Implémentation efficace et durable de processus métiers complexesGeeks Anonymes
La transposition de processus métiers complexes en programmes informatiques est parfois difficile pour des raisons techniques et/ou communicationnelles. Le faire efficacement et sous une forme flexible l'est encore plus. Pousse-Café, un framework Java se basant sur le Domain-Driven Design (DDD), rend la tâche plus abordable. https://www.pousse-cafe-framework.org/
Par Gérard Dethier, aux Geeks Anonymes du 15 janvier 2021
Vidéo : https://youtu.be/DE0QpTIz1cQ
Managing Open Source Licenses (Geeks Anonymes)Geeks Anonymes
This document discusses open source software licenses and managing open source code. It provides an overview of common open source licenses like GPL, MIT, and BSD licenses. It also discusses risks of license incompatibility and how to detect open source code dependencies. The document recommends that developers choose licenses carefully, document code properly, and that companies establish open source policies.
Conférence des Geeks Anonymes sur " Reprendre le contrôle de ses données ", par Gérard Dethier, le 26 octobre 2020.
Vidéo : https://youtu.be/RUbZ9RbI7TA
Conférence des Geeks Anonymes sur " le langage Go ", par Thomas Hayen le 23 septembre 2020.
Cette conférence est disponible en vidéo sur Youtube : https://youtu.be/AlGGneVGTJk
This document provides an overview of Kubernetes including: its architecture with key components like kubelet, kube-proxy, controller manager, scheduler, and etcd; how it manages deployments with rolling updates and rollbacks; jobs; services; ingress; volumes; configmaps and secrets; namespaces; cronjobs and daemonsets; readiness and liveness probes; statefulsets; network policies; RBAC and security; and a brief history of Kubernetes. It also includes contact information for Philippe Collignon who provides additional context on his experience with Kubernetes.
Implémentation efficace et durable de processus métiers complexesGeeks Anonymes
La transposition de processus métiers complexes en programmes informatiques est parfois difficile pour des raisons techniques et/ou communicationnelles. Le faire efficacement et sous une forme flexible l'est encore plus. Pousse-Café, un framework Java se basant sur le Domain-Driven Design (DDD), rend la tâche plus abordable. https://www.pousse-cafe-framework.org/
Par Gérard Dethier, aux Geeks Anonymes du 15 janvier 2021
Vidéo : https://youtu.be/DE0QpTIz1cQ
Managing Open Source Licenses (Geeks Anonymes)Geeks Anonymes
This document discusses open source software licenses and managing open source code. It provides an overview of common open source licenses like GPL, MIT, and BSD licenses. It also discusses risks of license incompatibility and how to detect open source code dependencies. The document recommends that developers choose licenses carefully, document code properly, and that companies establish open source policies.
Conférence des Geeks Anonymes sur " Reprendre le contrôle de ses données ", par Gérard Dethier, le 26 octobre 2020.
Vidéo : https://youtu.be/RUbZ9RbI7TA
Conférence des Geeks Anonymes sur " le langage Go ", par Thomas Hayen le 23 septembre 2020.
Cette conférence est disponible en vidéo sur Youtube : https://youtu.be/AlGGneVGTJk
This document provides an overview of Kubernetes including: its architecture with key components like kubelet, kube-proxy, controller manager, scheduler, and etcd; how it manages deployments with rolling updates and rollbacks; jobs; services; ingress; volumes; configmaps and secrets; namespaces; cronjobs and daemonsets; readiness and liveness probes; statefulsets; network policies; RBAC and security; and a brief history of Kubernetes. It also includes contact information for Philippe Collignon who provides additional context on his experience with Kubernetes.
Rust is a systems programming language that offers performance comparable to C and C++ with memory safety and thread safety. It uses a borrow checker to enforce rules around ownership, borrowing, and lifetimes that prevent common bugs like use of dangling pointers and data races. Rust also supports features like generics, pattern matching, and idioms that improve productivity without sacrificing performance.
