Enviar pesquisa
Carregar
Disrupt
•
Transferir como PPS, PDF
•
1 gostou
•
728 visualizações
G
guest6b7220
Seguir
Tecnologia
Notícias e política
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 35
Baixar agora
Recomendados
Intro to elixir and phoenix
Intro to elixir and phoenix
Jared Smith
Repeating History...On Purpose...with Elixir
Repeating History...On Purpose...with Elixir
Barry Jones
The Actor Model - Towards Better Concurrency
The Actor Model - Towards Better Concurrency
Dror Bereznitsky
ApacheCon NA 2011 report
ApacheCon NA 2011 report
Koji Kawamura
How to Write the Fastest JSON Parser/Writer in the World
How to Write the Fastest JSON Parser/Writer in the World
Milo Yip
Elixir intro
Elixir intro
Anton Mishchuk
Rethinking the debugger
Rethinking the debugger
Iulian Dragos
Process injection - Malware style
Process injection - Malware style
Sander Demeester
Recomendados
Intro to elixir and phoenix
Intro to elixir and phoenix
Jared Smith
Repeating History...On Purpose...with Elixir
Repeating History...On Purpose...with Elixir
Barry Jones
The Actor Model - Towards Better Concurrency
The Actor Model - Towards Better Concurrency
Dror Bereznitsky
ApacheCon NA 2011 report
ApacheCon NA 2011 report
Koji Kawamura
How to Write the Fastest JSON Parser/Writer in the World
How to Write the Fastest JSON Parser/Writer in the World
Milo Yip
Elixir intro
Elixir intro
Anton Mishchuk
Rethinking the debugger
Rethinking the debugger
Iulian Dragos
Process injection - Malware style
Process injection - Malware style
Sander Demeester
Steelcon 2014 - Process Injection with Python
Steelcon 2014 - Process Injection with Python
infodox
Building Your Own DSL with Xtext
Building Your Own DSL with Xtext
GlobalLogic Ukraine
Stackato v6
Stackato v6
Jonas Brømsø
Perl-Critic
Perl-Critic
Jonas Brømsø
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
Sam Bowne
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13
Sam Bowne
Phoenix for Rubyists
Phoenix for Rubyists
Doug Goldie
Packers
Packers
Ange Albertini
Microservices are ‘easy’ dependencies are hard
Microservices are ‘easy’ dependencies are hard
Itiel Shwartz
Reactive Web 101: WebFlux, WebClient, and Reactor Netty
Reactive Web 101: WebFlux, WebClient, and Reactor Netty
VMware Tanzu
Onion Architecture and the Blog
Onion Architecture and the Blog
barryosull
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
Sam Bowne
rsyslog meets docker
rsyslog meets docker
Rainer Gerhards
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Sam Bowne
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
enSilo
CNIT 126 12: Covert Malware Launching
CNIT 126 12: Covert Malware Launching
Sam Bowne
Lock-free algorithms for Kotlin Coroutines
Lock-free algorithms for Kotlin Coroutines
Roman Elizarov
Reactive applications with Akka.Net - DDD East Anglia 2015
Reactive applications with Akka.Net - DDD East Anglia 2015
Anthony Brown
Scripting robot
Scripting robot
Chonlasith Jucksriporn
What's the "right" PHP Framework?
What's the "right" PHP Framework?
