Merken

Day 3: Lightning Talks

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
I know and the and the 1 thing at a time and the new woman
in over but ensure that it we all woke up tomorrow in our bank account was it a 0 balance would be the price is the if you use online banking is a very real possibility banks retailers and health care use the same cookie back sessions that are web applications use topic user requests the devil at the present session 0 protocol than developing as part of my graduate studies that aims to protect and session hijacking and provide robust replay prevention so 1st let's review the vulnerabilities of cookie-based session it's 1 thing to note is that sessions are bearer tokens which means the static for the duration of the session and they bear the burden of authenticating all requests there's a number of opportunities to steal his token 1st if the client connection is an encrypted when on during authentication then all bets are off this is why are log and points at least use each year if there's a cross-site scripting vulnerability on our side and we haven't said the HTTP only flight than any injected JavaScript or the party does but library could ship off session cookies to an attacker and also packet sniffing during a session if traffic is unencrypted I'm also provides an opportunity for the session token be stolen and this is called site acting n lastly is on something I haven't seen really and mentioned before is rho browser extension see download a screenshot browser extension on it could be in the background of its given permission and shipping all of your session tokens after attack so I was curious as to how many sites actually use these protections so I developed a browser extension call session Jack that deactivates a cookie that the cookies for each day for a given domain or whatever time based on the protections that are being used if I was still lot then it meant that the protection wasn't being used and what I found was that about 30
per cent of sites and their session tokens are potentially vulnerable across its scripting 50 per cent of sites there session tokens are potentially vulnerable aside jacking and 99 per cent of sites use cookies or the session took I think that we can do better than cookies and this is
why I'm developing such a normal a protocol and the specification is still in flux so I'm not gonna go through it in complete detail on 1st of all of the server creates an opaque token which includes the real session ID so this is a layer on top of our existing session took its electrical encrypted and sent to the client what including and H. Mackey the client users to authenticate subsequent requests H. Mac as a way to prove ownership of a key without revealing the key itself and can also authenticate some associated data in the process and your clients will use a track to authenticate and their request to the server once you have an h max and you can implement 2 types of replay prevention if there's a time stamp in the h max when the server verifies the H. Mac it can rejects stale requests so this is time-based replay prevention you can also have counter based replay prevention in which and the incur some additional server-side storage because the server has to maintain the current count in it and I'd recommend in a bit vector so that you can have some out of order and you can you won't reject requests even if they're out of order and and this is absolutely replayed prevention but requires you to have and an additional cache of basically the counter that each year clients reusing I'd recommend something like readers or whatever underlies the GenGO cash In order to implement that so some of you may know that h max is nothing new and having this kind of opaque token is nothing new but I believe that my particle has a few advantages 1st of all there's a set of face choose the track algorithm in case there's a vulnerability found from for example shall 1 is not allowed and it's only shot 256 in above the the the you can configure the headers that authenticated like for example you have some and cache-control headers that the server be you're the intermediate proxy might not be able to might not have h McKeown in order to to a motherfucker to back and and this optional customer authentication counter based replay prevention is optional and it leverages an existing session infrastructure rather than replace it so it's a layer on top of the existence existing session once the server and often a case the request it d the opaque token and then just passes the session cookie down to Django so you have to modify the application of trees and I have a very early proof of concept implementation is a Django middleware and as a Google Chrome extension up on my of the quick repositories and you can reach me on Twitter except DMZ W K 3 s thank you FIL emotional sort of an obsessive that since the directive technology admitted guns and grew up with the tech department of there to got the group with that of related is to people and we have family of content sites such as in and that kind of images that were involved with and 300 underground well away nobody models in this video minute but we are in front of the kinds of gender-based orders we know we're on his speed of over in genetics which is fun and so you had upgraded and it's terrible because you have to compile it I mean we have about 20 servers give-and-take of across all the sites Venezuela