The talk introduces a concept of Greenfield Effect - a cognitive fallacy affecting most of our profession today. It causes us to seek for opportunities to design systems from scratch and stay away from legacy codebases. We acquire helplessness in the domain of fixing problems that are "too big".
The talk starts with a short review of major software catastrophes of the last decade along with their root causes. A common theme is prolonged, systematic organizational negligence of issues that incrementally lead to a disaster. After that comes the main part of the talk which introduces several organizational and behavioral anti-patterns, each of them being one step towards a disaster.
The talk keeps slightly sarcastic and comedic tone in order to keep the audience engaged, however the problem it is trying to highlight might be the most crucial issue in modern software engineering domain. The understanding of it can prevent real world disasters from happening, save capital, and possibly even human lives.
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...DevOpsDays Tel Aviv
Security people say users are the weakest link. But are they? When complying with security becomes too burdensome, users take shortcuts, find workarounds, and end up jeopardizing security. Blaming users is lazy and easy. Making security usable is time consuming and challenging. How does design research help us understand our customers? What patterns and principles drive secure behavior? How can we build empathy with customers and make the right thing to do the easiest thing to do? This session explores these questions, and provides examples of how design thinking and research can help us be more secure. We will walk through our creation of core user personas, design principles, and how these inform and direct our design choices and intent. Don’t blame your users anymore. Come learn how to be part of a future where usability leads security.
Deja vu Security CEO Adam Cecchetti was invited to present the keynote speech at this year's (sold-out!) Hushcon in Seattle. Rich in humorous anecdotes and practical analysis, Test For Echo explores the relationship between time, ken, and the future of computer security.
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
As the air gap between our daily lives and the Internet continues to shrink the security of our personal data and devices grows in importance. We are facing the daily threat of putting 2000s era computers bolted to toasters online while expecting them to defend against 2017 capable attackers. This talk will explore the continuing trend of IoT, discuss how we’ve been here before, and layout strategies for keeping pace with attackers in the future. This talk will focus on enumerating this risk, discuss the challenges involved, and explore solutions.
First, we will examine this history of how we got here, and what it means to say “security is a snapshot in time.” We then introduce the idea of shared ken – the range of one’s knowledge or sight – and how it impacts security. Third, we discuss the influence of data as code, the meta game, and secrecy as a way of mastering impact and ken.
This talk will allow attendees to walk away with
A holistic view of the history of computer security and how it impacts them today
The importance of extending the range of collective vision to reduce blind spots
Practical advice for BSiders to grow their mindset and improve their impact
Adam is a founding partner and Chief Executive Officer at Deja vu Security. He is dedicated to the leadership and relentless innovation in Deja’s products and services. Previously he has lead teams conducting application and hardware penetration tests for the Fortune 500 technology firms. Adam is a contributing author to multiple security books, benchmarks, tools, and DARPA research projects. Adam holds a degree in Computer Science and a Masters from Carnegie Mellon University in Information Networking.
My talk at the Scandinavian Developer Conference 2010 about following the wrong principles and getting too excited about shiny demos rather than building things that work and proving our technologies as professional tools.
NUDGE AND SLUDGE: DRIVING SECURITY WITH DESIGN // J. WOLFGANG GOERLICH, Duo S...DevOpsDays Tel Aviv
Security people say users are the weakest link. But are they? When complying with security becomes too burdensome, users take shortcuts, find workarounds, and end up jeopardizing security. Blaming users is lazy and easy. Making security usable is time consuming and challenging. How does design research help us understand our customers? What patterns and principles drive secure behavior? How can we build empathy with customers and make the right thing to do the easiest thing to do? This session explores these questions, and provides examples of how design thinking and research can help us be more secure. We will walk through our creation of core user personas, design principles, and how these inform and direct our design choices and intent. Don’t blame your users anymore. Come learn how to be part of a future where usability leads security.
Deja vu Security CEO Adam Cecchetti was invited to present the keynote speech at this year's (sold-out!) Hushcon in Seattle. Rich in humorous anecdotes and practical analysis, Test For Echo explores the relationship between time, ken, and the future of computer security.
