Most common web security problems from OWASP Top 10 in Latvia in recent years and compare with similar statistics from couple of years ago. Presentation will include most common mobile application security problems. For some vulnerabilities there will be demos in test and live systems.
Agris is founder of security consulting and pen-testing company IT Centrs, SIA and works in the the field for more than 10 years.
“Machine Learning in Production + Case Studies” by Dmitrijs Lvovs from Epista...DevClub_lv
Epistatica is a data science spin-off from VIA SMS R&D SERVICES, searching its niche in European markets.
Dmitrijs is head of credit risk with VIA SMS R&D SERVICES, a fintech company, and member of the board at Epistatica, holds a PhD from RAS Institute for Information Transmission Problems and analyzed data for over 12 years.
“How to Succeed with Machine Learning” by Arturs Valujevs from Intrum Global ...DevClub_lv
There is certainly a growing demand for incorporating machine learning solutions into various types of business. Yet, the knowledge base is not always keeping up with hype around this subject. Some reports [source: Global CIO Point of View] tell us that 9 out of 10 CIOs plan to use machine learning solutions to achieve certain goals in their companies. Yet only around 20% actually have something in production and only 5% use machine learning extensivelly. Why? There are quite a few reasons, and that’s what this talk is all about.
Arturs is a data scientist in Intrum Global Technologies, has experience in developing machine learning solutions ranging from scoring to automated self learning systems.
“Controlling of messages flow in Microservices architecture” by Andris Lubans...DevClub_lv
Microservices architecture has grown in popularity in recent years. It has many benefits like scalability, fault tolerance, independent deployability etc.
A common question that comes up is “Should I use orchestration or a reactive approach in my system?”. The talk will be about reactive approach with coordinator.
Andris is lead developer in Intrum Global Technologies, has experience in migrating live system to microservices architecture, .Net and Microsoft stack.
Better Customer Experience with Data Science - Bernard Burg, ComcastSri Ambati
Comcast is the third-largest Internet provider worldwide, managing massive networks which deliver connectivity and streaming content to millions of customers. Such networks face complex maintenance and troubleshooting issues. We use Machine Learning to analyze and model error patterns to continuously assess the health of our network and ensure a smooth experience for every user. This is supported with a Decision Engine, which can be configured to take appropriate remedial actions such as customer notifications and self-healing directives.
We describe the architecture capable of scaling and handling billions of events per day and explain how H20 helps to implement the underlying learning models. We illustrate the superiority of H2O algorithms in all of the following: accuracy, speed and memory footprint with comparisons to other systems such as Spark ML. #h2ony
“Machine Learning in Production + Case Studies” by Dmitrijs Lvovs from Epista...DevClub_lv
Epistatica is a data science spin-off from VIA SMS R&D SERVICES, searching its niche in European markets.
Dmitrijs is head of credit risk with VIA SMS R&D SERVICES, a fintech company, and member of the board at Epistatica, holds a PhD from RAS Institute for Information Transmission Problems and analyzed data for over 12 years.
“How to Succeed with Machine Learning” by Arturs Valujevs from Intrum Global ...DevClub_lv
There is certainly a growing demand for incorporating machine learning solutions into various types of business. Yet, the knowledge base is not always keeping up with hype around this subject. Some reports [source: Global CIO Point of View] tell us that 9 out of 10 CIOs plan to use machine learning solutions to achieve certain goals in their companies. Yet only around 20% actually have something in production and only 5% use machine learning extensivelly. Why? There are quite a few reasons, and that’s what this talk is all about.
Arturs is a data scientist in Intrum Global Technologies, has experience in developing machine learning solutions ranging from scoring to automated self learning systems.
“Controlling of messages flow in Microservices architecture” by Andris Lubans...DevClub_lv
Microservices architecture has grown in popularity in recent years. It has many benefits like scalability, fault tolerance, independent deployability etc.
A common question that comes up is “Should I use orchestration or a reactive approach in my system?”. The talk will be about reactive approach with coordinator.
Andris is lead developer in Intrum Global Technologies, has experience in migrating live system to microservices architecture, .Net and Microsoft stack.