Barry Jones
Sentencia TS Asturias EpC
Sentencia TS Asturias EpC
Andalucia Liberal
Kynning 1.Stig 21.02
Kynning 1.Stig 21.02
ingi
Mais conteúdo relacionado
Mais procurados
Steelcon 2014 - Process Injection with Python
Steelcon 2014 - Process Injection with Python
infodox
Building Your Own DSL with Xtext
Building Your Own DSL with Xtext
GlobalLogic Ukraine
Stackato v6
Stackato v6
Jonas Brømsø
Perl-Critic
Perl-Critic
Jonas Brømsø
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
Sam Bowne
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13
Sam Bowne
Phoenix for Rubyists
Phoenix for Rubyists
Doug Goldie
Packers
Packers
Ange Albertini
Microservices are ‘easy’ dependencies are hard
Microservices are ‘easy’ dependencies are hard
Itiel Shwartz
Reactive Web 101: WebFlux, WebClient, and Reactor Netty
Reactive Web 101: WebFlux, WebClient, and Reactor Netty
VMware Tanzu
Onion Architecture and the Blog
Onion Architecture and the Blog
barryosull
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
Sam Bowne
rsyslog meets docker
rsyslog meets docker
Rainer Gerhards
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Sam Bowne
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
enSilo
CNIT 126 12: Covert Malware Launching
CNIT 126 12: Covert Malware Launching
Sam Bowne
Lock-free algorithms for Kotlin Coroutines
Lock-free algorithms for Kotlin Coroutines
Roman Elizarov
Reactive applications with Akka.Net - DDD East Anglia 2015
Reactive applications with Akka.Net - DDD East Anglia 2015
Anthony Brown
Scripting robot
Scripting robot
Chonlasith Jucksriporn
What's the "right" PHP Framework?
What's the "right" PHP Framework?
Barry Jones
Mais procurados
(20)
Steelcon 2014 - Process Injection with Python
Steelcon 2014 - Process Injection with Python
Building Your Own DSL with Xtext
Building Your Own DSL with Xtext
Stackato v6
Stackato v6
Perl-Critic
Perl-Critic
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
Practical Malware Analysis Ch13
Practical Malware Analysis Ch13
Phoenix for Rubyists
Phoenix for Rubyists
Packers
Packers
Microservices are ‘easy’ dependencies are hard
Microservices are ‘easy’ dependencies are hard
Reactive Web 101: WebFlux, WebClient, and Reactor Netty
Reactive Web 101: WebFlux, WebClient, and Reactor Netty
Onion Architecture and the Blog
Onion Architecture and the Blog
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
rsyslog meets docker
rsyslog meets docker
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Practical Malware Analysis: Ch 10: Kernel Debugging with WinDbg
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
CNIT 126 12: Covert Malware Launching
CNIT 126 12: Covert Malware Launching
Lock-free algorithms for Kotlin Coroutines
Lock-free algorithms for Kotlin Coroutines
Reactive applications with Akka.Net - DDD East Anglia 2015
Reactive applications with Akka.Net - DDD East Anglia 2015
Scripting robot
Scripting robot
What's the "right" PHP Framework?
What's the "right" PHP Framework?
Destaque
Sentencia TS Asturias EpC
Sentencia TS Asturias EpC
Andalucia Liberal
Kynning 1.Stig 21.02
Kynning 1.Stig 21.02
ingi
Escocia
Escocia
nimiaazucena
香港六合彩让赚钱更容易
香港六合彩让赚钱更容易
ksjcs
Kynning 1
Kynning 1
ingi
AUTO_EPC1
AUTO_EPC1
Andalucia Liberal
Het Rijke Verleden Van Turkije Ppt[1]
Het Rijke Verleden Van Turkije Ppt[1]
Flopp1988
Web 2.0 for Educators
Web 2.0 for Educators
Fleep Tuque
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
Barry Feldman
Destaque
(9)
Sentencia TS Asturias EpC
Sentencia TS Asturias EpC
Kynning 1.Stig 21.02
Kynning 1.Stig 21.02
Escocia
Escocia
香港六合彩让赚钱更容易
香港六合彩让赚钱更容易
Kynning 1
Kynning 1
AUTO_EPC1
AUTO_EPC1
Het Rijke Verleden Van Turkije Ppt[1]
Het Rijke Verleden Van Turkije Ppt[1]
Web 2.0 for Educators
Web 2.0 for Educators
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
Semelhante a Disrupt
Erlang
Erlang
ESUG
Purdue CS354 Operating Systems 2008
Purdue CS354 Operating Systems 2008
guestd9065
Elixir
Elixir
Robert Brown
X page developer
X page developer
Jakob Majkilde
DEF CON 23 - Saif el-sherei and etienne stalmans - fuzzing
DEF CON 23 - Saif el-sherei and etienne stalmans - fuzzing
Felipe Prado
Peyton jones-2011-parallel haskell-the_future
Peyton jones-2011-parallel haskell-the_future
Takayuki Muranushi
Simon Peyton Jones: Managing parallelism
Simon Peyton Jones: Managing parallelism
Skills Matter
Sioux Hot-or-Not: Functional programming: unlocking the real power of multi-c...
