際際滷shows by User: DerrickIsaacson / http://www.slideshare.net/images/logo.gif 際際滷shows by User: DerrickIsaacson / Wed, 26 Apr 2017 23:59:01 GMT 際際滷Share feed for 際際滷shows by User: DerrickIsaacson UJUG Craftsmanship Roundup April 2017 /slideshow/ujug-craftsmanship-roundup-april-2017/75448396 ujugcraftsmanshiproundup-170426235901
Utah Java User Group presentation on Software Craftsmanship tips and tricks]]>

Utah Java User Group presentation on Software Craftsmanship tips and tricks]]>
Wed, 26 Apr 2017 23:59:01 GMT /slideshow/ujug-craftsmanship-roundup-april-2017/75448396 DerrickIsaacson@slideshare.net(DerrickIsaacson) UJUG Craftsmanship Roundup April 2017 DerrickIsaacson Utah Java User Group presentation on Software Craftsmanship tips and tricks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ujugcraftsmanshiproundup-170426235901-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Utah Java User Group presentation on Software Craftsmanship tips and tricks
UJUG Craftsmanship Roundup April 2017 from Derrick Isaacson
]]>
163 2 https://cdn.slidesharecdn.com/ss_thumbnails/ujugcraftsmanshiproundup-170426235901-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cargo Cult Security UJUG Sep2015 /slideshow/cargo-cult-security-ujug-sep2015/53133964 cargocultsecurityujugsep201516x9-150924004922-lva1-app6891
Common web app cryptography anti-patterns with examples in Java.]]>

Common web app cryptography anti-patterns with examples in Java.]]>
Thu, 24 Sep 2015 00:49:22 GMT /slideshow/cargo-cult-security-ujug-sep2015/53133964 DerrickIsaacson@slideshare.net(DerrickIsaacson) Cargo Cult Security UJUG Sep2015 DerrickIsaacson Common web app cryptography anti-patterns with examples in Java. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cargocultsecurityujugsep201516x9-150924004922-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Common web app cryptography anti-patterns with examples in Java.
Cargo Cult Security UJUG Sep2015 from Derrick Isaacson
]]>
473 5 https://cdn.slidesharecdn.com/ss_thumbnails/cargocultsecurityujugsep201516x9-150924004922-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Prisoner's Dilemma and Service-oriented Architectures /slideshow/prisoner-47921437/47921437 prisonersdilemmaandsoa-150508174818-lva1-app6892
Moving to a service-oriented architecture solves problems like fate sharing, coupling, and scaling. It also brings the complexity of a partially up/partially down system, with nodes regularly getting sick or otherwise partitioned. Learn what the Prisoners Dilemma teaches us about building a partition tolerant system. Hear how the CAP theorem (consistency, availability, and partition tolerance) helps the architect make intelligent trade-offs. See real examples from Google, Amazon, and others of building highly available distributed systems.]]>

Moving to a service-oriented architecture solves problems like fate sharing, coupling, and scaling. It also brings the complexity of a partially up/partially down system, with nodes regularly getting sick or otherwise partitioned. Learn what the Prisoners Dilemma teaches us about building a partition tolerant system. Hear how the CAP theorem (consistency, availability, and partition tolerance) helps the architect make intelligent trade-offs. See real examples from Google, Amazon, and others of building highly available distributed systems.]]>
Fri, 08 May 2015 17:48:17 GMT /slideshow/prisoner-47921437/47921437 DerrickIsaacson@slideshare.net(DerrickIsaacson) Prisoner's Dilemma and Service-oriented Architectures DerrickIsaacson Moving to a service-oriented architecture solves problems like fate sharing, coupling, and scaling. It also brings the complexity of a partially up/partially down system, with nodes regularly getting sick or otherwise partitioned. Learn what the Prisoners Dilemma teaches us about building a partition tolerant system. Hear how the CAP theorem (consistency, availability, and partition tolerance) helps the architect make intelligent trade-offs. See real examples from Google, Amazon, and others of building highly available distributed systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/prisonersdilemmaandsoa-150508174818-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Moving to a service-oriented architecture solves problems like fate sharing, coupling, and scaling. It also brings the complexity of a partially up/partially down system, with nodes regularly getting sick or otherwise partitioned. Learn what the Prisoners Dilemma teaches us about building a partition tolerant system. Hear how the CAP theorem (consistency, availability, and partition tolerance) helps the architect make intelligent trade-offs. See real examples from Google, Amazon, and others of building highly available distributed systems.
Prisoner's Dilemma and Service-oriented Architectures from Derrick Isaacson
]]>
573 2 https://cdn.slidesharecdn.com/ss_thumbnails/prisonersdilemmaandsoa-150508174818-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Rest in a Nutshell 2014_05_27 /slideshow/rest-in-a-nutshell-20140527/35222250 restinanutshell-140528111641-phpapp01
See some quick patterns and anti-patterns for RESTful web services.]]>

