When Performance Metrics and User Experience Come Together
When performance metrics are combined with active user experience and machine learning, we can gain new insights about why a business critical application is slow, what components are involved, and how this impacts users and hardware.
By interlinking several levels of dashboards, users from different departments can get a more transparent view of the issue and exchange problem related information as easy as sending a hyperlink to a specific dashboard to their colleagues. Thus troubleshooting and root case detection become much easier.
But collecting up to 500 mio datapoints per day per customer is not trivial.
As network security threats continue to multiply, so do the tools to battle them: firewalls, activity monitors, intrusion prevention systems (IPSs) and so forth. To defend your network, you need a reliable arsenal of these tools, but what if one of them stops performing?
Presented by Net Optics' Product Manager Lannie Rhodes and Director of Access Solutions Daniel Aharon this webinar dives into the rising security challenges facing your network and cover the latest trends in defending against them. Additionally, we discuss:
Advantages of utilizing a Bypass Switch to protect your network against security tool failure
Methods for developing monitoring redundancies for supporting uptime Service Level Agreements
Best Practices for maximizing your High Availability Networks
Scientific python programmers adore Pandas due to its many functionalities. In particular, for data manipulation and analysis it offers handy data structures and operations for numerical tables and time series. Combined with the rest of the SciPy stack and scikit-learn (e.g. for Machine Learning Analysis), multiple goals can be achieved. When it comes to on-line data analysis, interaction, or simple data navigation by multiple users, the SciPy stack can be stressed to its limits. It is here where the combination of InfluxDB as a data source and Grafana as a visualization tool have gained increasing awareness in recent years. Both methods of data analysis and visualization have their advantages and drawbacks. My talk will evidence some of them, as well as show what can be gained by combining python-based offline analysis with query language-based online analysis.
Presentation held during SFScon15 - Free Software Conference, 13.11.2015 @ TIS innovation park, Bolzano
--
Im Cloud-Zeitalter spielt die Verbesserung der End-User-Experience eine zunehmende Rolle wenn es darum geht den Geschäftserfolg zu optimieren.
Die Open Source Lösung Alyvix, eine Python basierte End-to-End Monitoring Engine, wurde letzthin deutlich erweitert, um die Identifizierung von Performance- und Zuverlässigkeitsmängeln an geschäftskritischen Applikationen wie Citrix, SAP, Terminal Server usw. zu vereinfachen. Durch die Integration von Anaconda und Robotframework bietet die kürzlich veröffentlichte Version Alyvix 2 (welche unter GNU GPL lizensiert ist), verschiedene Verbesserungen wie z.B. die Möglichkeit zur Erstellung von Test Cases ohne jegliche Python-Kenntnisse, stabilere Computer Vision Algorithmen und die Visualisierung detaillierter HTML-Reports.
OSMC 2015: End to End Monitoring mit Alyvix-Jürgen VignaNETWAYS
Application Performance Monitoring auf Open Source Basis: Wie stark leiden unsere User wirklich?
Im Cloud-Zeitalter spielt die Verbesserung der End-User-Experience eine zunehmende Rolle wenn es darum geht den Geschäftserfolg zu optimieren.
Die Open Source Lösung Alyvix, eine Python basierte End-to-End Monitoring Engine, wurde letzthin deutlich erweitert, um die Identifizierung von Performance- und Zuverlässigkeitsmängeln an geschäftskritischen Applikationen wie Citrix, SAP, Terminal Server usw. zu vereinfachen. Durch die Integration von Anaconda und Robot Framework bietet die kürzlich veröffentlichte Version Alyvix 2 (welche unter GNU GPL lizensiert ist), verschiedene Verbesserungen wie z.B. die Möglichkeit zur Erstellung von Test Cases ohne jegliche Python-Kenntnisse, stabilere Computer Vision Algorithmen und die Visualisierung detaillierter HTML-Reports. Auf der diesjährigen OSMC wird Jürgen Vigna die neuesten Funktionen der End-to-End Monitoring Engine vorstellen.
On March 14, we attended the Icinga Camp event in Berlin. As in previous years, it was a blast. On March 14, we attended the Icinga Camp event in Berlin. As in previous years, it was a blast.
As network security threats continue to multiply, so do the tools to battle them: firewalls, activity monitors, intrusion prevention systems (IPSs) and so forth. To defend your network, you need a reliable arsenal of these tools, but what if one of them stops performing?