Better Customer Experience with Data Science - Bernard Burg, ComcastSri Ambati
Comcast is the third-largest Internet provider worldwide, managing massive networks which deliver connectivity and streaming content to millions of customers. Such networks face complex maintenance and troubleshooting issues. We use Machine Learning to analyze and model error patterns to continuously assess the health of our network and ensure a smooth experience for every user. This is supported with a Decision Engine, which can be configured to take appropriate remedial actions such as customer notifications and self-healing directives.
We describe the architecture capable of scaling and handling billions of events per day and explain how H20 helps to implement the underlying learning models. We illustrate the superiority of H2O algorithms in all of the following: accuracy, speed and memory footprint with comparisons to other systems such as Spark ML. #h2ony
Nowadays in-stream data analysis takes an important role in modern research and development. Cerrera is a cloud-based data stream processing platform that lets analysts concentrate on solving their research problems but not the administrator’s or developer’s ones. Cerrera provides functionality to build stream processing workflow with pre-defined and user modules via Web interface, to run computations over stream and to export data or to get real time visualization. Cerrera is designed to be integrated with Microsoft Azure services (HDInsight, SQL, ML) and relies on modern cloud technologies.
Introduction to Machine learning and Deep LearningNishan Aryal
Overview of Machine Learning and Deep Learning. Brief introduction to different types of BI Reporting tools like Power BI, SSMS, Cortana, Azure ML, TenserFlow and other tools.
Hadoop World 2011: LeveragIng Hadoop to Transform Raw Data to Rich Features a...Cloudera, Inc.
This presentation focuses on the design and evolution of the LinkedIn recommendations platform. It currently computes more than 100 billion personalized recommendations every week, powering an ever growing assortment of products, including Jobs You May be Interested In, Groups You May Like, News Relevance, and Ad Targeting. We will describe how we leverage Hadoop to transform raw data to rich features using knowledge aggregated from LinkedIn's 100 million member base, how we use Lucene to do real-time recommendations, and how we marshal Lucene on Hadoop to bridge offline analysis with user-facing services.
comparison of Excel add-ins and other solutions for implementing data mining or machine learning solutions on the Microsoft stack - includes coverage of XLMiner, Analysis Services Data Mining and PredixionSoftware
Learn why continual learning is important, and how to use it in your machine learning models to improve accuracy. You can download the full webinar here: https://info.cnvrg.io/continual-learning-webinar
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUlf Mattsson
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
LEARNING OUTCOMES FROM PRESENTATION:
• Current trends in Cyber attacks
• FFIEC Cyber Assessment Toolkit
• NIST Cybersecurity Framework principles
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
Security Architecture Best Practices for SaaS ApplicationsTechcello
Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).
Network infrastructure teams connect. Information security teams lock it down. Their missions are fundamentally opposed, but digital enterprises are increasingly demanding that network operations and security operations teams work together.
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA), and Jon Kies, manager of network management product marketing at Micro Focus--examine how enterprises are aligning NetOps and SecOps.
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
Sesja o doświadczeniach profesjonalnego zespołu SOC (Security Operations Center) w oparciu o przykłady z życia wzięte. Od anatomii ataków do rekomendacji jak można się skutecznie bronić.
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
https://www.brighttalk.com/webcast/14723/234829?utm_source=Compliance+Engineering&utm_medium=brighttalk&utm_campaign=234829 :
With cyber attacks on the rise, securing your data is more imperative than ever. In future, organizations will face severe penalties if their data isn’t robustly secured. This will have a far reaching impact for how businesses deal with security in terms of managing their cyber risk.
Join this presentation to learn the cyber security controls prescribed by regulation, how this impacts compliance, and how cyber risk management helps CISOs understand the degree these controls are in place and where to prioritize their cyber dollars and ensure they are not at risk for fines.