See some quick patterns and anti-patterns for RESTful web services.]]>
Wed, 28 May 2014 11:16:41 GMT /slideshow/rest-in-a-nutshell-20140527/35222250 DerrickIsaacson@slideshare.net(DerrickIsaacson) Rest in a Nutshell 2014_05_27 DerrickIsaacson See some quick patterns and anti-patterns for RESTful web services. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/restinanutshell-140528111641-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> See some quick patterns and anti-patterns for RESTful web services.
Rest in a Nutshell 2014_05_27 from Derrick Isaacson
]]>
720 2 https://cdn.slidesharecdn.com/ss_thumbnails/restinanutshell-140528111641-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cargo Cult Security at OpenWest /slideshow/cargo-cult-security-programming-at-openwest/34497802 cargocultsecurityopenwestmay2014-140509171629-phpapp02
See common anti-patterns for securing web applications and how to correct them. Learn how to differentiate between authentication, authorization, secrecy, integrity, non-repudiation, and other security goals. Examples include how: * a theoretical "secret" banking request is corrupted to pad an attacker's bank account, * an insecure "session" authentication token is attacked, and * a "random" XSRF value gives a false sense of security. Correct principles and patterns are analyzed and compared with common incorrect ones. Presented at OpenWest 2014]]>

See common anti-patterns for securing web applications and how to correct them. Learn how to differentiate between authentication, authorization, secrecy, integrity, non-repudiation, and other security goals. Examples include how: * a theoretical "secret" banking request is corrupted to pad an attacker's bank account, * an insecure "session" authentication token is attacked, and * a "random" XSRF value gives a false sense of security. Correct principles and patterns are analyzed and compared with common incorrect ones. Presented at OpenWest 2014]]>
Fri, 09 May 2014 17:16:28 GMT /slideshow/cargo-cult-security-programming-at-openwest/34497802 DerrickIsaacson@slideshare.net(DerrickIsaacson) Cargo Cult Security at OpenWest DerrickIsaacson See common anti-patterns for securing web applications and how to correct them. Learn how to differentiate between authentication, authorization, secrecy, integrity, non-repudiation, and other security goals. Examples include how: * a theoretical "secret" banking request is corrupted to pad an attacker's bank account, * an insecure "session" authentication token is attacked, and * a "random" XSRF value gives a false sense of security. Correct principles and patterns are analyzed and compared with common incorrect ones. Presented at OpenWest 2014 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cargocultsecurityopenwestmay2014-140509171629-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> See common anti-patterns for securing web applications and how to correct them. Learn how to differentiate between authentication, authorization, secrecy, integrity, non-repudiation, and other security goals. Examples include how: * a theoretical &quot;secret&quot; banking request is corrupted to pad an attacker&#39;s bank account, * an insecure &quot;session&quot; authentication token is attacked, and * a &quot;random&quot; XSRF value gives a false sense of security. Correct principles and patterns are analyzed and compared with common incorrect ones. Presented at OpenWest 2014
Cargo Cult Security at OpenWest from Derrick Isaacson
]]>
2486 2 https://cdn.slidesharecdn.com/ss_thumbnails/cargocultsecurityopenwestmay2014-140509171629-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Effective SOA /slideshow/effective-soa/33665132 effectivesoa-140417184155-phpapp01
It has been observed that "A distributed system is at best a necessary evil, evil because of the extra complexity." Multiple nodes computing on inconsistent state with regular communication failures present entirely different challenges than those computer science students face in the classroom writing DFS algorithms. The past 30 years have seen some interesting theories and architectures to deal with these complexities in what we now call "cloud computing". Some researchers worked on "distributed memory" and others built "remote procedure calls". More commercially successful architectures of late have popularized ideas like the CAP theorem, distributed caches, and REST. Using examples from companies like Amazon and Google this presentation walks through some practical tips to evolve your service-oriented architecture. Google's Chubby service demonstrates how you can take advantage of CAP's "best effort availability" options and Amazon's "best effort consistency" services show the other end of the spectrum. Practical lessons learned from Lucidchart's forays into SOA share insight through quantitative analyses on how to make your system highly available. ]]>

