Serge Domkowski's favorites

Open Source Bridge 2016

Favorite sessions for this user

* Behind Closed Doors: Managing Passwords in a Dangerous World

A modern application has a lot of passwords and keys floating around. Encryption keys, database passwords, and API credentials; often typed in to text files and forgotten. Fortunately a new wave of tools are emerging to help manage, update, and audit these secrets. Come learn how to avoid being the next TechCrunch headline.
Noah Kantrowitz

* Bots Not Cattle

"Cattle Not Pets" got us to the first generation of microservice infrastructures. Now it's time for a second generation metaphor: "Bots Not Cattle."
Josh Berkus

* HTTP/2 and Asynchronous APIs

HTTP/2 (H2) is coming, and along with it a whole new way of communicating over the web. Connection re-use, prioritization, multiplexing, and server push are just some of the features in H2.
Davey Shafik

* Librarians and Open Source: We Need Code, Too!

Getting people started is easy. Sustaining people through is not. Let's talk about the ways the Open Source community can help people beyond the beginning steps, in the context of public library programming and staff development.
Alex Byrne

* Micro-services provide some benefits, but at what cost?

Several years ago, there was an architectural paradigm shift toward "micro-services" and away from the "monolithic" application stack. A micro-service architecture comes with scalability and replaceability, among others, but is it worth the time and effort to build it? Is it worth debugging API calls gone wrong? If you're thinking about making this move, have already started, or have already deployed to production, this is an ideal venue to see what others are doing with micro-services.
Serge Domkowski

* Monitoring Asynchronous Applications

The lure of asynchronous programming is that it will make your application run faster and your code simpler to reason about. So we have our wonderfully efficient non-blocking app; how do we check that it's delivering the goods performance wise?
Amy Boyle

* Overdoing Microservices: how small is too small?

All the cool kids are doing it, but is it possible to have too much of a good thing? I'll present some thoughts about things you can actually measure to decide if you've gone off the deep end with microservices.
Kevin Scaldeferri

* Supporting diversity with a new approach to software

It’s time for a new approach to software, one that embraces differences (not just tolerates them), and sees diversity as a strength. The industry is primed for change, and there are huge opportunities to do better by valuing emotion, intuition, compassion, purpose, empowerment, sustainability, and social justice. This highly-interactive session includes discussions of current “best practices” and emerging ideas from projects that have focused heavily on diversity, issues and problems in today’s environment, imagining how things could be different, and figuring out concrete steps to make it happen.
Jon Pincus, Tammarrian Rogers

* Tightly coupling your (REST) API docs

Documenting REST APIs isn't easy, and we need practical tips and tricks for keeping docs in sync with design and implementation. This talk explores some different but related ways to accomplish the goals of user-friendly, always up-to-date API docs.
Jennifer Rondeau

* Turning Sensors into Signals: Humanizing IoT with Old Smartphones and the Web

People are already tired of the over-promise of IoT - the slew of marginally useful products, the overly confusing and crowded developer space, and endless examples of how to turn an LED on and off. Take a break, step back from the crowd, and come learn how to solve real human problems with that old phone that's collecting dust on your shelf.
Rabimba Karanjai

* Unraveling the Masculinization of Technology

Have you ever wondered where the perception that technology is a masculine pursuit comes from? Or why we have to explain that, "no really, women are interested in computers too"?
Audrey Eschright

Open Source Bridge 2015

Favorite sessions for this user

* A Pair Programming Workshop

Pair programming is a great way to collaborate on code and to share new ideas and techniques, but the social dynamics can be challenging. In this session, we'll talk about what works and what doesn't, and practice some techniques for better pairing!
Moss Collum, Laura Dean

* A Profile of Performance Profiling With pprof

When our code is slow, performance gains can often difficult to obtain. Our ideas of where to focus our attention are often wrong. pprof has become my go to tool, and it's easy to see why. Together we'll learn how to understand pprof's output to help us zero in on the parts of our code that need the most love.
Lauren Voswinkel

* Bringing Security to Your Open Source Project

With high profile breaches in open source projects, the issue of security has become one of great import to many people. But many projects, especially smaller ones, are intimidated by the idea of a security audit. This talk will discuss ways for smaller projects to experiment, learn, and even have fun improving their security. No PhDs in security required!
Terri Oda

* Email as Distributed Protocol Transport: How Meeting Invites Work and Ideas for the Future

Learn how meeting invites work and some crazy other ideas for distributed protocols built on email.
Christine Spang

* How Do Python Coroutines Work?

