Enviar pesquisa
Carregar
Selected Topics ASP.NET2
•
Transferir como PPT, PDF
•
0 gostou
•
4,739 visualizações
Talal Alsubaie
Seguir
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 35
Baixar agora
Recomendados
Join us as we review the capabilities of the existing WSDL-to-Apex code generation feature, and explain how we built a tool to provide expanded features using the Tooling API. The resulting tool has greater support for more WSDL features, generates test cases and the associated mocks to maximize code coverage, and optionally includes HttpRequest versions of the callouts.
Using the Tooling API to Generate Apex SOAP Web Service Clients
Using the Tooling API to Generate Apex SOAP Web Service Clients
Salesforce Developers
Talks about the usage of Webservices In Salesforce.
Webservices in SalesForce (part 1)
Webservices in SalesForce (part 1)
Mindfire Solutions
Use Metadata API to retrieve, deploy, create, update or delete customization information, such as custom object definitions and page layouts, for your organization. This API is intended for managing customizations and for building tools that can manage the metadata model, not the data itself. Skype: ajay.dubedi Email: ajay.dubedi@cloudanalogy.com Phone: +1 (415) 830-3899
Metadata API
Metadata API
Cloud Analogy
Asp
Asp
Adil Jafri
SQL Injection
SQL Injection
SQL Injection
Adhoura Academy
Preventing SQL Injection attacks
Sql Injection Attacks Siddhesh
Sql Injection Attacks Siddhesh
Siddhesh Bhobe
The most massive crime of identity theft in history was perpetrated in 2007 by exploiting an SQL Injection vulnerability. This issue is one of the most common and most serious threats to web application security. In this presentation, you'll see some common myths busted and you'll get a better understanding of defending against SQL injection.
Sql Injection Myths and Fallacies
Sql Injection Myths and Fallacies
Karwin Software Solutions LLC
Sql Injection
D:\Technical\Ppt\Sql Injection
D:\Technical\Ppt\Sql Injection
avishkarm
Recomendados
Join us as we review the capabilities of the existing WSDL-to-Apex code generation feature, and explain how we built a tool to provide expanded features using the Tooling API. The resulting tool has greater support for more WSDL features, generates test cases and the associated mocks to maximize code coverage, and optionally includes HttpRequest versions of the callouts.
Using the Tooling API to Generate Apex SOAP Web Service Clients
Using the Tooling API to Generate Apex SOAP Web Service Clients
Salesforce Developers
Talks about the usage of Webservices In Salesforce.
Webservices in SalesForce (part 1)
Webservices in SalesForce (part 1)
Mindfire Solutions
Use Metadata API to retrieve, deploy, create, update or delete customization information, such as custom object definitions and page layouts, for your organization. This API is intended for managing customizations and for building tools that can manage the metadata model, not the data itself. Skype: ajay.dubedi Email: ajay.dubedi@cloudanalogy.com Phone: +1 (415) 830-3899
Metadata API
Metadata API
Cloud Analogy
Asp
Asp
Adil Jafri
SQL Injection
SQL Injection
SQL Injection
Adhoura Academy
Preventing SQL Injection attacks
Sql Injection Attacks Siddhesh
Sql Injection Attacks Siddhesh
Siddhesh Bhobe
The most massive crime of identity theft in history was perpetrated in 2007 by exploiting an SQL Injection vulnerability. This issue is one of the most common and most serious threats to web application security. In this presentation, you'll see some common myths busted and you'll get a better understanding of defending against SQL injection.
Sql Injection Myths and Fallacies
Sql Injection Myths and Fallacies
Karwin Software Solutions LLC
Sql Injection
D:\Technical\Ppt\Sql Injection
D:\Technical\Ppt\Sql Injection
avishkarm
In this article we will see how to set azure classification label to an excel/word/pdf file at the time of its creation during runtime programmatically. This solution is targeted for developers, architects, COE working on automating business processes that involves MS Office documents, PDFs
Microsoft Information Protection Implementation using C# and PowerShell
Microsoft Information Protection Implementation using C# and PowerShell
Aditya Sharma
Learn what is SQL injection, how to use prepared statements, how to escape and write secure stored procedures. Many PHP projects are covered - PDO, Propel, Doctrine, Zend Framework and MDB2. Multiple gotchas included.
