A JavaOne BOF session on ten things you should know when writing good unit test cases. These ten simple rules will help guide developers to write solid unit tests which will be easy to run, debug and maintain.
JavaOne2013: Build Your Own Runtime Monitoring for the IBM JDK with the Healt...Chris Bailey
In the recently released Health Center version 2.2 of the IBM JDK, a new API was made available that makes it possible to create your own monitoring and profiling tools that uses the Health Center data and recommendations. This session provides an overview of the API, shows you how to use it to create simple alerts based on the occurrence of defined conditions, and explores how it is being used by IBM to integrate the Health Center data into its own products.
Video available from Parleys.com:
https://www.parleys.com/talk/build-your-own-runtime-monitoring-ibm-jdk-health-center-api
Impact2014: Introduction to the IBM Java ToolsChris Bailey
IBM provides a number of free tools to assist in monitoring and diagnosing issues when running any Java application - from Hello World to IBM or third-party, middleware-based applications. This session introduces attendees to those tools, highlights how they have been extended with IBM middleware product knowledge, how they have been integrated into IBMs development tools, and how to use them to investigate and resolve real-world problem scenarios.
JavaOne2013: Secure Engineering Practices for JavaChris Bailey
Developing programs that are inherently immune to attack requires sound software engineering practices. This session looks at the overall software engineering lifecycle and the critical points at which software security is a specific consideration. From the requirements for third-party suppliers to in-house development, your process must offer a level of confidence that the software functions as intended and is free of vulnerabilities. The presentation shows how using threat models, code pattern analysis tooling, targeted reviews, and more enhances Java security.
Native out-of-memory errors happen when a Java application runs out of memory, not in the Java object heap but outside it. The cause may be memory use for native libraries, class loading, multithreading, working data for the Java VM, backing storage for Java objects, or other reasons. No single tool can give you all the answers, and we need to cross-reference information from multiple sources to isolate a problem. Operating system tools, Java dumps, logs, and debuggers all provide useful perspectives, and your challenge is to line them up to see the whole picture. This session works through the tools and data available on the main server platforms to give you a repeatable framework for native out-of-memory error debug.
Administration APIs: REST and JMX for IBM InfoSphere Streams V4.0lisanl
Janet Weber works as a software developer on the Streams Platform development team. Janet's presentation will dig deeper into the new platform enhancements in IBM InfoSphere Streams V4.0, including the administration APIs REST and JMX.
View related presentations and recordings from the Streams V4.0 Developers Conference at:
https://developer.ibm.com/answers/questions/183353/ibm-infosphere-streams-40-developers-conference-on.html?smartspace=streamsdev
JavaOne2013: Build Your Own Runtime Monitoring for the IBM JDK with the Healt...Chris Bailey
In the recently released Health Center version 2.2 of the IBM JDK, a new API was made available that makes it possible to create your own monitoring and profiling tools that uses the Health Center data and recommendations. This session provides an overview of the API, shows you how to use it to create simple alerts based on the occurrence of defined conditions, and explores how it is being used by IBM to integrate the Health Center data into its own products.
Video available from Parleys.com:
https://www.parleys.com/talk/build-your-own-runtime-monitoring-ibm-jdk-health-center-api
Impact2014: Introduction to the IBM Java ToolsChris Bailey
IBM provides a number of free tools to assist in monitoring and diagnosing issues when running any Java application - from Hello World to IBM or third-party, middleware-based applications. This session introduces attendees to those tools, highlights how they have been extended with IBM middleware product knowledge, how they have been integrated into IBMs development tools, and how to use them to investigate and resolve real-world problem scenarios.
JavaOne2013: Secure Engineering Practices for JavaChris Bailey
Developing programs that are inherently immune to attack requires sound software engineering practices. This session looks at the overall software engineering lifecycle and the critical points at which software security is a specific consideration. From the requirements for third-party suppliers to in-house development, your process must offer a level of confidence that the software functions as intended and is free of vulnerabilities. The presentation shows how using threat models, code pattern analysis tooling, targeted reviews, and more enhances Java security.