Viewers will learn:
- The latest cybercrime trends and targets
- Trends in board involvement in cybersecurity
- How to effectively manage the full range of enterprise risks
- How to protect against ransomware
- Visibility into third party risk
- Data security metrics
Nowadays in-stream data analysis takes an important role in modern research and development. Cerrera is a cloud-based data stream processing platform that lets analysts concentrate on solving their research problems but not the administrator’s or developer’s ones. Cerrera provides functionality to build stream processing workflow with pre-defined and user modules via Web interface, to run computations over stream and to export data or to get real time visualization. Cerrera is designed to be integrated with Microsoft Azure services (HDInsight, SQL, ML) and relies on modern cloud technologies.
Introduction to Machine learning and Deep LearningNishan Aryal
Overview of Machine Learning and Deep Learning. Brief introduction to different types of BI Reporting tools like Power BI, SSMS, Cortana, Azure ML, TenserFlow and other tools.
Hadoop World 2011: LeveragIng Hadoop to Transform Raw Data to Rich Features a...Cloudera, Inc.
This presentation focuses on the design and evolution of the LinkedIn recommendations platform. It currently computes more than 100 billion personalized recommendations every week, powering an ever growing assortment of products, including Jobs You May be Interested In, Groups You May Like, News Relevance, and Ad Targeting. We will describe how we leverage Hadoop to transform raw data to rich features using knowledge aggregated from LinkedIn's 100 million member base, how we use Lucene to do real-time recommendations, and how we marshal Lucene on Hadoop to bridge offline analysis with user-facing services.
comparison of Excel add-ins and other solutions for implementing data mining or machine learning solutions on the Microsoft stack - includes coverage of XLMiner, Analysis Services Data Mining and PredixionSoftware
Learn why continual learning is important, and how to use it in your machine learning models to improve accuracy. You can download the full webinar here: https://info.cnvrg.io/continual-learning-webinar
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUlf Mattsson
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
LEARNING OUTCOMES FROM PRESENTATION:
• Current trends in Cyber attacks
• FFIEC Cyber Assessment Toolkit
• NIST Cybersecurity Framework principles
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
Security Architecture Best Practices for SaaS ApplicationsTechcello
Gartner has predicted 18-20% growth in SaaS market, and expects it to hit US $22.1 billion by the year 2015. They have also measured that SaaS adoption rate has increased many fold in the last few years (almost 71% of enterprises use SaaS solutions).
Network infrastructure teams connect. Information security teams lock it down. Their missions are fundamentally opposed, but digital enterprises are increasingly demanding that network operations and security operations teams work together.
These slides--based on the webinar featuring Shamus McGillicuddy, senior analyst at leading IT analyst firm Enterprise Management Associates (EMA), and Jon Kies, manager of network management product marketing at Micro Focus--examine how enterprises are aligning NetOps and SecOps.
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
Sesja o doświadczeniach profesjonalnego zespołu SOC (Security Operations Center) w oparciu o przykłady z życia wzięte. Od anatomii ataków do rekomendacji jak można się skutecznie bronić.
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
https://www.brighttalk.com/webcast/14723/234829?utm_source=Compliance+Engineering&utm_medium=brighttalk&utm_campaign=234829 :
With cyber attacks on the rise, securing your data is more imperative than ever. In future, organizations will face severe penalties if their data isn’t robustly secured. This will have a far reaching impact for how businesses deal with security in terms of managing their cyber risk.
Join this presentation to learn the cyber security controls prescribed by regulation, how this impacts compliance, and how cyber risk management helps CISOs understand the degree these controls are in place and where to prioritize their cyber dollars and ensure they are not at risk for fines.
Viewers will learn:
- The latest cybercrime trends and targets
- Trends in board involvement in cybersecurity
- How to effectively manage the full range of enterprise risks
- How to protect against ransomware
- Visibility into third party risk
- Data security metrics
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirementsOlivier DASINI
MySQL Enterprise Transparent Data Encryption (TDE) protects your critical data by enabling data-at-rest encryption in the database. It protects the privacy of your information, prevents data breaches and helps meet regulatory requirements including the Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA) and numerous others.
MySQL Enterprise Audit provides an easy to use, policy-based auditing solution that helps organizations implement stronger security controls and satisfy regulatory compliance.