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
As the air gap between our daily lives and the Internet continues to shrink the security of our personal data and devices grows in importance. We are facing the daily threat of putting 2000s era computers bolted to toasters online while expecting them to defend against 2017 capable attackers. This talk will explore the continuing trend of IoT, discuss how we’ve been here before, and layout strategies for keeping pace with attackers in the future. This talk will focus on enumerating this risk, discuss the challenges involved, and explore solutions.
First, we will examine this history of how we got here, and what it means to say “security is a snapshot in time.” We then introduce the idea of shared ken – the range of one’s knowledge or sight – and how it impacts security. Third, we discuss the influence of data as code, the meta game, and secrecy as a way of mastering impact and ken.
This talk will allow attendees to walk away with
A holistic view of the history of computer security and how it impacts them today
The importance of extending the range of collective vision to reduce blind spots
Practical advice for BSiders to grow their mindset and improve their impact
Adam is a founding partner and Chief Executive Officer at Deja vu Security. He is dedicated to the leadership and relentless innovation in Deja’s products and services. Previously he has lead teams conducting application and hardware penetration tests for the Fortune 500 technology firms. Adam is a contributing author to multiple security books, benchmarks, tools, and DARPA research projects. Adam holds a degree in Computer Science and a Masters from Carnegie Mellon University in Information Networking.
My talk at the Scandinavian Developer Conference 2010 about following the wrong principles and getting too excited about shiny demos rather than building things that work and proving our technologies as professional tools.
2020: In this presentation made on the 3rd March 2020, for the graduate and post-graduate students of SRM University, Ramapuram, Chennai (India), Venkatarangan Thirumalai had presented on the various job roles and career options available in the field of AI and Machine Learning.
Venkat is a member of the "Professional Speakers Association of India" and delivers engaging talks for leading corporates and startups. To check his availability contact him through tncv.me or twitter: @venkatarangan.
Spark meetup london share and analyse genomic data at scale with spark, adam...Andy Petrella
Genomics and Health data is nowadays one of the hot topics requiring lots of computations and specially machine learning. This helps science with a very relevant societal impact to get even better outcome. That is why Apache Spark and its ADAM library is a must have.
This talk will be twofold.
First, we'll show how Apache Spark, MLlib and ADAM can be plugged all together to extract information from even huge and wide genomics dataset. Everything will be packed into examples from the Spark Notebook, showing how bio-scientists can work interactively with such a system.
Second, we'll explain how these methodologies and even the datasets themselves can be shared at very large scale between remote entities like hospitals or laboratories using micro services leveraging Apache Spark, ADAM, Play Framework 2, Avro and Tachyon.
Currently hundreds of tools are promising to make artificial intelligence accessible to the masses. Tools like DataRobot, H20 Driverless AI, Amazon SageMaker or Microsoft Azure Machine Learning Studio.
These tools promise to accelerate the time-to-value of data science projects by simplifying model building.
In the workshop we will approach the AI Topic head on!
What is AI? What can AI do today? What do I need to start my own project?
We do all this using Microsoft's Machine Learning Studio.
Trainer: Philipp von Loringhoven - Chef, Designer, Developer, Markeeter - Data Nerd!
He has acquired a lot of expertise in marketing, business intelligence and product development during his time at the Rocket Internet startups (Wimdu, Lamudi) and Projekt-A (Tirendo).
Today he supports customers of the Austrian digitisation agency TOWA as Director Data Consulting to generate an added value from their data.
Identify Development Pains and Resolve Them with Idea FlowTechWell
With the explosion of new frameworks, a mountain of automation, and our applications distributed across hundreds of services in the cloud, the level of complexity in software development is growing at an insane pace. With increased complexity comes increased costs and risks. When diagnosing unexpected behavior can take days, weeks, or sometimes months, all while our release is on the line, our projects plunge into chaos. In the invisible world of software development, how do we identify what's causing our pain? How do we escape the chaos? Janelle Klein presents a novel approach to measuring the chaos, identifying the causes, and systematically driving improvement with a data-driven feedback loop. Rather than measuring the problems in the code, Janelle suggests measuring the "friction in Idea Flow", the time it takes a developer to diagnose and resolve unexpected confusion, which disrupts the flow of progress during development. With visibility of the symptoms, we can identify the cause—whether it's bad architecture, collaboration problems, or technical debt. Janelle discusses how to measure Idea Flow, why it matters, and the implications for our teams, our organizations, and our industry.