Native out-of-memory errors happen when a Java application runs out of memory, not in the Java object heap but outside it. The cause may be memory use for native libraries, class loading, multithreading, working data for the Java VM, backing storage for Java objects, or other reasons. No single tool can give you all the answers, and we need to cross-reference information from multiple sources to isolate a problem. Operating system tools, Java dumps, logs, and debuggers all provide useful perspectives, and your challenge is to line them up to see the whole picture. This session works through the tools and data available on the main server platforms to give you a repeatable framework for native out-of-memory error debug.
Administration APIs: REST and JMX for IBM InfoSphere Streams V4.0lisanl
Janet Weber works as a software developer on the Streams Platform development team. Janet's presentation will dig deeper into the new platform enhancements in IBM InfoSphere Streams V4.0, including the administration APIs REST and JMX.
View related presentations and recordings from the Streams V4.0 Developers Conference at:
https://developer.ibm.com/answers/questions/183353/ibm-infosphere-streams-40-developers-conference-on.html?smartspace=streamsdev
Dell-EMC Remote Acess Controller "DRAC" 10 Features For "Power" UsersMark Maclean
Technical deck aimed at showcasing a number of the advanced features & benefits of Dell-EMC's embedded iDRAC (Dell Remote access controller) . The iDRAC 8 is the out-of-band controller solution for Dell-EMC's PowerEdge range of servers & blades.
The IBM Java implementation is now virtualization aware! In modern data centres, highly virtualized systems produce a challenge for traditional Java implementations and applications designed for static systems. The IBM JVM exposes Virtualization and OS related information through a set of MXBeans. This session talks about the newly added APIs and the use cases to better optimize the JVM in the cloud.
This talk presents a number of opportunities to tune the JVM (virtualization info in javacore, JIT idle tuning etc) and also for a way to tune the middleware virtualized environments.
Learn about the Virtualization aware JVM and explore the ways to exploit this information to optimize your application for the cloud.
UKOUG APPS 14: Optimizing Performance for Oracle EPM SystemsAlithya
Oracle's Enterprise Performance Management (EPM) is a cutting edge suite of tools engineered to deliver analytical insights to users at high speeds, but any competitive advantage is often blunted by sub-optimal infrastructure and easily remedied software configuration issues. The result is slow user response times, endless reboots, and lengthy calculation and consolidation times.
Edgewater Ranzal infrastructure consultant Paul Rix presents a compact guide on how to get the best performance from Oracle EPM investments as well as those planning for increased workload in the near future.
Mixing theory and real-world examples, we navigate the key elements of EPM performance tuning from the low hanging fruit of 10-minute fixes to the architectural and infrastructure blockages that commonly prevent EPM systems from reaching their true performance potential.
Optimizing Oracle licensing in VMware environments iQuate
Hosted by:
Jason Keogh – Founder and CTO, iQuate
Will Monin – Alliances Director, VMware
Virtualizing server environments carelessly can lead to significant, unexpected costs in relation to software licenses from vendors such as Oracle, Microsoft and IBM.
However, done correctly, Virtualization can actually significantly reduce software license costs while improving performance, scalability and reliability of enterprise applications.
Unfortunately, many customers are prevented from realizing these benefits because of widespread confusion and uncertainty around the implications of licensing Oracle in VMware environments.
This webinar will be jointly hosted by iQuate and VMware and is focused on Oracle database licensing. It will provide insights as to how best structure virtual environments to reduce costs while ensuring compliance and providing maximum ROI.
Intended Audience:
Professionals working in:
Software Asset Management
IT Asset Management
Procurement
IT Management
IT Operations
Anyone who needs practical guidance on maximizing ROI from implementing Oracle in virtual environments.
Oracle Solaris 11 - Best for Enterprise Applicationsglynnfoster
This presentation details some of the basic features of Oracle Solaris 11 that can be used as building blocks to deploy an enterprise application. Specifically, it uses a simple deployment example to create an IPS package for an application, integrates that application with SMF to provide an initial level of continuous service availability, deployed in an Oracle Solaris Zone using network virtualization to throttle bandwidth. Using this simple deployment example, additional integrated services like Immutable Zones, Delegated Administration, Firewall or Load Balancing, an administrator can build up to a more advanced deployment scenario.
EDB's fault tolerant clustering technology and redundant architecture eliminate single points of failure and protect against system outages to achieve 24/7 availability.
