Azure Meetup: Novit CosmosDB modalit Serverless e Cognitive Servicesdotnetcode
油
The document discusses new features of Azure Cosmos DB, a multi-model database service. It begins with an introduction to NoSQL databases and how they originated. It then outlines three new key features of Cosmos DB: 1) serverless capabilities that allow customers to pay based on consumption, 2) built-in Jupyter notebooks for interactive querying and visualization, and 3) integration of notebooks with GitHub. The document concludes with a demo of how these features can be used together with other Azure services like Cognitive Search, Computer Vision, and Functions.
Azure Meetup: Understanding Azure App Service Plandotnetcode
油
Azure App Service 竪 il servizio Microsoft per l'hosting di applicazioni basate sul Web (Web App, Api App, Mobile App o Logic App).
In Azure App Service Il piano tariffario determina le limitazioni in termini di spazio sul disco, il numero di app che 竪 possibile ospitare e il numero di istanze di macchine virtuali che 竪 possibile scalare all'interno del piano.
Inoltre il piano tariffario scelto determina anche quali funzionalit sono disponibili.
Scopriamo le differenze tra i vari piani, come cambiarlo anche dopo la creazione dell'App Service e come scalarlo.
Speaker: Gaetano Patern嘆
Video sessione: https://youtu.be/u1akvSSsFz4
Azure Meetup: Keep your secrets and configurations safe in azure!dotnetcode
油
Le nostre applicazioni hanno di tutto nei loro file di configurazione: stringhe di connessione, chiavi di accesso ai servizi e informazioni sensibili si trovano, in chiaro, scritti in file accessibili da chiunque. Ogni applicazione, inoltre, ha il suo file di configurazione dove vengono duplicate informazioni che sono sempre le stesse.Sar il modo corretto di conservare i segreti?
Come faccio a sapere chi e quando accede alle informazioni sensibili e come posso centralizzare le configurazioni comuni?
Azure Key Vault e Azure App Configuration possono essere la soluzione ai nostri problemi. In questo meetup vedremo quali strumenti e funzionalit ci forniscono per mettere in sicurezza le informazioni sensibili di configurazione delle nostre applicazioni..e non solo!!!
Meetup Azure DevOps
Introduzione ad Azure DevOps e panoramica sulle principali funzionalit per il CI ed il CD del proprio software
Speaker: Simone Natalini
The document summarizes a presentation given by Fabio Mannis on secure coding practices for .NET developers. It discusses the Open Web Application Security Project (OWASP) Top 10 security risks, including injection, broken authentication, sensitive data exposure, and cross-site scripting. It provides examples of each risk and techniques for avoiding common vulnerabilities like validating and sanitizing untrusted user input, implementing secure password policies, encrypting sensitive data, and using anti-XSS libraries when updating pages with user-supplied content. The presentation aims to help developers write more secure code and avoid vulnerabilities.
The document announces a meetup hosted by DotNetCode.IT, a Microsoft .NET coding community. The meetup agenda focuses on micro ORMs, how they can help write performant code, differences from Entity Framework, and examples using Dapper. The meetup includes presentations on what micro ORMs are, how to use them to improve performance, use cases versus Entity Framework, an introduction to Dapper, and a demo. Attendees can get a 25% discount and information is provided on upcoming events focusing on serverless microservices and the Global Azure Bootcamp.
SAP Automation with UiPath: Leveraging AI for SAP Automation - Part 8 of 8DianaGray10
油
Connect directly with the TSP team for live demonstrations and practical exercises on SAP GUI, Fiori, SuccessFactors, and more. You'll also receive exclusive SAP access to practice automation on your own machine. Bring your laptop if you want to do the exercises. Dont miss this great opportunity to kickstart your SAP automation journey!
Generative AI refers to a subset of artificial intelligence that focuses on creating new content, such as images, text, music, and even videos, based on the data it has been trained on. Generative AI models learn patterns from large datasets and use these patterns to generate new content.
