25+ Reasons to use OmniFaces in JSF applicationsAnghel Leonard
Â
OmniFaces is an utility library that can help you to improve your JSF development experience. This presentation reveals 25+ real cases in which OmniFaces can make JSF life easier.
What's even better than mocking? API Virtualization. This presentation will show you how.
With API Virtualization, quickly and easily create mocks to validate the APIs you depend on, then pump them up with some serious juice for more powerful application testing. In your own API sandbox, simulate API failure conditions to make sure your application can gracefully handle error responses.
Mastering OmniFaces - A Problem to Solution ApproachAnghel Leonard
Â
OmniFaces is a utility library for JSF and a comprehensive compendium of programming techniques, design patterns and recipes for JSF developers. Mastering OmniFaces is targeted towards JSF page authors/developers that wish to use OmniFaces in their projects and JSF developers interested in going deep into the JSF API ĘşbowelsĘş in order to become real JSF masters.
This presentation is a brief overview of the JSF custom validators provided by OmniFaces (e.g. cross-field validators). Some OmniFaces validators fixes a suite of gaps of the JSF standard validators, while others are totally new.
Selenium is a software testing framework for automating tests of Web applications. Join Frank Cohen for a Workshop to learn the basics of Selenium. A screencast for this presentation is on the PushToTest.com Web site.
25+ Reasons to use OmniFaces in JSF applicationsAnghel Leonard
Â
OmniFaces is an utility library that can help you to improve your JSF development experience. This presentation reveals 25+ real cases in which OmniFaces can make JSF life easier.
What's even better than mocking? API Virtualization. This presentation will show you how.
With API Virtualization, quickly and easily create mocks to validate the APIs you depend on, then pump them up with some serious juice for more powerful application testing. In your own API sandbox, simulate API failure conditions to make sure your application can gracefully handle error responses.
Mastering OmniFaces - A Problem to Solution ApproachAnghel Leonard
Â
OmniFaces is a utility library for JSF and a comprehensive compendium of programming techniques, design patterns and recipes for JSF developers. Mastering OmniFaces is targeted towards JSF page authors/developers that wish to use OmniFaces in their projects and JSF developers interested in going deep into the JSF API ĘşbowelsĘş in order to become real JSF masters.
This presentation is a brief overview of the JSF custom validators provided by OmniFaces (e.g. cross-field validators). Some OmniFaces validators fixes a suite of gaps of the JSF standard validators, while others are totally new.
Selenium is a software testing framework for automating tests of Web applications. Join Frank Cohen for a Workshop to learn the basics of Selenium. A screencast for this presentation is on the PushToTest.com Web site.
ATAGTR2017 Upgrading a mobile tester's weapons with advanced debuggingAgile Testing Alliance
Â
The presentation on Upgrading a mobile tester's weapons with advanced debugging was done during #ATAGTR2017, one of the largest global testing conference. All copyright belongs to the author.
Author and presenter : Abhijeet Vaikar
These are training slides created by me to conduct training and knowledge sharing sessions for beginners in Cognizant Technology Solutions for Selenium Automation.
Test Coverage for Your WP REST API ProjectPantheon
Â
Are you writing full test coverage for your endpoints as you go? If not, you absolutely need to be, for two primary reasons: security and reliability. If you aren’t writing test coverage for your endpoints, sorry Charlie—your endpoints are probably insecure, and probably behave unexpectedly for clients.
This tutorial is everything you need to get started.
A complete boot camp for beginners who want to learn Spring Boot.
In this course, you'll learn how we can create web services and cover all the topics of Spring Boot, Spring Framework, and many others.
If you've some experience in Java and want to be a Software Engineer or Java Developer using Spring, you're on right way.
Just read and practice, in the end of this course you'll have a great knowledge of Spring boot, a backend knowledge.
Course outline:
JPA, Hibernate, Spring, Spring Framework, H2 Database, PostgreSQL, MySQL.
#SpringBoot
#SpringFramwork
#MySQL
#PostgreSQL
#MySQL
#H2
#JPA/Hibernate
#Webservices
Modelling RESTful applications – Why should I not use verbs in REST urlXebia IT Architects
Â
What would go wrong if we use verbs in #REST #URL.
Whether there is some rationale behind it or it just REST dogma. Are there any “#RESTguidelines”?
In this session we will explore how to model our services so that we follow the RESTful way adhering to HTTP specification.
ATAGTR2017 Upgrading a mobile tester's weapons with advanced debuggingAgile Testing Alliance
Â
The presentation on Upgrading a mobile tester's weapons with advanced debugging was done during #ATAGTR2017, one of the largest global testing conference. All copyright belongs to the author.
Author and presenter : Abhijeet Vaikar
These are training slides created by me to conduct training and knowledge sharing sessions for beginners in Cognizant Technology Solutions for Selenium Automation.
Test Coverage for Your WP REST API ProjectPantheon
Â
Are you writing full test coverage for your endpoints as you go? If not, you absolutely need to be, for two primary reasons: security and reliability. If you aren’t writing test coverage for your endpoints, sorry Charlie—your endpoints are probably insecure, and probably behave unexpectedly for clients.