SQL Injection: complete walkthrough (not only) for PHP developers
SQL Injection: complete walkthrough (not only) for PHP developers
Krzysztof Kotowicz
Show the reader the potential damage that a SQL injection vulnerability can make. Show evading techniques to some filters. Show some common mistakes that the programmers make when protecting their sites. Show the best practices to protect your code.
Advanced SQL Injection: Attacks
Advanced SQL Injection: Attacks
Nuno Loureiro
Sql injection
Sql injection
Hemendra Kumar
Secure coding - Balgan - Tiago Henriques
Secure coding - Balgan - Tiago Henriques
Tiago Henriques
Here are the slides from the Dreamforce 2014 session. Hope you enjoyed it.
Best practices in using Salesforce Metadata API
Best practices in using Salesforce Metadata API
Sanchit Dua
This PPT would describe about SQL Injection Attack and How to defense this attack.
Sql injection attack
Sql injection attack
RajKumar Rampelli
An advanced technical presentation on attacking Web applications using sql injection technique and the countermeasures.
Web application attacks using Sql injection and countermasures
Web application attacks using Sql injection and countermasures
Cade Zvavanjanja
aol
Aol
Aol
Sv Ravi
This presentation include sql injection intro,type,example,prevention techniques etc....
Sql injection
Sql injection
Nikunj Dhameliya
Topic: SQL Injection 101 : It is not just about ' or '1'='1 Speaker: Pichaya Morimoto Event: OWASP Thailand Meeting 3/2014 Date: Auguest 28, 2014
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
Pichaya Morimoto
Victor Chapela
Advanced SQL Injection
Advanced SQL Injection
amiable_indian
70562 (1)
70562 (1)
Pragya Rastogi
The presentation has a quick preamble on SQL injection definition, sqlmap and its key features. I then illustrate into details common and uncommon problems and respective solutions with examples that a penetration tester faces when he wants to take advantage of any kind of web application SQL injection flaw on real world web applications, for instance SQL injection in ORDER BY and LIMIT clauses, single entry UNION query SQL injection, specific web application technologies IDS bypasses and more. These slides have been presented at the Front Range OWASP Conference in Denver on March 5, 2009.
SQL injection: Not only AND 1=1
SQL injection: Not only AND 1=1
Bernardo Damele A. G.
SQL injection is a technique used to take advantage of un-sanitized input vulnerabilities to pass SQL commands through a web application for execution by a backend database. It is a basic attack used to either gain unauthorized access to a database or retrieve information directly from the database. Learn how SQL injection works, and explore advanced SQL injection attacks: https://iclass.eccouncil.org/product/web-application-hacking-security/
What is advanced SQL Injection? Infographic
What is advanced SQL Injection? Infographic
JW CyberNerd
System Defined Exceptions & User Defined Exceptions in Oracle
Exception Handling
Exception Handling
Swapnali Pawar
Oracle Text is a facility within the database that provides more advanced indexing & search techniques - including the ability to index documents stored in your database; on your server; or even the web! Now you can incorporate this functionality into your web application using Oracle Application Express. This presentation will demonstrate how easy it is to combine the two, and give you a platform for further expansion and exploration within a very powerful product.
Oracle Text in APEX
Oracle Text in APEX
Scott Wesley
Let’s face it: Best Practices are too many to really know them all and choose which ones should be applied first. Does your telephone ring all the time? Do your users ask for that “quick report” that instead takes ages and keeps changing every time you think it’s done? Have you ever thought that in dire times avoiding Worst Practices could be a good starting point and you can leave fine tuning for a better future? If the answer is “yes”, then this session is for you: we will discover together how not to torture a SQL Server instance and we will see how to avoid making choices that in the long run could turn out to be not as smart as they looked initially.