Presented by Net Optics' Product Manager Lannie Rhodes and Director of Access Solutions Daniel Aharon this webinar dives into the rising security challenges facing your network and cover the latest trends in defending against them. Additionally, we discuss:
Advantages of utilizing a Bypass Switch to protect your network against security tool failure
Methods for developing monitoring redundancies for supporting uptime Service Level Agreements
Best Practices for maximizing your High Availability Networks
Scientific python programmers adore Pandas due to its many functionalities. In particular, for data manipulation and analysis it offers handy data structures and operations for numerical tables and time series. Combined with the rest of the SciPy stack and scikit-learn (e.g. for Machine Learning Analysis), multiple goals can be achieved. When it comes to on-line data analysis, interaction, or simple data navigation by multiple users, the SciPy stack can be stressed to its limits. It is here where the combination of InfluxDB as a data source and Grafana as a visualization tool have gained increasing awareness in recent years. Both methods of data analysis and visualization have their advantages and drawbacks. My talk will evidence some of them, as well as show what can be gained by combining python-based offline analysis with query language-based online analysis.
Presentation held during SFScon15 - Free Software Conference, 13.11.2015 @ TIS innovation park, Bolzano
--
Im Cloud-Zeitalter spielt die Verbesserung der End-User-Experience eine zunehmende Rolle wenn es darum geht den Geschäftserfolg zu optimieren.
Die Open Source Lösung Alyvix, eine Python basierte End-to-End Monitoring Engine, wurde letzthin deutlich erweitert, um die Identifizierung von Performance- und Zuverlässigkeitsmängeln an geschäftskritischen Applikationen wie Citrix, SAP, Terminal Server usw. zu vereinfachen. Durch die Integration von Anaconda und Robotframework bietet die kürzlich veröffentlichte Version Alyvix 2 (welche unter GNU GPL lizensiert ist), verschiedene Verbesserungen wie z.B. die Möglichkeit zur Erstellung von Test Cases ohne jegliche Python-Kenntnisse, stabilere Computer Vision Algorithmen und die Visualisierung detaillierter HTML-Reports.
OSMC 2015: End to End Monitoring mit Alyvix-Jürgen VignaNETWAYS
Application Performance Monitoring auf Open Source Basis: Wie stark leiden unsere User wirklich?
Im Cloud-Zeitalter spielt die Verbesserung der End-User-Experience eine zunehmende Rolle wenn es darum geht den Geschäftserfolg zu optimieren.
Die Open Source Lösung Alyvix, eine Python basierte End-to-End Monitoring Engine, wurde letzthin deutlich erweitert, um die Identifizierung von Performance- und Zuverlässigkeitsmängeln an geschäftskritischen Applikationen wie Citrix, SAP, Terminal Server usw. zu vereinfachen. Durch die Integration von Anaconda und Robot Framework bietet die kürzlich veröffentlichte Version Alyvix 2 (welche unter GNU GPL lizensiert ist), verschiedene Verbesserungen wie z.B. die Möglichkeit zur Erstellung von Test Cases ohne jegliche Python-Kenntnisse, stabilere Computer Vision Algorithmen und die Visualisierung detaillierter HTML-Reports. Auf der diesjährigen OSMC wird Jürgen Vigna die neuesten Funktionen der End-to-End Monitoring Engine vorstellen.
On March 14, we attended the Icinga Camp event in Berlin. As in previous years, it was a blast. On March 14, we attended the Icinga Camp event in Berlin. As in previous years, it was a blast.
The goal of this talk is to give a brief overview of the emerging field of Deep Learning and its increasing relevance to the Open Source community. I will use examples – mainly based on performance data – on the one hand to underline the difference between traditional Machine Learning and Deep Learning, and on the other hand to underline the potential of the latter. The current state of Keras, Tensorflow and the respective possibilities to use them together for instance with the SciPy stack, scikit-learn, as well as InfluxDB, and Grafana is going to be illustrated.
OSMC 2019 | Tornado – Extend Icinga2 for Active and passive Monitoring of com...NETWAYS
The main objective of this talk is to show how you can extend an Icinga2 active monitoring with a passive monitoring engine.