This tutorial is everything you need to get started.
A complete boot camp for beginners who want to learn Spring Boot.
In this course, you'll learn how we can create web services and cover all the topics of Spring Boot, Spring Framework, and many others.
If you've some experience in Java and want to be a Software Engineer or Java Developer using Spring, you're on right way.
Just read and practice, in the end of this course you'll have a great knowledge of Spring boot, a backend knowledge.
Course outline:
JPA, Hibernate, Spring, Spring Framework, H2 Database, PostgreSQL, MySQL.
#SpringBoot
#SpringFramwork
#MySQL
#PostgreSQL
#MySQL
#H2
#JPA/Hibernate
#Webservices
Modelling RESTful applications – Why should I not use verbs in REST urlXebia IT Architects
Â
What would go wrong if we use verbs in #REST #URL.
Whether there is some rationale behind it or it just REST dogma. Are there any “#RESTguidelines”?
In this session we will explore how to model our services so that we follow the RESTful way adhering to HTTP specification.
OAuth Authorization flows in salesforceKishore B T
Â
OAuth Authorization flows in salesforce
1. Creating Connected App and Managing Connected App usage
2. Oauth web server flow (walkthrough with postman)
3. Oauth JWT Bearer token flow (walkthrough with postman)
4. Oauth JWT Bearer token flow (apex code walkthrough to integrate one salesforce org to another using JWT bearer flow)
Hackazon is a free, vulnerable test site that is an online storefront built with the same technologies used in today’s rich client and mobile applications. Hackazon has an AJAX interface, strict workflows and RESTful API’s used by a companion mobile app providing uniquely-effective training and testing ground for IT security professionals. And, it’s full of your favorite vulnerabilities like SQL Injection, cross-site scripting and so on.
ForwardJS 2017 - Fullstack end-to-end Test Automation with node.jsMek Srunyu Stittri
Â
Slide deck for ForwardJS 2017 in San Francisco - March 1st 2017
https://forwardjs.com/schedule#lecture-224
Airware builds hardware, software and cloud for commercial drones. We have transitioned to Node.js for cloud functional test automation in 2015. The purpose of this is to unite Fullstack developers and Automation engineers to speak in the same language which is JavaScript. With a year worth of lessons learnt, we will share the challenges involved with building a full-stack test automation framework with Node.js while using the latest and greatest in JavaScript tools.
A Practical Guide to Automating End-to-End API TestingpCloudy
Â
In recent times we have heard alot about APIs and their applications. It has gained so much popularity that today it has become one of the integral parts of the Software Development process. In this blog post we will learn about API, and how to test the same using automation. API is the abbreviation for Application Programming Interface. It is a set of methods and procedures that developers expose to other programmers to have their applications communicate and interact with other applications. Designing an API is half of the work, and the rest half is about testing the same to provide a truly secure, reliable and scalable connection between platforms.
Now to perform API testing we have a wide variety of tools available in the market, but the most used one is Rest Assured framework. This is quite easy to use and as it has a steep learning curve. Before we will explore the usage of API Automation, we should understand an API and specifically what are the validations we need to perform in end-to-end API Testing.
The API Check provides a flexible way to check the functionality and performance of API endpoints. The shift toward API first development has magnified the necessity to monitor the back-end services that provide your core front-end functionality. Whether you're interested in testing the multi-step API interactions or you want to gain visibility into the performance of your critical web-services, the API Check can help accomplish your goals.
More Enhancements to Grails:
Topics covered:
Grails Plugins
Resources
Restful API
Integration Tests
What’s new in grails 2.0
What’s new in grails 2.1
What’s new in grails 2.2
How to upgrade plugins
This talk introduces Spring's REST stack - Spring MVC, Spring HATEOAS, Spring Data REST, Spring Security OAuth and Spring Social - while refining an API to move higher up the Richardson maturity model
RightScale API: How To Build Your Own IT Vending Machine - RightScale Compute...RightScale
Â
Speaker: Ryan Geyer, Cloud Solutions Engineer, RightScale
Want to implement a simple, yet powerful self-service interface on top of RightScale? This talk is for you. We will demo our work on the IT Vending Machine and cover how to customize it for your needs. You will leave with our code to begin using in your environment.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Â
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
Â
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Â
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
Â
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Â
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
Â
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Â
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Â
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. Background
 Please refer my earlier presentation to get basics,
https://www.slideshare.net/MohammadSabirKhan/spring-rest-request-validation
 Part -1 presentation highlights use of @Valid annotation
 With @Valid annotation, you can validate Java POJOs i.e. specific to Spring REST, it
would be @RequestBody
 If you simply place @Valid & @NotEmpty to a GET request @RequestParam or
@PathVariable, it wouldn’t work i.e. it will have no effect – validator wouldn’t be
invoked
 Directly placing JSR annotations for method parameters was not supported in bean
validation 1.0 ( JSR – 303 ) and support started from bean validation 1.1 ( JSR –
349)
 So you have to make sure that you are using JSR – 349 implementation before using
this feature
3. Why we need it?
 For a REST End Point – Its not guaranteed that client will always send a well formed
request
 REST Entry Point need not to proceed if request is invalid and data sent is improper
 If request is invalid, REST Entry Point need to return an error response automatically and
service developers need not be tweaking service logic for data invalidity
 Validation needs to be segregated system component for maintainable flow and
readable code
 As described in previous slide, you will have to convert method parameters into a POJO
to validate with @Valid, we are trying to avoid it and directly process validation
annotations placed on method signatures for simple arguments like String etc.