Fantastic Tests - The Crimes of Bad Test DesignWinston Laoh
Presentation given at the February 2019 Gridspace Talks event by Winston Laoh, Software Engineer in Test. The main purpose of the presentation was to inform the audience of the importance of good test design and factors that contribute to bad test design.
End-to-End Automated Testing: Lessons from ZombielandJosiah Renaudin
With the proliferation of mobile devices, browsers, and IoT devices, each with its own eccentricities, performing end-to-end automated testing is starting to feel like navigating a zombie apocalypse. You need to fight off the zombies but lack the right tools. You need a set of rules to live by. You wish you had a buddy who would teach you all those rules because alone, you feel like you’re being eaten alive. On the surface, the rules are simple—Limber Up, Don’t Be a Hero, Travel Light, and Check the Backseat. When applied to automated testing, these rules provide you the tools you need to live a happy life in a world of uncertainty. Matt Barbour shares how you can adapt the rules from the movie Zombieland to make your end-to-end tests highly efficient and provide meaningful business value—all while reducing the amount of overhead needed to maintain them.
Dell-EMC Remote Acess Controller "DRAC" 10 Features For "Power" UsersMark Maclean
Technical deck aimed at showcasing a number of the advanced features & benefits of Dell-EMC's embedded iDRAC (Dell Remote access controller) . The iDRAC 8 is the out-of-band controller solution for Dell-EMC's PowerEdge range of servers & blades.
The IBM Java implementation is now virtualization aware! In modern data centres, highly virtualized systems produce a challenge for traditional Java implementations and applications designed for static systems. The IBM JVM exposes Virtualization and OS related information through a set of MXBeans. This session talks about the newly added APIs and the use cases to better optimize the JVM in the cloud.
This talk presents a number of opportunities to tune the JVM (virtualization info in javacore, JIT idle tuning etc) and also for a way to tune the middleware virtualized environments.
Learn about the Virtualization aware JVM and explore the ways to exploit this information to optimize your application for the cloud.
UKOUG APPS 14: Optimizing Performance for Oracle EPM SystemsAlithya
Oracle's Enterprise Performance Management (EPM) is a cutting edge suite of tools engineered to deliver analytical insights to users at high speeds, but any competitive advantage is often blunted by sub-optimal infrastructure and easily remedied software configuration issues. The result is slow user response times, endless reboots, and lengthy calculation and consolidation times.
Edgewater Ranzal infrastructure consultant Paul Rix presents a compact guide on how to get the best performance from Oracle EPM investments as well as those planning for increased workload in the near future.
Mixing theory and real-world examples, we navigate the key elements of EPM performance tuning from the low hanging fruit of 10-minute fixes to the architectural and infrastructure blockages that commonly prevent EPM systems from reaching their true performance potential.
Optimizing Oracle licensing in VMware environments iQuate
Hosted by:
Jason Keogh – Founder and CTO, iQuate
Will Monin – Alliances Director, VMware
Virtualizing server environments carelessly can lead to significant, unexpected costs in relation to software licenses from vendors such as Oracle, Microsoft and IBM.
However, done correctly, Virtualization can actually significantly reduce software license costs while improving performance, scalability and reliability of enterprise applications.
Unfortunately, many customers are prevented from realizing these benefits because of widespread confusion and uncertainty around the implications of licensing Oracle in VMware environments.
This webinar will be jointly hosted by iQuate and VMware and is focused on Oracle database licensing. It will provide insights as to how best structure virtual environments to reduce costs while ensuring compliance and providing maximum ROI.
Intended Audience:
Professionals working in:
Software Asset Management
IT Asset Management
Procurement
IT Management
IT Operations
Anyone who needs practical guidance on maximizing ROI from implementing Oracle in virtual environments.
Oracle Solaris 11 - Best for Enterprise Applicationsglynnfoster
This presentation details some of the basic features of Oracle Solaris 11 that can be used as building blocks to deploy an enterprise application. Specifically, it uses a simple deployment example to create an IPS package for an application, integrates that application with SMF to provide an initial level of continuous service availability, deployed in an Oracle Solaris Zone using network virtualization to throttle bandwidth. Using this simple deployment example, additional integrated services like Immutable Zones, Delegated Administration, Firewall or Load Balancing, an administrator can build up to a more advanced deployment scenario.
