Symmetric encryption, hashing & digital signatures + More – Cryptography 101 | Robert Boedigheimer

Learn the fundamentals of cryptography, including public/private and symmetric encryption, hashing, and digital signatures. Discover which techniques are appropriate for various situations. Review practical real life examples for storing passwords, protecting URL parameters, securely exchanging information with partners, and safely encrypting sensitive information on public web sites. Concepts apply to all platforms, examples will be…

Read More

The 5 important questions about .NET 5 | Brendan Richards

The 5 important questions about .NET 5 ​Back in 2016 Microsoft made the brave step of building a brand new .Net Core away from the classic “Full Framework” .NET. This meant they were able to hit the “Redo button” in so many ways, bringing us the modern, open-source, fast and cross-platform framework that we use…

Read More

EF Core Query Tags and logging | Jernej “JK” Kavka

.NET Core allows us to log just about everything very easily, but when something goes wrong with SQL queries, how exactly do you figure out where it’s coming from…? This is where EF Core Query Tags comes into play, along with a couple of logging strategies, you’ll never be confused by the intent and location…

Read More

Build your first deep learning solution using Azure Automated ML

Machine learning is a blazing topic today. Data scientists love the power of machine learning frameworks such as TensorFlow. However, software developers can struggle with a TensorFlow based machine learning solution on Azure. In this talk, I will show you how to use TensorFlow to design a deep learning neural network, train, and save the…

Read More

Clean Testing: Clean Architecture with .NET Core | Jason Taylor

All developers should be writing automated tests. In fact modern developers should be doing Clean Testing. Systems that adhere to the principles of Clean Architecture are independent of UIs, databases, frameworks, and other external concerns. As a result, the domain and business logic, the most important parts of the system, are completely isolated from external…

Read More

Access Granted: Demystifying the identity options | Matt Goldman

How do you manage access to the applications you build? When it comes to securing your software, it’s easy to get overwhelmed by the vast number of options available, and confused by the sheer volume of information; not to mention often poor documentation. ‘Identification’, ‘authentication’, ‘authorisation’; ‘claims’, ‘roles’, ‘tokens’; ‘OpenID’, ‘OAuth’, ‘B2C’, ‘Auth0’. Ever wondered…

Read More