As more sensitive data is collected, stored and used online, database auditing becomes an essential component of any security strategy. To guard against the misuse of information, popular compliance regulations including HIPAA, Sarbanes-Oxley, and the PCI Data Security Standard require organizations to track access to information.
MySQL Enterprise Firewall guards against cyber security threats by providing real-time protection against database specific attacks. Any application that has user-supplied input, such as login and personal information fields is at risk. Database attacks don't just come from applications. Data breaches can come from many sources including SQL virus attacks or from employee misuse. Successful attacks can quickly steal millions of customer records containing personal information, credit card, financial, healthcare or other valuable data.
MySQL Enterprise Masking and De-identification provides an easy to use, built-in database solution to help organizations protect sensitive data from unauthorized uses by hiding and replacing real values with substitutes.
MySQL Enterprise Edition provides ready to use external authentication modules to easily integrate existing security infrastructures, including Linux Pluggable Authentication Modules (PAM) and Windows Active Directory.
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017Big Data Spain
This talk gives a technical and innovative overview of how companies can face the challenge of protecting the data and services that are in their data-centric platform, focusing on three main aspects: implementing network segmentation, managing AAA and securing data processing.
https://www.bigdataspain.org/2017/talk/big-data-security-facing-the-challenge
Big Data Spain 2017
16th - 17th November Kinépolis Madrid
Learn how ThousandEyes Network Intelligence can help you monitor and manage multi-cloud performance, across Microsoft Azure, Amazon Web Services and Google Cloud
Fine-tuning Large Language Models by Dmitry BalabkaDevClub_lv
focusing on the hands-on process of preparing datasets and fine-tuning models for a specific business task. This session will cover dataset preparation, model fine-tuning, and cloud ML accelerators like TPUs and related libraries. It’s aimed at those seeking hands-on knowledge in applying ML techniques.
"Infrastructure and AWS at Scale: The story of Posti" by Goran Gjorgievski @ ...DevClub_lv
It is a talk regarding how AWS is utilized to manage around 200 services, 4+ million users and 20+ teams in Posti Group. The speaker will demonstrate how Posti is maintaining and controlling the ‘Infrastructure side’ of a variety of different cross-functional teams, with a unified approach. The presentation will focus on the approach, tools and tech with some concrete examples. It should be fairly comprehendible even for non-hands on IT professionals, however aimed at Software engineers, Infra and DevOps engineers and IT leaders.
From 50 to 500 product engineers – data-driven approach to building impactful...DevClub_lv
Erik Kaju from Wise will give a talk “From 50 to 500 product engineers – data-driven approach to building impactful and efficient product teams”.
Product engineering is data-driven. It is best to avoid personal opinions and back actions with data. Sharing data transparently and making it broadly accessible within the whole company helps to scale and build faster. Data-driven practices are useful beyond just product development. Over the years, we have been systematic and methodological in how we scale the company and track its health.
This is a story of Wise growing from a regular-sized with 50 engineers to one with 500. While our headcount has grown tenfold, the speed of our releasing and ability to deliver complex projects has risen significantly. It is crucial for the scale-up to not slow down. And that is only possible with effective and unhampered teams. Join Erik for fresh insights that will inspire you to grow your teams, track their health and experiment with team metrics.
(Language – English)
Erik is Director of Engineering at Wise.
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...DevClub_lv
Dmitry Buzdin from A-Heads Consulting will give a talk “Why is it so complex to accept a payment?”.
He will share technical, legal and organizational details of payment world which make it very challenging. There will be examples of code as well.
(Language – English)
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...DevClub_lv
Jurijs Čudnovskis from “Craftsmans Passion” will give a talk “Do we need DDD?“.
While helping to build and scale multiple IT companies and during tons of interviews I’ve seen a lot of misunderstanding of Domain Driven Design.
I would like to share with you my experience based point of view on why and how DDD can help you and your company to build better, more flexible and scalable software and solve real business needs. The talk will be not so much about technical aspect of DDD, but about core ideas behind with some real world examples. :)
(Language – English)
For more than 10 years Jurijs is helping multiple organizations to build their products and grow their companies. His passion is to find easiest solution for complex business problems and build excelent business oriented IT teams.