With Icinga2 you focus on active monitoring. With Tornado you can do exactly the opposite and focus on passive monitoring. You receive events from different channels like SNMP Trap, Syslog, Email and match them against a rule engine and decide which action to associate. A very common use case is to set a Icinga2 Service status (critical, warning, ok) based on a matched rule. In addition you could also subscribe the Icinga API Stream and define matching rules which you would like to correlate and associate an executor for example create a new entry in Elasticsearch. Another common use case could be to register Tornado as a webhook for example in Elasticsearch Watcher collect the alarms and set the status on a Icinga Service Check. During the talk I will explain why Tornado was built from Würth Phoenix in rust and what are the common use case we would like to address with it.
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
Learn what is new in Splunk App for Stream and how it can help you utilize wire/network data analytics to proactively resolve applications and IT operational issues and to efficiently analyze security threats in real-time, across your cloud and on-premises infrastructures. Additionally, you will learn about Splunk MINT, which allows you to gain operational intelligence on the availability, performance, and usage of your mobile apps. You’ll learn how to instrument your mobile apps for operational insight, and how you can build the dashboards, alerts, and searches you need to gain real-time insight on your mobile apps.
What’s New: Splunk App for Stream and Splunk MINTSplunk
Join us to learn what is new in Splunk App for Stream and how it can help you utilize wire/network data analytics to proactively resolve applications and IT operational issues and to efficiently analyze security threats in real-time, across your cloud and on-premises infrastructures. Additionally, you will learn about Splunk MINT, which allows you to gain operational intelligence on the availability, performance, and usage of your mobile apps. You’ll learn how to instrument your mobile apps for operational insight, and how you can build the dashboards, alerts, and searches you need to gain real-time insight on your mobile apps.
The Future of Mobile Application SecuritySecureAuth
The rapid adoption of mobile technology in recent years has created an opportunity for enterprises to increase the productivity and flexibility of their organizations. This demand for greater mobility has forced enterprises to deliver sensitive applications and data across a wide array of devices and networks.
SecureAuth and Sencha have created an integrated approach to application, data, and user mobility that elegantly addresses these challenges.
-Secure enterprise application deployment
-End-to-end data security with strong encryption
-Managed application container that works on any device
-Developer SDK for creating rich application user experiences
Workspace ONE is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Managing Your Application Security Program with the ThreadFix EcosystemDenim Group
ThreadFix is an open source application vulnerability management system that helps automate many common application security tasks and integrate security and development tools. This tutorial will walk through the capabilities of the ecosystem of ThreadFix applications, showing how ThreadFix can be used to:
•Manage a risk-ranked application portfolio
•Consolidate, normalize and de-duplicate the results of DAST, SAST and other application security testing activities and track these results over time to produce trending and mean-time-to-fix reporting
•Convert application vulnerabilities into software defects in developer issue tracking systems
•Pre-seed DAST scanners such as OWASP ZAP with application attack surface data to allow for better scan coverage
•Instrument developer Continuous Integration (CI) systems such as Jenkins to automatically collect security test data
•Map the results of DAST and SAST scanning into developer IDEs
The presentation walks through these scenarios and demonstrates how ThreadFix, along with other open source tools, can be used to address common problems faced by teams implementing software security programs. It will also provide insight into the ThreadFix development roadmap and upcoming enhancements.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
The goal of this talk is to give a brief overview of the emerging field of Deep Learning and its increasing relevance to the Open Source community. I will use examples – mainly based on performance data – on the one hand to underline the difference between traditional Machine Learning and Deep Learning, and on the other hand to underline the potential of the latter. The current state of Keras, Tensorflow and the respective possibilities to use them together for instance with the SciPy stack, scikit-learn, as well as InfluxDB, and Grafana is going to be illustrated.
OSMC 2019 | Tornado – Extend Icinga2 for Active and passive Monitoring of com...NETWAYS
The main objective of this talk is to show how you can extend an Icinga2 active monitoring with a passive monitoring engine.
With Icinga2 you focus on active monitoring. With Tornado you can do exactly the opposite and focus on passive monitoring. You receive events from different channels like SNMP Trap, Syslog, Email and match them against a rule engine and decide which action to associate. A very common use case is to set a Icinga2 Service status (critical, warning, ok) based on a matched rule. In addition you could also subscribe the Icinga API Stream and define matching rules which you would like to correlate and associate an executor for example create a new entry in Elasticsearch. Another common use case could be to register Tornado as a webhook for example in Elasticsearch Watcher collect the alarms and set the status on a Icinga Service Check. During the talk I will explain why Tornado was built from Würth Phoenix in rust and what are the common use case we would like to address with it.