was a US security updates for page be was back in February it was such a lack of wonderment of the I was not going to water I'm way to list of reasons will heavily to deploy the application the so we wrote invincible model for that is the real reform which is probably the best documentation for now that the actual roles or about 100 lines of code and all my disorder rental at the velocity is updated that said no what is the role as the those at the abilities of a this will help members of the so when you have a problem with that the speed of your runner adapted policy this are helpful in the future will have a vendor modeling prejudice so the way that were able to so that that is well because some cool stuff in the interest of what all some cool features with the role of which is the reason we have about 25 roles adjust those 1 want to talk about that the GenGO 1 which is a witness of this will have some cool features which are good for us to review uh so again when you're compiling a genetic should be given a bunch of build options which you can specify where this animal dictionary that the curses Canada right now and these are configurable and extend that you can trade to the real need to do and you'll be able to install genetics of just by specifying the version you want so words worship so it'll and the pay model and so they call piece all which you need to do the pitch work of what it does is actually going to build up using the version numbers this look to see if you have already downloaded and there you have it downloaded all try to install it so always will roll much review although I importance is a very important factor of the run a role twice that should really do anything so it's uh because everything's ordered included should be really downloading it should be really studying a configuration falls restarting sources of it is actually this role is idempotent so I we have a lot of checks and stuff neutron demanded of we parents formal
meaning of will justice so this is actually a moral so and it's all it's of others could agree to people that all of you I'm actually Greek so that's a little bit better this could have an attitude of but anyway it's basically the each of us will take more on the left indicates a step in the in the build process so is intelligent Eisner impacted we can figure of we do source stuff we said variables and then we finally good directory but you gradually progerin and let's site configuration 2 through of 1 coefficient do before the data this is what's known as the clustering ginger filter plaudits as what is gender 4 as its time putting into I wrote because of all the that turns those build that build dictionary pointed out to you before the build options dictionary into the actual command line that's the work compilation steps to so that's all the exams will use in the book and its future and this is about and ties social authentication so I'm Dan Davis and from the National Library of Medicine there are a number of us here and we're switching from Django to GenGO from another a number of other languages especially cold fusion so and chose the chill of but I want to tell you how we integrate gender with NIH like in our corporate identity provider most of the tutorials we see on line about user registration on the web but most the apps we implement only allow Larkin's for corporate users even if their public site is available on the web that was so we want to implement single sign-on With this badge and and we wanted to it in with common code that can be used by multiple internal laps so why is this hard the I mean we may think that you know we can use well remote user middleware with some sort of Apache marginal we may think that they'll will just use some the build up of education where we're supposed to use NIH log in because you know we don't wanna applications handling passwords even if they are SSL on and NIH log is and high social off not only in the sense that we don't want to authenticate Google even though it does technically support that but because it's based on CI CEA site minor which means it is also based on Sam all that would mean every application you to certificate and key tied to the application I'm getting the certificate and he can take like a month heat for totally non technical reasons the and finally we also wanna see the same often our development environment so that our selenium integration tests can handle pages that require authentication so by systems guys will want us to do this by installing CEA site minder and that makes controlling particular pass outside of slasher been something we have to do by committee arm and application may have rest of us in the we made 1 only to protect updates to arrest applet imports but fortunately tooling team has already implemented a cast server and they protect the the log in on that server with CSI reminder on causing to be what we need to integrate to and cast friendly to developers you don't need a certificate for each that and authenticates feral it's not quite as secure though I mean it's really authenticating just the euro but that does mean that local host a thousand can be OK because the rockets shares local those OK I the so our system does not to this and they would still like us to use Apache model this time model of caste we don't wanna go this way we still want customize what URLs are protective ourselves and we still want to see the same thing in the development environment