Rapid fire talk going through a number of topics that we'd pre-selected...one slide on the question, 1-2 slides on an answer....
Much goodness, for reference, here's the subjects:
Planes: Lets go from myth to reality in a couple of slides, including updates since 2015
Transportation in general, cars, trucks, trains and ships….
Why can we still do this?
What’s not changed?
The technology, reactive, static vs. predictive
The humans, why do we ignore them?
Why this needs to change…what does the future hold?
Why DO we stare into the abyss, why do we continue to deny it
Hacking humans, molecular
Hacking humans, consciousness
Why DO we need to fix and HOW do we fix it?
Fix the human
Fix the basics
Intelligent systems working collaboratively with us
Augmented intelligence, the science of giving us the edge.
Collaborate
Rental Cars and Industrialized Learning to Rank with Sean DownesDatabricks
Data can be viewed as the exhaust of online activity. With the rise of cloud-based data platforms, barriers to data storage and transfer have crumbled. The demand for creative applications and learning from those datasets has accelerated. Rapid acceleration can quickly accrue disorder, and disorderly data design can turn the deepest data lake into an impenetrable swamp.
In this talk, I will discuss the evolution of the data science workflow at Expedia with a special emphasis on Learning to Rank problems. From the heroic early days of ad-hoc Spark exploration to our first production sort model on the cloud, we will explore the process of industrializing the workflow. Layered over our story, I will share some best practices and suggestions on how to keep your data productive, or even pull your organization out of the data swamp.
2.5 quintillion bytes of data are created every day thats 25 followed by 17 zeros, or roughly 10 quadrillion laptop hard drives..Big data can be truly overwhelming..so how does one go about making sense of it?
(Beyond simplistic thinking and models)
This lecture is one of a series ‘Grand Challenge Subjects’ designed to make students think beyond, and challenge, the status quo; to question what they have been taught and the established industry wisdoms; to look beyond the tech media and journal papers; to think, be original, and be creative in the widest sense. This all culminates in a design and build/project program spread over several weeks.
The notion that the IoT will see everything connecting via the internet using a wireless domain dominated by 5G is not only simplistic, it is fundamentally impossible. A moments thought and a few simple calculations reveal that there is not enough energy on the planet to power 50 - 250Bn or more IoT devices operating in such a mode. So how are we really going to design and engineer the IoT to become a workable proposition? Here are some clues:
3/4G: Carries <5% of all internet traffic; WiFi ~55%; Wired LANs @ 45%
Mobile Network coverage is sadly lacking @ <90% by geography
Mobile Device batteries and charging are major limitations
The internet consumes ~12% of all our energy
Mobile Devices consume ~ 1% and rising
Mobile Nets consume ~ 10%
None of the above takes into account the cost of raw materials, production, distribution, delivery, support, disposal and the ecological impact of civil engineering, equipments, and people.
During this lecture the following surprising conclusions quickly emerge:
Most IoT devices will talk to each other and never connect to the internet
IoT devices will require a range of bandwidths and not just low bit rates
The majority of IoT devices will communicate over very short distance
Our current wireless architectures are outmoded by the IoT
We will most likely need something beyond UWB
The power per IoT device has to be <<1mW
Security will demand auto-immunity
This then is the starting point; from here we can design and engineer solutions for an, as yet, unspecified and dimensioned IoT fit for this century.
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
Throughout history we've seen opposing forces skillfully pit strengths against weaknesses until, ultimately, one side succumbs. Holding a position takes considerably more effort than does a single, offensive surge, and attackers are counting on it. The very nature of the cybersecurity attacks we face today are in direct response to the shortcomings of the available tools, knowledge and approaches. The only problem is that we must evolve our defenses as fast as (or faster) than their offenses, and the odds are greatly in their favor. Imagine a football game – with no time limits – determined by your opponent’s first undefended scoring play. Game over. Hmmm…I wonder how that one ends?
Facing next-generation challenges requires a next-generation approach – preferably one that requires no change to your current production environment, never tires, continually evolves, doesn't rely on humans and is 99%+ accurate regardless of Internet connectivity. We'll discuss a solution that shifts the balance in your favor by leveraging artificial intelligence to predict and prevent against malware-born threats so you don't have to.
Most organizations have started to include either static or dynamic application security testing as part of their overall test strategy.
