This document outlines a presentation on Mobile Backend as a Service (MBaaS). It discusses MBaaS features like push notifications, data storage, and APIs. It also covers several MBaaS platforms like Kinvey, Backendless, BackBeam, and Parse. For each platform, it describes services like user authentication, data storage, and SDKs. Finally, it shows code examples for performing common tasks like storing and querying data using the Parse MBaaS platform on Android.
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...Simplilearn
In this presentation on virtualization explained, we will understand what is virtualization technology and how it is helpful to us during professional as well as personal work. In this virtualization tutorial, we will understand how virtualization takes place and what software makes virtualization possible and manage different virtual instances, along with the benefits of virtualization.
The topics covered in this what is virtualization presentation are:
1. What Is Virtualization?
2. What Is a Virtual Machine(VM)?
3. Role and Types of Hypervisor
4. Types of Virtualization
5. Benefits of Virtualization
Virtualization is the process of designing a virtual layer to allow one or more operating systems to work on a single physical system known as the host and virtual operating system as a guest. This virtual layer is created through software known as the hypervisor, and it also manages the resource distribution among the virtual machines.
About Simplilearn AWS Cloud Architect Program:
This AWS Cloud Architect Certification Course will make you an expert in Amazon Web Services (AWS). In this program, you will become familiar with architectural principles and services of AWS, learn how to design and deploy highly scalable and fault-tolerant applications on AWS, implement AWS security and testing, and become an expert in AWS components such as S3 and CloudFormation.
What are the course objectives for this AWS Cloud Architect training?
This AWS Cloud Architect certification training will enable you to master the core skills required for designing and deploying dynamically scalable, highly available, fault-tolerant, and reliable applications on one of the top cloud platform providers—Amazon Web Services (AWS). You will learn the fundamentals of the Amazon Web Services (AWS) cloud platform and become an expert in understanding AWS terminologies, concepts, benefits, and deployment options to meet your business requirements. You will also get an overview of AWS DMS (Database Migration Service), how the AWS Schema Conversion tool works, and the various types of AWS DMS; how to build, implement, and manage scalable and fault-tolerant systems on AWS; and, how to select the appropriate AWS service based on data, compute, database, and security requirements.
Learn more at: https://www.simplilearn.com/aws-cloud-architect-certification-training-course
VMware vCloud® SuiteTM is a private cloud infrastructure solution based on VMware vSphere®. vCloud Suite allows IT to achieve cloud service provider economics in the data center, provision applications in minutes instead of weeks, and deliver the right availability and security for each application with policy-based governance. vCloud Suite is the first step for IT organizations towards the software- defined data center architecture. VMware also offers additional software-defined data center products that can further extend the capabilities of a vSphere private cloud environment.
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...Simplilearn
In this presentation on virtualization explained, we will understand what is virtualization technology and how it is helpful to us during professional as well as personal work. In this virtualization tutorial, we will understand how virtualization takes place and what software makes virtualization possible and manage different virtual instances, along with the benefits of virtualization.
The topics covered in this what is virtualization presentation are:
1. What Is Virtualization?
2. What Is a Virtual Machine(VM)?
3. Role and Types of Hypervisor
4. Types of Virtualization
5. Benefits of Virtualization
Virtualization is the process of designing a virtual layer to allow one or more operating systems to work on a single physical system known as the host and virtual operating system as a guest. This virtual layer is created through software known as the hypervisor, and it also manages the resource distribution among the virtual machines.
About Simplilearn AWS Cloud Architect Program:
This AWS Cloud Architect Certification Course will make you an expert in Amazon Web Services (AWS). In this program, you will become familiar with architectural principles and services of AWS, learn how to design and deploy highly scalable and fault-tolerant applications on AWS, implement AWS security and testing, and become an expert in AWS components such as S3 and CloudFormation.
What are the course objectives for this AWS Cloud Architect training?
This AWS Cloud Architect certification training will enable you to master the core skills required for designing and deploying dynamically scalable, highly available, fault-tolerant, and reliable applications on one of the top cloud platform providers—Amazon Web Services (AWS). You will learn the fundamentals of the Amazon Web Services (AWS) cloud platform and become an expert in understanding AWS terminologies, concepts, benefits, and deployment options to meet your business requirements. You will also get an overview of AWS DMS (Database Migration Service), how the AWS Schema Conversion tool works, and the various types of AWS DMS; how to build, implement, and manage scalable and fault-tolerant systems on AWS; and, how to select the appropriate AWS service based on data, compute, database, and security requirements.
Learn more at: https://www.simplilearn.com/aws-cloud-architect-certification-training-course
VMware vCloud® SuiteTM is a private cloud infrastructure solution based on VMware vSphere®. vCloud Suite allows IT to achieve cloud service provider economics in the data center, provision applications in minutes instead of weeks, and deliver the right availability and security for each application with policy-based governance. vCloud Suite is the first step for IT organizations towards the software- defined data center architecture. VMware also offers additional software-defined data center products that can further extend the capabilities of a vSphere private cloud environment.
E’ un’estensione di VMware vCenter che fornisce ai professionisti IT la possibilità di disaster recovery, migrazione di siti e funzionalità di test non distruttive.
Cloud Migration, Application Modernization and Security for PartnersAmazon Web Services
As AWS continues to expand, enterprise customers are increasingly looking to our partner ecosystem to assist in migrating their workloads to the cloud. This session describes the challenges, lessons learned and best practices for large scale application migrations. We will use real examples from our consulting partners and AWS Professional Services to illustrate how to move workloads to the cloud while modernizing the associated applications to take advantage of AWS’ unique benefits. We will also dive into how to use an array of AWS services and features to improve a customer’s security posture as they are migrating and once they are up and running in the cloud.