as in reduction so we found that Django cast and the N stands for next generation supports all this they can integrate with the central authentication service it supports protecting mineral range such as slash admin through settings it supports decorators such as 11 required but and we've also enhanced gender class NG but lots of extra security we want some functions to work only within our some so that we want to deploy up so that the admin side and the public side can be deployed together on the same application servers and this is not what we've done with cold fusion and there was some push back on this but we want to make sure that and then uses are only coming from our own set that includes a decorator and middleware and a context processor the context processor help helps us to have a admin navigation in in a web apps so we can show that link only to users who should be allowed to use but thank you but I'm going hang out of their own Porgy if there are any questions and then it
I feel about you all the and and I am acicular something that we do I every week we publish a story and from a woman who uses pipeline and you go so if you are a woman who uses pipelines indoor Django at all you know what I mean and that you know all and who does that so I'm hoping that covers everyone in the room and if you are or no this talk is free of I want you story I want you to e-mail me at story at Django girls . work so what is your origin and story you're
doing story is an interview that's published weekly 2 hour official Jinglebells blog it's blogger . j no girls that word which I publish news story every week I'm the 1 who publishes them it's really exciting all experience levels are welcome it doesn't matter if you need a pipeline or even doing every years we still on here the story and it is a great way to share what you're working on a work here about with the community so on and as Schneider I talked about what time here I have her a couple months ago announces a line so it's great you tried like build of brand or images stored away you care about and there are lots of GC that so I just want to how these are the questions that you would be acid and all the questions are optional and there the questions that we came up with and that we think work but beyond inter every 1 of them if you don't mind a relevant working not like it and how your story we can start tell us about that and what you before becoming a parent and what you unanimous about coding why do you like and what could project sorry working on 7 pretty pretty easy and this
slide is not in the right place and that this is an example of a recent story we had we we share an image of your goal with that and I love the stories to check it out in
the story I'm here that the questions and what in your life are you most proud of because their kids you can save namely that their partner and you could say something you belt and what he curious about what you're doing in your free time and 1 of my favorite parts about this interview series is this question what advice you have for newbies I'm I care a lot about the I care a lot about of alternative programming and you read blogs in these interviews this is where some of the best material comes from it's usually what I use for a tweet I so love to hear that in in different ways to you if attended agenda rather than what is you get out of it how to change your life and that's you can come at that angle either as an attendee impetus then or as a coach and so it does it matter that have had convinced you or major
think somebody who you could talk to you about sharing their story please e-mail me story a general's outward we let the feature you and the . T policy exhibits future
and on a given current and 1 at the start in dimension sexual assault but they're just kind of in the reporting of and so last year our calcium and gave a talk I think it was called at jingle can I think it was called making GenGO really really ridiculously secure or something like that and she mentioned work was about a project called Callisto and who knows what clusters what that and so for those of you don't and Callisto is a tool right now that's used for a for repairing sexual assault on college campuses it was designed to be kind of a more empowering reporting experience of the and it's trauma and formed and is also designed to facilitate the from identification of repeat assailants and so it it's based on this and information escrow concepts so that you can report said something happens to you can repair the details of of what happened to you from work when it's still fresh in your mind of but then decide on your own time when if you can't do anything without reports of belongs to you it's encrypted is stored in this 3rd party place were no 1 really other than you has any legal authority to access it and even if the subpoenaed by court or it's or encrypted and you can only decode it so and they can even get it that way I and then you can decide if you wanna report that to an authority on but the really great thing is a has a matching feature where on you can only identify your assailant right now it's the Facebook euro since almost everyone has Facebook I'm and then and say if anyone else reports the same as they were then ordered you automatically report and so both of your reports at that moment we and get reported to the proper authorities were evidence from so Susan college campuses but it's kind and it's