This document discusses best practices for testing code. It recommends writing unit, integration, functional, generated, and performance tests. Unit tests should be isolated, reproducible, fast, simple, and automated. Integration tests check interactions between components. Functional tests simulate user behaviors. Generated tests use random inputs to try breaking code. Performance tests measure timing and load capacity. The document provides examples of tools and techniques for writing different types of tests in Python.
Become Rick and famous, thanks to Open SourceGeeks Anonymes
This document discusses how to become rich and famous through open source software by attracting users and developers, and outlines various business models for monetizing open source projects including services, dual licensing, and creating added value products. It notes that choosing open source allows for social impact, helps customers avoid lock-in, and helps attract talent from the open source community.
This document provides an introduction to natural language processing (NLP) and discusses various NLP techniques. It begins by introducing the author and their background in NLP. It then defines NLP and common text data used. The document outlines a typical NLP pipeline that involves pre-processing text, feature engineering, and both low-level and high-level NLP tasks. Part-of-speech tagging and sentiment analysis are discussed as examples. Deep learning techniques for NLP are also introduced, including word embeddings and recurrent neural networks.
1. The document discusses modern features of SQL such as window functions, common table expressions, grouping sets, rollup and cube.
2. It provides examples and explanations of these features and how they can be used to analyze and query data in flexible ways.
3. Compatibility of these features across major database systems such as PostgreSQL, SQL Server, and Oracle is also discussed.
Présentation aux Geeks Anonymes Liège par Cyril Soldani, le 13 décembre 2017.
Page des Geeks Anonymes : https://www.recherche.uliege.be/cms/c_9463913/fr/geeks-anonymes
The document describes various stages of a cyber attack lifecycle including reconnaissance, initial infection, gaining control, privilege escalation, lateral movement, persistence, and malicious activities. It also discusses social engineering techniques, vulnerabilities and exploitation, and provides an example penetration test scenario.
Présentation sur le Domain-Driven Design par Gérard Dethier (Guardis) aux Geeks Anonymes le 10 novembre 2017.
Vidéo de la conférence : https://youtu.be/OmrtGo68E6M
Introduction à l'écosystème de l'Internet des Objets Geeks Anonymes
The document discusses Internet of Things (IoT) technologies. It defines IoT as connecting physical objects to the internet and being able to identify, locate, track and trade information about them. It then examines various technologies used for IoT like QR codes, RFID, Bluetooth, wireless sensors, and mobile networks. It compares the technologies based on factors like power, information capacity, cost, and accuracy. Finally, it provides examples of potential IoT business applications in areas like smart metering, logistics tracking, and agriculture.
This document discusses five transformations for the software industry:
1. Data innovation - Turning data into value through areas like wearable data intelligence, predictive analytics, and exploratory analytics.
2. Blending hardware - The renaissance of hardware through devices like Arduino and Raspberry Pi and combining software with hardware.
3. Embracing the API economy - Adopting an API-first mindset and business strategy to build on other platforms through simple encodings.
4. Digital valorization - Achieving hyper scalability and servitization through viral sharing and stickiness to maximize value creation.
5. Security - Moving toward "security by design" given security concerns around multi-tenancy,
This document discusses the history and technologies behind Facebook. It notes that Facebook was originally founded by Mark Zuckerberg in 2004 as a social network for Harvard students. As it grew, Facebook transitioned to using PHP for server-side scripting and developed its own technologies like HHVM (Hip Hop Virtual Machine) and the Hack programming language to improve performance and security. Key points discussed include Facebook's use of PHP, its development of a PHP to C++ transpiler called HPHPc, its creation of a JIT compiler called HHVM, and its development of the Hack language which combines elements of PHP and C++.