This additional test effort is due in large part to the cyber security risks that are emerging. These risks create an urgent need to move beyond testing and to institutionalize security as part of every organization’s software development/acquisition culture.
This presentation covers real-life examples of how to enable this type of behavioral change in your organization.
First presented at HP Discover Barlceona 2014 by Gopal Padinjaruveetil, Chief Application Security and Compliance Architect, Capgemini
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
More Related Content
Similar to Greenfield Effect: Patterns for Effective Disaster Delivery
2020: In this presentation made on the 3rd March 2020, for the graduate and post-graduate students of SRM University, Ramapuram, Chennai (India), Venkatarangan Thirumalai had presented on the various job roles and career options available in the field of AI and Machine Learning.
Venkat is a member of the "Professional Speakers Association of India" and delivers engaging talks for leading corporates and startups. To check his availability contact him through tncv.me or twitter: @venkatarangan.
Spark meetup london share and analyse genomic data at scale with spark, adam...Andy Petrella
Genomics and Health data is nowadays one of the hot topics requiring lots of computations and specially machine learning. This helps science with a very relevant societal impact to get even better outcome. That is why Apache Spark and its ADAM library is a must have.
This talk will be twofold.
First, we'll show how Apache Spark, MLlib and ADAM can be plugged all together to extract information from even huge and wide genomics dataset. Everything will be packed into examples from the Spark Notebook, showing how bio-scientists can work interactively with such a system.
Second, we'll explain how these methodologies and even the datasets themselves can be shared at very large scale between remote entities like hospitals or laboratories using micro services leveraging Apache Spark, ADAM, Play Framework 2, Avro and Tachyon.
Currently hundreds of tools are promising to make artificial intelligence accessible to the masses. Tools like DataRobot, H20 Driverless AI, Amazon SageMaker or Microsoft Azure Machine Learning Studio.
These tools promise to accelerate the time-to-value of data science projects by simplifying model building.
In the workshop we will approach the AI Topic head on!
What is AI? What can AI do today? What do I need to start my own project?
We do all this using Microsoft's Machine Learning Studio.
Trainer: Philipp von Loringhoven - Chef, Designer, Developer, Markeeter - Data Nerd!
He has acquired a lot of expertise in marketing, business intelligence and product development during his time at the Rocket Internet startups (Wimdu, Lamudi) and Projekt-A (Tirendo).
Today he supports customers of the Austrian digitisation agency TOWA as Director Data Consulting to generate an added value from their data.
Identify Development Pains and Resolve Them with Idea FlowTechWell
With the explosion of new frameworks, a mountain of automation, and our applications distributed across hundreds of services in the cloud, the level of complexity in software development is growing at an insane pace. With increased complexity comes increased costs and risks. When diagnosing unexpected behavior can take days, weeks, or sometimes months, all while our release is on the line, our projects plunge into chaos. In the invisible world of software development, how do we identify what's causing our pain? How do we escape the chaos? Janelle Klein presents a novel approach to measuring the chaos, identifying the causes, and systematically driving improvement with a data-driven feedback loop. Rather than measuring the problems in the code, Janelle suggests measuring the "friction in Idea Flow", the time it takes a developer to diagnose and resolve unexpected confusion, which disrupts the flow of progress during development. With visibility of the symptoms, we can identify the cause—whether it's bad architecture, collaboration problems, or technical debt. Janelle discusses how to measure Idea Flow, why it matters, and the implications for our teams, our organizations, and our industry.
Rapid fire talk going through a number of topics that we'd pre-selected...one slide on the question, 1-2 slides on an answer....
Much goodness, for reference, here's the subjects:
Planes: Lets go from myth to reality in a couple of slides, including updates since 2015
Transportation in general, cars, trucks, trains and ships….
Why can we still do this?
What’s not changed?
The technology, reactive, static vs. predictive
The humans, why do we ignore them?
Why this needs to change…what does the future hold?
Why DO we stare into the abyss, why do we continue to deny it
Hacking humans, molecular
Hacking humans, consciousness
Why DO we need to fix and HOW do we fix it?
Fix the human
Fix the basics
Intelligent systems working collaboratively with us
Augmented intelligence, the science of giving us the edge.
