SlideShare a Scribd company logo
Curriculum:
Authentication, Validation & Basic Testing
Spring, 2016
Authentication, Validation, & Testing PART 1
1.) Authentication (~ 60 minutes)
2.) Validation (~ 30 minutes)
3.) Pairing (~30 minutes)
Agenda
Introductions
Matthew Gerrior
Devpost, Head of Engineering
ABOUT ME
● Grew up outside Boston
● Went to school upstate
● Worked in consulting for ~ 3.5 years
● Got tired of building other people’s products
● Moved to NYC to join Devpost (known as
ChallengePost at the time)
devpost.com/MGerrior

Recommended for you

Web 2.0 security woes
Web 2.0 security woesWeb 2.0 security woes
Web 2.0 security woes

This document is an agenda for a talk about Web 2.0 security woes. The talk will discuss how Web 2.0 applications have changed some threats and vulnerabilities compared to previous generations of web applications. While some threats have changed form, many of the same types of vulnerabilities still exist. The talk will provide examples of cross-site scripting and hidden functionality vulnerabilities. It will also discuss steps that development teams and customers can take to help improve security, such as training, secure coding practices, and involvement of security personnel throughout the development life cycle.

authenticationcaptchasensepost
Top Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.NetTop Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.Net

The document provides 10 tips for securing ASP.NET applications. It discusses common web attacks like cross-site request forgery and session fixation, and defenses against them such as using secret tokens and regenerating session IDs. It also covers proper use of cryptography, input validation, authorization, cookies, password security, and restricting application trust levels.

SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management

This presentation is a result of research and evaluation for SSO and IDM majorly focused to Drupal CMS. Enterprises, corporations and companies with multiple web properties are struggling to provide a better user experience and offer a single "corporate ID" and "Password" as the key for all. This single ID should be used across all the properties and corporations should still be able to manage the access level and permission of the respective user based on the grants assigned to this ID in each web property.

ssoidmdrupal cms
Devpost
Get an inside look at Dev teams who are hiring
ABOUT US
● Online Hackathons (Uber, Oculus, AT&T)
● In-Person Hackathons (PennApps, HackNY)
● Developer Portfolios to showcase skills,
technologies, projects
● Team Pages give an inside look at hot
startups in NYC (Blue Apron, Buzzfeed,
Genius)
devpost.com/teams
ScriptEd
Coding Skills for under-resourced schools
ScriptEd equips students in under-resourced schools with the fundamental
coding skills and professional experiences that together create access to
careers in technology.
● GitHub accounts from Day 1
● Two hackathons every year
● Field trips to Tech Companies
● Summer internship opportunities
Authentication
Cookies

Recommended for you

Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong

JWTs provide a more secure and scalable alternative to cookie-based authentication. JWTs contain encrypted user information that is verified on the client-side and transmitted with each request, avoiding the need for database lookups on the server-side. In contrast, cookies require server-side sessions and database lookups to validate the user on each request. JWTs also enable cross-domain requests and work across mobile and web platforms, while cookies have limitations in these areas. Developers are advised to use a third-party service to handle JWT generation and verification rather than implementing it themselves.

jwtstatelesssaas
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications

Everyone building a web application that supports user login is concerned with security. How do you securely authenticate users and keep their identity secure? With the huge growth in Single Page Applications (SPAs), JavaScript and mobile applications, how do you keep users safe even though these are 'unsafe' client environments? This presentation will demystify HTTP Authentication and explain how the Next Big Thing - Token Authentication - can be used to secure web applications on the JVM, REST APIs, and 'unsafe' clients while supporting security best practices and even improving your application's performance and scale.

jwtcsrfspa
Html5 Fit: Get Rid of Love Handles
Html5 Fit:  Get Rid of Love HandlesHtml5 Fit:  Get Rid of Love Handles
Html5 Fit: Get Rid of Love Handles

According to HTTPArchive.org the average web page is now larger than the original DOOM installation application. Today's obese web is leading to decreased user satisfaction, customer engagement and increased cost of ownership. Research repeatedly tells us customers want faster user experiences. Search engines reward faster sites with better rankings. Small, fast sites are cheaper to develop, maintain and operate. - Why has the web become obese? - What actions can developers and stakeholders do to combat their morbid obesity? - Are these actions expensive or hard to implement? This session reviews what customers want and how to identify your web site's love handles. More importantly you will learn simple techniques to eliminate the fat and create a healthy, maintainable, affordable web development lifestyle that produces the user experiences your customers want to engage with over and over.

csswebsitehtml5
Cookies
- Key-value data pairs
- Stored in the user’s browser
- Stored until they reach their specified expiration
data.
Cookies
Cookies
Good for:
- Storing temporary data
- Storing data that isn’t sensitive
Bad for:
- Storing permanent/persistent data
- Storing sensitive data like passwords or
shopping carts
Cookies

Recommended for you

Our application got popular and now it breaks
Our application got popular and now it breaksOur application got popular and now it breaks
Our application got popular and now it breaks