Sql server infernals
Sql server infernals
Gianluca Sartori
Automated testing using selenium IDE, presentation from Phily.Net code camp May 11, 2013
Automated testing with selenium prasad bapatla
Automated testing with selenium prasad bapatla
prasadbcs
This slide shares basics of performance tuning and it has more focus on effective writting of an SQL Query.
Performance tuning
Performance tuning
ami111
e-Learning
e-Learning
guest402475
Tema 5
Tema 5
guest764e98
Mais conteúdo relacionado
Mais procurados
In this article we will see how to set azure classification label to an excel/word/pdf file at the time of its creation during runtime programmatically. This solution is targeted for developers, architects, COE working on automating business processes that involves MS Office documents, PDFs
Microsoft Information Protection Implementation using C# and PowerShell
Microsoft Information Protection Implementation using C# and PowerShell
Aditya Sharma
Learn what is SQL injection, how to use prepared statements, how to escape and write secure stored procedures. Many PHP projects are covered - PDO, Propel, Doctrine, Zend Framework and MDB2. Multiple gotchas included.
SQL Injection: complete walkthrough (not only) for PHP developers
SQL Injection: complete walkthrough (not only) for PHP developers
Krzysztof Kotowicz
Show the reader the potential damage that a SQL injection vulnerability can make. Show evading techniques to some filters. Show some common mistakes that the programmers make when protecting their sites. Show the best practices to protect your code.
Advanced SQL Injection: Attacks
Advanced SQL Injection: Attacks
Nuno Loureiro
Sql injection
Sql injection
Hemendra Kumar
Secure coding - Balgan - Tiago Henriques
Secure coding - Balgan - Tiago Henriques
Tiago Henriques
Here are the slides from the Dreamforce 2014 session. Hope you enjoyed it.
Best practices in using Salesforce Metadata API
Best practices in using Salesforce Metadata API
Sanchit Dua
This PPT would describe about SQL Injection Attack and How to defense this attack.
Sql injection attack
Sql injection attack
RajKumar Rampelli
An advanced technical presentation on attacking Web applications using sql injection technique and the countermeasures.
Web application attacks using Sql injection and countermasures
Web application attacks using Sql injection and countermasures
Cade Zvavanjanja
aol
Aol
Aol
Sv Ravi
This presentation include sql injection intro,type,example,prevention techniques etc....
Sql injection
Sql injection
Nikunj Dhameliya
Topic: SQL Injection 101 : It is not just about ' or '1'='1 Speaker: Pichaya Morimoto Event: OWASP Thailand Meeting 3/2014 Date: Auguest 28, 2014
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
Pichaya Morimoto
Victor Chapela
Advanced SQL Injection
Advanced SQL Injection
amiable_indian
70562 (1)
70562 (1)
Pragya Rastogi
The presentation has a quick preamble on SQL injection definition, sqlmap and its key features. I then illustrate into details common and uncommon problems and respective solutions with examples that a penetration tester faces when he wants to take advantage of any kind of web application SQL injection flaw on real world web applications, for instance SQL injection in ORDER BY and LIMIT clauses, single entry UNION query SQL injection, specific web application technologies IDS bypasses and more. These slides have been presented at the Front Range OWASP Conference in Denver on March 5, 2009.
SQL injection: Not only AND 1=1
SQL injection: Not only AND 1=1
Bernardo Damele A. G.
SQL injection is a technique used to take advantage of un-sanitized input vulnerabilities to pass SQL commands through a web application for execution by a backend database. It is a basic attack used to either gain unauthorized access to a database or retrieve information directly from the database. Learn how SQL injection works, and explore advanced SQL injection attacks: https://iclass.eccouncil.org/product/web-application-hacking-security/
What is advanced SQL Injection? Infographic
What is advanced SQL Injection? Infographic
JW CyberNerd
System Defined Exceptions & User Defined Exceptions in Oracle
Exception Handling
Exception Handling
Swapnali Pawar
Oracle Text is a facility within the database that provides more advanced indexing & search techniques - including the ability to index documents stored in your database; on your server; or even the web! Now you can incorporate this functionality into your web application using Oracle Application Express. This presentation will demonstrate how easy it is to combine the two, and give you a platform for further expansion and exploration within a very powerful product.
