nos Pásztor: How (not) to document
Let’s face it: writing documentation is fundamentally boring. Unless you’re a total graphomaniac, chances are you are not writing as much documentation as you should be, or if you do, you find it hard to organize it in a useful manner. Grab a cup of coffee and join me on a journey of the good, the bad and the ugly parts of writing documentation. By the time we are finished, you will find writing and reading documentation a lot easier.
nos Pásztor: How (not) to document
Let’s face it: writing documentation is fundamentally boring. Unless you’re a total graphomaniac, chances are you are not writing as much documentation as you should be, or if you do, you find it hard to organize it in a useful manner. Grab a cup of coffee and join me on a journey of the good, the bad and the ugly parts of writing documentation. By the time we are finished, you will find writing and reading documentation a lot easier.
Why Network and Endpoint Security Isn’t EnoughImperva
The rise in high-profile breaches demonstrates that traditional security defenses are no longer enough. Endpoint and network security cannot defend against sophisticated attacks or compromised insiders.
View this presentation and learn:
- Why traditional security measures fail to stop web attacks and data breaches
- How modernized best practices safeguard against web application attacks
- What strategies enable scalable data protection and simplified audits
You may not be able to see it, but the chances are your website has a number of issues negatively impacting its performance. Discover a number of performance optimisation techniques to improve your website and provide a better user experience.
The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Watch this webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.
The State of Application Security: Hackers On SteroidsImperva
Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications.
This presentation will detail key insights from the Imperva Application Defense Center annual Web Application Attack Report. View this presentation for an in-depth view of the threat landscape for the year. We will:
- Discuss hacking trends and shifts
- Provide breach analysis by geography, industry, and attack type
- Detail next steps for improved security controls and risk management processes
The Now and Next of Learning and TechnologyDavid Kelly
These slides were used in support of a talk I deliver at conferences and events..
If you're interested in bringing this talk/workshop into your event or organization, please contact me at LnDDave@gmail.com.
Research makes it clear, the generation of children in our ministries today is vastly different than any other group of children the Church has ever sought to reach. They engage and edit media, experiment with culture, and experience community in new ways. Discover the unique learning charac- teristics of today’s kid and learn to leverage those characteristics in your ministry.
GAME ON! Integrating Games and Simulations in the Classroom Brian Housand
Brian Housand, Ph.D.
brianhousand.com
@brianhousand
GAME ON! Integrating Games and Simulations in the Classroom
It is estimated that by the time that today’s youth enters adulthood that they will have played an average of 10,000 hours of video games. By playing games, research suggests that they have developed abilities related to creativity, collaboration, and critical thinking. Come explore the history of games and simulations in the classroom and investigate ways that current games and simulations in digital and non-digital formats can be meaningfully and purposefully integrated into your learning environment.
Keynote address (Feb, 2016) to the educators in the Fort Nelson school district. We all know that we cannot teach a child without a concection... without a relationship. In the hustle and bustle of our jobs as educators, we often forget our why, the reason we got into education, of trying to make a difference with kids. In this talk, 6 Keys to Connecting are shared and discussed with the challenge of creating a more positive climate and better connections with kids in our classrooms, schools, and organizations.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
Why Network and Endpoint Security Isn’t EnoughImperva
The rise in high-profile breaches demonstrates that traditional security defenses are no longer enough. Endpoint and network security cannot defend against sophisticated attacks or compromised insiders.
View this presentation and learn:
- Why traditional security measures fail to stop web attacks and data breaches
- How modernized best practices safeguard against web application attacks
- What strategies enable scalable data protection and simplified audits
You may not be able to see it, but the chances are your website has a number of issues negatively impacting its performance. Discover a number of performance optimisation techniques to improve your website and provide a better user experience.
The new 2016 Gartner Magic Quadrant for Web Application Firewalls (WAF) is based on detailed responses to questionnaires from experienced Web App Firewall customers. Watch this webinar and hear the experiences of major customers who participated in the Gartner MQ for WAF research and how they implemented web app firewall to protect their applications and critical data.
The State of Application Security: Hackers On SteroidsImperva
Organizations of all sizes face a universal security threat from today’s organized hacking industry. Why? Hackers have decreased costs and expanded their reach with tools and technologies that allow for automated attacks against Web applications.
This presentation will detail key insights from the Imperva Application Defense Center annual Web Application Attack Report. View this presentation for an in-depth view of the threat landscape for the year. We will:
- Discuss hacking trends and shifts
- Provide breach analysis by geography, industry, and attack type
- Detail next steps for improved security controls and risk management processes
The Now and Next of Learning and TechnologyDavid Kelly
These slides were used in support of a talk I deliver at conferences and events..
If you're interested in bringing this talk/workshop into your event or organization, please contact me at LnDDave@gmail.com.
Research makes it clear, the generation of children in our ministries today is vastly different than any other group of children the Church has ever sought to reach. They engage and edit media, experiment with culture, and experience community in new ways. Discover the unique learning charac- teristics of today’s kid and learn to leverage those characteristics in your ministry.
GAME ON! Integrating Games and Simulations in the Classroom Brian Housand
Brian Housand, Ph.D.
brianhousand.com
@brianhousand
GAME ON! Integrating Games and Simulations in the Classroom
It is estimated that by the time that today’s youth enters adulthood that they will have played an average of 10,000 hours of video games. By playing games, research suggests that they have developed abilities related to creativity, collaboration, and critical thinking. Come explore the history of games and simulations in the classroom and investigate ways that current games and simulations in digital and non-digital formats can be meaningfully and purposefully integrated into your learning environment.
Keynote address (Feb, 2016) to the educators in the Fort Nelson school district. We all know that we cannot teach a child without a concection... without a relationship. In the hustle and bustle of our jobs as educators, we often forget our why, the reason we got into education, of trying to make a difference with kids. In this talk, 6 Keys to Connecting are shared and discussed with the challenge of creating a more positive climate and better connections with kids in our classrooms, schools, and organizations.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
41. Bizonyos műveletekre szükség van magasabb jogosultság szintre, ilyenkor a processzor a TRAP parancs hatására átvált kernel módba és átadja a vezérlést az operációs rendszernek.
65. Linux != Unix (vannak pontok, amiben eltér a POSIX szabványtól)
66. Egy halom más projektből kerülnek át szoftverek, javítások a Linux kernelbe vagy felhasználói programokba.
67.
68. Igaz, hogy csak úgy terjeszthető, hogy a hozzá fordított programok is azonos licenc alatt terjesztésre kerülnek, tehát a saját fejlesztéseket egy továbbadás során nyílt forrásúvá kell tenni.
69. Nem igaz, hogy a Linuxon üzemeltetett szoftverek forráskódját nyílt forrásúvá kell tenni. (Ez az AGPL.)
70. A fizetős Linuxoknál (SuSE, RedHat, stb) a vevő a brand használatért, a supportért és a külön fejlesztett szoftverekért fizet.
71.
72. A 0-s UID és GID mindig a rendszergazdáé. (root)
104. ext4, stb. unordered data mode-ot használ, tehát nem feltétlenül olyan sorrendben írja a diskre, ahogy a fájlrendszerbe írtuk! Ezért tilos ilyen módot használni, ha nincs barrier támogatás vagy battery unit.