Our application got popular and now breaks under load. The document discusses common issues that cause applications to break as user load increases, such as overuse of shared scopes, inefficient database queries, and slow client-side performance. It provides examples of better approaches and techniques to optimize performance, such as using distributed caching, improving query efficiency through joins, compressing assets, and prioritizing critical CSS and JavaScript.

application performance
Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016

You can improve how well your website works and looks across different devices using responsive web design techniques. But did you know you can also improve access for all users, including those with disabilities, by applying responsive techniques? Learn how.

responsive webweb designmobile
Difference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.netDifference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.net

Authentication verifies a user's identity by having them log in, while authorization determines which resources and pages the authenticated user has access to. For example, after authenticating normal and admin users on a website, authorization would prevent normal users from accessing admin pages. Authentication occurs before authorization and verifies the user, even if anonymously, while authorization checks the user's access rights after identity is confirmed.

authentication and authorization in asp.net
Why is it bad to store sensitive data or persistent
data in a cookie?
- Very easy for users to delete cookies
- Doesn’t persist across browser sessions/devices
- Easy to steal/manipulate cookies
Cookies
Cookies
Cookie Jars
Rails also provides access to two
cookie jars:
- “Signed” cookies prevent
tampering by the end user by
signing the cookies with your
applications “Secret Base Key”
- “Encrypted” cookies are secured
even further by first encrypting
the values, and then signing them
with the “Secret Base Key”
Cookie Jar

Recommended for you

Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Microsoft Azure Identity and O365
Microsoft Azure Identity and O365

Identity and Access (AD), Azure and Office 365: Building a Single Page Application (SPA) with ASP.NET Web API and Angular.js using Azure Active Directory to Log in Users

azure
Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion

A number of years ago I presented a talk at cfObjective on building an advanced, custom CF error handler. This talk will go above and beyond that, covering not just CF but JS/Ajax and SQL Server error logging and strategies for debugging errors on live sites. Developers should come away from this talk with lots of ideas for both custom code they can add to their sites as well a variety of open source and 3rd party solutions for error logging and use site analytics to track and fix issues on their live sites. Blog articles expanding on the information presented in this talk will also be published concurrent with the presentation at coldfusionmuse.com.

error handlingcoldfusionbug tracking
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...

The document provides an overview of 10 best practices for AWS Identity and Access Management (IAM). It discusses creating individual users and managing permissions with groups. It also covers granting least privilege, configuring strong password policies, enabling multi-factor authentication for privileged users, using IAM roles for EC2 instances and sharing access. Additional best practices include rotating security credentials regularly, restricting access with conditions, and reducing reliance on root users. The document is copyrighted material from Amazon.

reinvent-security-trackreinventaws
Session
Session
How can we tell which user is making a request to
our site if HTTP requests are stateless?
Rails stores a cookie on the user’s browser
containing their session hash.
- Secure
- Tamper-Proof
- Expires when the browser is closed
Session
Session

Recommended for you

Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)

We already showed you how to build a Beautiful REST+JSON API(http://www.slideshare.net/stormpath/rest-jsonapis), but how do you secure your API? At Stormpath we spent 18 months researching best practices, implementing them in the Stormpath API, and figuring out what works. Here’s our playbook on how to secure a REST API.

rest designrest securityapi security
Build A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON APIBuild A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON API

REST+JSON APIs are great - but you still need to communicate with them from your code. Wouldn't you prefer to interact with clean and intuitive Java objects instead of messing with HTTP requests, HTTP status codes and JSON parsing? Wouldn't you prefer to work with type-safe objects specific to your API? In this presentation, Les Hazlewood - Stormpath CTO and Apache Shiro PMC Chair - will share all of the golden nuggets learned while designing, implementing and supporting multiple clients purpose-built for a real-world REST+JSON API. Further reading: http://www.stormpath.com/blog Stormpath is a user management and authentication service for developers. By offloading user management and authentication to Stormpath, developers can bring applications to market faster, reduce development costs, and protect their users. Easy and secure, the flexible cloud service can manage millions of users with a scalable pricing model.

rest clientrest designrest
User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...

An overview of user authentication and authorization in the Galaxy project, and they can use it to authorize Galaxy to access their private resources on cloud, and how Galaxy implements the flow leveraging OpenID Connect protocol and Role-Based Access Control model to obtain temporary credentials.

galaxyauthenticationauthorization
That looks like the cookies you just taught us about,
why do we need both?
The session is an entire hash that gets stored in a
secure cookie that expires when the browser is
closed. Each value in the cookies hash is stored as an
individual cookie, since they are key-value data pairs.
Session
- Not really a hash, that’s just how Rails presents it
to you to make it easier to work with. Cookies
are not hashes either.
- Size of an individual cookie is limited to roughly
4kb, which is sufficient for normal usage, but
prevents them from acting as a database of any
sort.
Session
Session
Which Session Store should I choose?
- Cookie store is the default, and recommended
store. It’s lightweight and requires zero setup in
a new application to use.
Session

