PRESENTATIONS_1100x200_BW
Rock-SOLID-Apps

Building Rock SOLID Serverless Applications | William Liebenberg

The world has embraced serverless computing, but some systems still end up with the same problems we thought would be a thing of the past. William covers how we should apply familiar SOLID principles to our Serverless Application architecture and infrastructure. This lets you create systems that are are light, easy to maintain, and benefit…

Aaron Powell

The Power of VS Code! – NDC Sydney 2020 Ask Me Anything | Aaron Powell

Unleash the power of VS Code! VS Code is hot, there’s no doubt about it being an utterly amazing editor, but are you using it to its full potential? In this session, SSW’s Software Architect Andreas Lengkeek discusses with Aaron Powell his NDC Talk ‘Unleash the Power of VS Code’

Automagic Tenant Config Matt goldman

Automagic Tenant Config for Mobile Apps | Matt Goldman

How do you get environment- or tenant-specific config into your users’ hands? With mobile or desktop apps, for managed devices we can pre-configure these using SOE or MDM tools. However, deploying configuration to unmanaged devices is the real challenge! In this talk, Matt Goldman looks at some different options for automating this for your users.…

Thumbnail

Transform your Power BI Dashboards with Custom Visuals built in React | Prem Radhakrishnan

Quick Question – How many Visualization options come built-in with Power BI? Quick Answer – Not nearly enough. Prem will walk you through the extra visualizations that are in the wonderful awesome Power BI Visuals Marketplace called AppSource. However, no matter how many options you find, there is always a need for that little bit…

Thumbnail-passwords

Cracking passwords & why L33t!fied passwords are bad | Alexei Doudkine

Watch this demo of how a hacker who has broken into your machine can quickly and easily get your password hashes, take them offline and crack them to retrieve your original password. In this talk, Alexei discusses how passwords are stored in Windows, some techniques real-world hackers use to crack password hashes and what you…

Thumbnail

Symmetric encryption, hashing & digital signatures + More – Cryptography 101 | Robert Boedigheimer

Learn the fundamentals of cryptography, including public/private and symmetric encryption, hashing, and digital signatures. Discover which techniques are appropriate for various situations. Review practical real life examples for storing passwords, protecting URL parameters, securely exchanging information with partners, and safely encrypting sensitive information on public web sites. Concepts apply to all platforms, examples will be…

Thumbnail

The 5 important questions about .NET 5 | Brendan Richards

The 5 important questions about .NET 5 ​Back in 2016 Microsoft made the brave step of building a brand new .Net Core away from the classic “Full Framework” .NET. This meant they were able to hit the “Redo button” in so many ways, bringing us the modern, open-source, fast and cross-platform framework that we use…

GabeThumbnail

Angular – Satisfying your Performance Hungry UI | Gabriel George

Angular is one of the fastest JavaScript UI frameworks, however sometimes when we want to render a large number of components it can still perform poorly. You think to yourself “Am I doing it wrong?” Gabe will show us how to the use built-in functionality of Angular to make rendering snappier.

Thumbnail-ef-core-jk

EF Core Query Tags and logging | Jernej “JK” Kavka

.NET Core allows us to log just about everything very easily, but when something goes wrong with SQL queries, how exactly do you figure out where it’s coming from…? This is where EF Core Query Tags comes into play, along with a couple of logging strategies, you’ll never be confused by the intent and location…