it's it's it's a general you know that the system in the course of reporting the machinery could be used in a variety of situations that could be used and in the workplace or in the military and they have a place where they were kind of reporting confidential information from about something that happened you the world be important like this can be used and so this entire this is among the various but on organizers but on Thursday and Friday to make a and their cluster recently open source the kind of underlying escrow coding encryption of reports and all that and then we're going to work on making a generic and Django app that kind provides an example of how you could of implement that stuff in kind of a generic way hopefully that other other places could then some use in their own kind of organizations and so if you're interested in working on and find me tomorrow morning I'm there's a a channel in the this than the general COMSOC called Sprint Callisto and so you you can find us in there and once we should know where we are tomorrow and and I we could use basically I can imagine the scale that we couldn't use like our work was carried out tradition writing from back in developments design work from efficient has like any kind of experience with like trauma form to design like that would be super useful but really but I think whenever you want have your help ensure we can find reference that work so they do the few bytes of who he has
heard of gender makeup of a work with you and that was the 1st it is as a librarian makes conferences and know it generates configuration files of the so why would you want generate a configuration file and so that's probably Bollinger you have this whole ecosystem made there and it's always right the 1st time I'm sure anybody who's used to have you here right but I've been you of Platform stuff it's really simple and I need to get like 1 setting into my application who uses her rope Elastic Beanstalk OK I tirelessly things out but I think of a social worker OQ 2 and if anybody wants to help you make it work for her review a cover in the last slide on but basically I want to use my Jago settings flowery have to just generate other files like adaptor file or something like that and rather than having some all of the ecosystem so I mean it's really complicated system that uses jagged templates which we already know and love and Jagger settings with reality known love to create other files so I'm using my pride in his configuration I has different settings files based on material using and I just include a couple extra settings in these files or you settings already got to make my templates were so you might end up including AWS but means for deployment or role names or resource locations and you might put these things in any files from files Dr. files whatever the this is an example of generating of there's a template you'd use to generate from your settings and you can see it's sitting like the credentials location which is going to be a linked data view us and I can Elastic Beanstalk role name in this case that don't use the bottom of the site's shorten the lattices and actually LAWS works and that that someone slide them anywhere that it is again a couple of things that coming from you settings that that I and you know you could use that to the poor different credentials based on material that hopefully not using the same credentials and problems that the nodes and I I also made a little harder to get us settings from the environment into the temple and ends up working like a filter so you have to leave the load may come together environ b but the this is like he built this is in the audience and this uses Jenkins environment variables to put a little further in In a sense of the nodes which like did my did my hair code deploys is the release of thought it was on that's just getting in the environment variables on and the set up user map this 2 is there but this is the sort of make a map and you're saying I wanna make a file called file and I wanna make it from this template and it will have access to your settings in your environment and that's is gonna generate a doctor file in the current directory the other way to do it is with the elastic means of models and I can imagine having a local models also this you have to have they're not published because they're all secret secret of not my job but you can have models for like different things you over the head chatter few Sassanid need certain dependencies that is of little model the drop and this this lets you put them kind of an ordering case 1 is needed before and then use running with the management commands idealism in my Jenkins built in Munich at the settings you wanna use run Conf generates files it's magic it shows that
in progress so I think you at the my name is then someone the partners that bolt
affect the Django web on agency in Greenville South Carolina but last year I did a lightning talk on fabric ball which is a Django project on we support that allows you run fabric deployments right from your browser TV approach manager click a button and goes as so it's really cool at the end so that's there were up as your reasons but just added channels to that project so Jarrod has a penny poorly procedure is that right I had no idea what is ahead mode in there so anyway we're going to get that which that's it he wants the challenge running real product there you go when talk about those things that I share with my students at the I'm not I'm a an instructor for the idea that we help people moving into programming careers that are for as so non-programmers returning programmers it's really awesome but so this research but that suggests that teaching the mechanism of how the brain grows but when it's challenge increases performance so you learn better if I tell you a little bit at a higher brain works what we need now is