Oracle Text in APEX
Oracle Text in APEX
Scott Wesley
Let’s face it: Best Practices are too many to really know them all and choose which ones should be applied first. Does your telephone ring all the time? Do your users ask for that “quick report” that instead takes ages and keeps changing every time you think it’s done? Have you ever thought that in dire times avoiding Worst Practices could be a good starting point and you can leave fine tuning for a better future? If the answer is “yes”, then this session is for you: we will discover together how not to torture a SQL Server instance and we will see how to avoid making choices that in the long run could turn out to be not as smart as they looked initially.
Sql server infernals
Sql server infernals
Gianluca Sartori
Automated testing using selenium IDE, presentation from Phily.Net code camp May 11, 2013
Automated testing with selenium prasad bapatla
Automated testing with selenium prasad bapatla
prasadbcs
This slide shares basics of performance tuning and it has more focus on effective writting of an SQL Query.
Performance tuning
Performance tuning
ami111
Mais procurados
(20)
Microsoft Information Protection Implementation using C# and PowerShell
Microsoft Information Protection Implementation using C# and PowerShell
SQL Injection: complete walkthrough (not only) for PHP developers
SQL Injection: complete walkthrough (not only) for PHP developers
Advanced SQL Injection: Attacks
Advanced SQL Injection: Attacks
Sql injection
Sql injection
Secure coding - Balgan - Tiago Henriques
Secure coding - Balgan - Tiago Henriques
Best practices in using Salesforce Metadata API
Best practices in using Salesforce Metadata API
Sql injection attack
Sql injection attack
Web application attacks using Sql injection and countermasures
Web application attacks using Sql injection and countermasures
Aol
Aol
Sql injection
Sql injection
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
Advanced SQL Injection
Advanced SQL Injection
70562 (1)
70562 (1)
SQL injection: Not only AND 1=1
SQL injection: Not only AND 1=1
What is advanced SQL Injection? Infographic
What is advanced SQL Injection? Infographic
Exception Handling
Exception Handling
Oracle Text in APEX
Oracle Text in APEX
Sql server infernals
Sql server infernals
Automated testing with selenium prasad bapatla
Automated testing with selenium prasad bapatla
Performance tuning
Performance tuning
Destaque
e-Learning
e-Learning
guest402475
Tema 5
Tema 5
guest764e98
MuséE Louvre
MuséE Louvre
qatar96
Humanities Presentation Template
Humanities Presentation Template
qatar96
3 Farger
3 Farger
guesta8f0ab
Similarity Search For Web Services
Similarity Search For Web Services
Talal Alsubaie
Destaque
(6)
e-Learning
e-Learning
Tema 5
Tema 5
MuséE Louvre
MuséE Louvre
Humanities Presentation Template
Humanities Presentation Template
3 Farger
3 Farger
Similarity Search For Web Services
Similarity Search For Web Services
Semelhante a Selected Topics ASP.NET2
OWASP Top 10
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
cgt38842
OWASP Top 10 Slide New
OWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptx
nmk42194
Scala.js is a compiler that compiles Scala source code to equivalent Javascript code. It can be seen as the start of a revolution in developing web application. In this talk, I'll present Scala.js project, common libraries for having a pleasure web development (such as scalatags, autowire and upickle) and integration with well known javascript libraries such as AngularJS and React.js.
Alberto Paro - Hands on Scala.js
Alberto Paro - Hands on Scala.js
Scala Italy
Presentation slide on ScalaJS for ScalaDay Italy 2015
Scala Italy 2015 - Hands On ScalaJS
Scala Italy 2015 - Hands On ScalaJS
Alberto Paro
The presentation describes a series of secure coding techniques to help Java developers build secure web applications.