Rust is a systems programming language that offers performance comparable to C and C++ with memory safety and thread safety. It uses a borrow checker to enforce rules around ownership, borrowing, and lifetimes that prevent common bugs like use of dangling pointers and data races. Rust also supports features like generics, pattern matching, and idioms that improve productivity without sacrificing performance.
This document discusses best practices for testing code. It recommends writing unit, integration, functional, generated, and performance tests. Unit tests should be isolated, reproducible, fast, simple, and automated. Integration tests check interactions between components. Functional tests simulate user behaviors. Generated tests use random inputs to try breaking code. Performance tests measure timing and load capacity. The document provides examples of tools and techniques for writing different types of tests in Python.
Become Rick and famous, thanks to Open SourceGeeks Anonymes
This document discusses how to become rich and famous through open source software by attracting users and developers, and outlines various business models for monetizing open source projects including services, dual licensing, and creating added value products. It notes that choosing open source allows for social impact, helps customers avoid lock-in, and helps attract talent from the open source community.
This document provides an introduction to natural language processing (NLP) and discusses various NLP techniques. It begins by introducing the author and their background in NLP. It then defines NLP and common text data used. The document outlines a typical NLP pipeline that involves pre-processing text, feature engineering, and both low-level and high-level NLP tasks. Part-of-speech tagging and sentiment analysis are discussed as examples. Deep learning techniques for NLP are also introduced, including word embeddings and recurrent neural networks.
1. The document discusses modern features of SQL such as window functions, common table expressions, grouping sets, rollup and cube.
2. It provides examples and explanations of these features and how they can be used to analyze and query data in flexible ways.
3. Compatibility of these features across major database systems such as PostgreSQL, SQL Server, and Oracle is also discussed.
Présentation aux Geeks Anonymes Liège par Cyril Soldani, le 13 décembre 2017.
Page des Geeks Anonymes : https://www.recherche.uliege.be/cms/c_9463913/fr/geeks-anonymes
The document describes various stages of a cyber attack lifecycle including reconnaissance, initial infection, gaining control, privilege escalation, lateral movement, persistence, and malicious activities. It also discusses social engineering techniques, vulnerabilities and exploitation, and provides an example penetration test scenario.
Présentation sur le Domain-Driven Design par Gérard Dethier (Guardis) aux Geeks Anonymes le 10 novembre 2017.
Vidéo de la conférence : https://youtu.be/OmrtGo68E6M
Introduction à l'écosystème de l'Internet des Objets Geeks Anonymes
The document discusses Internet of Things (IoT) technologies. It defines IoT as connecting physical objects to the internet and being able to identify, locate, track and trade information about them. It then examines various technologies used for IoT like QR codes, RFID, Bluetooth, wireless sensors, and mobile networks. It compares the technologies based on factors like power, information capacity, cost, and accuracy. Finally, it provides examples of potential IoT business applications in areas like smart metering, logistics tracking, and agriculture.
This document discusses five transformations for the software industry:
1. Data innovation - Turning data into value through areas like wearable data intelligence, predictive analytics, and exploratory analytics.
2. Blending hardware - The renaissance of hardware through devices like Arduino and Raspberry Pi and combining software with hardware.
3. Embracing the API economy - Adopting an API-first mindset and business strategy to build on other platforms through simple encodings.
4. Digital valorization - Achieving hyper scalability and servitization through viral sharing and stickiness to maximize value creation.
5. Security - Moving toward "security by design" given security concerns around multi-tenancy,
This document discusses the history and technologies behind Facebook. It notes that Facebook was originally founded by Mark Zuckerberg in 2004 as a social network for Harvard students. As it grew, Facebook transitioned to using PHP for server-side scripting and developed its own technologies like HHVM (Hip Hop Virtual Machine) and the Hack programming language to improve performance and security. Key points discussed include Facebook's use of PHP, its development of a PHP to C++ transpiler called HPHPc, its creation of a JIT compiler called HHVM, and its development of the Hack language which combines elements of PHP and C++.