This presentation provides a detailed coverage on Cloud services: Software as a Service, Platform as a Service, Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as Services. Service providers- Google, Amazon, Microsoft Azure, IBM, Sales force.
Updated lifecycle management, improved analytics and support, and the option of Kubernetes — VMware vSphere® 7 is the biggest re-platform of vSphere in years. Learn more about the most significant vSphere evolution in a decade.
Learn more: http://ms.spr.ly/6005TmX9B
Presentation by John Mulhall of Maolte Technical Solutions Limited on Cloud Migrations for presentation to a meetup by Morgan McKinley Recruitment agency in their Dublin 4 offices on the 30th November 2022.
This file was recently published to the local community two months back. And now opening to the generic access. The document discusses about high level deployment scenario of VDI solution jointly formed by Microsoft & Citrix. A 700 user-base was assumed and a scalability of 4500 user-base scale-up model was provided using DELL & HP hardware.
Nutanix se despacha en días, y su despliegue se realiza en menos de un día (realmente!)
Permite no interrumpir las operaciones en curso (reducción del 99,7% en los tiempos de inactividad no planificados)
Escala fácilmente - Añada capacidad cuando la necesite- No más sobre aprovisionamiento (el tiempo de despliegue es 85% más rápido)
Reduce el costo y la complejidad de su sistema de computación y almacenamiento - hasta un 90% de ahorro de energía y espacio
Todos sus sistemas gestionados a través de una interfaz de panel único (71% menos tiempo de gestión de un entorno Nutanix)
Proporciona capacidades avanzadas de almacenamiento de clase empresarial (Deduplicación, Compresión, etc.)
Soporte de Clase Mundial – 88 Net Promotor Score (El siguiente proveedor de tecnología más alta de la lista fue Intel- en un 53!)
Cloud Migration, Application Modernization and Security for PartnersAmazon Web Services
As AWS continues to expand, enterprise customers are increasingly looking to our partner ecosystem to assist in migrating their workloads to the cloud. This session describes the challenges, lessons learned, and best practices for large-scale application migrations. We will use real examples from our consulting partners and AWS Professional Services to illustrate how to move workloads to the cloud while modernizing the associated applications to take advantage of the unique benefits of AWS. We will also dive into how to use an array of AWS services and features to improve customers' security posture as they migrate and once they are up and running in the cloud.
Slides for the presentation on BaaS at the Cloud Computing event hosted by GTECH Technology Forum, Technopark.
Covers :
- What is Backend as a Service ?
- How much time can be saved by using BaaS ?
- Current Mobile Ecosystem with BaaS as the new middleware
- Bringing BaaS to Enterprise IT.
- Leading Providers
E’ un’estensione di VMware vCenter che fornisce ai professionisti IT la possibilità di disaster recovery, migrazione di siti e funzionalità di test non distruttive.
Cloud Migration, Application Modernization and Security for PartnersAmazon Web Services
As AWS continues to expand, enterprise customers are increasingly looking to our partner ecosystem to assist in migrating their workloads to the cloud. This session describes the challenges, lessons learned and best practices for large scale application migrations. We will use real examples from our consulting partners and AWS Professional Services to illustrate how to move workloads to the cloud while modernizing the associated applications to take advantage of AWS’ unique benefits. We will also dive into how to use an array of AWS services and features to improve a customer’s security posture as they are migrating and once they are up and running in the cloud.
This presentation provides a detailed coverage on Cloud services: Software as a Service, Platform as a Service, Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as Services. Service providers- Google, Amazon, Microsoft Azure, IBM, Sales force.
Updated lifecycle management, improved analytics and support, and the option of Kubernetes — VMware vSphere® 7 is the biggest re-platform of vSphere in years. Learn more about the most significant vSphere evolution in a decade.
Learn more: http://ms.spr.ly/6005TmX9B
Presentation by John Mulhall of Maolte Technical Solutions Limited on Cloud Migrations for presentation to a meetup by Morgan McKinley Recruitment agency in their Dublin 4 offices on the 30th November 2022.
This file was recently published to the local community two months back. And now opening to the generic access. The document discusses about high level deployment scenario of VDI solution jointly formed by Microsoft & Citrix. A 700 user-base was assumed and a scalability of 4500 user-base scale-up model was provided using DELL & HP hardware.
Nutanix se despacha en días, y su despliegue se realiza en menos de un día (realmente!)
Permite no interrumpir las operaciones en curso (reducción del 99,7% en los tiempos de inactividad no planificados)
Escala fácilmente - Añada capacidad cuando la necesite- No más sobre aprovisionamiento (el tiempo de despliegue es 85% más rápido)
Reduce el costo y la complejidad de su sistema de computación y almacenamiento - hasta un 90% de ahorro de energía y espacio
Todos sus sistemas gestionados a través de una interfaz de panel único (71% menos tiempo de gestión de un entorno Nutanix)
Proporciona capacidades avanzadas de almacenamiento de clase empresarial (Deduplicación, Compresión, etc.)
Soporte de Clase Mundial – 88 Net Promotor Score (El siguiente proveedor de tecnología más alta de la lista fue Intel- en un 53!)
Cloud Migration, Application Modernization and Security for PartnersAmazon Web Services
As AWS continues to expand, enterprise customers are increasingly looking to our partner ecosystem to assist in migrating their workloads to the cloud. This session describes the challenges, lessons learned, and best practices for large-scale application migrations. We will use real examples from our consulting partners and AWS Professional Services to illustrate how to move workloads to the cloud while modernizing the associated applications to take advantage of the unique benefits of AWS. We will also dive into how to use an array of AWS services and features to improve customers' security posture as they migrate and once they are up and running in the cloud.