EDB's fault tolerant clustering technology and redundant architecture eliminate single points of failure and protect against system outages to achieve 24/7 availability.
Fantastic Tests - The Crimes of Bad Test DesignWinston Laoh
Presentation given at the February 2019 Gridspace Talks event by Winston Laoh, Software Engineer in Test. The main purpose of the presentation was to inform the audience of the importance of good test design and factors that contribute to bad test design.
End-to-End Automated Testing: Lessons from ZombielandJosiah Renaudin
With the proliferation of mobile devices, browsers, and IoT devices, each with its own eccentricities, performing end-to-end automated testing is starting to feel like navigating a zombie apocalypse. You need to fight off the zombies but lack the right tools. You need a set of rules to live by. You wish you had a buddy who would teach you all those rules because alone, you feel like you’re being eaten alive. On the surface, the rules are simple—Limber Up, Don’t Be a Hero, Travel Light, and Check the Backseat. When applied to automated testing, these rules provide you the tools you need to live a happy life in a world of uncertainty. Matt Barbour shares how you can adapt the rules from the movie Zombieland to make your end-to-end tests highly efficient and provide meaningful business value—all while reducing the amount of overhead needed to maintain them.
Lessons Learned in Test Automation From ZombielandMatt Barbour
This presentation will tell you how to apply the rules for surviving the zombie apocalypse to surviving your own zombie apocalypse - end to end testing on real devices.
https://www.youtube.com/watch?v=9IShc6tfj2E
Solving Flaky Automated Tests Using Machine LearningJames Farrier
Learn different ways of handling flaky tests/unreliable automation. We will go through the different processes that companies like Microsoft, Google and Facebook have used to stop Flaky tests from breaking the build and how you can implement similar techniques and processes.
Your shrinking project deadlines are increasing the need for automated tests—but, simultaneously, reducing the time available for writing them. The system requirements are continually changing. The implementation is changing. You spend more and more time maintaining old tests, leaving less time to write new ones. The tests take longer and longer to run. And when they fail, the problem is as likely to be in the tests as in the system. What’s a developer to do? Dale Emery and George Dinwiddie share hard-won lessons learned from their decades of software development and test automation. Discover the factors that make automated tests maintainable, expressive, informative, fast, reliable, and repeatable. Practice achieving these qualities in hands-on exercises. Apply new techniques and your existing software development expertise in new ways. Take home powerful principles and practices to meet the unique challenges of test automation and to help your project deliver sooner with greater confidence.
Watch the on demand webinar recording - https://opentestingplatform.curiositysoftware.ie/in-sprint-regression-testing-webinar
Visit TestModeller.io to start a free trial and work through our free Test Modeller for Perfecto tutorial.
Achieving in-sprint regression- convert continuous feedback into rigorous automated testing - September 9th, 2020
Delivering quality systems at speed demands rigorous testing before each and every release. Unfortunately, robust and reliable automated regression testing is difficult to achieve in short iterations.
Too often, complex processes force testing far behind development. Teams scramble to update and execute complex test suites, leaving system logic and configurations exposed to costly bugs. Model-based test automation (MBTA) can help. With the new integration between TestModeller.io and Perfecto, you can achieve rigorous test creation, maintenance, and execution at scale.
This webinar will present a practical approach to in-sprint regression testing, delivering accurately-built, fully-tested software in short iterations. You will discover how:
1. Visual modelling provides a single source of truth for fast-changing designs and continuous feedback;
2. Model-based test generation creates regression packs that focus on the logic most likely affected by system changes;
3. One click pushes the risk-based tests to Perfecto for cloud-based execution across a full spread of devices and platforms;
4. Feeding advanced test reports back into the central models closes the feedback loop, enabling continuous, in-sprint testing.
Sound too good to be true? Join James Walker and Julius Mong to discover how you can get started today!
About the Speakers:
James Walker is Director of Technology at Curiosity Software and brings years of experience in successful software delivery. James has collaborated closely with a range of organisations to identify and resolve their QA needs and has invented several success Model-Based Testing technologies.
Julius Mong has over 20 years of experience in software development, consulting, business development, pre and post-sales operations, and QA across the software, consumer product, digital media, and digital marketing industries. He specializes in helping enterprises optimize their QA strategies and make testing become of value rather than a liability by "shifting testing left.”