It has been observed that "A distributed system is at best a necessary evil, evil because of the extra complexity." Multiple nodes computing on inconsistent state with regular communication failures present entirely different challenges than those computer science students face in the classroom writing DFS algorithms. The past 30 years have seen some interesting theories and architectures to deal with these complexities in what we now call "cloud computing". Some researchers worked on "distributed memory" and others built "remote procedure calls". More commercially successful architectures of late have popularized ideas like the CAP theorem, distributed caches, and REST. Using examples from companies like Amazon and Google this presentation walks through some practical tips to evolve your service-oriented architecture. Google's Chubby service demonstrates how you can take advantage of CAP's "best effort availability" options and Amazon's "best effort consistency" services show the other end of the spectrum. Practical lessons learned from Lucidchart's forays into SOA share insight through quantitative analyses on how to make your system highly available. ]]>
Thu, 17 Apr 2014 18:41:55 GMT /slideshow/effective-soa/33665132 DerrickIsaacson@slideshare.net(DerrickIsaacson) Effective SOA DerrickIsaacson It has been observed that "A distributed system is at best a necessary evil, evil because of the extra complexity." Multiple nodes computing on inconsistent state with regular communication failures present entirely different challenges than those computer science students face in the classroom writing DFS algorithms. The past 30 years have seen some interesting theories and architectures to deal with these complexities in what we now call "cloud computing". Some researchers worked on "distributed memory" and others built "remote procedure calls". More commercially successful architectures of late have popularized ideas like the CAP theorem, distributed caches, and REST. Using examples from companies like Amazon and Google this presentation walks through some practical tips to evolve your service-oriented architecture. Google's Chubby service demonstrates how you can take advantage of CAP's "best effort availability" options and Amazon's "best effort consistency" services show the other end of the spectrum. Practical lessons learned from Lucidchart's forays into SOA share insight through quantitative analyses on how to make your system highly available. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/effectivesoa-140417184155-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It has been observed that &quot;A distributed system is at best a necessary evil, evil because of the extra complexity.&quot; Multiple nodes computing on inconsistent state with regular communication failures present entirely different challenges than those computer science students face in the classroom writing DFS algorithms. The past 30 years have seen some interesting theories and architectures to deal with these complexities in what we now call &quot;cloud computing&quot;. Some researchers worked on &quot;distributed memory&quot; and others built &quot;remote procedure calls&quot;. More commercially successful architectures of late have popularized ideas like the CAP theorem, distributed caches, and REST. Using examples from companies like Amazon and Google this presentation walks through some practical tips to evolve your service-oriented architecture. Google&#39;s Chubby service demonstrates how you can take advantage of CAP&#39;s &quot;best effort availability&quot; options and Amazon&#39;s &quot;best effort consistency&quot; services show the other end of the spectrum. Practical lessons learned from Lucidchart&#39;s forays into SOA share insight through quantitative analyses on how to make your system highly available.
Effective SOA from Derrick Isaacson
]]>
980 3 https://cdn.slidesharecdn.com/ss_thumbnails/effectivesoa-140417184155-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cargo Cult Security 2014_01_18 /slideshow/cargo-cult-security-20140118/30166326 cargocultsecurity20140118-140118141422-phpapp01
See common anti-patterns for securing web applications and how to correct them. Learn how to differentiate between authentication, authorization, secrecy, integrity, non-repudiation, and other security goals. Examples include how: * a theoretical "secret" banking request is corrupted to pad an attacker's bank account, * an insecure "session" authentication token is attacked, and * a "random" XSRF value gives a false sense of security. Correct principles and patterns are analyzed and compared with common incorrect ones.]]>

See common anti-patterns for securing web applications and how to correct them. Learn how to differentiate between authentication, authorization, secrecy, integrity, non-repudiation, and other security goals. Examples include how: * a theoretical "secret" banking request is corrupted to pad an attacker's bank account, * an insecure "session" authentication token is attacked, and * a "random" XSRF value gives a false sense of security. Correct principles and patterns are analyzed and compared with common incorrect ones.]]>
Sat, 18 Jan 2014 14:14:22 GMT /slideshow/cargo-cult-security-20140118/30166326 DerrickIsaacson@slideshare.net(DerrickIsaacson) Cargo Cult Security 2014_01_18 DerrickIsaacson See common anti-patterns for securing web applications and how to correct them. Learn how to differentiate between authentication, authorization, secrecy, integrity, non-repudiation, and other security goals. Examples include how: * a theoretical "secret" banking request is corrupted to pad an attacker's bank account, * an insecure "session" authentication token is attacked, and * a "random" XSRF value gives a false sense of security. Correct principles and patterns are analyzed and compared with common incorrect ones. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cargocultsecurity20140118-140118141422-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> See common anti-patterns for securing web applications and how to correct them. Learn how to differentiate between authentication, authorization, secrecy, integrity, non-repudiation, and other security goals. Examples include how: * a theoretical &quot;secret&quot; banking request is corrupted to pad an attacker&#39;s bank account, * an insecure &quot;session&quot; authentication token is attacked, and * a &quot;random&quot; XSRF value gives a false sense of security. Correct principles and patterns are analyzed and compared with common incorrect ones.
Cargo Cult Security 2014_01_18 from Derrick Isaacson
]]>
20410 6 https://cdn.slidesharecdn.com/ss_thumbnails/cargocultsecurity20140118-140118141422-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
UJUG 2013 Architecture Roundup with Lucid Software /slideshow/ujug-architecture-lucid20131017/27361954 ujugarchitecturelucid20131017-131019111829-phpapp02
Lucid Software's lessons learned about architecture at the Utah Java User Group. 15 minute presentation by Derrick Isaacson, Director of Engineering, on sharding, session state, typed JavaScript, and ORMs.]]>

