Slides from my Lightning Talk at WordCamp US in Philadelphia on Dec 4th 2015. Five must-have tools (and plenty of REAL TALK) for delivering high performance WordPress websites.
Presentation from the Elasticsearch Denver Meetup.
Discusses scaling of Elasticsearch for Related Posts across WordPress.com and some of the big changes that were needed in order to scale for 23 million queries a day across 800 million documents.
Presentation from the Elasticsearch Denver Meetup.
Discusses scaling of Elasticsearch for Related Posts across WordPress.com and some of the big changes that were needed in order to scale for 23 million queries a day across 800 million documents.
Building Beautiful REST APIs with ASP.NET CoreStormpath
Join Stormpath .NET Developer Evangelist, Nate Barbettini, to learn best practices for designing your REST API in ASP.NET Core. Nate will explain how to build HATEOS-compliant JSON APIs while supporting security best practices and even improving performance and scale.
Topics Covered:
What is REST and HATEOS?
How to think about RESTful APIs
How to model hypermedia in C#
Building JSON APIs in ASP.NET Core
Many gif images are broken. Please go to this link :)
https://docs.google.com/presentation/d/1geMkdEC43ge_kS_GDHHIljiJL-E4CSURCn-23eqrXTQ/edit?usp=sharing
WordPress is my favorite computer asset, but it's very vulnerable to attack from the bad clowns ;-) This presentation from WordCamp Atlanta 2012 is my system of handling WordPress security without getting too geeky.
This talk discusses the principles of RESTful design and what it means to be HATEOAS. It concludes by demonstrating how to implement a simple RESTful API on top of ASP.NET Core.
@Indeedeng: RAD - How We Replicate Terabytes of Data Around the World Every Dayindeedeng
Link to video: https://youtu.be/lDXdf5q8Yw8
At Indeed, we use massive amounts of data to build our products and services. At first, we relied on rsync to distribute these data to our servers. This rsync system lasted for ten years before we started to encounter scaling challenges. So we built a new system on top of BitTorrent to improve latency, reliability, and throughput. Today, terabytes of data flow around the world every day between our servers. In this talk, we will describe what we needed, what we created, and the lessons we learned building a system at this scale.
Scaling Slack - The Good, the Unexpected, and the Road AheadC4Media
Video and slides synchronized, mp3 and slide download available at URL https://bit.ly/2BJ8u7F.
Mike Demmer talks about the major changes that Slack has made to the service architecture to meet the needs for larger and larger enterprise customers. Demmer presents 3 of these changes: decomposition of the real-time message service, client-side lazy loading via edge caching, and scaling the primary data storage tier with fine-grained horizontal sharding using Vitess. Filmed at qconsf.com.
Mike Demmer is a member of Slack's Infrastructure Engineering team, where he works on hard problems of scalability and reliability and leads the development of Slack's next generation database architecture. Previously, he was co-founder and CTO of Jut - a startup applying a new dataflow language to observability for developers and operations engineers.
Keynote given at the European ExpressionEngine & CodeIgniter conference (http://eeci2009.com).
You can see a video of the keynote on Vimeo:
http://www.vimeo.com/7260725
REST: The Most Misunderstood Software Architecture EverMartín Soto
The REST architectural style must be the most misunderstood one ever: Many systems on the Internet proudly call themselves REST, but very few of them really are, at least if we accept what REST's creator Roy Fielding has to tell us. In reality, REST is an abstraction of the World Wide Web's architecture, and systems built according to REST are bound to share many of the Web's advantages, and some of its disadvantages.
In this presentation, I'll share with you my understanding of REST, based on my experience building a large REST-style system over the last few years. We'll go through the set of characteristics that make a system RESTful, look at a few examples of partial and full REST systems, and consider the advantages and disadvantages of building systems according to REST.
Evolving toward devops through transaction centric monitoringPeter Holditch
I gave this presentation at a London FITE club meeting on March 5th 2013
http://eventful.com/events/fite-club-peter-holditch-appdynamics-evolving-toward-devop-/E0-001-054955463-8?utm_source=apis&utm_medium=apim&utm_campaign=apic
WordPress Speed & Performance from Pagely's CTOLizzie Kardon
We've got 10 years experience in managed WordPress hosting and here our CTO brings you his engineering knowledge on optimizing WordPress and when to NOT compromise.
Building Beautiful REST APIs with ASP.NET CoreStormpath
Join Stormpath .NET Developer Evangelist, Nate Barbettini, to learn best practices for designing your REST API in ASP.NET Core. Nate will explain how to build HATEOS-compliant JSON APIs while supporting security best practices and even improving performance and scale.
Topics Covered:
What is REST and HATEOS?
How to think about RESTful APIs
How to model hypermedia in C#
Building JSON APIs in ASP.NET Core
Many gif images are broken. Please go to this link :)
https://docs.google.com/presentation/d/1geMkdEC43ge_kS_GDHHIljiJL-E4CSURCn-23eqrXTQ/edit?usp=sharing
WordPress is my favorite computer asset, but it's very vulnerable to attack from the bad clowns ;-) This presentation from WordCamp Atlanta 2012 is my system of handling WordPress security without getting too geeky.
This talk discusses the principles of RESTful design and what it means to be HATEOAS. It concludes by demonstrating how to implement a simple RESTful API on top of ASP.NET Core.
@Indeedeng: RAD - How We Replicate Terabytes of Data Around the World Every Dayindeedeng
Link to video: https://youtu.be/lDXdf5q8Yw8
At Indeed, we use massive amounts of data to build our products and services. At first, we relied on rsync to distribute these data to our servers. This rsync system lasted for ten years before we started to encounter scaling challenges. So we built a new system on top of BitTorrent to improve latency, reliability, and throughput. Today, terabytes of data flow around the world every day between our servers. In this talk, we will describe what we needed, what we created, and the lessons we learned building a system at this scale.