Collaborate
Rental Cars and Industrialized Learning to Rank with Sean DownesDatabricks
Data can be viewed as the exhaust of online activity. With the rise of cloud-based data platforms, barriers to data storage and transfer have crumbled. The demand for creative applications and learning from those datasets has accelerated. Rapid acceleration can quickly accrue disorder, and disorderly data design can turn the deepest data lake into an impenetrable swamp.
In this talk, I will discuss the evolution of the data science workflow at Expedia with a special emphasis on Learning to Rank problems. From the heroic early days of ad-hoc Spark exploration to our first production sort model on the cloud, we will explore the process of industrializing the workflow. Layered over our story, I will share some best practices and suggestions on how to keep your data productive, or even pull your organization out of the data swamp.
2.5 quintillion bytes of data are created every day thats 25 followed by 17 zeros, or roughly 10 quadrillion laptop hard drives..Big data can be truly overwhelming..so how does one go about making sense of it?
(Beyond simplistic thinking and models)
This lecture is one of a series ‘Grand Challenge Subjects’ designed to make students think beyond, and challenge, the status quo; to question what they have been taught and the established industry wisdoms; to look beyond the tech media and journal papers; to think, be original, and be creative in the widest sense. This all culminates in a design and build/project program spread over several weeks.
The notion that the IoT will see everything connecting via the internet using a wireless domain dominated by 5G is not only simplistic, it is fundamentally impossible. A moments thought and a few simple calculations reveal that there is not enough energy on the planet to power 50 - 250Bn or more IoT devices operating in such a mode. So how are we really going to design and engineer the IoT to become a workable proposition? Here are some clues:
3/4G: Carries <5% of all internet traffic; WiFi ~55%; Wired LANs @ 45%
Mobile Network coverage is sadly lacking @ <90% by geography
Mobile Device batteries and charging are major limitations
The internet consumes ~12% of all our energy
Mobile Devices consume ~ 1% and rising
Mobile Nets consume ~ 10%
None of the above takes into account the cost of raw materials, production, distribution, delivery, support, disposal and the ecological impact of civil engineering, equipments, and people.
During this lecture the following surprising conclusions quickly emerge:
Most IoT devices will talk to each other and never connect to the internet
IoT devices will require a range of bandwidths and not just low bit rates
The majority of IoT devices will communicate over very short distance
Our current wireless architectures are outmoded by the IoT
We will most likely need something beyond UWB
The power per IoT device has to be <<1mW
Security will demand auto-immunity
This then is the starting point; from here we can design and engineer solutions for an, as yet, unspecified and dimensioned IoT fit for this century.
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
Throughout history we've seen opposing forces skillfully pit strengths against weaknesses until, ultimately, one side succumbs. Holding a position takes considerably more effort than does a single, offensive surge, and attackers are counting on it. The very nature of the cybersecurity attacks we face today are in direct response to the shortcomings of the available tools, knowledge and approaches. The only problem is that we must evolve our defenses as fast as (or faster) than their offenses, and the odds are greatly in their favor. Imagine a football game – with no time limits – determined by your opponent’s first undefended scoring play. Game over. Hmmm…I wonder how that one ends?
Facing next-generation challenges requires a next-generation approach – preferably one that requires no change to your current production environment, never tires, continually evolves, doesn't rely on humans and is 99%+ accurate regardless of Internet connectivity. We'll discuss a solution that shifts the balance in your favor by leveraging artificial intelligence to predict and prevent against malware-born threats so you don't have to.
Most organizations have started to include either static or dynamic application security testing as part of their overall test strategy.
This additional test effort is due in large part to the cyber security risks that are emerging. These risks create an urgent need to move beyond testing and to institutionalize security as part of every organization’s software development/acquisition culture.
This presentation covers real-life examples of how to enable this type of behavioral change in your organization.
First presented at HP Discover Barlceona 2014 by Gopal Padinjaruveetil, Chief Application Security and Compliance Architect, Capgemini
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
top nidhi software solution freedownloadvrstrong314
This presentation emphasizes the importance of data security and legal compliance for Nidhi companies in India. It highlights how online Nidhi software solutions, like Vector Nidhi Software, offer advanced features tailored to these needs. Key aspects include encryption, access controls, and audit trails to ensure data security. The software complies with regulatory guidelines from the MCA and RBI and adheres to Nidhi Rules, 2014. With customizable, user-friendly interfaces and real-time features, these Nidhi software solutions enhance efficiency, support growth, and provide exceptional member services. The presentation concludes with contact information for further inquiries.
