session id?
session_id() returns the session id for the current session.
35. What is the difference between $message and $$message?
6. FNT Software Solutions Pvt Ltd, Bangalore
PHP Interview Questions
They are both variables. But $message is a variable with a fixed name. $$message is a variable who's
name is stored in $message. For example, if $message contains "var", $$message is the same as $var.
36. How can we get the browser properties using php?
<?php
echo $_SERVER['HTTP_USER_AGENT'] . "nn";
$browser = get_browser(null, true);
print_r($browser);
?>
37. How can we know that a session is started or not?
A session starts by session_start()function.
this session_start() is always declared in header portion.it always declares first.then
we write session_register().
38. What is the use of obj_start()?
Its intializing the object buffer, so that the whole page will be first parsed (instead of parsing in parts and
thrown to browser gradually) and stored in output buffer so that after complete page is executed, it is
thrown to the browser once at a time.
39. What is the difference between Split and Explode?
split()-used for JavaScript for processing the string and the explode()-used to convert the String to Array,
implode()-used for convert the array to String
Here the Example
<?php
$x="PHP is a ServerSide Scripting Language";
$c=explode(" ",$x);
print_r($c);
$d=implode(" ",$c);
echo "
7. FNT Software Solutions Pvt Ltd, Bangalore
PHP Interview Questions
".$d;
?>
Javascript Example:
list($month, $day, $year) = split('[/.-]', $date);
40. Which will execute faster on php POST or GET?
Both are same while performing the action but using POST security is there.
Because using GET method in the action, form field values send along with URL, so at the time of
sending password, problem will occur means password also will shown in the URL.
Using of POST there is no problem.
GET method has a limit of sending parameters 100 characters but POST method does not have a limit of
sending data
GET is faster than POST. Because GET fetch the data directly from the URL but POST method fetch the
encrypted data from the page.
41. What is the use of sprintf() function?
The sprintf() function writes a formatted string to a variable.
42. What Is a Session?
Sessions are commonly used to store temporary data to allow multiple PHP pages to offer a complete
functional transaction for the same visitor.
43. What is the use of header() function in php?
The header() function is used for redirect the page.if you want to redirect one page to another we can
use it.
44. How can i get ip address?
REMOTE_ADDR - the IP address of the client
REMOTE_HOST - the host address of the client
45. What is htaccess?
.htaccess files (or "distributed configuration files") provide a way to make configuration changes on a
per-directory basis.
8. FNT Software Solutions Pvt Ltd, Bangalore
PHP Interview Questions
46. What is the diffrence between Notify URL and Return URL?
Notify URL is used to just notify the status while processing.
Return URL is used to return after processing.
47. What is the difference between ucfirst and ucwords?
ucfirst() to convert the first letter of every string to uppercase, and ucwords(), to convert the first letter
of every word in the string to uppercase.
48. What is meant by nl2br()?
nl2br() inserts a HTML tag <br> before all new line characters n in a string.
49. How To Read the Entire File into a Single String?
<?php
$file = file_get_contents("/windows/system32/drivers/etc/services");
print("Size of the file: ".strlen($file)."n");
?>
50. What are the different functions in sorting an array?
Sorting functions in PHP:
asort()
arsort()
ksort()
krsort()
uksort()
sort()
natsort()
rsort()