Slides for the presentation on BaaS at the Cloud Computing event hosted by GTECH Technology Forum, Technopark.
Covers :
- What is Backend as a Service ?
- How much time can be saved by using BaaS ?
- Current Mobile Ecosystem with BaaS as the new middleware
- Bringing BaaS to Enterprise IT.
- Leading Providers
Backendless 3.0 is a major release of a cloud mobile (mBaaS) development platform. The presentation reviews the major changes introduced by the release.
Mobile Backend Apps and APIs meetup London overview of BaaS APIs and discussi...Taras Filatov
The first Mobile Backend Apps and APIs meetup has taken place in London on 16th of May 2012.
Taras Filatov, founder and CEO of QuickBlox has kicked off the event in an open discussion format giving a quick overview of existing market and asking questions about important aspects of mobile backends. Developers present in the audience have shared their opinions and this has launched a very interesting discussion from which both developers and API providers could take something.
Dan Murphy from Pearson and Terence Eden from InMobi have continued the discussion giving further introspective into evolution of apps and APIs and providing details about their APIs.
The official meetup page:
http://www.meetup.com/Mobile-Backend-Apps-and-APIs/events/49006492/
A solução completa para apps móveis e websites.
VI Komet é um produto de Backend as a Service (BaaS ou MBaaS) pronto para uso na nuvem.
Uma série de funcionalidades prontas e testadas, disponibilizadas em ambiente seguro e escalável onde você deixa de se preocupar com infraestrutura, desenvolvimento, banco de dados e itens de natureza tecnológica, possibilitando dedicação exclusiva ao seu negócio.
Parse é uma plataforma web focada em prover serviços na nuvem para plataformas móveis.
Fundada em 2011 por um grupo pequeno de desenvolvedores e sua primeira versão foi apelidada de “Heroku of mobile”.
A plataforma cresceu muito nos 2 anos seguintes e foi adquirido pelo Facebook em Abril/2013.
Atualmente, a maioria dos aplicativos faz uso de internet, seja através de requests à APIs, componentes sociais, ou qualquer outra funcionalidade fora do contexto do aplicativo. E para um aplicativo de sucesso precisamos de um backend estável, robusto e escalável. Nessa apresentação vamos discutir algumas opções de backends oferecido pelo Google Cloud Platform e entre outras plataformas.
O serviço AWS Mobile Hub permite que você desenvolva de forma fácil e rápida aplicativos moveis. O intuito dessa sessão é mostrar serviços, os quais ajudarão nesse desenvolvimento, como serviços de autenticação, push, armanzenamento, backend, assim como testes em dispositivos reais.
Já pensou em ter um aplicativo Mobile, e usar a infraestrutura para isso como um serviço? Sem necessidade de provisionar, configurar e administrar servidores? Venha ver como isto é possível com a AWS.
In our deep-dive technical series, we look at the strategic importance of having Baas as part of your API Management solution. Apigee Edge API BaaS enables web and mobile app developers to link their apps to a cloud datastore and provide features including user management, push notifications, geolocation services, and more.
2016 F8 Facebook Developer Conference Overview_Innobirds MediaInnobirds Media
메신저의 개인화를 통해 모두에게 공개된 형태의 소셜미디어가
프라이빗한 형태도 함께 가지게 됨. 기업들은 새로운 방법의 소통 방법을 고민할 필요가 있음.
비디오 라이브의 강화로 페이스북 알고리즘이 변할 것으로 예상.
가장 먼저 흥미로운 방식으로 라이브 방송을 하는 브랜드들이 유리할 것.
VR은 여전히 니치 시장이며 앞으로도 꾸준한 도전과 발전이 발생할 것. 마케터들은 퍼스널 VR기기와 프로덕션 기술을 통한 기회를 물색해야 함.
Quote Sharing / Save Button을 통해 페이스북 단일 플랫폼 뿐 아니라 웹에서도 유저들은 페이스북으로 콘텐츠를 유통시킬 것임.
기업은 새로운 웹사이트 트래픽 증가 전략과 함께 어떤 종류의 기사가 많이 저장되는지를 파악하고 분석할 필요가 있음
Mobile app development is complex and time-consuming. Learn how to rapidly deliver mobile apps with AWS Mobile Hub. We will demonstrate how AWS Mobile Hub abstracts the undifferentiated heavy lifting by providing a single, integrated experience for discovering, provisioning and configuring AWS cloud resources you need to build, test, and monitor usage of your mobile apps.
Things that go bump on the web - Web Application SecurityChristian Heilmann
My talk at the Web Directions North conference in Denver, Colorado. It covers basic technologies and methodologies of attacks of web applications, what we can do against them and a plea for making interfaces more educational about security than scaring users.
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...CA Technologies
As a mobile developer, you understand the pressure to deliver apps faster and of higher quality. Developer solutions must simplify the complexity of creating a great user experience by providing mobile security, interactivity and backend integration with developer-friendly interfaces and APIs. This session steps through the new mobile app services solutions from CA.
For more information, please visit http://cainc.to/Nv2VOe
MySQL 8.0 is the latest Generally Available version of MySQL. This session will help you upgrade from older versions, understand what utilities are available to make the process smoother and also understand what you need to bear in mind with the new version and considerations for possible behavior changes and solutions.
Corporations increasingly rely on their enterprise services bus (ESB) as the communication center to link multiple IT systems, applications and data. Unfortunately, when something goes wrong in the ESB it can have a cascading affect and impact critical applications using ESB services. Determining the root cause of the problem is a challenge for most IT organizations because ESBs appear as a ‘black box,’ providing little insight into the cause of performance problems. Join us to learn how you can use Nastel AutoPilot for WebSphere MQ and CA Cross-Enterprise APM to prevent and resolve performance issues for applications communicating across your ESB, before they impact your users.