learning is kind of like a tracking across the Appalachian Trail not climb Mount Everest so we're talking about a learning complex skills like programming you can do this over a lifetime highs and take a long time
there are 2 things I wanna talk about real quick before we dive and cut the comfort zone and on kind of a we're glad there's
where you basically have a cop covers only no learning is happening without the learning zone where you pushes up to learn something new to other panics and we'll freaking out OK what we wanna try to do is get as close to the panic zone as possible while staying in that learning and maximize what's happening now the reason for that is
ever for learning is a longer lasting and more versatile but learning is built on the shoulders of habits of things you do on a regular basis is higher in 1 not be aware of cognitive bias so we oftentimes the we know stuff when we don't so test yourself but be aware of fossil perceived fluency but you can read something 10 times and that doesn't mean you actually know something right so just re reading these events times maybe not be so helpful but retrieval
interrupts forgetting and straightens retrieval pathways so the way your brain works is your connecting use Monsignor brain together through these pathways and as you try to retrieve information from your brain whether or not to get the right answer it turns out that actually helps your learning now to come up with the wrong answer we you got the right answer a close at hand I you know what I just have the wrong answer that doesn't help but just the act of trying to retrieve helped you 1 but make retrieval harder with space reputation and interleaving interleaving is this idea of having multiple topics but so I would suggest if you're trying to learn a little bit of advanced CSS that you go ahead and sprinkling and sounds equal queries that that's a unique interleaved topics which helped you forget this yes as the you're just working on and then you come back and you retrieved that information and that that will actually increase for learning but times up comes before your talk how of learning styles or overrated I always
came to extract principles and rules so you wonderful concepts out of things that you're learning that you can apply them in a different context the collaborate on newly
gained knowledge so as you're bringing in new knowledge you wanna kind of beef that up a little bit but this is a lottery so I will post these slides will will have them the right but because of what effect I can't I get this that is if you wanna read all but I'm I'm house sounds completely weird that totally works is people have memorized thousands of digits of pi i there's no limit to what your brain can actually store we have an at least found what that when it is so that you needed kind works to use for things in there and creative ways but it turns out that intellectual
ability is fixed knowledge are born with some amount of information that you can store and that's it so mind set and learning actually changes your brain and which so it's in step and I state come so if you get that have zones you trying bite off a little bit more than you can chew that actually causes your brain to loosen the this city there and that's the 1 I even if you're doing some challenging once they come In review here's all the things that we just learned about learning a nicer and that's it prevents things
few old argument was if you don't really fast and so let's say you have an idea of the best thing ever you do a gender adviser over the best thing ever because of questionable that's the averaging of you do get in it because you're responsible develop will put this in source control it at but it can it an Initial commit it was on a master this is not something you should do do because what he does that and you just committed to a secret key to a probably open repository because you're probably using get have like most of the room and so you have made a huge mistake we have minute was that what we do is
what is the theory yes it used for yes you have made a huge mistake about this here's what I here's a list of what is the key is used for Signed that he's figure sessions password reset ogons shout out to Russell what is now to me yesterday and I went looking source and yes the pattern recent organs are generated from the secret key so that means if your is your is public someone can impersonate your users and potentially eating their passwords this is bad what do you do about the show a big block of code it's for 1 reason the slightly positive going to the ends you don't understand that is a kind of a point of view you should be putting its secret things in environment variables Membros can actually live in the environment where they can live as ever graphology import but they should not live in source control has been lot what of code is that you do this and this is a should be accessing secret keys if you have a step is that exceed the reduction please use environment variables the