The Survey Says: Testers Spend Their Time Doing...TechWell
How can testers contribute more to the success of their project and their company? How can they focus on asking the right questions, improving test planning and design, and finding defects so the business releases a quality product―even though there’s always one more fire to extinguish or one more request to fulfill? There aren’t enough hours in the day to do it all. Join Al Wagner as he reveals recent survey results showing where testers actually spend their time and where testers think their time would be better spent. Compare your own experience with what 250 test professionals from around the world reported. You may be surprised how prevalent testing challenges really are. Learn what techniques and technologies are available to help today’s test professionals execute what they were actually hired to do—test software. Return to your organization with an increased understanding of how other testers are dealing with their testing bottlenecks and what activities your peers view as the best use of their valuable time.
DevOps in Practice: When does "Practice" Become "Doing"?Michael Elder
DevOps has emerged as the hot trend in development buzzword-ology. With a few quick paragraphs, it proposes to decimate all of the traditional problems you've encountered during your development experience.
In IBM UrbanCode, we build products to help customers follow good DevOps practices. You may think DevOps is about the release process, but really it's about applying a mix of automation and operational practices earlier in your development life cycle so that rolling out to production becomes easier. DevOps promotes a focus on small-batch changes over large complex updates which are harder to predict and harder to roll back when problems occur. With greater velocity, rolling out smaller changes becomes more common place. Additionally, IBM UrbanCode makes extensive application of cloud technology that intercepts well with practices in DevOps around production-like environments.
In this talk, Michael Elder describes how we practice DevOps internally with a mixture of IBM-built and open source tools. He'll discuss the areas that we do well and the challenges that we have with changing our culture around areas like test automation. On top of that, he'll describe how you can leverage these approaches in your own development process!
Applying principles of chaos engineering to serverless (O'Reilly Software Arc...Yan Cui
Chaos engineering is a discipline that focuses on improving system resilience through experiments that expose the inherent chaos and failure modes in our system, in a controlled fashion, before these failure modes manifest themselves like a wildfire in production and impact our users.
Netflix is undoubtedly the leader in this field, but much of the publicised tools and articles focus on killing EC2 instances, and the efforts in the serverless community has been largely limited to moving those tools into AWS Lambda functions.
But how can we apply the same principles of chaos to a serverless architecture built around AWS Lambda functions?
These serverless architectures have more inherent chaos and complexity than their serverful counterparts, and, we have less control over their runtime behaviour. In short, there are far more unknown unknowns with these systems.
Can we adapt existing practices to expose the inherent chaos in these systems? What are the limitations and new challenges that we need to consider?
Exploring Best Practises in Design of Experiments: A Data Driven Approach to ...JMP software from SAS
Learn about best practises in the
design of experiments and a data-driven approach to DOE that increases robustness, efficiency and effectiveness. This was presented at a JMP seminar in the UK.
One of the worst situations is when you have a database in need of recovery...and find that you don't have a usable backup. One option is to use a Data Unloader (DUL), a costly tool/service that is able to extract data from a down and unusable database. However, the best option is to avoid this situation completely through recovery testing, database refreshes, and proper security. This presentation focuses on common reasons for data recovery (worst practices) and how to avoid them (best practices).
Oracle Forms Performance Testing PushToTest TestMaker JATClever Moe
Java Applet technology powers Oracle Forms and many Web applications. The Open Source Test (OST) community rises to support testers in Java Applet environments with sophisticated and powerful test tools and methodology. Tools like TestMaker with JAT were built for Java Applet environments for functional testing, load and performance testing, and production monitoring.
Load and Performance Testing in Production, featuring Scott BarberNeotys
Test environments these days are rarely built out to the same level as production environments, so they can never achieve the full scale and realism that you’d see in “real life.” Plus, testing environments can easily get stale and out-of-date. Additionally, with the faster pace of modern application development and the rise of DevOps automation, the use of large-scale testing environments has been minimized.
As a result, Testing in Production has grown in popularity. But what’s the right way to load and performance test an application in production to get the results you need without impacting your live users?
Similar to Ten things you should know when writing good unit test cases (20)
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.