For more information, please visit http://cainc.to/Nv2VOe
10 Key Digital Infrastructure ConsiderationsCognizant
As digital becomes ever-more essential to revenue growth and market relevance, underlying infrastructure must be made as efficient as possible to realize its true potential. By prioritizing foundational technology modernization and simplification, organizations can accelerate their transformation into the digital era.
Zero-downtime deployment of Micro-services with KubernetesWojciech Barczyński
Talk on deployment strategies with Kubernetes covering kubernetes configuration files and the actual implementation of your service in Golang.
You will find demos for recreate, rolling updates, blue-green, and canary deployments.
Source and demos, you will find on github: https://github.com/wojciech12/talk_zero_downtime_deployment_with_kubernetes
Explain about power BI Overview from Power BI Desktop, Power BI Service, Power BI Report Server and Power BI Mobile that consume all BI Data from Dataset and datamodel
Low-code backend to build modern apps. Store and query relational data on the cloud. Make it accessible over GraphQL and REST with a scalable, open-source backend.
Firebase alternative, Backend as a Service, Mobile Backend as a Service, Low Code Backend, Heroku Alternatives, Open Source Firestore
https://www.back4app.com/
This presentation is for developer, software architect. It’ll help you:
- Understand use cases for Mobile Enterprise application (MEA) system
- Choose right architecture and appropriate open source solution for each component in
Mobile Enterprise Application System
- Reference information
Similar to Mobile Backend as a Service(MBaaS) (20)
Herramientas de benchmarks para evaluar el rendimiento en máquinas y aplicaci...Jose Manuel Ortega Candel
Los benchmarks son programas que permiten evaluar el rendimiento de un sistema, componente o proceso en comparación con otros sistemas similares. Son herramientas esenciales para medir y comparar el rendimiento de hardware, software y sistemas en diferentes áreas. El objetivo es dar a conocer las principales herramientas de benchmark que disponemos hoy en día para medir el rendimiento.
Entre los puntos a tratar podemos destacar:
-Introducción a Benchmarks: Definición y propósito de los benchmarks en la medición del rendimiento
-Tipos de Benchmarks: Benchmarks sintéticos vs. Benchmarks del mundo real.Benchmarks específicos para CPU, memoria, almacenamiento, y gráficos
-Selección de Benchmarks: Consideraciones al elegir benchmarks según el tipo de aplicación y los objetivos de evaluación
En el mundo actual, las APIs juegan un papel importante en la creación de aplicaciones y servicios robustos y flexibles. Sin embargo, con la expansión de las APIs, también surge la necesidad de abordar los desafíos de seguridad asociados.
En esta charla, exploraremos en detalle el OWASP Top 10 de Seguridad en APIs, una lista de las principales vulnerabilidades que los desarrolladores y equipos de seguridad deben tener en cuenta al diseñar, desarrollar y asegurar sus APIs. Por último, comentaremos las mejores prácticas para mitigar los riesgos y garantizar la seguridad de tus APIs. Entre los puntos a tratar podemos destacar:
1.Introducir el concepto de seguridad en las APIs
2.OWASP Top 10 y su importancia para la seguridad en APIs
3.Actualización del OWASP Top 10 security en 2023
4.Herramientas para evaluar y mejorar la seguridad de tus APIs.
5.Estrategias y mejores prácticas para garantizar la seguridad de tus APIs.
La seguridad en aplicaciones web es un aspecto fundamental para garantizar la protección de los datos y la confidencialidad de los usuarios. Si nuestro objetivo es aprender como Django gestiona la seguridad, PyGoat es una aplicación desarrollada con Django vulnerable de forma intencionada que puede ser utilizada para aprender a asegurar nuestras aplicaciones Django.
En esta charla, analizamos como Django gestiona la seguridad utilizando la aplicación vulnerable Pygoat, identificando los problemas de seguridad subyacentes. Aprenderemos sobre vulnerabilidades de seguridad comunes como las que aparecen en el OWASP Top 10 en aplicaciones Django y cómo solucionarlas para que podamos mantener nuestras aplicaciones a salvo de atacantes.
Entre los puntos a tratar podemos destacar:
Introducción a la seguridad en aplicaciones Django
Pygoat como ejemplo de aplicación vulnerable
Vulnerabilidades OWASP top 10 y mitigación
Ciberseguridad en Blockchain y Smart Contracts: Explorando los Desafíos y Sol...Jose Manuel Ortega Candel
En la actualidad, la tecnología blockchain y los smart contracts están revolucionando la forma en que interactuamos con la información y realizamos transacciones. Sin embargo, esta innovación no está exenta de desafíos en cuanto a la ciberseguridad se refiere. En esta charla, exploraremos los desafíos desde el punto de vista de la ciberseguridad en blockchain y smart contracts, así como las soluciones y enfoques para mitigar los riesgos asociados. A medida que continuamos adoptando estas tecnologías disruptivas, es fundamental comprender y abordar adecuadamente los aspectos de seguridad para minimizar los posibles riesgos. Entre los puntos a tratar podemos destacar:
1. Fundamentos de Blockchain y Smart Contracts 2. Desafíos de Seguridad en Blockchain 3. Seguridad en Smart Contracts 4. Auditorías y Pruebas de Seguridad en smart contracts
In the latest versions of K8s there has been an evolution regarding the definition of security strategies at the level of access policies to the cluster by users and developers. The security contexts (securityContext) allow you to define the configurations at the level of access control and privileges for a pod or container in a simple way using keywords in the configuration files.
To facilitate the implementation of these security strategies throughout the cluster, new strategies have emerged such as the Pod Security Policy (PSP) where the cluster administrator is in charge of defining these policies at the cluster level with the aim that developers can follow these policies.