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfJay Das
With the advent of artificial intelligence or AI tools, project management processes are undergoing a transformative shift. By using tools like ChatGPT, and Bard organizations can empower their leaders and managers to plan, execute, and monitor projects more effectively.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
3. 1978 - 1985: hole in the ozone layer over Antarctica remained undetected for ~7 years
Root cause: data analysis software used to map the ozone layer had treated correct
records of extreme values as measurement errors and ignored them.
6. I’ma be progrmr! I’m dumb!
got a job on
brownfield
starts understanding
the code
mother of god!
7. I’ma be progrmr! I’m dumb!
got a job on
brownfield
starts understanding
the code
mother of god!
F. this job!!
goes to Conference and hears
about all the cool new tech
8. I’ma be progrmr! I’m dumb!
got a job on
brownfield
starts understanding
the code
mother of god!
F. this job!!
goes to Conference and hears
about all the cool new tech
hired as first engineer at greenfield
writes crappy code others will have to maintain
YAY!
12. Why is it even bad?
Greenfield
Effect
Greenfield
Effect
Greenfield
Effect
13. Again, why is it bad?
● Lost money
● Technology advancement slowdown
● Work becomes miserable, depression
● Bad opinion about our profession
● Software-induced disaster where people die
● ^^ already happened, but the bodycount will grow
14. Therac-25
Because of a side effect of the buggy
software powering the device, number
of patients received up to 100 times
the intended dose, and at least three
of them died as a direct result of the
radiation overdose.
source: royal.pingdom.com
15. Ariane 5
The rocket delivering satellite payload self-
destructed 37 seconds after launch. The
problem was the result of code reuse from
the launch system’s predecessor, Ariane 4,
which had very different flight conditions
from Ariane 5. More than $370 million
were lost due to this error.
Casting float to integer!!!
source: royal.pingdom.com
16. There is more
1980: NORAD reported that the US was under missile attack. The problem was caused
by a faulty circuit, a possibility the reporting software hadn’t taken into account.
2003: The glitch in St. Mary’s Mercy Medical’s patient management system notified
Social Security, insurance companies, and the families, of demises of 8500 living
patients.
2012: Knight Capital Group’s trading algorithms activated legacy system and decided
to buy high and sell low on 150 different stocks. $440 million lost in 30 minutes.
[page 1 of 100]
17. There is more
1991: Patriot battery at Dhahran failed to track and intercept a Scud missile due to a
software problem in the system's weapons control compute. 28 killed.
2003: blackout across eight US states and Canada affected 50 million people. Race
condition in the code caused 256 power plants to go offline.
2011: Due to a mistake in its computer programming, California gave “non-revocable”
preference to approximately 450 violent offenders, who were released and did not
have to report to a parole officer.
18. “If you want to deliver faster,
just hire more engineers”
19. “If you want to deliver faster,
just hire more engineers”
-- some idiot PM
20. “If you want to deliver faster,
just hire more engineers”
-- some idiot PM
-- and 1000 others
33. Tech debt is JUST a metaphor
BAD metaphor
Monetary debt is fully quantifiable
Tech debt is NOT quantifiable.
34. We need to start addressing tech debt
Why?
Cuz the code is in terrible condition
How’s that? You wrote it
We had no time to write it clean
How much time do you need?
dunno
35. solutions
Greenfield version:
write clean code and don’t talk about tech-debt
Brownfield version:
measure the $#!t out of codebase before you open your mouth
… and then use the numbers to get the buy in
… but don’t take it too seriously
41. Makes you feel absolutely awesome even if the true state of your
body is catastrophic.