Recommended for you

Web Development for UX Designers
Web Development for UX DesignersWeb Development for UX Designers
Web Development for UX Designers

An overview of web development essentials that will help you as a user experience designer to not only understand how to integrate designs with development components, but also to learn some tips on interacting effectively with developers.

user experience designhtml5web development
Pec4 final version cortina.pptx
Pec4 final version cortina.pptxPec4 final version cortina.pptx
Pec4 final version cortina.pptx

El documento propone dar acceso a los pacientes a su información médica de forma sencilla a través de la red, garantizando la protección de datos y definiendo políticas y procedimientos para gestionar la implementación. Se describen los derechos de los ciudadanos al acceso electrónico, como la seguridad y confidencialidad, así como posibles restricciones y elementos a considerar de la ley, como notificaciones electrónicas y gestión de documentos digitales.

ley 11/2007
POSTER 1
POSTER 1POSTER 1
POSTER 1

This study investigated the ability of two deep eutectic solvents (DESs) to extract lignin from different types of waste paper. The results showed that both DESs could selectively dissolve lignin from the waste paper, with magazine paper providing the highest absorbance and estimated lignin concentration. Figure 5 and 6 indicate that LC1.25:1 dissolved more lignin than UC2:1 from the same amount of paper. The maximum amount of lignin dissolved in each solvent is shown in Table 1. The conclusions state that DESs show potential for lignin extraction from lignocellulosic materials like waste paper but require further research to optimize the process.

Why would I use a different store then?
- You need more than 4kb of session data
- You probably don’t, but sometimes you do
- Cookies are sent along with every request you
make
- Bigger Cookies means bigger (and slower)
requests
Session
- If you accidentally expose your
“secret_base_key”, users can change their
session data
- Since the key is used to sign/encrypt the
cookie, exposing the key exposes the
session
- Storing the wrong kind of data is insecure
- Vulnerable to attacks like the replay attack if
sensitive data stored in cookie
Session
What is it useful for besides knowing which user is
currently logged in?
Session
Session

Recommended for you

4.1.4torque
4.1.4torque4.1.4torque
4.1.4torque

This document repeats the subject name "Applied Electrical Technology 1" multiple times without providing any other details. It focuses solely on one topic, Applied Electrical Technology 1, but does not give any explanation or context about what that subject entails.

technologyelectricalapplied
Les a2 1 2-2012
Les a2 1 2-2012Les a2 1 2-2012
Les a2 1 2-2012
Professional Media Kit for Alex Ihama (v2017)
Professional Media Kit for Alex Ihama (v2017)Professional Media Kit for Alex Ihama (v2017)
Professional Media Kit for Alex Ihama (v2017)

This document provides a media kit for Alex Ihama, an executive coach, leadership consultant, inspirational speaker, and author. It summarizes his experience working with governments, corporations, churches, and schools over two decades. He travels extensively each year, enabling thousands to achieve leadership effectiveness, organizational success, and personal fulfillment. The document includes testimonials from clients praising Ihama's engaging speaking style and ability to motivate and challenge audiences to improve themselves and achieve their goals. It also lists categories of frequently requested speaking topics and sample videos available on YouTube.

Flash
Flash
Special “hash” that persists only from one request to
the next. A self-destructing session hash.
Commonly used for sending messages from the
controllers to the view, because they persist across a
redirect from a “New Object” form to the details
page for that object.
Flash
Flash

Recommended for you

Leeson plan for Septa3
Leeson plan for Septa3Leeson plan for Septa3
Leeson plan for Septa3

This training provides employees information on protecting themselves from nanoparticle titanium dioxide exposure. It defines nanoparticles as less than 100 nanometers and notes titanium dioxide is commonly used but also produced as nanoparticles, which studies show can cause greater health risks than larger particles. The training objectives are to define nanoparticles and titanium dioxide, discuss health hazards from exposure, and explain proper protective equipment to reduce risk. It will include a presentation, discussion of protective gear, and a quiz to evaluate learning.

LocalGeo Торговый центр
LocalGeo Торговый центрLocalGeo Торговый центр
LocalGeo Торговый центр

Путеводитель по торговым центрам

Introducing Virtual Reality in Your Geography Classroom
Introducing Virtual Reality in Your Geography ClassroomIntroducing Virtual Reality in Your Geography Classroom
Introducing Virtual Reality in Your Geography Classroom

This document introduces using virtual reality in geography classrooms. It discusses how virtual reality can provide situated cognition, active learning, and social interaction. It provides details on virtual reality hardware like Google Cardboard and apps that are available. The advantages of virtual reality for education include being highly motivating and engaging for students, allowing active participation and learning at their own pace. Potential disadvantages include costs, availability of equipment, and concerns about health, safety, and educator reluctance.

k-12 geography educationgeographic education
Flash
Flash
Why can’t I just use instance variables?
Instance variables only exist for the current request,
and are lost when a new request takes place such as
when the user is redirected.
Flash
What if I’m not redirecting the user and I’m just
rendering a page?
Make flash messages available to the current
request using flash.now just like you would with a
regular flash.
Flash