Other interesting projects include Open Policy Agent (OPA) as the main cloud-native authorization policy agent for creating policies and managing user permissions for access to applications.
The objective of this talk is to present the evolution that has occurred in security strategies and how we could use them together, as well as analyze their behavior in accessing resources. Among the points to be discussed we can highlight:
-Introduction to security strategies in K8s environments
-Pod Security Admission(PSA) vs Open Policy Agent (OPA)
-Combination of different security strategies together
-Access to resources in privileged and non-privileged mode
In the latest versions of K8s there has been an evolution regarding the definition of security strategies at the level of access policies to the cluster by users and developers. The security contexts (securityContext) allow you to define the configurations at the level of access control and privileges for a pod or container in a simple way using keywords in the configuration files.
To facilitate the implementation of these security strategies throughout the cluster, new strategies have emerged such as the Pod Security Policy (PSP) where the cluster administrator is in charge of defining these policies at the cluster level with the aim that developers can follow these policies.
Other interesting projects include Open Policy Agent (OPA) as the main cloud-native authorization policy agent for creating policies and managing user permissions for access to applications.
The objective of this talk is to present the evolution that has occurred in security strategies and how we could use them together, as well as analyze their behavior in accessing resources. Among the points to be discussed we can highlight:
*Introduction to security strategies in K8s environments
*Pod Security Admission(PSA) vs Open Policy Agent (OPA)
*Combination of different security strategies together
*Access to resources in privileged and non-privileged mode
No production system is complete without a way to monitor it. In software, we define observability as the ability to understand how our system is performing. This talk dives into capabilities and tools that are recommended for implementing observability when running K8s in production as the main platform today for deploying and maintaining containers with cloud-native solutions.
We start by introducing the concept of observability in the context of distributed systems such as K8s and the difference with monitoring. We continue by reviewing the observability stack in K8s and the main functionalities. Finally, we will review the tools K8s provides for monitoring and logging, and get metrics from applications and infrastructure.
Between the points to be discussed we can highlight:
-Introducing the concept of observability
-Observability stack in K8s
-Tools and apps for implementing Kubernetes observability
-Integrating Prometheus with OpenMetrics
La computación distribuída es un nuevo modelo de computación que surgió con el objetivo de resolver problemas de computación masiva donde diferentes máquinas trabajan en paralelo formando un clúster de computación.
En los últimos años han surgido diferentes frameworks como Apache Hadoop, Apache Spark y Apache Flink que permiten resolver este tipo de problemas donde tenemos datos masivos desde diferentes fuentes de datos.
Dentro del ecosistema de Python podemos destacar las librerías de Pyspark y Dask de código abierto que permiten la ejecución de tareas de forma paralela y distribuida en Python.
Entre los puntos a tratar podemos destacar:
Introducción a la computación distribuida
Comparando tecnologías de computación distribuida
Frameworks y módulos en Python para computación distribuida
Casos de uso en proyectos Big Data
En los últimos años, las arquitecturas cloud han evolucionado a un modelo serverless que trae como principales ventajas la posibilidad de ejecutar código sin aprovisionar ni administrar servidores. Este tipo de arquitecturas permite ejecutar el código en una infraestructura con alta disponibilidad y escalado automático, así como capacidades de monitorización de forma automática. Sin embargo, estos tipos de arquitecturas introducen un conjunto completamente nuevo de implicaciones de seguridad que deben tenerse en cuenta al crear sus aplicaciones.
El OWASP Serverless Top 10 es una excelente referencia para conocer los posibles riesgos de seguridad y las consecuencias de implementar una arquitectura serverless, así como también cómo mitigarlos.
En esta charla se analizará el estado actual de la seguridad en arquitecturas serverless, los principales riesgos y cómo podríamos mitigarlos de una forma sencilla. Entre los puntos a tratar podemos destacar:
-Introducción a las arquitecturas serverless
-Seguridad en arquitecturas serverless y OWASP Serverless Top 10
-Pentesting sobre aplicaciones serverless
-Mejoras prácticas de seguridad al trabajar en entornos cloud
La adopción de arquitecturas basadas en microservicios ha crecido de manera exponencial en los últimos años. Cuando se trata de obtener la máxima seguridad utilizamos lo que se denomina arquitecturas de “confianza cero” (zero trust architecture). Las arquitecturas de este tipo establecen mecanismos de autenticación y autorización entre nuestros propios microservicios, aumentando de esta manera la seguridad en entornos altamente regulados.
El objetivo de esta charla es dar a conocer los principios básicos para construir aplicaciones utilizando arquitecturas zero trust y algunas herramientas para realizar auditorías de seguridad en entornos cloud. Entre los puntos a tratar podemos destacar:
Introducción a DevSecOps y modelado de amenazas
Modelo de confianza cero(zero trust) en la nube
Mejoras prácticas a nivel de permisos y estrategias de seguridad al trabajar en entornos cloud
Herramientas de análisis orientadas al pentesting en entornos cloud
Python has become the most widely used language for machine learning and data science projects due to its simplicity and versatility.
Furthermore, developers get to put all their effort into solving an Machine Learning or data science problem instead of focusing on the technical aspects of the language.
For this purpose, Python provides access to great libraries and frameworks for AI and machine learning (ML), flexibility and platform independence
In this talk I will try to get a selection of libraries and frameworks that can help us introduce in the Machine Learning world and answer the question that all people is doing, What makes Python the best programming language for machine learning?