42. Side effects of cocaine intake
Permanent damage to blood vessels of heart and
brain
High blood pressure, leading to heart attacks, strokes
Liver, kidney and lung damage
Destruction of tissues in nose
Respiratory failure if smoked
Infectious diseases and abscesses if injected
Malnutrition, weight loss
Severe tooth decay
Auditory and tactile hallucinations
Sexual problems, reproductive damage and infertility
Disorientation, apathy, confused exhaustion
Irritability and mood disturbances
Increased frequency of risky behavior
Delirium or psychosis
Severe depression
43. Cocaine Tools
● if your deployment is too complicated to be scripted in bash…
● if your logs are too tangled to be analyzed with grep…
● if your code is too complex to navigate with vim…
● if your infrastructure is too sophisticated to be managed as VMs…
● if your data is too intricate to define its schema…
● if your business logic is too fluid to be constrained with types…
47. Solutions
● Prefer not use frameworks
● Rely on core language features
● Be boring with your tools and extra boring with platforms
● Always do buy vs build analysis
● IDE is for coding
49. Never completes the task
others have to complete it
Introduces tech debt
others need to pay it off
Introduces bugs
others have to fix them
Never follows up when code is live
others have to follow up
The Real 10x Developer
50. There are no 10x devs.
There are only 0.1x devs.
51. 0.1 dev /nɔ:t pɔɪnt wʌn dəv/
A developer who works on a team with a “10x developer”
52. Solutions
● Standards + knowledge
● Call out bad practices
● Definition of done
● High truck factor
● Mandated mentoring and learning
● Pair programming
● Measure productivity of TEAMS not INDIVIDUALS
53. How to become a 9x developer
● Pareto rule: 90% of the work takes 10% of the time
● Identify what constitutes the 90% of work
● Work only on that ^^
● Let others work on the remaining 10%
● You will be 9 times more productive than others
● I don’t know how to become 10x :(
54. Todo: global problem
Like global warming
Its everyones problem
To fix it everyone has to work together
Nobody has incentive to work on it individually
58. A Good Reader
● doesn’t care what is read
● doesn’t care about the intent of the code
● cares only about the effect of the code
● covers up for Bad Writer
● prevents tech debt from emerging
● makes everyone think ths s#!t is simple
59. Good Listener Analogy
● You are at the meeting
● Someone uses heavy jargon you don’t understand
● But you do not stop him to explain the terms
● Because nobody else does, so they must know it all
● So you feel a little bit dumb
● But you keep your mouth shut
● You don’t know this but…
● everyone else in the room feels the same way
67. Physical attractiveness gives people a HALO effect whereby
others are more likely to trust them and think of them as smarter
and more talented.
Fancy title, eloquent speaking, years of experience
Attractive/hipster look, thick glasses, grey hair, male (WTF!?)
Fame, wrote books, spoke at conferences
Halo Effect
68. Dunning Kruger Effect + Halo Effect
=
People Who Don’t Know What They’re Doing
And Everyone Listens to Them
70. “I’ve coded this system with my bare hands.
I’ve been in the business longer than you live.
How can you tell me how to do programming!?”
71. “I’ve coded this system with my bare hands.
I’ve been in the business longer than you live.
How can you tell me how to do programming!?”
--VP of Engineering
--Chief Technology Officer
--Principal Architect
--That person whose beard is longer than yours
72. Why is it bad?
● Bad decisions picked over good ones
● Everyone has best intentions, this still happens
● No halo - no career #inequality
75. ● It acquires random companies
● It hires legions of people
● It engages in projects with no ROI
● It creates departments
● It searches for ways to spend
● It doesn’t care about costs
When the company is successful
76. ● It cuts unneeded positions
● It optimizes processes
● It focuses on projects that bring value
● It dumps unneeded products
● It cares deeply about costs
When the company is fighting for survival
82. “We went through hell to build it.
Why would we want to abandon it”
--A person held hostage by his project
83. Sunk Cost Fallacy
Why use third party bug tracking system? We’ve written our own and have a
whole team maintaining it.
Could use that OS tool for cluster management. Could also use one our
company built internally. But we’ll use the one that smart colleague on our
team has written two years ago, cuz he’s done so much work on it.
We got 10M LOC in C++. We can’t just throw it away and start writing in
Java!
84. solutions
Code is not an asset, it is a liability
The more code we maintain,
the less we can deliver
88. “All evidence points to OOP being bullshit”
“Why OO Sucks”
“Ten Things I Hate About Object-Oriented Programming”
“Object-Relational Mapping is the Vietnam of Computer Science”
“ORM - the Killer of Scalability”
“Java Sucks”
“Why is Java a bad language?”
103. about me
fintech is my battleground
LendUp is the best startup
spits sarcasm at @hundredmondays
We are privileged with choice.
Let’s choose work that matters.