Explore the most powerful and widely-used mobile hacking tools in cybersecurity today. This presentation covers top tools like MobSF, Frida, Hopper, Ghidra, Objection, and morehighlighting their core features, use cases, platforms, and practical tips. Whether you're a security researcher, ethical hacker, or mobile app developer, this slide deck offers a well-rounded introduction to both static and dynamic analysis tools for Android and iOS. Ideal for training, awareness, and professional development.
Misc: The Internet Story - How Data Travels, Transit Works, and the Role of C...3G4G
油
Ever wondered how the Internet really works? In this tutorial, we break it all downfrom how your home or office connects to the wider web, to the role of Internet Service Providers (ISPs), Transit Networks, Peering, Content Delivery Networks (CDNs), and Multi-access Edge Computing (MEC).
Youll learn about:
How ISPs interconnect and form transit chains
What peering is and how it helps reduce latency and cost
How content like Netflix and Facebook reaches your screen
Real-world case studies like Swisscom vs Netflix & Init7
The difference between CDN and MECand when each is used
We also explore technical infrastructure using simple diagrams to explain how web servers, app servers, and storage systems come together to deliver your favourite content in real time.
Whether youre a student, tech enthusiast, or just curious about how the Internet works behind the scenesthis video is for you.
Got questions or insights? Drop them in the commentswed love to hear from you!
All our #3G4G5G slides, videos, blogs and tutorials are available at:
Tutorials: https://www.3g4g.co.uk/Training/
Videos: https://www.youtube.com/3G4G5G
際際滷s: /3G4GLtd
Our channels:
3G4G Website https://www.3g4g.co.uk/
The 3G4G Blog https://blog.3g4g.co.uk/
Telecoms Infrastructure Blog https://www.telecomsinfrastructure.com/
Operator Watch Blog https://www.operatorwatch.com/
Connectivity Technology Blog https://www.connectivity.technology/
Free 5G Training https://www.free5gtraining.com/
Free 6G Training https://www.free6gtraining.com/
Private Networks Technology Blog - https://blog.privatenetworks.technology/
En esta charla compartiremos la experiencia del equipo de Bitnami en la mejora de la seguridad de nuestros Helm Charts y Contenedores utilizando Kubescape como herramienta principal de validaci坦n. Exploraremos el proceso completo, desde la identificaci坦n de necesidades hasta la implementaci坦n de validaciones automatizadas, incluyendo la creaci坦n de herramientas para la comunidad.
Compartiremos nuestra experiencia en la implementaci坦n de mejoras de seguridad en Charts y Contenedores, bas叩ndonos en las mejores pr叩cticas del mercado y utilizando Kubescape como herramienta de validaci坦n. Explicaremos c坦mo automatizamos estas validaciones integr叩ndolas en nuestro ciclo de vida de desarrollo, mejorando significativamente la seguridad de nuestros productos mientras manten鱈amos la eficiencia operativa.
Durante la charla, los asistentes aprender叩n c坦mo implementar m叩s de 60 validaciones de seguridad cr鱈ticas, incluyendo la configuraci坦n segura de contenedores en modo no privilegiado, la aplicaci坦n de buenas pr叩cticas en recursos de Kubernetes, y c坦mo garantizar la compatibilidad con plataformas como OpenShift. Adem叩s, demostraremos una herramienta de self-assessment que desarrollamos para que cualquier usuario pueda evaluar y mejorar la seguridad de sus propios Charts bas叩ndose en esta experiencia.
Threat Modeling a Batch Job System - AWS Security Community DayTeri Radichel
油
I've been working on building a batch job framework for a few years now and blogging about it in the process. This presentation explains how and why I started building and writing about this system and the reason it changed from deploying one simple batch job to a much bigger project. I explore a number of recent data breaches, how they occurred, and what may have prevented them along the way. We consider how what make goes into an effective security architecture and well-designed security controls that avoid common pitfalls. There are friend links to many blog posts in the notes of the presentation that bypass the paywall. Topics include security architecture, IAM, encryption (KMS), networking, MFA, source control, separation of duties, supply chain attacks, and more.