In this talk I will show how to save secret keys in Docker containers and K8s in production and best practices for saving and securing distribution of secrets. With Docker and k8s secrets we can manage information related to keys that are needed at runtime but cannot be exposed in the Docker image or source code repository. These could be the main talking points:
1.Challenges of security and secret keys in containers
2.Best practices for saving and securing distribution of secrets in Docker Containers
3.Managing secrets in Kubernetes using volumes and sealed-secrets
4.Other tools for distributing secrets in containers like Hashicorp Vault and KeyWhiz
One of the best practices from a security point of view is to introduce the management of the certificates that we are going to use to support protocols such as SSL / TLS. In this talk we will explain cert-manager and his implementation in K8s as a native Kubernetes certificate management controller that allows us to manage connection certificates and secure communications through SSL/TLS protocols. Later I will explain the main functionalities and advantages that cert-manager provides, for example it allows us to validate that the certificates we are using in different environments are correct. Finally, some use cases are studied in which to use cert-manager and the integration with other services such as Let's Encrypt or HashiCorp Vault.
Python se ha convertido en el lenguaje más usado para desarrollar herramientas dentro del ámbito de la seguridad. Esta charla se centrará en las diferentes formas en que un analista puede aprovechar el lenguaje de programación Python tanto desde el punto de vista defensivo como ofensivo.
Desde el punto de vista defensivo Python es una de las mejores opciones como herramienta de pentesting por la gran cantidad de módulos que nos pueden ayudar a desarrollar nuestras propias herramientas con el objetivo de realizar un análisis de nuestro objetivo.
Desde el punto de vista ofensivo podemos utilizar Python para recolección de información de nuestro objetivo de forma pasiva y activa. El objetivo final es obtener el máximo conocimiento posible en el contexto que estamos auditando. Entre los principales puntos a tratar podemos destacar:
1.Introducción a Python para proyectos de ciberseguridad(5 min)
2.Herramientas de pentesting(10 min)
3.Herramientas Python desde el punto de vista defensivo(10 min)
4.Herramientas Python desde el punto de vista ofensivo(10 min)
Python se ha convertido en el lenguaje más usado para desarrollar herramientas dentro del ámbito de la seguridad. Esta charla se centrará en las diferentes formas en que un analista puede aprovechar el lenguaje de programación Python tanto desde el punto de vista defensivo como ofensivo.
Desde el punto de vista defensivo Python es una de las mejores opciones como herramienta de pentesting por la gran cantidad de módulos que nos pueden ayudar a desarrollar nuestras propias herramientas con el objetivo de realizar un análisis de nuestro objetivo.
Desde el punto de vista ofensivo podemos utilizar Python para recolección de información de nuestro objetivo de forma pasiva y activa. El objetivo final es obtener el máximo conocimiento posible en el contexto que estamos auditando. Entre los principales puntos a tratar podemos destacar:
1.Introducción a Python para proyectos de ciberseguridad(5 min)
2.Herramientas de pentesting(10 min)
3.Herramientas Python desde el punto de vista defensivo(10 min)
4.Herramientas Python desde el punto de vista ofensivo(10 min)
Shodan es una de las plataformas de hacking más utilizadas en todo el mundo que nos brinda un completo motor de búsqueda avanzado desde el que podemos encontrar cualquier dispositivo conectado a la red junto con sus servicios activos, puertos abiertos y posibles vulnerabilidades.
En esta charla mostraremos las principales herramientas que podemos utilizar para maximizar nuestras búsquedas en Shodan, así como desarrollar nuestros propios scripts con python para automatizar las búsquedas.
Entre los puntos a tratar podemos destacar:
-Filtros y búsquedas personalizadas en Shodan
-Detectando vulnerabilidades con Shodan
-Buscar bases de datos abiertas en Shodan
-Shodan desde lineas de comandos con ShodanCLI
La charla trataría sobre cómo usar el stack Elasticsearch, Logstash y Kibana (ELK) para respuestas ante incidentes, monitorización de logs y otras tareas relacionadas con los equipos blue team. Por ejemplo, podríamos analizar los registros basados en autenticación y eventos del sistema operativo.
Entre los puntos a tratar podemos destacar:
-Introducción al estándar ELK y cómo nos puede ayudar para crear nuestro laboratorio de análisis.
-Comentar las diferentes fuentes de datos que podríamos usar (eventos del sistema operativo, capturas de red).
-Indexación y búsqueda de datos en ElasticSearch.
-Recopilación y manipulación de datos con LogStash.
-Creación de dashboards con Kibana.
-Ejemplo de aplicación para alertar sobre eventos basados en la autenticación en el sistema operativo.
The world is advancing towards accelerated deployments using DevOps and cloud native technologies. In architectures based on microservices, container monitoring and management become even more important as we need to scale our application.
In this talk, I will show how to monitor and manage docker containers to manage the status of your applications. We will review how to monitor for security events using open source solutions to build an actionable monitoring system for Docker and Kubernetes.
Through a web interface, tools such as cadvisor, portainer and rancher give us a global overview of the containers you are running as well as facilitate their management.
These could be the main points to discuss:
Challenges in containers and architectures distributed from the point of view of monitoring and administration
Most important metrics that we can use to measure container performance.
Tools for monitoring and management of containers such as cadvisor, sysdig and portainer
Rancher as a platform for the administration of Kubernetes
In this talk I will try explain the memory internals of Python and discover how it handles memory management and object creation.
The idea is explain how objects are created and deleted in Python and how garbage collector(gc) functions to automatically release memory when the object taking the space is no longer in use.
I will review the main mechanims for memory allocation and how the garbage collector works in conjunction with the memory manager for reference counting of the python objects.
Finally, I will comment the best practices for memory managment such as writing efficient code in python scripts.
In this talk I will speak about main tips for integrating Security into DevOps. I will share my knowledge and experience and help people learn to focus more on DevOps Security. In addition to the so-called best practices, the development of efficient, readable, scalable and secure code, requires the right tools for security development.