 Lots of confusion is out there on Internet because of change of bean validation
standards, types of validations supported and various techniques to invoke validator
4. Getting Started : Coding…Dependency
 First you need to include validation API standard and implementations in your REST application
that supports JSR – 349.
<dependency>
<groupId>javax.validation</groupId>
<artifactId>validation-api</artifactId>
<version>1.1.0.Final</version>
</dependency>
<dependency>
<groupId>org.hibernate</groupId>
<artifactId>hibernate-validator</artifactId>
<version>5.3.4.Final</version>
</dependency>
5. Getting Started : Coding…Dependency…Contd
 Out of those two dependencies, validation-api-1.1.0.Final.jar is a reference to JSR –
349 while hibernate-validator-5.3.4.Final.jar is a JSR-349 implementation
 Hibernate JAR has nothing to do with hibernate ORM implementation, its simply a
bean validation implementation and can be used in non – hibernate environments.
Here we are trying to use for Spring REST service.
 If you are using Spring Boot, these two dependencies will already be there as part of
below dependency and not required to include separately.
<dependency>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-web</artifactId>
</dependency>
6. Coding…Enable Method Validation
 Processing validation annotations as part of method signatures are not
enabled by default.
 You need to tell Spring Framework to process @Email, @NotNull,
@NotEmpty annotations included in method signatures directly without
@Valid annotation
 This is achieved in two steps,
1. Place @Validated -
org.springframework.validation.annotation.Validated at your
controller class, like ,
@RestController
@RequestMapping("/…")
@Validated
7. Coding…Enable Method Validation…Contd
2. Place these two beans in your Spring Configuration i.e. in
@Configuration class available for application
@Bean
public MethodValidationPostProcessor methodValidationPostProcessor() {
MethodValidationPostProcessor mvProcessor = new MethodValidationPostProcessor();
mvProcessor.setValidator(validator());
return mvProcessor;
}
@Bean
public LocalValidatorFactoryBean validator(){
LocalValidatorFactoryBean validator = new LocalValidatorFactoryBean();
validator.setProviderClass(HibernateValidator.class);
validator.afterPropertiesSet();
return validator;
}
8. Coding…Enable Method Validation…Contd
 You have to note that Spring has its own validators and we have to somehow tell
Spring that method level annotation processing is enabled and which validator
factory to use to process those validations ( Its Hibernate implementation in our
case )
 Hibernate validator documentation says that you can invoke their validator via some
AOP kind of mechanism and Spring provides that mechanism , refer JIRA -
https://jira.spring.io/browse/SPR-8199 to know a bit more
 In Absence of this in build mechanism, you will have to invoke validator on your own
as described in - https://github.com/gunnarmorling/methodvalidation-integration
 Anyway, now you are set to validate your @RequestParam & @PathVariable directly
in method signatures
9. Coding…Validate
 Now , you can do below
@RequestMapping(method = RequestMethod.GET, value = "/testValidated" , consumes=MediaType.APPLICATION_JSON_VALUE, produces
=MediaType.APPLICATION_JSON_VALUE )
public ResponseBean<String> testValidated( @Email(message="email RequestParam is not a valid email address") @NotEmpty(message="email
RequestParam is empty") @RequestParam("email") String email ){
ResponseBean<String> response = new ResponseBean<>();
……
return response;
}
Above code tells that for @RequestParam(“email”) – validate if it’s a valid email address and if its not empty String
You can externalize message Strings
No need to place @Valid or @Validated in method signature
You can use other available annotations as per your need
10. Coding…Exception Handler
 In part – 1 of presentation, we saw that @Valid throws – MethodArgumentNotValidException but @Validated throws a different exception –
ConstraintViolationException so we will have to write a handler for this exception too.
@RestControllerAdvice(value=“*.controller") -> this is basically controller package location
public class ApplicationExceptionHandler {
@ExceptionHandler
@ResponseBody
@ResponseStatus(HttpStatus.BAD_REQUEST)
public ResponseBean handle(ConstraintViolationException exception){
 StringBuilder messages = new StringBuilder();
 ResponseBean response = new ResponseBean();
 int count = 1;
 for(ConstraintViolation<?> violation:exception.getConstraintViolations()){
 messages.append(" "+count+"."+violation.getMessage());
 ++count;
 }
 response.setResponse(Constants.FAILURE);
 response.setErrorcode(Constants.ERROR_CODE_BAD_REQUEST);
 response.setMessage(messages.toString());
 return response;
}
}
ResponseBean is my application specific class that I wrote my own , you can have your own.
This handler will automatically be called if validation fails and response returned to your client.