Recommended for you

eidan mosa ali alzahrani- evaluation and measurement- educational administration
eidan mosa ali alzahrani- evaluation and measurement- educational administrationeidan mosa ali alzahrani- evaluation and measurement- educational administration
eidan mosa ali alzahrani- evaluation and measurement- educational administration

eidan mosa ali alzahrani- evaluation and measurement- educational administration

measurementevaluationalzahrani
Grobuchkina tsc ekbpromo_almaty_2016
Grobuchkina tsc ekbpromo_almaty_2016Grobuchkina tsc ekbpromo_almaty_2016
Grobuchkina tsc ekbpromo_almaty_2016

Conference Logistics of future in Kazakhstan 2016

logisticsekbpromokazakhstan
Sklad russia 2016
Sklad russia 2016Sklad russia 2016
Sklad russia 2016

Sklad Russia 2016

ekbpromowarehouse
Devise
Devise
Flexible authentication solution for Rails with
Warden.
https://github.com/plataformatec/devise
Authenticating users is easy. I’ll just build a
SessionsController with some CRUD actions and
store the user id in the cookie. Problem solved.
Devise
No. Authenticating users is not easy. What about:
- Securely storing user passwords
- Confirming email addresses?
- Log in With Twitter/GitHub/Facebook?
- Forgot Password email?
- Remember me checkbox?
Devise

Recommended for you

Resumen Phyla reino Animalia
Resumen Phyla reino AnimaliaResumen Phyla reino Animalia
Resumen Phyla reino Animalia

Este documento presenta una clasificación de los animales en diferentes filos y subfilos. Describe sus características organizacionales, la presencia o ausencia de notocorda y cavidades celómicas, y si su simetría es radial, bilateral o amorfa. Divide a los animales en protozoos, mesozoos, parazoos, poríferos, radiados, acelomados, pseudoceolomados, celomados, protóstomos y deuteróstomos.

filosfilareino animal
(Webinar Slides) Choosing Legal Tech for Your Office
(Webinar Slides) Choosing Legal Tech for Your Office(Webinar Slides) Choosing Legal Tech for Your Office
(Webinar Slides) Choosing Legal Tech for Your Office

This document discusses choosing legal technology for a law office. It covers selecting the right hardware like laptops, tablets, printers and peripherals. It also discusses using cloud storage versus on-site storage and the security considerations of each. The document reviews choosing document handling, email and creation software like Adobe Acrobat, Microsoft Office 365 and when to upgrade technology. It provides tips on setting up technology on a budget and recommends the best upgrades for increased productivity.

choose legal techmycase legal practice managementlegal webinar
Fijacion del nitrogeno ppt
Fijacion del nitrogeno pptFijacion del nitrogeno ppt
Fijacion del nitrogeno ppt

El documento describe el nitrógeno y su importancia para los organismos vivos. Explica que el nitrógeno se encuentra principalmente en la atmósfera como N2 gaseoso y que puede ser fijado por procesos biológicos o industriales para convertirlo en formas utilizables como amonio o nitrato. También describe el ciclo del nitrógeno y los principales procesos de fijación biológica del nitrógeno realizados por bacterias y otros microorganismos.

You’re not getting paid to build an authentication
system (unless you are), you’re getting paid to build
a new and exciting product that no one has ever
built before.
Devise
Hashes and stores a password in the database to
validate the authenticity of a user while signing in.
Devise
Database Authenticatable
Adds OmniAuth (sign in with
Twitter/Facebook/GitHub/whatever) support.
Devise
Omniauthable
Sends emails with confirmation instructions and
verifies whether an account is already confirmed
during sign in.
Devise
Confirmable

Recommended for you

Passive voice
Passive voicePassive voice
Passive voice

The document discusses the passive voice in verbs. It explains that there are two types of verb voices: active and passive. The passive voice is used when the focus is on the action rather than the subject performing the action. The passive is formed by using the verb "to be" in the correct tense plus the past participle of the principal verb. Several examples are provided to illustrate transforming sentences from the active to passive voice for different tenses. The document also discusses forming the passive voice when there are two objects, impersonal passives, and the causative passive.

doc
docdoc
doc

KeepSwitch does not have a marketing plan and is unsure of their budget. The group recommends Option 4: increasing prices to $200+$100 per additional person, aiming for a 1% market share with an advertising budget of 8.1% of sales. Option 4 returns the highest net profit of $161,705 with a breakeven of 732 units, allowing KeepSwitch to invest in features like photography and expand to more cities quickly. The recommendations are supported by market research and industry benchmarks.

CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat

Dale Olds, VMware A pinch of authentication theory and methods, a taste of the sweet and the bitter of the much maligned password, and then larger portions of federated authentication protocols from SAML to OpenID Connect, clearing up along the way some confusion between federated authentication and tokens used for delegated authorization.