Top Ten Java Defense for Web Applications v2
Top Ten Java Defense for Web Applications v2
Jim Manico
an introduction to OWASP top ten proactive control
OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2
ssuser18349f1
hty
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
johnpragasam1
owasp
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
azida3
SQL Injection
SQL Injection
Abhinav Nair
SQLCLR For DBAs and Developers
SQLCLR For DBAs and Developers
webhostingguy
Dr. Jekyll and Mr. Hyde
Dr. Jekyll and Mr. Hyde
webhostingguy
Enterprise Library 2.0,.net,Enterprise Library 3.0 Data Access Application Block,Enterprise Library 2.0 Logging Application Block Part II - Simple ASP.NET 2.0 Website Example - Logging Unhandled ExceptionsEnterprise Library 2.0 Configuration Tool - Configuring Data Access Application Block
Enterprise Library 2.0
Enterprise Library 2.0
Raju Permandla
CAD Report
CAD Report
Jyoti Tyagi
Sql Injection and Entity Frameworks
Sql Injection and Entity Frameworks
Rich Helton
SQL Server Security - Attack
SQL Server Security - Attack
webhostingguy
SQL Injection attacks are one of the most common hacker tricks used on the web. Learn what a SQL injection attack is and why you should be concerned about them. This all new session is loaded with demos. You’ll get to witness first-hand several different types of SQL injection attacks, how to find them, and how to block them.
Understanding and preventing sql injection attacks
Understanding and preventing sql injection attacks
Kevin Kline
Presentation from the SQL Summit in Grand Rapids for the launch of SQL Server 2005
Sql Summit Clr, Service Broker And Xml
Sql Summit Clr, Service Broker And Xml
David Truxall
How to write a stored procedure in C#. When to do it and when not to do it
SQL Server - CLR integration
SQL Server - CLR integration
Peter Gfader
Free and useful tools have proliferated since the launch of the CodePlex and SourceForge websites. Join Kevin Kline, long-time author of the SQL Server Magazine column "Tool Time", as he profiles the very best of the free tools covered in his monthly column - dozens of free tools and utilities! Some of the cover tools help to: - Track database growth - Implement logging in SSIS job steps - Stress test your database applications - Automate important preventative maintenance tasks - Automate maintenance tasks for Analysis Services - Help protect against SQL Injection attacks - Graphically manage Extended Events - Utilize PowerShell scripts to ease administration And much more. These tools are all free and independently supported by SQL Server enthusiasts around the world.
Ultimate Free SQL Server Toolkit
Ultimate Free SQL Server Toolkit
Kevin Kline
Struts Interview Questions
Struts Interview Questions
Struts Interview Questions
jbashask
Semelhante a Selected Topics ASP.NET2
(20)
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptx
Alberto Paro - Hands on Scala.js
Alberto Paro - Hands on Scala.js
Scala Italy 2015 - Hands On ScalaJS
Scala Italy 2015 - Hands On ScalaJS
Top Ten Java Defense for Web Applications v2
Top Ten Java Defense for Web Applications v2
OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls version 2
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
SQL Injection
SQL Injection
SQLCLR For DBAs and Developers
SQLCLR For DBAs and Developers
Dr. Jekyll and Mr. Hyde
Dr. Jekyll and Mr. Hyde
Enterprise Library 2.0
Enterprise Library 2.0
CAD Report
CAD Report
Sql Injection and Entity Frameworks
Sql Injection and Entity Frameworks
SQL Server Security - Attack
SQL Server Security - Attack
Understanding and preventing sql injection attacks
Understanding and preventing sql injection attacks
Sql Summit Clr, Service Broker And Xml
Sql Summit Clr, Service Broker And Xml
SQL Server - CLR integration
SQL Server - CLR integration
Ultimate Free SQL Server Toolkit
Ultimate Free SQL Server Toolkit
Struts Interview Questions
Struts Interview Questions
Mais de Talal Alsubaie
Exploratory data analysis to some of the international KPIs such as population, fertility, life expectancy and GDP per Capita
Exploratory Data Analysis
Exploratory Data Analysis
Talal Alsubaie
شرح مبسط يشرح هل نحتاج حقاً لإدارة إجراءات العمل
هل نحتاج لإجراءات العمل Do we need BPM
هل نحتاج لإجراءات العمل Do we need BPM
Talal Alsubaie
شرح لأبرز 9 عوامل تفشل مشاريع توثيق إجراءات العمل
9 عوامل تفشل مشاريع توثيق الإجراءات
9 عوامل تفشل مشاريع توثيق الإجراءات
Talal Alsubaie
This is about Cloud Computing