These could be the main talking points:
-How to integrate security into iteration and pipeline application development with containers.
-How to secure development environments.
-DevOps security best practices
1. José Manuel Ortega Candel
Mobile Backend as a Service(MBaaS)
Except where otherwise noted, this work is licensed under: http://creativecommons.org/licenses/by-nc-sa/3.0/
Leganés
12-13 Febrero 2015
2. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
2
https://speakerdeck.com/jmortega
3. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
3
Persistence in Mobile
iNDEX
Cloud Computing / BaaS
MBaaS features /architecture/ Startups
Push Notifications / GCM / API REST / Storage
Kinvey / Backendless / BackBeam / Parse
Demos on Android
4. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
4
SQLite / Core Data
Persistence in Mobile
5. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
5
Persistence in Mobile
Android iOS
SQLite
android.database.sqlite
Tables and relations
Core Data
Objects
DataModel
Content Providers
/data/data/<Application-Package>
/databases/<database-name> Only
acces with root
DataModel editor in Xcode for
register objects and their
relationships
6. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
6
Persistence in Mobile
Objects vs Tables
Object Relational Mapping
7. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
7
Persistence in Mobile
public class Event extends Entity {
public int id;
public String name;
}
Event e =
Entity.query(Event.class).where("id=1")
.execute();
p.name = “Techfest";
p.save();
8. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
8
Cloud Computing
PaaS(Platform as a Service)
IaaS(Infraestructure as a Service)
9. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
9
Cloud Computing
BaaS(Backend as a Service) /MBaaS
SaaS(Software as a Service)
10. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
10
BaaS
11. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
11
BaaS
MBaaS= Cloud-Mobile Services + Mobile SDKs + Management Console
12. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
12
MBaaS APIs
13. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
13
MBaaS APIs
14. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
14
MBaaS architecture
15. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
15
MBaaS features
API REST for CRUD operations(GET,POST,UPDATE,DELETE,PATCH)
Multi platform SDK
Cloud Storage
Push notifications
User management
Data Browser
Query language
Import/Export data
Analytics / Monetization
16. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
16
MBaaS features
Reduce server side coding
developers can focus on front-end development
often providers offer SDKs that wrap REST API calls
and handle in/out parameters:
both HTML/JS and native (iOS, Android,Windows
Phone)
No server setup, ready to use (HOSTED SERVICE)
Deployed on the cloud, with built-in scalability
17. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
17
Startups
18. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
18
Others
Appcelerator(Titanium)
http://appery.io
http://www.applicasa.com
http://www.apiomat.com
http://www.kumulos.com
Open Source
http://www.baasbox.com
19. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
19
Startups
20. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
20
MBaaS
OBJECT-BASED DATA STORAGE
DATA SYNCHRONIZED
USER ACCOUNTS & AUTHENTICATION
REAL-TIME ANALYTICS
PUSH NOTIFICATIONS
API REST
21. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
21
Storage support
22. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
22
{ "results": [
{
"createdAt": "2015-01-05T14:54:00.650Z",
"eventImage": {
"__type": "File",
"name": "tfss-b84799aa-4366-488d-afe7-1afdb5646dee-t3chfest_slider.jpg",
"url": "http://files.parsetfss.com/5ffebb1f-a86a-4d00-8dcb-6b9e349f4838/tfss-b84799aa-4366-
488d-afe7-1afdb5646dee-t3chfest_slider.jpg" },
"eventName": "techFest",
"eventURL": "https://techfest.uc3m.es/",
"objectId": "HxmPtSWnqa", "updatedAt": "2015-02-12T14:56:00.866Z" }] }
JSON Object
23. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
23
Push Notifications
Var channel= _application.pubSub.Subscribe(“channel
name”);
channel.Send({message});
Push Notification
Service
MBaaS
24. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
24
Push Notifications
Multiplatforms messages
Enable server applications to send information to mobile
apps even when the app isn’t in use
The device displays the information using a “badge,” alert, or pop
up message. A push notification uses the service provided by the
device’s operating system:
iOS - Apple Push Notification service (APNS)
Android - Google Cloud Messaging (GCM)
25. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
25
Google Cloud Messaging(GCM)
26. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
26
Google Cloud Messaging(GCM)
https://console.developers.google.com
27. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
27
Push Notifications
iOS
Apple Push Notification service (APNs) Certificate
Private Key
Android
Google Cloud Messaging API KEY
Sender ID
Google API Console > Authentication && Project
Number
29. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
29
Kinvey Data collection
Kinvey stores data as collections and entities. Entities are JSON documents. Collections belong to
applications. Internally, data is stored in a MongoDB cluster.
30. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
30
Kinvey Data management
NO SQL DataBases
REST API
CLOUD CODE
31. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
31
Kinvey Data Link
32. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
32
Kinvey API REST
33. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
33
Kinvey API REST OPERATIONS
34. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
34
Kinvey API REST OPERATIONS
35. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
35
Kinvey CLOUD CODE
JavaScript / Custom endpoints
36. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
36
Kinvey Users management
37. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
37
Kinvey Import/Export data
38. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
38
Kinvey Push notifications
39. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
39
Kinvey
55. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
55
Security
Authentication && Authorization
Basic Authentication userName and password encoded in
Base 64
authorization
header: Authorization: Basic
bXlVc2VybmFtZTpteVBhc3N3b3Jk
Session Authentication Auth token / Social Networks
Permissions Shared / Private / Read Only / Full
57. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
57
Parse ARCHITECTURE
58. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
58
Parse SERVICES
User Authentication
Push Notification
Data Storage
Rest API
JavaScript SDK
iOS SDK
Android SDK
JavaScript SDK
59. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
59
Parse CROSS-PLATFORM SUPPORT
60. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
60
Connect your app with services
APPLICATION ID
CLIENT KEY
+ Parse.initialize(“APP_ID”,”C_KEY”);
61. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
61
Parse Application Keys + Installations
62. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
62
Parse Objects
Parse stores data internally as flat JSON Documents, called ParseObject, with have the restriction that
keys must be alphanumeric strings. Parse automatically creates ‘classes’ for ParseObjects, grouping objects
with similar properties. Classes and all objects associated to them belong to applications, which can be
defined on the Parse web interface.