Resets the user password and sends reset
instructions.
Devise
Recoverable
Handles signing up users through a registration
process, also allowing them to edit and destroy their
account.
Devise
Registerable
Manages generating and clearing a token for
remembering the user from a saved cookie.
Devise
Rememberable
Tracks sign in count, timestamps and IP address.
Devise
Trackable

Recommended for you

AD113 Speed Up Your Applications w/ Nginx and PageSpeed
AD113  Speed Up Your Applications w/ Nginx and PageSpeedAD113  Speed Up Your Applications w/ Nginx and PageSpeed
AD113 Speed Up Your Applications w/ Nginx and PageSpeed

My slide deck from my session, AD113: Speed Up Your Applications with Nginx + PageSpeed, at MWLUG 2015 in Atlanta, GA at the Ritz-Carlton. For more, see: - https://edm00se.io/self-promotion/mwlug-ad113-success - https://github.com/edm00se/AD113-Speed-Up-Your-Apps-with-Nginx-and-PageSpeed

reverse proxynginxpagespeed
Session and cookies,get and post methods
Session and cookies,get and post methodsSession and cookies,get and post methods
Session and cookies,get and post methods

- Cookies and sessions are used to maintain state in HTTP, a stateless protocol. Cookies are stored on the client side while sessions are stored on the server side. - Cookies can store string data and may persist even after closing the browser. Sessions can store any object but end when the browser closes. - GET requests can transmit data via URL parameters while POST transmits data within the HTTP request body and is more secure as data is not logged.

session and cookiesget and post methodssessions and cookies
1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin

Is your environment acting the way you intended it to be, as in do your users see what you wanted them to see?

playwrightazureclarity
Expires sessions that have not been active in a
specified period of time.
Devise
Timeoutable
Provides validations of email and password. It's
optional and can be customized, so you're able to
define your own validations.
Devise
Validatable
Locks an account after a specified number of failed
sign-in attempts. Can unlock via email or after a
specified time period.
Devise
Lockable
Should I always use Devise?
No, not always. There are other alternatives such as
Sorcery that provide authentication.
More importantly, it is a very enlightening exercise to
try to build your own authentication system from
scratch (just not for a production application).
Devise

Recommended for you

Brown aug11 bsdmag
Brown aug11 bsdmagBrown aug11 bsdmag
Brown aug11 bsdmag

Jim Brown's article on BSD certification for August issue of BSD Magazine. Last article in a 3 part series.

bsd magcertification
Job portal at jiit 2013-14
Job portal at jiit 2013-14Job portal at jiit 2013-14
Job portal at jiit 2013-14

This document summarizes a job portal website that allows job seekers and employers to search, apply, and post jobs. The portal uses ASP.NET, C#, HTML, JavaScript, and SQL Server for development. It includes modules for users, searching, employee/job seeker login, forums, and chat. The system aims to be flexible, efficient, user-friendly, and focused on data security as it will operate online. Hardware and software requirements are also specified.

Developer Night - Opticon18
Developer Night - Opticon18Developer Night - Opticon18
Developer Night - Opticon18

Lightning talks on best practices for product and engineering teams to experiment everywhere in their applications. First presented at Optimizely's user conference, Opticon18 on September 12th, 2018.

experimentationproduct experimentationfull stack
Where can I learn more about rolling my own
authentication system?
● Michael Hartl's online book: https://www.railstutorial.
org/book/modeling_users
● Ryan Bates' Railscast: http://railscasts.com/episodes/250-authentication-
from-scratch
● Codecademy's Ruby on Rails: Authentication and Authorization: http:
//www.codecademy.com/en/learn/rails-auth
Devise
Validation
Validation
- Make testing/maintenance more difficult
- Beneficial when multiple applications access
database
- Can handle some constraints more efficiently
than application-level code
Database-level Validation
- Convenient way to provide immediate feedback
without submitting form/performing request
- Unreliable if used alone and implemented in
JavaScript, as they can easily be bypassed.
Validation
Client-side Validation

Recommended for you

Code your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard LearnCode your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard Learn

The document discusses authentication in Blackboard Learn and provides an example of extending authentication capabilities by creating a custom filter. It begins by explaining the different types of authentication providers in Blackboard Learn, including remote, delegated credential, and fully delegated providers. It then discusses changes in Service Pack 8, supported providers, and how the framework is built for extension. The document concludes by walking through a sample implementation of a custom filter that limits login attempts to prevent password guessing.

authenticationsample codeblackboard
Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?

