SSW TV was proud to sponsor this years’ DDD event in Brisbane.
This entertaining talk features Joshua Wulf, Legendary Recruiter at Just Digital People.
From the description:
Like English there is widespread debate about the best way to speak it – and if there even *is* a good way.
Read about the 7 Incredible Productivity Techniques that Chuck Norris Uses While Programming.
Take the Poll!
About the speakers
Mr Open Source
Joshua Wulf is a tech genius, who works hard, owns yoga studios, is very well cultured and has friends who have their own action figures.
At Just Digital People he is committed to the development of Australia's "Silicon Economy" and its role and contribution to the global economy, and to the career development of IT professionals in Australia.
Joshua's work in the open source community over the last ten years is visible in document repositories, bug trackers, mailing lists, and revision control systems world-wide.
In this Tech Talk, Andreas Lengkeek has a chat with Mehmet Ozdemir. We learn about Multitenancy with SQL Server, and go through some scenarios where this might be useful. In this video SSW Solution Architect Mehmet Ozdemir chats with Andreas Lengkeek about the three options for Multitenancy with SQL Server and how he goes about…
The world has embraced Serverless computing, but some systems still end up with the same problems we thought would be a thing of the past. William covers how we should apply familiar SOLID principles to our Serverless Application architecture and infrastructure. This lets you create systems that are are light, easy to maintain, and benefit…
How do you get environment- or tenant-specific config into your users’ hands? With mobile or desktop apps, for managed devices we can pre-configure these using SOE or MDM tools. However, deploying configuration to unmanaged devices is the real challenge! In this talk, Matt Goldman looks at some different options for automating this for your users.…
Quick Question – How many Visualization options come built-in with Power BI? Quick Answer – Not nearly enough. Prem will walk you through the extra visualizations that are in the wonderful awesome Power BI Visuals Marketplace called AppSource. However, no matter how many options you find, there is always a need for that little bit…
Watch this demo of how a hacker who has broken into your machine can quickly and easily get your password hashes, take them offline and crack them to retrieve your original password. In this talk, Alexei discusses how passwords are stored in Windows, some techniques real-world hackers use to crack password hashes and what you…
Learn the fundamentals of cryptography, including public/private and symmetric encryption, hashing, and digital signatures. Discover which techniques are appropriate for various situations. Review practical real life examples for storing passwords, protecting URL parameters, securely exchanging information with partners, and safely encrypting sensitive information on public web sites. Concepts apply to all platforms, examples will be…
Matt Wicks talks with Yaser about his talk at NDC: Tuning web performance with just browser APIs For more interviews, watch the full video playlist:
The 5 important questions about .NET 5 Back in 2016 Microsoft made the brave step of building a brand new .Net Core away from the classic “Full Framework” .NET. This meant they were able to hit the “Redo button” in so many ways, bringing us the modern, open-source, fast and cross-platform framework that we use…
.NET Core allows us to log just about everything very easily, but when something goes wrong with SQL queries, how exactly do you figure out where it’s coming from…? This is where EF Core Query Tags comes into play, along with a couple of logging strategies, you’ll never be confused by the intent and location…