CitrineOS: Bridging the Past and Future of EV Charging with OCPP 1.6 & 2.x Su...DanBrown980551
油
Join us for an exclusive webinar showcasing the latest advancements in CitrineOS, the open-source, API-first Charge Station Management System. With expanded support for OCPP 1.6 alongside full OCPP 2.x compatibility, CitrineOS is now more adaptable than everallowing operators to seamlessly manage both legacy and next-generation EV chargers. Discover how our new dynamic UI enhances operational efficiency, providing native EV charging network management with intuitive TimeSeries data views for authorizations, transactions, charging stations, and locations. Learn about technical upgrades, including the addition of GraphQL, improved file storage flexibility, and a refactored core designed to support multiple OCPP protocols. Dont miss this opportunity to see how CitrineOS is redefining charge station management with a future-proof platform that evolves with the industry. Register now to stay ahead in the rapidly changing EV charging landscape!
Weekly cyber hits: NK hackers drop BeaverTail via 11 npm pkgs (5.6k dls) targeting devs. Ivanti flaw (CVE-2025-22457) hit by China prospatch by 4/11! PoisonSeed spams Coinbase; PyPI pkgs (39k dls) swipe data. Lock it down! Like & share for more!
How to Achieve High-Accuracy Results When Using LLMsAggregage
油
Ben Epstein, Stealth Founder & CTO, is here to share how he and his team engineered a system that employs reproducible test variations and enables non-LLM evaluation metrics for at-scale production guardrails. This walk-through will provide practical, battle-tested techniques you can immediately apply to your own LLM-powered SaaS solutions!
GDG on Campus Monash hosted Info Session to provide details of the Solution Challenge to promote participation and hosted networking activities to help participants find their dream team
The document summarizes a presentation given by Fabio Mannis on secure coding practices for .NET developers. It discusses the Open Web Application Security Project (OWASP) Top 10 security risks, including injection, broken authentication, sensitive data exposure, and cross-site scripting. It provides examples of each risk and techniques for avoiding common vulnerabilities like validating and sanitizing untrusted user input, implementing secure password policies, encrypting sensitive data, and using anti-XSS libraries when updating pages with user-supplied content. The presentation aims to help developers write more secure code and avoid vulnerabilities.
The document announces a meetup hosted by DotNetCode.IT, a Microsoft .NET coding community. The meetup agenda focuses on micro ORMs, how they can help write performant code, differences from Entity Framework, and examples using Dapper. The meetup includes presentations on what micro ORMs are, how to use them to improve performance, use cases versus Entity Framework, an introduction to Dapper, and a demo. Attendees can get a 25% discount and information is provided on upcoming events focusing on serverless microservices and the Global Azure Bootcamp.
SAP Automation with UiPath: Leveraging AI for SAP Automation - Part 8 of 8DianaGray10
油
Connect directly with the TSP team for live demonstrations and practical exercises on SAP GUI, Fiori, SuccessFactors, and more. You'll also receive exclusive SAP access to practice automation on your own machine. Bring your laptop if you want to do the exercises. Dont miss this great opportunity to kickstart your SAP automation journey!
Generative AI refers to a subset of artificial intelligence that focuses on creating new content, such as images, text, music, and even videos, based on the data it has been trained on. Generative AI models learn patterns from large datasets and use these patterns to generate new content.
Explore the most powerful and widely-used mobile hacking tools in cybersecurity today. This presentation covers top tools like MobSF, Frida, Hopper, Ghidra, Objection, and morehighlighting their core features, use cases, platforms, and practical tips. Whether you're a security researcher, ethical hacker, or mobile app developer, this slide deck offers a well-rounded introduction to both static and dynamic analysis tools for Android and iOS. Ideal for training, awareness, and professional development.
Misc: The Internet Story - How Data Travels, Transit Works, and the Role of C...3G4G
油
Ever wondered how the Internet really works? In this tutorial, we break it all downfrom how your home or office connects to the wider web, to the role of Internet Service Providers (ISPs), Transit Networks, Peering, Content Delivery Networks (CDNs), and Multi-access Edge Computing (MEC).
Youll learn about:
How ISPs interconnect and form transit chains
What peering is and how it helps reduce latency and cost
How content like Netflix and Facebook reaches your screen
Real-world case studies like Swisscom vs Netflix & Init7
The difference between CDN and MECand when each is used
We also explore technical infrastructure using simple diagrams to explain how web servers, app servers, and storage systems come together to deliver your favourite content in real time.