Learn how to choose which #Azure​ services to use so that you can start "Jumping Clouds" with confidence :) Watch the recording at https://youtu.be/34U1hUJmCUc and for more forward-looking #Software #Developerment topics, join http://ServerlessToronto.org User Group LINKS FROM THE MEETUP & CHAT https://www.askyourdeveloper.com/ http://youtube.serverlesstoronto.org https://youtu.be/Ivcndg9pTpk?t=1390 https://www.meetup.com/Serverless-Toronto/events/276721419/ https://www.meetup.com/Serverless-Toronto/events/275256767/ https://www.meetup.com/Serverless-Toronto/events/276752609/ https://developerweeklypodcast.com/ https://channel9.msdn.com/Shows/Azure-Friday https://www.pluralsight.com/paths/microsoft-azure-compute-for-developers https://azureoverview.com/ https://build5nines.com/ https://azure.microsoft.com/en-us/updates/ https://azure.microsoft.com/en-us/blog/ https://docs.microsoft.com/en-us/azure/architecture/ https://www.mssqltips.com/sqlservertip/5144/sql-server-temporal-tables-vs-change-data-capture-vs-change-tracking--part-3/ https://azure.microsoft.com/en-us/pricing/details/synapse-analytics/ https://www.manning.com/books/azure-data-engineering https://www.manning.com/books/azure-storage-streaming-and-batch-analytics https://docs.microsoft.com/en-us/azure/azure-functions/durable/durable-functions-overview?tabs=csharp https://cloudevents.io/ https://docs.microsoft.com/en-us/azure/architecture/patterns/ https://www.linkedin.com/pulse/you-asking-your-team-design-perfect-solution-daniel-zivkovic/ https://youtu.be/GBTdnfD6s5Q https://www.linkedin.com/company/serverless-toronto/

SEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEOSEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEO

In the digital age, cybersecurity is a paramount concern, and Google is committed to ensuring user safety and privacy. As part of their efforts, they've made SSL certificates a significant factor in search engine optimization (SEO). SSL (Secure Sockets Layer) certificates, indicated by the "https" in website URLs and the padlock symbol in browsers, are not only essential for security but also offer several SEO benefits. In this comprehensive guide, we'll delve into the advantages of having an SSL certificate for SEO.

digital marketingseo training courseseo marketing
- Unwieldy to use and difficult to test/maintain
- Goes against the Skinny Controller/Fat Model
design paradigm of Rails
Validation
Controller-level Validation
- Best way to ensure that only valid data is stored
in the database
- Database agnostic
- Cannot be bypassed by end users
- Convenient to test and maintain
Validation
Model-level validations
- Important to ensure consistency in your
database
- Easier to render things like user profiles if you
know things like name are guaranteed to be
present
- Ensure proper functioning of application by
enforcing things like uniqueness of screen
names, or valid formats of email addresses.
Validations
Validations

Recommended for you

A A A
A A AA A A
A A A

A presentation about Authentication I did at the local geekmeet meetup. Some examples of outsourced authenticaton using CAMS/Shibboleth/OpenID

shibbolethcams"authentication
Job portal
Job portalJob portal
Job portal

Easy Jobs is Job Searching website, can be used by thousands of Students/Employee/Companies. We can advertise company new recruitment like Fresher recruits, Experienced recruits by adding your add on our site.

Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018

Vault is a tool for centrally managing secrets like passwords, API keys, and certificates. It addresses the problem of "secrets sprawl" where credentials are stored insecurely in multiple places like source code, emails, and configuration files. Vault centralizes secrets management, provides access control and auditing, and generates unique short-lived credentials to reduce risk if a secret is compromised. It also supports encrypting sensitive data for additional protection. Implementing Vault involves deciding where it will run, who will manage encryption keys, which secrets it will store, where audit logs will go, and who will operate and configure the system on an ongoing basis.

devopssecurity
Validations
Validations
Validations
Acceptance
Validations
Associated

Recommended for you

session and cookies.ppt
session and cookies.pptsession and cookies.ppt
session and cookies.ppt

The document discusses session tracking techniques in servlets. It describes four main techniques: cookies, hidden form fields, URL rewriting, and HTTP sessions. Cookies are the simplest technique and involve assigning a unique session ID to each client as a cookie. Hidden form fields maintain state by storing information in hidden form fields and transmitting it across requests. URL rewriting appends a session ID to the URL. HTTP sessions involve saving client-specific information on the server side in an HTTP session object.

Proxy Caches and Web Application Security
Proxy Caches and Web Application SecurityProxy Caches and Web Application Security
Proxy Caches and Web Application Security

The document summarizes a presentation about proxy caches posing a threat to web application security. It begins with a review of the OWASP top 10 security risk of broken authentication and session management. It then describes how a vulnerability in Google Docs allowed access to other users' accounts due to issues with proxy caches and session management. The presentation warns that developers must assume proxy caches exist and can potentially expose session information to unintended users if session management is not implemented securely. It emphasizes the need for developers to test their applications under aggressive proxy cache scenarios.

applicationwebowasp
Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...