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...DevClub_lv
Erwin Staal from 4DotNet will share experience on “Network security with Azure PaaS services“.
He will share some of the things he learned while implementing network security at his current client. We will start with a short introduction to the basics of networking in Azure. He will present to you some best practices and tell you about some of the limitations you need to know before getting started. We will talk about how you for example can lock-down your API or SQL-server. To do that we will use relatively new Azure offerings like Service endpoints, Private endpoints, and VPN connections.
Erwin is a .NET Software Engineer and DevOps Consultant at 4DotNet. He’s helping clients with ASP.NET Core, Docker and Kubernetes and as a DevOps Consultant he helps companies with the implementation of DevOps and Continuous Delivery.
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...DevClub_lv
Jan de Vries from 4DotNet will share experience on “Using Azure Managed Identities for your App Services“.
He will show you what needs to be set up in your application and AAD to get you started. When everything is set up correctly you can manage the access to all of your API’s via Azure Active Directory and even restrict access to specific endpoints if you want.
You’ll leave this session knowing how to set up your services by using the built-in capabilities of Azure and make your complete environment more secure and easy to manage.
Jan is a Cloud Solution Architect at 4DotNet (Netherlands). His main focus is on developing highly performant and scalable solutions using the awesome services provided by the Microsoft Azure platform. Because of his expertise, he has been able to help out multiple customers to bring their on-premise solution to the cloud and guide them towards a better software development ecosystem.
SRE (service reliability engineer) on big DevOps platform running on the clou...DevClub_lv
SRE (service reliability engineer). The talk is to explain the SRE philosophy and the principles of production engineering and operations in clouds.
(Language – English)
Pavlo is ADOP (Accenture DevOps Platform) Service Reliability Team Lead, SRE practitioner. Has more then 18 years of IT experience in Ops and Dev.
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...DevClub_lv
In this talk, we will discuss what is IOT, what is the market and growth of IOT, security in IOT, and factor for the growth of IOT, how the invention of eSIM giving a boost in IOT, and need of cloud and steps for the codification of IOT with Azure.
(Language – English)
Narendra is a Technical Architect at Cognizant, other than coding his hobbies includes Travelling, reading technical books & watching thriller/sci-fi series.
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...DevClub_lv
Maintaining multiple code bases for the same application is often a pain in the neck for mobile developers. In the recent years, different frameworks have appeared in the market that aim to reduce the workload of developers by offering them a write-once-run-everywhere approach. In this session, Wei-Meng will take a quick look at the different frameworks available – Xamarin, React Native, and Flutter. He will focus on using Flutter and see how it makes your life as a mobile developer easier.
(Language – English)
Wei-Meng Lee is a technologist and founder of Developer Learning Solutions (http://www.learn2develop.net).
Building resilient frontend architecture by Monica Lent at FrontCon 2019DevClub_lv
Change is inevitable. So is legacy. And too often, we as developers (who love to solve problems by coding) fall into the trap of believing the only way to fix it is by rewriting everything again and again. But how can we design an application architecture that is more resilient to change in the first place? How can we defend against entropy in a system where people are pushing changes every day? In this talk we’ll define what architecture means for the frontend, dispel some commonly-held myths, and look at specific tools and techniques on a scale from micro to macro that you can use today to keep your app from turning into that infamous ball of mud.
Things that every JavaScript developer should know by Rachel Appel at FrontCo...DevClub_lv
JavaScript can be a passive-aggressive and fickle language that can frustrate you at every turn. It lets you do things like declare variables anywhere, but doesn’t tell you that it will hoist them while you’re not looking. Learn how JavaScript organizes data by using key-based dictionaries and how it handles functions behind the scenes. Additionally, you'll learn how JavaScript uses arrow functions, closures, prototypes and inheritance, equality, and more.
In this session, you'll learn little known facts about JavaScript, as well as frequently experienced JavaScript headaches and mistakes, and ways to avoid them. Learn these key facets of JavaScript and take your knowledge to the next level!