Whether youre a student, tech enthusiast, or just curious about how the Internet works behind the scenesthis video is for you.
Got questions or insights? Drop them in the commentswed love to hear from you!
All our #3G4G5G slides, videos, blogs and tutorials are available at:
Tutorials: https://www.3g4g.co.uk/Training/
Videos: https://www.youtube.com/3G4G5G
際際滷s: /3G4GLtd
Our channels:
3G4G Website https://www.3g4g.co.uk/
The 3G4G Blog https://blog.3g4g.co.uk/
Telecoms Infrastructure Blog https://www.telecomsinfrastructure.com/
Operator Watch Blog https://www.operatorwatch.com/
Connectivity Technology Blog https://www.connectivity.technology/
Free 5G Training https://www.free5gtraining.com/
Free 6G Training https://www.free6gtraining.com/
Private Networks Technology Blog - https://blog.privatenetworks.technology/
En esta charla compartiremos la experiencia del equipo de Bitnami en la mejora de la seguridad de nuestros Helm Charts y Contenedores utilizando Kubescape como herramienta principal de validaci坦n. Exploraremos el proceso completo, desde la identificaci坦n de necesidades hasta la implementaci坦n de validaciones automatizadas, incluyendo la creaci坦n de herramientas para la comunidad.
Compartiremos nuestra experiencia en la implementaci坦n de mejoras de seguridad en Charts y Contenedores, bas叩ndonos en las mejores pr叩cticas del mercado y utilizando Kubescape como herramienta de validaci坦n. Explicaremos c坦mo automatizamos estas validaciones integr叩ndolas en nuestro ciclo de vida de desarrollo, mejorando significativamente la seguridad de nuestros productos mientras manten鱈amos la eficiencia operativa.
Durante la charla, los asistentes aprender叩n c坦mo implementar m叩s de 60 validaciones de seguridad cr鱈ticas, incluyendo la configuraci坦n segura de contenedores en modo no privilegiado, la aplicaci坦n de buenas pr叩cticas en recursos de Kubernetes, y c坦mo garantizar la compatibilidad con plataformas como OpenShift. Adem叩s, demostraremos una herramienta de self-assessment que desarrollamos para que cualquier usuario pueda evaluar y mejorar la seguridad de sus propios Charts bas叩ndose en esta experiencia.
Threat Modeling a Batch Job System - AWS Security Community DayTeri Radichel
油
I've been working on building a batch job framework for a few years now and blogging about it in the process. This presentation explains how and why I started building and writing about this system and the reason it changed from deploying one simple batch job to a much bigger project. I explore a number of recent data breaches, how they occurred, and what may have prevented them along the way. We consider how what make goes into an effective security architecture and well-designed security controls that avoid common pitfalls. There are friend links to many blog posts in the notes of the presentation that bypass the paywall. Topics include security architecture, IAM, encryption (KMS), networking, MFA, source control, separation of duties, supply chain attacks, and more.
CitrineOS: Bridging the Past and Future of EV Charging with OCPP 1.6 & 2.x Su...DanBrown980551
油
Join us for an exclusive webinar showcasing the latest advancements in CitrineOS, the open-source, API-first Charge Station Management System. With expanded support for OCPP 1.6 alongside full OCPP 2.x compatibility, CitrineOS is now more adaptable than everallowing operators to seamlessly manage both legacy and next-generation EV chargers. Discover how our new dynamic UI enhances operational efficiency, providing native EV charging network management with intuitive TimeSeries data views for authorizations, transactions, charging stations, and locations. Learn about technical upgrades, including the addition of GraphQL, improved file storage flexibility, and a refactored core designed to support multiple OCPP protocols. Dont miss this opportunity to see how CitrineOS is redefining charge station management with a future-proof platform that evolves with the industry. Register now to stay ahead in the rapidly changing EV charging landscape!