Scaling Slack - The Good, the Unexpected, and the Road AheadC4Media
Video and slides synchronized, mp3 and slide download available at URL https://bit.ly/2BJ8u7F.
Mike Demmer talks about the major changes that Slack has made to the service architecture to meet the needs for larger and larger enterprise customers. Demmer presents 3 of these changes: decomposition of the real-time message service, client-side lazy loading via edge caching, and scaling the primary data storage tier with fine-grained horizontal sharding using Vitess. Filmed at qconsf.com.
Mike Demmer is a member of Slack's Infrastructure Engineering team, where he works on hard problems of scalability and reliability and leads the development of Slack's next generation database architecture. Previously, he was co-founder and CTO of Jut - a startup applying a new dataflow language to observability for developers and operations engineers.
Keynote given at the European ExpressionEngine & CodeIgniter conference (http://eeci2009.com).
You can see a video of the keynote on Vimeo:
http://www.vimeo.com/7260725
REST: The Most Misunderstood Software Architecture EverMartín Soto
The REST architectural style must be the most misunderstood one ever: Many systems on the Internet proudly call themselves REST, but very few of them really are, at least if we accept what REST's creator Roy Fielding has to tell us. In reality, REST is an abstraction of the World Wide Web's architecture, and systems built according to REST are bound to share many of the Web's advantages, and some of its disadvantages.
In this presentation, I'll share with you my understanding of REST, based on my experience building a large REST-style system over the last few years. We'll go through the set of characteristics that make a system RESTful, look at a few examples of partial and full REST systems, and consider the advantages and disadvantages of building systems according to REST.
Evolving toward devops through transaction centric monitoringPeter Holditch
I gave this presentation at a London FITE club meeting on March 5th 2013
http://eventful.com/events/fite-club-peter-holditch-appdynamics-evolving-toward-devop-/E0-001-054955463-8?utm_source=apis&utm_medium=apim&utm_campaign=apic
WordPress Speed & Performance from Pagely's CTOLizzie Kardon
We've got 10 years experience in managed WordPress hosting and here our CTO brings you his engineering knowledge on optimizing WordPress and when to NOT compromise.
This is the deck that I used in my European Silverlight Tour in Spain, Switzerland, Denmark, Sweden, Bengium, Netherlands and Ireland. It\'s about architecting Rich Internet Applications with Silverlight 2.0.
Free The Enterprise With Ruby & Master Your Own DomainKen Collins
On the heals of Luis Lavena's RailsConf talk "Infiltrating Ruby Onto The Enterprise Death Star Using Guerilla Tactics" comes a local and frank talk about the current state of Open Source Software (OSS) participation from Windows developers. Learn what OSS is, what motivates its contributors, and how OSS can make you a stronger developer. Be prepared to fall in love with writing software again!
We will start off with a 101 introduction to both the Ruby programming language and the Ruby on Rails web application framework. You will learn about ActiveRecord, a powerful ORM that maps rich objects to your databases, and the latest components to use it with SQL Server. As a Rails core contributor and author of the SQL Server stack, I will give you a modern insight into both that will allow you to leverage your legacy data with Ruby.
Lastly, I will review the bleeding edge tools being actively created for Windows developers to ease the transition to Ruby, Rails and OSS from a POSIX driven world. Many things have changed. It is time to learn and perform some occupational maintenance.
Lessons from Highly Scalable Architectures at Social Networking SitesPatrick Senti
What are the techniques and technolgies used by popular social networking sites such as Facebook, Twitter, Tumblr, Pinterest or Instagram? How do they architect their systems to scale to multiples of 100 million of visits per day?
Drupalcon Baltimore Cornell Case Study: Drupal as a centrally-brokered web pl...Josh Koenig
Drupal has enjoyed widespread user-driven adoption in the education space, but what does it take to go from grassroots traction to a sustainable/standard option campus-wide? The central IT web team at Cornell has gone through the entire journey, starting with having to deal with Drupal as one of many technologies popping up organically all the way to promoting Drupal as a centrally-brokered platform for web development at the University.
Video here: https://events.drupal.org/baltimore2017/sessions/cornell-university-case-study-drupal-centrally-brokered-platform-web
Drupal Performance Census - BADCamp 2016Josh Koenig
"I've seen things you wouldn't believe," but every wise developer knows there's no shame in the performance game. The only way to learn is by doing.
This year we implemented New Relic's Pro-level APM service across thousands of websites. With access to the details of their performance at scale we can learn truths with statistical significance. Here are our early findings.
This is available on video here: https://2016.badcamp.net/session/drupal-performance-census-lessons-over-2500-sites
WordCamp LAX 2015 - Decoupled WordPress with the WP-APIJosh Koenig
Slides for my first ever WordCamp presentation - talking about how Decoupled architectures can help power exciting new use-cases. With the WP-API JSON REST interface ready for use, now is the time to start learning to speak HTTP!
If code is poetry, workflow is a dance. Pantheon facilitates best-practices for website development, using a combination of Continuous Integration and Git Branching. Read our documentation here:
https://pantheon.io/docs/articles/sites/code/using-the-pantheon-workflow/
https://pantheon.io/docs/articles/sites/multidev/
Continuous Integration - Taking "the suck" out of the project lifecycleJosh Koenig
Projects sometimes get bogged down and feel like they'll never finish. Learn how to escape "the suck" with Continuous Integration, using GitHub, TravisCI, and Behat.
Open Source is on the way to dominating the web at all levels, but the ability to get a "best of both worlds" solution with CMSs like WordPress delivered as vertically targeted SaaS (Software as a Service) solutions will be a turbocharger.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.