Asynchronous I/O frameworks like Node, Twisted, Tornado, and Python 3.4’s new “asyncio” can efficiently scale past tens of thousands of concurrent connections. But async coding with callbacks is painful and error-prone. Programmers increasingly use coroutines in place of callbacks to get the best of both worlds: efficiency plus a natural and robust coding style. I’ll explain how asyncio’s coroutines work. They are built using Python generators, the “yield from” statement, and the Future and Task classes. You will gain a deep understanding of this miraculous new programming idiom in the Python standard library.
A. Jesse Jiryu Davis

* HTTP Can Do That?!

I have explored weird corners of HTTP -- malformed requests that try to trick a site admin into clicking spam links in 404 logs, an API that responds to POST but not GET, and more. In this talk I'll walk you through those (using Python, netcat, and other tools you might have lying around the house).
Sumana Harihareswara

* Trustworthy software in the real world

Software is made of bugs, yet software is controlling a growing part of our physical world. As bugs and security holes become potentially life-threatening, what can we do to make our software worthy of the trust we're placing in it? Take quadcopters, for example. Toy vehicles are not just in specialty hobby shops but even in supermarkets; sports stadiums and the White House are trying to find ways to keep them out; and everyone from agriculture startups to Amazon wants to use them commercially. Quadcopters are becoming safety and security critical systems, but how are we going to make them truly safe and secure? I'll present SMACCMPilot, a BSD-licensed high-assurance quadcopter autopilot, and the new tools and technologies that make it feasible to trust a large piece of software.
Jamey Sharp

* What's in a name? Phonetic Algorithms for Search and Similarity

Search can be as simple as returning a word or part of word based on character similarity. LIKE and wildcard matches can be sufficient, but can only account for character or string matching, and fail on misspelled words or names. Phonetic algorithms can help us find matches for misspellings and typo'd user data.
Mercedes Coyle

* Write It Down: Process Documentation from the Ground Up

The collective knowledge base of an organization can be difficult to crack. Some things have "always been done that way" but no one knows why. This talk will help to expose those undocumented corners of your project, and give you tools for writing process documentation for new contributors using lessons from Not-For-Profit organizations.
Kat Toomajian

Open Source Bridge 2014

Favorite sessions for this user

* A short examination on the intersection of security and usability (or How usable security could save us all)

This talk is geared for people with minimal experience with usability and some experience with security
Morgan Miller

* An Adventure in Data Modeling: The Entity-Attribute-Value Model

A case study on the trials of Emma's performance when implementing the Entity-Attribute-Value data model on their PostgreSQL database systems.
Mark Wong

* Crash Course in Tech Management

Managing is a skill which you can master just as you did programming. This session will introduce you to many of the skills and resources you’ll need to become a successful tech manager (and keep your team from wanting to string you up).
VM Brasseur

* History of Concurrency

With new languages like Dart, Go, and Rust coming with powerful concurrency primitives (and languages like C# & Java adding more concurrency features), it's important to know where these ideas come from and where concurrency handling is headed.
Michael Schurter

* Introduction to Sphinx & Read the Docs

Learn more about how to document your software projects with the most powerful open source documentation tool. You'll learn more about how to think about semantics in documentation, and how to use these tools to make great looking documentation.
Eric Holscher

* Unicode Beyond Just Characters: Localization with the CLDR

Unicode is much more than just characters. The Unicode Consortium defines open standards for collating, parsing, and formatting data in much of the world’s languages. The Common Locale Data Repository (CLDR) is the largest standard repository of locale data along with specifications for its use and is a powerful resource for software localization.
Nova Patch

* When Many Eyes Fail You: Tales from Security Standards and Open Source

It's often said that "given many eyes, all bugs are shallow" and open source proponents love to list this as a reason that open source is more secure than its closed-source relatives. While that makes a nice sound bite, the reality of security with many eyeballs doesn't fit so nicely into a tweet. This talk will explore some of the things that surprised me in going from academic security research to industry security research in open source and open standards.
Terri Oda

* xmonad: the window manager that (practically) reads your mind

Many desktop environments try to be easy to use for the average user, but that's not you. You're at your computer all day writing code; you don't have time to waste _dragging windows_ (ugh!) or watching _animated transitions_ (yuck!). David Brewer will demonstrate how by using xmonad, a tiling window manager, you can bend your desktop to your will and control your windows with telepathy. Kind of.
David Brewer

Favorite proposals for this user

* Having Pure Fun on the Web With Haskell

Practical programming in Haskell: is that an oxymoron? Not at all: in recent years, many programmers have joined together to create a vibrant library ecosystem for the Haskell programming language. In this interactive workshop, you will see the skeleton of a web service implemented in Haskell, then write your own code to implement the missing pieces. Whether you go on to learn more Haskell or just apply new ideas to your work in any language, you'll leave knowing the Haskell is pure fun.
Chemistry 2014-03-06 07:06:50 +0000
Tim Chevalier