Lucid Software's lessons learned about architecture at the Utah Java User Group. 15 minute presentation by Derrick Isaacson, Director of Engineering, on sharding, session state, typed JavaScript, and ORMs.]]>
Sat, 19 Oct 2013 11:18:29 GMT /slideshow/ujug-architecture-lucid20131017/27361954 DerrickIsaacson@slideshare.net(DerrickIsaacson) UJUG 2013 Architecture Roundup with Lucid Software DerrickIsaacson Lucid Software's lessons learned about architecture at the Utah Java User Group. 15 minute presentation by Derrick Isaacson, Director of Engineering, on sharding, session state, typed JavaScript, and ORMs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ujugarchitecturelucid20131017-131019111829-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Lucid Software&#39;s lessons learned about architecture at the Utah Java User Group. 15 minute presentation by Derrick Isaacson, Director of Engineering, on sharding, session state, typed JavaScript, and ORMs.
UJUG 2013 Architecture Roundup with Lucid Software from Derrick Isaacson
]]>
581 4 https://cdn.slidesharecdn.com/ss_thumbnails/ujugarchitecturelucid20131017-131019111829-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Scaling Web Services with Evolvable RESTful APIs - JavaOne 2013 /slideshow/java-one-con1967isaacson/26724411 javaonecon1967isaacson-130930234227-phpapp01
Presentation given at JavaOne 2013 by Derrick Isaacson, Director of Development for Lucid Software, makers of Lucidchart. The presentation explains how the uniform interface of REST creates evolvable, versioned APIs. The presentation includes many examples and code snippets using Scala & Play.]]>

Presentation given at JavaOne 2013 by Derrick Isaacson, Director of Development for Lucid Software, makers of Lucidchart. The presentation explains how the uniform interface of REST creates evolvable, versioned APIs. The presentation includes many examples and code snippets using Scala & Play.]]>
Mon, 30 Sep 2013 23:42:27 GMT /slideshow/java-one-con1967isaacson/26724411 DerrickIsaacson@slideshare.net(DerrickIsaacson) Scaling Web Services with Evolvable RESTful APIs - JavaOne 2013 DerrickIsaacson Presentation given at JavaOne 2013 by Derrick Isaacson, Director of Development for Lucid Software, makers of Lucidchart. The presentation explains how the uniform interface of REST creates evolvable, versioned APIs. The presentation includes many examples and code snippets using Scala & Play. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/javaonecon1967isaacson-130930234227-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation given at JavaOne 2013 by Derrick Isaacson, Director of Development for Lucid Software, makers of Lucidchart. The presentation explains how the uniform interface of REST creates evolvable, versioned APIs. The presentation includes many examples and code snippets using Scala &amp; Play.
Scaling Web Services with Evolvable RESTful APIs - JavaOne 2013 from Derrick Isaacson
]]>
3386 8 https://cdn.slidesharecdn.com/ss_thumbnails/javaonecon1967isaacson-130930234227-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-DerrickIsaacson-48x48.jpg?cb=1638499926 Building a sharing economy marketplace in the $380 billion self storage industry derrickisaacson.com https://cdn.slidesharecdn.com/ss_thumbnails/ujugcraftsmanshiproundup-170426235901-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ujug-craftsmanship-roundup-april-2017/75448396 UJUG Craftsmanship Rou... https://cdn.slidesharecdn.com/ss_thumbnails/cargocultsecurityujugsep201516x9-150924004922-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cargo-cult-security-ujug-sep2015/53133964 Cargo Cult Security UJ... https://cdn.slidesharecdn.com/ss_thumbnails/prisonersdilemmaandsoa-150508174818-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/prisoner-47921437/47921437 Prisoner&#39;s Dilemma and...