Weekly cyber hits: NK hackers drop BeaverTail via 11 npm pkgs (5.6k dls) targeting devs. Ivanti flaw (CVE-2025-22457) hit by China prospatch by 4/11! PoisonSeed spams Coinbase; PyPI pkgs (39k dls) swipe data. Lock it down! Like & share for more!
How to Achieve High-Accuracy Results When Using LLMsAggregage
油
Ben Epstein, Stealth Founder & CTO, is here to share how he and his team engineered a system that employs reproducible test variations and enables non-LLM evaluation metrics for at-scale production guardrails. This walk-through will provide practical, battle-tested techniques you can immediately apply to your own LLM-powered SaaS solutions!
GDG on Campus Monash hosted Info Session to provide details of the Solution Challenge to promote participation and hosted networking activities to help participants find their dream team
Leadership in the AI Era: The Reinvention of Human-Centered Leadership by Bor...Agile ME
油
Artificial intelligence is not only transforming business processes but also fundamentally challenging traditional leadership concepts. In this groundbreaking keynote, leadership expert Boris Gloger explores the complex challenges and opportunities that arise for leaders in the context of AI.
Drawing on Gartners latest forecasts on the Augmented Executive and recent research on AI-supported decision-making, Gloger illuminates the evolving role of leaders. He demonstrates how AI takes over repetitive management tasks, creating space for valuable human-centered leadership.
Simultaneously, Gloger warns against uncritical faith in technology. Building on his insights from Self-Organization Needs Leadership, he argues that in the AI era, human qualities such as empathy, ethical judgment, and the ability to create meaning are indispensable.
Gloger explains how agile leadership principles can synergistically interact with AI systems to create resilient, adaptive organizations. He shows how leaders can design an ecosystem where human creativity and machine efficiency reinforce each other.
Key Topics of the Keynote:
Realigning leadership roles in AI-driven organizations
Ethical challenges in using AI for leadership decisions
Promoting employee engagement and continuous learning in the AI era
Creating a corporate culture that unites innovation and responsible AI use
Practical strategies for integrating AI tools into agile leadership approaches
Experience a profound, forward-looking keynote that combines technological understanding with decades of leadership expertise. Gain critical insights to redefine your company and leadership role for the AI era with a balanced approach that harmoniously unites technological innovation and human-centered leadership.
Mobile app development is a fundamental element of todays digital landscape. It is transforming various industries like healthcare, e-commerce, entertainment, and education. As the use of mobile devices continues to soar, businesses are turning to mobile apps to boost customer engagement, offer innovative services, and deliver personalized experiences. Whether its enhancing customer service or introducing new tools, mobile apps help businesses stay connected to users in meaningful ways.
For businesses, mobile apps provide a direct and efficient method of communication with customers. With real-time, personalized interactions, apps can enhance user engagement, foster customer loyalty, and increase sales. Additionally, mobile apps offer businesses the flexibility to streamline processes, deliver new services, and cater to customer demands in todays mobile-first world. They are essential for companies seeking to stay competitive and relevant.
For developers, mobile app development presents both challenges and opportunities. It requires a deep understanding of user needs, creative design skills, and technical expertise in coding and testing. A successful app must be user-friendly, reliable, and innovative. Developers need to balance functionality and design, ensuring that apps perform seamlessly across different devices and operating systems.
Successful apps often feature unique capabilities or solve specific problems. The goal is to create an intuitive and engaging experience, whether its simplifying everyday tasks, providing entertainment, or offering educational content. A well-designed app not only attracts users but keeps them returning by delivering real value and solving their problems.
Mobile apps also enable businesses to gather valuable user data, which can be used to improve marketing strategies, refine products, and enhance customer support. Understanding user behavior and preferences helps businesses optimize the app experience, boosting customer satisfaction.
Furthermore, mobile apps present businesses with new revenue streams, such as in-app purchases, subscriptions, and ads. For startups, apps are an affordable way to test ideas and reach new customers, while larger companies can use apps to improve operational efficiency, increase customer loyalty, and stay ahead of competitors.
Whether you're a small business or a large corporation, mobile apps offer tremendous potential. By focusing on providing a seamless user experience, ensuring app functionality and delivering regular updates, businesses can enhance customer relationships and remain competitive in the crowded app market.