OK as he made as you carried energies you can put in viral and not have to use be act the 2 0 really easy ways 1 is used as web tool and and if you it will generate a 50 character Django secret key if you are super paranoid and always eat every even touch the internet is this this will prove that kind of America is but it's include in the standard library enjoying over easy use of you may be as use of OK well that it was a good he 1 of my users will that habit and if I wrote him as if the force that will happen is that they will have to log in again because the session cookies 101 a valid however them having in again is way better than their accounting hacked and I'm calling you know the I there's an optional step which is you can have not have a permanent key if you have an off mechanism like some or that of a discussed earlier that doesn't rely on session keys and session cookies then you don't need to have a policy gradient doesn't matter if you start and so think about this but I really investigate whether this is going to work for you have that is it also I'm giving a talk at 1 about more general security issues and at 1 15 in here I'm going to try to run at a very large game of cat on your head is a game that you play sitting down in the conference and is better with large was people to 115 come back here and place and Canada had that's going to the slides you want my block of how I get my variables and I'm giving of other 130 areas at that I thank you to it
and has a rank area and that's what I'm from and apology alone and of flown like what and those in the light to get to that does this conference so you with this this week so thank you so much for having me if I could have how he has a stunning and when the sun sets that like it'd be more you lots of that
it goes under that article by going in them it is happening on September 24 and 25 on last year we had and band-limited like that capital of are some people before to it but this year we have shifted to not which is the actual capital of India New Delhi and just to give you stats the number of attendants the bike and the last year was 1 thousand 137 of those many people actually add in the conference and the ticket price for the conference as 25 dollars this it gives selected as of confidence in terms of food and like me like thousand people in that do this this if you think it's cheap people so they become about at all mn set price so I get that
that's how the name I think it's likely by them and burglar button instead of just a few of you for the conservative then I was actually there is this
in the last years of that service station would I and that the left if you see me and so on and so this is like localization happens all over there and if you're not as we have a different you with just the mean that's not that s high contrast thousand 100 people had been in force since we would just starting with the letter S C or have allowed together we can think of that as like secession all of the things that like really funny is turned on and
all of the cup of the
idea that the intelligent that's there and from that well that's the end now and in the length of the Muslim designing this conference and it's been amusing so far and I also known as a commission from my candidacy of 0 yeah bridge you might known in a little bit and read about it later I think accomplished that but originally
and a couple of voters again that's not looking being setting things up that's disciplines that we have in the 1st day and yet that's that will help the government's looks like it's full and you don't have this going on the yes and no whom that's like the picture from last year and
also this year we haven't 165 for of proposals of me that the music going on not 17 finalized
and we them at the diner goes watchable over there and then when I was 1 of the colleges so the communities pretty interesting that about the movement of goods in almost every state and yeah that's the patterns of the Society of India which actually runs all these things together it's like 0 on the role of that and we also
have this interesting thing called about and express that says that if you are an organization or institution and want to conduct but much of the design of all of them and the community people actually say we won't get a common the 2 of them so it's like a middle middle layer between people who want to learn and be wounded he's uh so that also the the idea that some of the laws of the land and about the next president of the things but that's my blog like about this and as 1
would or the regions and from that and there are signs I have flag on multiple interviews and on that you get accepted into the US of
the Vatican and if I but and this is to you see how
the issues of this
Einfach zusammenhängender Raum
Beobachtungsstudie
Web Site
Punkt
Protokoll <Datenverarbeitungssystem>
Browser
Web-Applikation
Zahlenbereich
Systemaufruf
Token-Ring
Service provider
Computeranimation
Summengleichung
Client
Domain-Name
Cross-site scripting
Softwareschwachstelle
Reelle Zahl
Mereologie
Programmbibliothek
Cookie <Internet>
Authentifikation
Telebanking
Spyware
Maßerweiterung
Bit
Prozess <Physik>
Extrempunkt
Familie <Mathematik>
Gruppenkeim
Versionsverwaltung
Formale Grammatik
Kartesische Koordinaten
Zählen
Computeranimation
Richtung
Homepage
Videokonferenz
Netzwerktopologie
Client
Algorithmus
Existenzsatz
Zeitstempel
E-Mail
Gerade
Umwandlungsenthalpie
Addition
Dokumentenserver