Cloud Computing
Cloud Computing
Talal Alsubaie
Pattern Recognition
Pattern Recognition
Talal Alsubaie
Bracket Capability For Distributed Systems Security
Bracket Capability For Distributed Systems Security
Talal Alsubaie
Intro to AJAX and ASP.NET installation and programming
Ajax & ASP.NET 2
Ajax & ASP.NET 2
Talal Alsubaie
IPv6
IPv6
IPv6
Talal Alsubaie
Emerging DB Technologies
Emerging DB Technologies
Emerging DB Technologies
Talal Alsubaie
Mais de Talal Alsubaie
(9)
Exploratory Data Analysis
Exploratory Data Analysis
هل نحتاج لإجراءات العمل Do we need BPM
هل نحتاج لإجراءات العمل Do we need BPM
9 عوامل تفشل مشاريع توثيق الإجراءات
9 عوامل تفشل مشاريع توثيق الإجراءات
Cloud Computing
Cloud Computing
Pattern Recognition
Pattern Recognition
Bracket Capability For Distributed Systems Security
Bracket Capability For Distributed Systems Security
Ajax & ASP.NET 2
Ajax & ASP.NET 2
IPv6
IPv6
Emerging DB Technologies
Emerging DB Technologies
Último
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Workshop Build With AI - Google Developers Group Rio Verde
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Presentation on the progress in the Domino Container community project as delivered at the Engage 2024 conference
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
JAM, the future of Polkadot.
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
MINDCTI Revenue Release Quarter 1 2024
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Accelerating FinTech Innovation: Unleashing API Economy and GenAI Vasa Krishnan, Chief Technology Officer - FinResults Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
In this talk, we are going to cover the use-case of food image generation at Delivery Hero, its impact and the challenges. In particular, we will present our image scoring solution for filtering out inappropriate images and elaborate on the models we are using.
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Webinar Recording: https://www.panagenda.com/webinars/why-teams-call-analytics-is-critical-to-your-entire-business Nothing is as frustrating and noticeable as being in an important call and being unable to see or hear the other person. Not surprising then, that issues with Teams calls are among the most common problems users call their helpdesk for. Having in depth insight into everything relevant going on at the user’s device, local network, ISP and Microsoft itself during the call is crucial for good Microsoft Teams Call quality support. To ensure a quick and adequate solution and to ensure your users get the most out of their Microsoft 365. But did you know that ‘bad calls’ are also an excellent indicator of other problems arising? Precisely because it is so noticeable!? Like the canary in the mine, bad calls can be early indicators of problems. Problems that might otherwise not have been noticed for a while but can have a big impact on productivity and satisfaction. Join this session by Christoph Adler to learn how true Microsoft Teams call quality analytics helped other organizations troubleshoot bad calls and identify and fix problems that impacted Teams calls or the use of Microsoft365 in general. See what it can do to keep your users happy and productive! In this session we will cover - Why CQD data alone is not enough to troubleshoot call problems - The importance of attributing call problems to the right call participant - What call quality analytics can do to help you quickly find, fix-, and prevent problems - Why having retrospective detailed insights matters - Real life examples of how others have used Microsoft Teams call quality monitoring to problem shoot problems with their ISP, network, device health and more.
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
DBX 1Q24 Investor Presentation
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
When you’re building (micro)services, you have lots of framework options. Spring Boot is no doubt a popular choice. But there’s more! Take Quarkus, a framework that’s considered the rising star for Kubernetes-native Java. It always depends on what's best for your situation, but how to choose the best solution if you're comparing 2 frameworks? Both Spring Boot and Quarkus have their positives and negatives. Let us compare the two by live coding a couple of common use cases in Spring Boot and Quarkus. After this talk, you’ll be ready to get started with Quarkus yourself, and know when to select Quarkus or Spring Boot.