With a centralized data store, the entire spectrum of analytics is at your fingertips. Using Looker & Segment, you can collect, store and analyze everything from click-stream and event data to transactional and behavioral data in your data warehouse. Some of the topics this webinar will include: -The advantages of a centralized data warehouse with Segment Warehouses -Creating a data model to get your company on the same page with Looker Blocks -Putting it all together: Best practices for making your data accessible to your end users

data analyticsdata
Validations
Confirmation
Validations
Exclusion
Validations
Format
Validations
Inclusion

Recommended for you

The Testing Planet Issue 2
The Testing Planet Issue 2The Testing Planet Issue 2
The Testing Planet Issue 2

This document discusses the importance of good design principles for test automation code. It provides examples of applying basic design concepts like avoiding duplication and separating concerns when automating tests using the Robot Framework and Selenium. The examples start simply by extracting duplicated steps in a single test into keywords and variables. They progress to splitting functionality across multiple files as "resources" and parameterizing tests to run with different data values. The goal is to demonstrate how non-programmers can design maintainable automated tests by applying basic coding best practices.

software testingquality assurancetest automation
Cookies authentication
Cookies authenticationCookies authentication
Cookies authentication

This project was done for my fourth semester ( Computer Science) for the subject Cryptography and Network Security. For this project coding was done in PHP

Zendesk User Group - May 14 2013 - OpenDNS & Zendesk
Zendesk User Group - May 14 2013 - OpenDNS & ZendeskZendesk User Group - May 14 2013 - OpenDNS & Zendesk
Zendesk User Group - May 14 2013 - OpenDNS & Zendesk

This document discusses OpenDNS's transition to using Zendesk for customer support over the past year. Some key points: - OpenDNS migrated from an in-house helpdesk to using Zendesk in under 3 months to support the launch of their new Umbrella cloud security service. - Zendesk has allowed them to streamline support processes, gain customer intelligence, and integrate support into their product dashboard. - While there have been some growing pains with customization and content control, OpenDNS has been able to maintain branding and see improvements in customer satisfaction rates and support metrics. - OpenDNS is now using Zendesk to support both consumer and enterprise products, and is looking forward

Validations
Length
Validations
Numericality
Validations
Presence
Validations
Absence

Recommended for you

Website Security
Website SecurityWebsite Security
Website Security

The document provides an overview of basic web security issues and recommendations to address them. It discusses making regular backups and testing restores, using strong and unique passwords that are changed frequently, password protecting directories with .htaccess, keeping software updated, restricting access to sensitive files and data, preventing cross-site scripting attacks, filtering user-submitted data, and using prepared statements to prevent SQL injection. The goal is to increase awareness of common vulnerabilities and how to avoid or lessen exposure to exploits.

modxmodxposecurity
active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptxactive-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx

Active Directory Audit

ANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdfANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdf

Ansys Mechanical enables you to solve complex structural engineering problems and make better, faster design decisions. With the finite element analysis (FEA) solvers available in the suite, you can customize and automate solutions for your structural mechanics problems and parameterize them to analyze multiple design scenarios. Ansys Mechanical is a dynamic tool that has a complete range of analysis tools.

mechanical engineeringsoftware3d software
Validations
Uniqueness
Validations
Validations
Validations

Recommended for you

Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.

Shivam Pandit Php Web Dveloper

phpmysqlsql
How we built TryBoxLang in under 48 hours
How we built TryBoxLang in under 48 hoursHow we built TryBoxLang in under 48 hours
How we built TryBoxLang in under 48 hours

Explore the rapid development journey of TryBoxLang, completed in just 48 hours. This session delves into the innovative process behind creating TryBoxLang, a platform designed to showcase the capabilities of BoxLang by Ortus Solutions. Discover the challenges, strategies, and outcomes of this accelerated development effort, highlighting how TryBoxLang provides a practical introduction to BoxLang's features and benefits.

coldfusioncfmladobe
Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …

Prada Group Reports Strong Growth in First Quarter …

Validations
Validations
Validations
Validations

Recommended for you

COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...
COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...
COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...

Hironori Washizaki, "Charting a Course for Equity: Strategies for Overcoming Challenges and Promoting Inclusion in the Metaverse", IEEE COMPSAC 2024 D&I Panel, 2024.

Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)

Our world runs on software. It governs all major aspects of our life. It is an enabler for research and innovation, and is critical for business competitivity. Traditional software engineering techniques have achieved high effectiveness, but still may fall short on delivering software at the accelerated pace and with the increasing quality that future scenarios will require. To attack this issue, some software paradigms raise the automation of software development via higher levels of abstraction through domain-specific languages (e.g., in model-driven engineering) and empowering non-professional developers with the possibility to build their own software (e.g., in low-code development approaches). In a software-demanding world, this is an attractive possibility, and perhaps -- paraphrasing Andy Warhol -- "in the future, everyone will be a developer for 15 minutes". However, to make this possible, methods are required to tweak languages to their context of use (crucial given the diversity of backgrounds and purposes), and the assistance to developers throughout the development process (especially critical for non-professionals). In this keynote talk at ICSOFT'2024 I presented enabling techniques for this vision, supporting the creation of families of domain-specific languages, their adaptation to the usage context; and the augmentation of low-code environments with assistants and recommender systems to guide developers (professional or not) in the development process.

softwaremodel-driven engineeringdomain-specific languages
A Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdfA Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdf

A robust software testing strategy encompassing functional and non-functional testing is fundamental for development teams. These twin pillars are essential for ensuring the success of your applications. But why are they so critical? Functional testing rigorously examines the application's processes against predefined requirements, ensuring they align seamlessly. Conversely, non-functional testing evaluates performance and reliability under load, enhancing the end-user experience.

non functional testingfunctional testing
Validations
Validations
Testing
Testing
TDD - Test Driven Development

Recommended for you

Break data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud ConnectorsBreak data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud Connectors

Connectors integrate Apache Kafka® with external data systems, enabling you to move away from a brittle spaghetti architecture to one that is more streamlined, secure, and future-proof. However, if your team still spends multiple dev cycles building and managing connectors using just open source Kafka Connect, it’s time to consider a faster and cost-effective alternative.