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk
Learn what is new in Splunk App for Stream and how it can help you utilize wire/network data analytics to proactively resolve applications and IT operational issues and to efficiently analyze security threats in real-time, across your cloud and on-premises infrastructures. Additionally, you will learn about Splunk MINT, which allows you to gain operational intelligence on the availability, performance, and usage of your mobile apps. You’ll learn how to instrument your mobile apps for operational insight, and how you can build the dashboards, alerts, and searches you need to gain real-time insight on your mobile apps.
What’s New: Splunk App for Stream and Splunk MINTSplunk
Join us to learn what is new in Splunk App for Stream and how it can help you utilize wire/network data analytics to proactively resolve applications and IT operational issues and to efficiently analyze security threats in real-time, across your cloud and on-premises infrastructures. Additionally, you will learn about Splunk MINT, which allows you to gain operational intelligence on the availability, performance, and usage of your mobile apps. You’ll learn how to instrument your mobile apps for operational insight, and how you can build the dashboards, alerts, and searches you need to gain real-time insight on your mobile apps.
The Future of Mobile Application SecuritySecureAuth
The rapid adoption of mobile technology in recent years has created an opportunity for enterprises to increase the productivity and flexibility of their organizations. This demand for greater mobility has forced enterprises to deliver sensitive applications and data across a wide array of devices and networks.
SecureAuth and Sencha have created an integrated approach to application, data, and user mobility that elegantly addresses these challenges.
-Secure enterprise application deployment
-End-to-end data security with strong encryption
-Managed application container that works on any device
-Developer SDK for creating rich application user experiences
Workspace ONE is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Managing Your Application Security Program with the ThreadFix EcosystemDenim Group
ThreadFix is an open source application vulnerability management system that helps automate many common application security tasks and integrate security and development tools. This tutorial will walk through the capabilities of the ecosystem of ThreadFix applications, showing how ThreadFix can be used to:
•Manage a risk-ranked application portfolio
•Consolidate, normalize and de-duplicate the results of DAST, SAST and other application security testing activities and track these results over time to produce trending and mean-time-to-fix reporting
•Convert application vulnerabilities into software defects in developer issue tracking systems
•Pre-seed DAST scanners such as OWASP ZAP with application attack surface data to allow for better scan coverage
•Instrument developer Continuous Integration (CI) systems such as Jenkins to automatically collect security test data
•Map the results of DAST and SAST scanning into developer IDEs
The presentation walks through these scenarios and demonstrates how ThreadFix, along with other open source tools, can be used to address common problems faced by teams implementing software security programs. It will also provide insight into the ThreadFix development roadmap and upcoming enhancements.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Hivelance Technology
Cryptocurrency trading bots are computer programs designed to automate buying, selling, and managing cryptocurrency transactions. These bots utilize advanced algorithms and machine learning techniques to analyze market data, identify trading opportunities, and execute trades on behalf of their users. By automating the decision-making process, crypto trading bots can react to market changes faster than human traders
Hivelance, a leading provider of cryptocurrency trading bot development services, stands out as the premier choice for crypto traders and developers. Hivelance boasts a team of seasoned cryptocurrency experts and software engineers who deeply understand the crypto market and the latest trends in automated trading, Hivelance leverages the latest technologies and tools in the industry, including advanced AI and machine learning algorithms, to create highly efficient and adaptable crypto trading bots
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Strategies for Successful Data Migration Tools.pptxvarshanayak241
Data migration is a complex but essential task for organizations aiming to modernize their IT infrastructure and leverage new technologies. By understanding common challenges and implementing these strategies, businesses can achieve a successful migration with minimal disruption. Data Migration Tool like Ask On Data play a pivotal role in this journey, offering features that streamline the process, ensure data integrity, and maintain security. With the right approach and tools, organizations can turn the challenge of data migration into an opportunity for growth and innovation.
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Modern design is crucial in today's digital environment, and this is especially true for SharePoint intranets. The design of these digital hubs is critical to user engagement and productivity enhancement. They are the cornerstone of internal collaboration and interaction within enterprises.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).