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
Passkeys: Developing APIs to enable passwordless authentication Cody Salas, Sr Developer Advocate | Solutions Architect - Yubico Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Tracing the root cause of a performance issue requires a lot of patience, experience, and focus. It’s so hard that we sometimes attempt to guess by trying out tentative fixes, but that usually results in frustration, messy code, and a considerable waste of time and money. This talk explains how to correctly zoom in on a performance bottleneck using three levels of profiling: distributed tracing, metrics, and method profiling. After we learn to read the JVM profiler output as a flame graph, we explore a series of bottlenecks typical for backend systems, like connection/thread pool starvation, invisible aspects, blocking code, hot CPU methods, lock contention, and Virtual Thread pinning, and we learn to trace them even if they occur in library code you are not familiar with. Attend this talk and prepare for the performance issues that will eventually hit any successful system. About authorWith two decades of experience, Victor is a Java Champion working as a trainer for top companies in Europe. Five thousands developers in 120 companies attended his workshops, so he gets to debate every week the challenges that various projects struggle with. In return, Victor summarizes key points from these workshops in conference talks and online meetups for the European Software Crafters, the world’s largest developer community around architecture, refactoring, and testing. Discover how Victor can help you on victorrentea.ro : company training catalog, consultancy and YouTube playlists.
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
AXA XL - Insurer Innovation Award 2024
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Presentation from Melissa Klemke from her talk at Product Anonymous in April 2024
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
The value of a flexible API Management solution for Open Banking Steve Melan, Manager for IT Innovation and Architecture - State's and Saving's Bank of Luxembourg Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Keynote 2: APIs in 2030: The Risk of Technological Sleepwalk Paolo Malinverno, Growth Advisor - The Business of Technology Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
Dubai, often portrayed as a shimmering oasis in the desert, faces its own set of challenges, including the occasional threat of flooding. Despite its reputation for opulence and modernity, the emirate is not immune to the forces of nature. In recent years, Dubai has experienced sporadic but significant floods, testing the resilience of its infrastructure and communities. Among the critical lifelines in this bustling metropolis is the Dubai International Airport, a bustling hub that connects the city to the world. This article explores the intersection of Dubai flood events and the resilience demonstrated by the Dubai International Airport in the face of such challenges.
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Último
(20)
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Selected Topics ASP.NET2
1.
Tips and Tricks
in ASP.NET 2.0 Development Talal Abdullah Alsubaie Programmer IT Department Saudi Food and Drugs Authority Talal A. Alsubaie SFDA
2.
3.
4.
N-Tier Architecture Talal
A. Alsubaie SFDA
5.
6.
Talal A. Alsubaie
SFDA Database Get Salary Total Get Last Year Salaries Query Salary 1 Salary 2 Salary 3 Add Salary Together Display Total
7.
8.
Database Programming Talal
A. Alsubaie SFDA
9.
10.
11.
12.
13.
14.
15.
16.
17.
Demo Talal A.
Alsubaie SFDA
18.
19.
20.
21.
Cascading Style Sheets
CSS Talal A. Alsubaie SFDA
22.
23.
Cascading Style Sheets
(CSS) selector {property: value;} Selector: The HTML element you wish to define. Property: Attribute you wish to change. Value: Value the property takes. Talal A. Alsubaie SFDA
24.
25.
Demo Talal A.
Alsubaie SFDA
26.
27.
28.
Exception Handling Talal
A. Alsubaie SFDA
29.
30.
31.
32.
33.
Demo Talal A.
Alsubaie SFDA
34.
Q & A
Talal A. Alsubaie SFDA
35.
Thank you Talal
Abdullah Alsubaie [email_address] IT Department Saudi Food and Drugs Authority Talal A. Alsubaie SFDA
Baixar agora