For developers, mobile app development offers a world of possibilities. With emerging technologies like AI, AR, and IoT, the future of app development is full of exciting opportunities. As the demand for mobile apps continues to grow, developers have a chance to shape the future of digital interaction and positively impact millions of users worldwid.
UiPath Community Dubai: Discover Unified AppsUiPathCommunity
油
This session gives an overview on what are unified apps:
- how one can use this concept to leverage the app development with ease
- how one can have a unified experience of app development and process linking within one integrated platform
- how one can have a unified experience of app development and process linking within one integrated platform
Participants will learn:
- how this approach simplifies workflows & reduces development complexity
- how to ensure seamless process linking across different applications
By leveraging unified apps, organizations can achieve greater efficiency, consistency, and scalability in their app development processes, ultimately fostering a more connected and integrated digital ecosystem.
Speakers:
Lovely Sinha, UiPath MVP, Manager - Automation Center of Excellence, @Dubai Holding
Harika Mudiam, UiPath MVP, Hyper Automation Consultant @FAB
This session streamed live on April 10, 2025, 19:00 GST.
Check out all our upcoming UiPath Community sessions at
https://community.uipath.com/dubai/
Automating Behavior-Driven Development: Boosting Productivity with Template-D...DOCOMO Innovations, Inc.
油
https://bit.ly/4ciP3mZ
We have successfully established our development process for Drupal custom modules, including automated testing using PHPUnit, all managed through our own GitLab CI/CD pipeline. This setup mirrors the automated testing process used by Drupal.org, which was our goal to emulate.
Building on this success, we have taken the next step by learning Behavior-Driven Development (BDD) using Behat. This approach allows us to automate the execution of acceptance tests for our Cloud Orchestration modules. Our upcoming session will provide a thorough explanation of the practical application of Behat, demonstrating how to effectively use this tool to write and execute comprehensive test scenarios.
In this session, we will cover:
1. Introduction to Behavior-Driven Development (BDD):
- Understanding the principles of BDD and its advantages in the software development lifecycle.
- How BDD aligns with agile methodologies and enhances collaboration between developers, testers, and stakeholders.
2. Overview of Behat:
- Introduction to Behat as a testing framework for BDD.
- Key features of Behat and its integration with other tools and platforms.
3. Automating Acceptance Tests:
- Running Behat tests in our GitLab CI/CD pipeline.
- Techniques for ensuring that automated tests are reliable and maintainable.
- Strategies for continuous improvement and scaling the test suite.
4. Template-Based Test Scenario Reusability:
- How to create reusable test scenario templates in Behat.
- Methods for parameterizing test scenarios to enhance reusability and reduce redundancy.
- Practical examples of how to implement and manage these templates within your testing framework.
By the end of the session, attendees will have a comprehensive understanding of how to leverage Behat for BDD in their own projects, particularly within the context of Drupal and cloud orchestration. They will gain practical knowledge on writing and running automated acceptance tests, ultimately enhancing the quality and efficiency of their development processes.
AI Driven Posture Analysis Fall Detection System for the Elderly.pdfPatrick Ogbuitepu
油
This project introduces an innovative, cost-effective solution for real-time activity monitoring of elderly individuals. By leveraging the MediaPipe pose estimation model, fuzzy logic, and finite state machines, the system can reliably track individuals, recognize static postures (standing, sitting, lying), and detect transitions, particularly focusing on falls. A key achievement is the systems zero false alarm rate, a significant advancement in vision-based fall detection systems. While the system shows promise, it faces limitations in scenarios with severe occlusions or low lighting conditions. To address these challenges, future work
will explore the use of multi-camera setups, interactive calibration modes, and audio feedback to enhance accuracy and user experience. This prototype represents a significant step towards reliable, real-time elder care. By combining advanced AI techniques with practical considerations, this system offers a scalable and effective solution to a pressing societal need.
MariaDB Berlin Roadshow 際際滷s - 8 April 2025MariaDB plc
油
With a surge of database solutions, many open-source databases in particular lack battle-tested, enterprise-grade features. Explore MariaDB for an enterprise open source database solution.