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...DevClub_lv
Front-end developers have grown accustomed to protecting themselves from attackers seeking to exploit vectors such as cross-site scripting and malicious input, but the prevalence of reusable micro-libraries in the Node.js ecosystem makes JavaScript developers particularly susceptible to software supply chain attacks.
In this session Mitch will share his perspective on helping to protect Microsoft and its customers from these supply chain attacks and what it is like being the vendor of an artifact management service which often plays the middleman between target and victim.
Learn how Microsoft tackles the problem of securely taking dependencies on open source software and what problems scanning tools can and can’t solve and thoughts on how we as an industry could start to tackle the problem for 0-day malicious packages.
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019DevClub_lv
When we build the best possible software engineering solution, we face many decisions we must make. Daily. Maybe those decisions taking could be much easier? In this talk I will attack the pain points of decision making in software and how I helped my team to enjoy lighter decision making process.
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...DevClub_lv
V8 is complicated. Things change way too fast and it’s really hard to keep track of what’s the fastest way of doing every specific action.
But not anymore. Join me, a V8 contributor, on a journey through the compilation pipeline of V8 and understand how it all works under the hood. We’ll take the example of a popular JavaScript builtin method and find that what does and does not trigger de-optimization.
By the end of the talk, you will have a fairly decent idea of how builtins are written inside the V8 compilation pipeline, and how to make sure you always take the fast path, no matter what.
Bridging the gap between UX and development - A Storybook by Marko Letic at F...DevClub_lv
The main topic of this talk is a short introduction to Storybook.js, JavaScript library that allows us to create independent and interactive UX components from already existing ones, developed in frameworks such as Angular, React or Vue. Reusing the components, we create an isolated environment that can be shared within the organization and enable a collaboration between designers and developers on a whole new level. Different use-cases will be described using Angular as a framework of choice with practical examples.
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019DevClub_lv
This talk will cover the whole UX development process and many choices that we as a team did, to get where we are now. When you think about frontend, it’s not just a developers who writes Javascript. If you want to make it right, you need UX researchers, UX designers, UI designers, Visual Designers, Technical writers and, of course, UX developers. I would like to talk about each roll in short and how they help and why you should have all of them to achieve best results. After that I want to go into more technical details on why EmberJs (its not so trendy, right?). How we work with ES6 and why we see future in Typescript. I will structure a talk in terms of a “technical challenge – pros/cons – why we’ve chose A and not B”. For example:
We have 16 applications internal and external. Why we have them separate and not a single app.
We had ~8-10 internal packages and we’ve merged them into 2. Why we’ve did that and why benefits out-weighted cons?
Also, from the talk point, I want to start with a real Cybersecurity case and how how it gets solved
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...DevClub_lv
Page load times can influence conversion rates and store profitability a lot. PWA is a magic keyword that can deliver fast page load times and happy customers that buy a lot. PWA was coming to Magento, there were several competing solutions, but we wanted to be the best and stand out. Being the most certified Magento agency in the world Scandiweb wanted to make something that is both compatible with default Magneto, but also easier to use and faster. So this is a story of looking at competitors and finding our niche as well as building on experience gained by creating solutions for the world’s top brands.
The talk will share approaches investigated and selected and look into tips and tricks used to get out most of React, Webpack, Mobx and other cool frontend tools. There is also some GraphQl and aspects of integration with Magento.
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019DevClub_lv
When I wanted to compare which bundler to use in my next small project – Webpack or Rollup, I came across a new kid on the block – Parcel.
At first I was like – OMG! Another one! Why?! And then I was like – Interesting… and you wouldn’t believe what happened next!
Managing State in React Apps with RxJS by James Wright at FrontCon 2019DevClub_lv
Redux is one of the most popular technologies for the management of shared state across entire React applications, which can be complemented by Redux Observable to describe asynchronous side effects with RxJS. This approach, however, adds cognitive load when balancing the varying concepts across these three libraries. What if we could use RxJS exclusively for managing state in our React apps? This talk will demonstrate this possibility and the benefits it provides.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.