Tips and tricks to maintain your professional integrity in the workplace

Uly Maclaren

Ulysses Maclaren with the best tips on how to keep your professional integrity. Read the rules ↴ https://rules.ssw.com.au/do-you-have-…​ https://rules.ssw.com.au/professional…​ 00:00​ – Why Professional Integrity? 00:45​ – Example – What Not to Do 01:46​ – How to Maintain Your Integrity 04:27​ – Good Example Benefits of Integrity 06:56​ – Tools to Improve Your Integrity 13:13​ –…

Read More

Web Application development is hard – Why choose SSW

Ulysses Maclaren

Web Application development is hard – Why choose SSW Featuring SSW General Manager, Ulysses Maclaren. Consulting page: https://www.ssw.com.au/ssw/Consulting…​ || Subscribe for more content from SSW TV || || Press like and leave a comment below to let us know how we’re doing || Twitter ↴ https://twitter.com/ssw_tv​ Facebook ↴ https://www.facebook.com/SSW.page​ Created by SSW TV | Videos…

Read More

Building Rock SOLID Serverless Applications | William Liebenberg

The world has embraced serverless computing, but some systems still end up with the same problems we thought would be a thing of the past. William covers how we should apply familiar SOLID principles to our Serverless Application architecture and infrastructure. This lets you create systems that are are light, easy to maintain, and benefit…

Read More

Automagic Tenant Config for Mobile Apps | Matt Goldman

Automagic Tenant Config Matt goldman

How do you get environment- or tenant-specific config into your users’ hands? With mobile or desktop apps, for managed devices we can pre-configure these using SOE or MDM tools. However, deploying configuration to unmanaged devices is the real challenge! In this talk, Matt Goldman looks at some different options for automating this for your users.…

Read More

Symmetric encryption, hashing & digital signatures + More – Cryptography 101 | Robert Boedigheimer

Learn the fundamentals of cryptography, including public/private and symmetric encryption, hashing, and digital signatures. Discover which techniques are appropriate for various situations. Review practical real life examples for storing passwords, protecting URL parameters, securely exchanging information with partners, and safely encrypting sensitive information on public web sites. Concepts apply to all platforms, examples will be…

Read More

The 5 important questions about .NET 5 | Brendan Richards

The 5 important questions about .NET 5 ​Back in 2016 Microsoft made the brave step of building a brand new .Net Core away from the classic “Full Framework” .NET. This meant they were able to hit the “Redo button” in so many ways, bringing us the modern, open-source, fast and cross-platform framework that we use…

Read More