ParseObject event = new ParseObject(“Event");
event.put(“eventName", “techfest”);
event.put(“eventURL", “http://techfest.uc3m.es");
event.put(“eventDate", new Date());
63. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
63
Parse Data browser + filter
64. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
64
Parse Data browser
65. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
65
Parse Cloud Code
Write our owns API functions with javascript
66. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
66
Parse with ANDROID
<uses-permission android:name="android.permission.INTERNET" />
<uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
// Enable Local Datastore.
Parse.enableLocalDatastore(this);
Parse.initialize(this, “APPLICATION_ID", “CLIENT_KEY");
ParseObject event = new ParseObject(“Event");
event.put(“eventName", “techfest”);
event.put(“eventURL", “http://techfest.uc3m.es");
event.put(“eventDate", new Date());
event.saveEventually(); //Object saved when user has network connection
event.saveInBackground();
67. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
67
Parse Object
import com.parse.ParseClassName;
import com.parse.ParseObject;
@ParseClassName(“Event")
public class Event extends ParseObject{
public Event(){}
public String getName(){
return getString(“eventName");
}
public void setName(String name){
put(“eventName", name); }
}}
ParseObject.registerSubclass(Event.class);
68. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
68
Parse Object with files
byte[] data = myPhotoObject.toByteArray();
ParseFile eventPhoto = new ParseFile("t3chfest.jpg", data);
eventPhoto.saveInBackground();
ParseObject event = new ParseObject("Event");
event.put("name", "t3chFest");
event.put(”photo”, eventPhoto);
event.saveInBackground();
69. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
69
Parse Object with files
70. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
70
Parse Data Entity type
71. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
71
Query Language
ParseQuery<ParseObject> query = ParseQuery.getQuery(“Event");
query.whereEqualTo(“eventName", “techfest");
query.findInBackground(new FindCallback<ParseObject>() {
public void done(List<ParseObject> eventList, ParseException e) {
if (e == null) {
Log.d(“events", "Retrieved " + eventList.size() + " events");
} else {
Log.d(“events", "Error: " + e.getMessage());
}
}
});
query.setCachePolicy(CachePolicy.CACHE_THEN_NETWORK);
72. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
72
CACHE
query.cachePolicy property
CachePolicy.CACHE_ELSE_NETWORK
The query first tries to load from the cache, but if that fails, it loads results from
the network.If neither cache nor network succeed, there is a PFError.
CachePolicy.CACHE_THEN_NETWORK
The query first loads from the cache, then loads from the network. In this case,
the callback will actually be called twice - first with the cached results, then with
the network results.
Since it returns two results at different times, this cache policy cannot be used
synchronously with findObjects.
73. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
73
JavaScript
var event= Parse.Object.extend ("Event");
var query = new Parse.Query (event);
query.find ({ success: function (results) {
$scope.data.events = results;
},
error: function (error) {
alert ("Error:" + error.code + "" + error.message);
}
});
74. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
74
Parse Push Notifications
Enabling Push Notifications
75. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
75
Parse SDK
76. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
76
Parse Push Notifications
77. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
77
Parse Push Notifications
//Enable to receive push
PushService.setDefaultPushCallback(this,
RespondToPushActivity.class);
ParseInstallation pi = ParseInstallation.getCurrentInstallation();
//Register a channel to test push channels
Context ctx = this.getApplicationContext();
PushService.subscribe(ctx, "ch1", RespondToPushActivity.class);
pi.saveEventually();
78. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
78
API REST
79. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
79
API REST AJAX CALL
var headers = {"X-Parse-Application-Id":"YOUR-APP-ID-HERE", "X-Parse-REST-API-Key":"YOUR-
REST-API-KEY-HERE"};
function getData() {
$.ajax({ "type":"GET", "url":"https://api.parse.com/1/classes/Event",
"dataType":"json", "contentType":"application/json", "headers":headers,
success:function(data, status, xhr) {
var result = "";
for(var i = 0; i < data.results.length; i++) {
result = result +""+ data.results[i].eventName+" / "+ data.results[i].eventURL+"";
}}
});
}
80. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
80
PERMISSIONS / ACL
81. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
81
PARSE ANALYTICS
82. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
82
PARSE IMPORT DATA JSON/CSV
83. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
83
PARSE USER MANAGMENT
//login
ParseUser.logInInBackground(username, password, new LogInCallback() {
public void done(ParseUser user, com.parse.ParseException e) {
}});
//signUp
ParseUser user = new ParseUser();
user.setUsername(username);
user.setPassword(password);
user.setEmail(email); //optional
user.signUpInBackground(new SignUpCallback() {
public void done(com.parse.ParseException e) {
}});
//Check if user is logged
ParseUser currentUser = ParseUser.getCurrentUser();
84. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
84
PARSE USER MANAGMENT
85. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
85
https://github.com/jmortega/parseProjects
86. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
86
Parse T3chfest
87. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
87
Parse T3chfest
88. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
88
Parse Login
89. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
89
PARSE EXAMPLES https://parse.com/tutorials
90. Mobile Backend as a Service(MBaaS)
Leganés
12-13 Febrero 2015
90
REFERENCES http://www.androidbook.com/expertandroid/projects