Computersicherheit
Gebäude <Mathematik>
Google Chrome
Ausnahmebehandlung
Quellcode
Natürliche Sprache
Teilbarkeit
Konfiguration <Informatik>
Twitter <Softwareplattform>
Menge
Beweistheorie
Server
Ordnung <Mathematik>
Schlüsselverwaltung
Geschwindigkeit
Proxy Server
Web Site
Wasserdampftafel
Implementierung
Zahlenbereich
Fluss <Mathematik>
Code
Informationsmodellierung
Weg <Topologie>
Reelle Zahl
Datentyp
Inhalt <Mathematik>
Maßerweiterung
Speicher <Informatik>
Konfigurationsraum
Bildgebendes Verfahren
Protokoll <Datenverarbeitungssystem>
Mailing-Liste
Token-Ring
Vektorraum
Quick-Sort
Data Dictionary
Middleware
Softwareschwachstelle
Caching
Cookie <Internet>
Authentifikation
Wort <Informatik>
Entropie
Partikelsystem
Zentralisator
Bit
Prozess <Physik>
Gemeinsamer Speicher
Compiler
Formale Sprache
Kartesische Koordinaten
Login
Service provider
Computeranimation
Homepage
RPC
Nichtunterscheidbarkeit
Gerade
Softwaretest
App <Programm>
Lineares Funktional
Computersicherheit
Quellcode
Kontextbezogenes System
Auswahlverfahren
Arithmetisches Mittel
Generator <Informatik>
Dienst <Informatik>
Menge
Registrierung <Bildverarbeitung>
Geschlecht <Mathematik>
Koeffizient
Server
URL
Verzeichnisdienst
Programmierumgebung
Message-Passing
Web Site
Klasse <Mathematik>
Zahlenbereich
Code
Spannweite <Stochastik>
Benutzerbeteiligung
Variable
Informationsmodellierung
Passwort
Coprozessor
Softwareentwickler
Konfigurationsraum
Hilfesystem
Digitales Zertifikat
Systemverwaltung
Physikalisches System
Binder <Informatik>
Ordnungsreduktion
Quick-Sort
Data Dictionary
Integral
Middleware
Authentifikation
Single Sign-On
Web log
Atomarität <Informatik>
Mixed Reality
Vererbungshierarchie
Wort <Informatik>
Gerade
Bildgebendes Verfahren
Computeranimation
Übergang
Rechenschieber
Impuls
Videospiel
Web log
Twitter <Softwareplattform>
Mereologie
Reihe
Äußere Algebra eines Moduls
Optimierung
Bildgebendes Verfahren
Computeranimation
Autorisierung
Zentrische Streckung
App <Programm>
Facebook
Momentenproblem
Selbst organisierendes System
Open Source
Hausdorff-Dimension
Systemidentifikation
Physikalisches System
Computeranimation
Bildschirmmaske
Chiffrierung
Projektive Ebene
Information
Softwareentwickler
Cluster <Rechnernetz>
Drei
Hilfesystem
Verkehrsinformation
Varietät <Mathematik>
Web Site
Subtraktion
Kartesische Koordinaten
Gesetz <Physik>
Systemplattform
Code
Computeranimation
Überlagerung <Mathematik>
Knotenmenge
Informationsmodellierung
Variable
Datenmanagement
Arithmetische Folge
Prozess <Informatik>
Minimum
Elastische Deformation
Tropfen
Konfigurationsraum
Schreib-Lese-Kopf
Template
Ideal <Mathematik>
Physikalisches System
Elektronische Publikation
Rechenschieber
Arithmetisches Mittel
Mapping <Computergraphik>
Generator <Informatik>
Verbandstheorie
Menge
Geschlecht <Mathematik>
Last
URL
Programmierumgebung
Verzeichnisdienst
Kraftfahrzeugmechatroniker
ATM
Bit
Programmiergerät
Browser
t-Test
Biprodukt
Komplex <Algebra>
Algorithmische Programmiersprache
Computeranimation
Weg <Topologie>
Benutzerbeteiligung
Datenmanagement
Rechter Winkel
Projektive Ebene
Optimierung
Extrempunkt
Zeitzone
Computeranimation
Information Retrieval
Arithmetisches Mittel
Softwaretest
Bit
Interleaving
Basisvektor
Abfrage
Abgeschlossene Menge
Information
Raum-Zeit
Interrupt <Informatik>
Hilfesystem
Ereignishorizont
Computeranimation
Soundverarbeitung
Rechenschieber
Bit
Digitalisierer
Inverser Limes
Schlussregel
Kontextbezogenes System
Computeranimation
Parametersystem
Bit
Geschlecht <Mathematik>
Mittelwert
Endogene Variable
Mathematisierung
Versionsverwaltung
Information
Schlüsselverwaltung
Zeitzone
Computeranimation
Punkt
Selbst organisierendes System
Versionsverwaltung
Physikalische Theorie
Code
Computeranimation
Gradient
Internetworking
Variable
Benutzerbeteiligung
Rangstatistik
Spieltheorie
Mustersprache
Programmbibliothek
Passwort
Schreib-Lese-Kopf
Kraftfahrzeugmechatroniker
Sichtenkonzept
Computersicherheit
Mailing-Liste
Quellcode
p-Block
Ordnungsreduktion
Rechenschieber
Energiedichte
Flächeninhalt
Forcing
Cookie <Internet>
Computerunterstützte Übersetzung
Schlüsselverwaltung
Programmierumgebung
Bereichsschätzung
Zahlenbereich
Term
Computeranimation
Dienst <Informatik>
Forcing
Arbeitsplatzcomputer
Stellenring
Kontrast <Statistik>
Computeranimation
Abstimmung <Frequenz>
Dicke
Bridge <Kommunikationstechnik>
Computeranimation
Lesen <Datenverarbeitung>
Selbst organisierendes System
Gruppe <Mathematik>
Mustersprache
Güte der Anpassung
Gesetz <Physik>
Computeranimation
Aggregatzustand
Multiplikation
Vorzeichen <Mathematik>
Fahne <Mathematik>
Computeranimation

Metadaten

Formale Metadaten

Titel Day 3: Lightning Talks
Serientitel DjangoCon US 2016
Teil 32
Anzahl der Teile 52
Autor Sauber, Andrew
Caratzas, Justin
Davis, Dan
Lowe, Adrienne
Daum, Kevin
McCreadie, Ethan
Dietz, Dan
James, Phillip
Ibrahim K.V., Haris
Lizenz CC-Namensnennung - Weitergabe unter gleichen Bedingungen 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen und nicht-kommerziellen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen und das Werk bzw. diesen Inhalt auch in veränderter Form nur unter den Bedingungen dieser Lizenz weitergeben.
DOI 10.5446/32686
Herausgeber DjangoCon US
Erscheinungsjahr 2016
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract 00:15 - Andrew Sauber 05:04 - Justin Caratzas 09:21 - Dan Davis 14:02 - Adrienne Lowe 17:10 - Kevin Daum 20:52 - Ethan McCreadie 25:02 - Dan Dietz 29:56 - Phillip James 32:56 - Haris Ibrahim K.V.

Ähnliche Filme

Loading...