Sioux Hot-or-Not: Functional programming: unlocking the real power of multi-c...
siouxhotornot
Unmanaged Parallelization via P/Invoke
Unmanaged Parallelization via P/Invoke
Dmitri Nesteruk
Software and the Concurrency Revolution : Notes
Software and the Concurrency Revolution : Notes
Subhajit Sahu
jhtp5_01
jhtp5_01
Praveen Sudarsan
Os Worthington
Os Worthington
oscon2007
Git Ready! Workflows
Git Ready! Workflows
Atlassian
Keynote joearmstrong
Keynote joearmstrong
Sentifi
Concurrent programming1
Concurrent programming1
Nick Brandaleone
The Future of Computing is Distributed
The Future of Computing is Distributed
Alluxio, Inc.
Some wonderful Linux softwares for daily use
Some wonderful Linux softwares for daily use
arun.arwachin
Elixir Into Production
Elixir Into Production
Jamie Winsor
Low level java programming
Low level java programming
Peter Lawrey
Building scalable and language independent java services using apache thrift
Building scalable and language independent java services using apache thrift
Talentica Software
Semelhante a Disrupt
(20)
Erlang
Erlang
Purdue CS354 Operating Systems 2008
Purdue CS354 Operating Systems 2008
Elixir
Elixir
X page developer
X page developer
DEF CON 23 - Saif el-sherei and etienne stalmans - fuzzing
DEF CON 23 - Saif el-sherei and etienne stalmans - fuzzing
Peyton jones-2011-parallel haskell-the_future
Peyton jones-2011-parallel haskell-the_future
Simon Peyton Jones: Managing parallelism
Simon Peyton Jones: Managing parallelism
Sioux Hot-or-Not: Functional programming: unlocking the real power of multi-c...
Sioux Hot-or-Not: Functional programming: unlocking the real power of multi-c...
Unmanaged Parallelization via P/Invoke
Unmanaged Parallelization via P/Invoke
Software and the Concurrency Revolution : Notes
Software and the Concurrency Revolution : Notes
jhtp5_01
jhtp5_01
Os Worthington
Os Worthington
Git Ready! Workflows
Git Ready! Workflows
Keynote joearmstrong
Keynote joearmstrong
Concurrent programming1
Concurrent programming1
The Future of Computing is Distributed
The Future of Computing is Distributed
Some wonderful Linux softwares for daily use
Some wonderful Linux softwares for daily use
Elixir Into Production
Elixir Into Production
Low level java programming
Low level java programming
Building scalable and language independent java services using apache thrift
Building scalable and language independent java services using apache thrift
Último
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Boston Institute of Analytics
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Último
(20)
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Disrupt
1.
2.
3.
Erlang + EDTK
+ BDB: Disrupting the Web Margo Seltzer Architect
4.
5.
6.
7.
8.
9.
10.
An Internet Service
Clients Load Balancer .NET Java The Internet App Servers Database Servers
11.
An Internet Service
Clients Load Balancer .NET Java CGI PHP LISP Perl The Internet Database Servers
12.
An Internet Service
Clients Load Balancer BDB CGI Perl Application Code The Internet Servers
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
An Internet Service
Clients Load Balancer Servers The Internet
32.
How does it
Perform? From: http://www.sics.se/~joe/apachevsyaws.html
33.
34.
A Q &
35.
Baixar agora