Attendance Tracking From Paper To Digital
Attendance Tracking From Paper To DigitalAttendance Tracking From Paper To Digital
Attendance Tracking From Paper To Digital

If you are having trouble deciding which time tracker tool is best for you, try "Task Tracker" app. It has numerous features, including the ability to check daily attendance sheet, and other that make team management easier.

time trackerdaily attendance sheettask tracker
What is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for FreeWhat is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for Free

Discover the fascinating world of Optical Character Recognition (OCR) technology with our comprehensive presentation. Learn how OCR converts various types of documents, such as scanned paper documents, PDFs, or images captured by a digital camera, into editable and searchable data. Dive into the history, modern applications, and future trends of OCR technology. Get step-by-step instructions on how to extract text from any image online for free using a simple tool, along with best practices for OCR image preparation. Ideal for professionals, students, and tech enthusiasts looking to harness the power of OCR.

optical character recognitionocrimage to text conversion
Testing
TDD
Testing
RSpec
Testing
RSpec
Testing
RSpec & TDD

Recommended for you

MVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptxMVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptx

An MVP (Minimum Viable Product) mobile application is a streamlined version of a mobile app that includes only the core features necessary to address the primary needs of its users. The purpose of an MVP is to validate the app concept with minimal resources, gather user feedback, and identify any areas for improvement before investing in a full-scale development. This approach allows businesses to quickly launch their app, test its market viability, and make data-driven decisions for future enhancements, ensuring a higher likelihood of success and user satisfaction.

mvp developmentmvp software developmentmvp mobile application
Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...
Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...
Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...

IN Dubai [WHATSAPP:Only (+971588192166**)] Abortion Pills For Sale In Dubai** UAE** Mifepristone and Misoprostol Tablets Available In Dubai** UAE CONTACT DR. SINDY Whatsapp +971588192166* We Have Abortion Pills / Cytotec Tablets /Mifegest Kit Available in Dubai** Sharjah** Abudhabi** Ajman** Alain** Fujairah** Ras Al Khaimah** Umm Al Quwain** UAE** Buy cytotec in Dubai +971588192166* '''Abortion Pills near me DUBAI | ABU DHABI|UAE. Price of Misoprostol** Cytotec” +971588192166* ' Dr.SINDY ''BUY ABORTION PILLS MIFEGEST KIT** MISOPROSTOL** CYTOTEC PILLS IN DUBAI** ABU DHABI**UAE'' Contact me now via What's App… abortion pills in dubai Mtp-Kit Prices abortion pills available in dubai/abortion pills for sale in dubai/abortion pills in uae/cytotec dubai/abortion pills in abu dhabi/abortion pills available in abu dhabi/abortion tablets in uae … abortion Pills Cytotec also available Oman Qatar Doha Saudi Arabia Bahrain Above all** Cytotec Abortion Pills are Available In Dubai / UAE** you will be very happy to do abortion in Dubai we are providing cytotec 200mg abortion pills in Dubai** UAE. Medication abortion offers an alternative to Surgical Abortion for women in the early weeks of pregnancy. We only offer abortion pills from 1 week-6 Months. We then advise you to use surgery if it's beyond 6 months. Our Abu Dhabi** Ajman** Al Ain** Dubai** Fujairah** Ras Al Khaimah (RAK)** Sharjah** Umm Al Quwain (UAQ) United Arab Emirates Abortion Clinic provides the safest and most advanced techniques for providing non-surgical** medical and surgical abortion methods for early through late second trimester** including the Abortion By Pill Procedure (RU 486** Mifeprex** Mifepristone** early options French Abortion Pill)** Tamoxifen** Methotrexate and Cytotec (Misoprostol). The Abu Dhabi** United Arab Emirates Abortion Clinic performs Same Day Abortion Procedure using medications that are taken on the first day of the office visit and will cause the abortion to occur generally within 4 to 6 hours (as early as 30 minutes) for patients who are 3 to 12 weeks pregnant. When Mifepristone and Misoprostol are used** 50% of patients complete in 4 to 6 hours; 75% to 80% in 12 hours; and 90% in 24 hours. We use a regimen that allows for completion without the need for surgery 99% of the time. All advanced second trimester and late term pregnancies at our Tampa clinic (17 to 24 weeks or greater) can be completed within 24 hours or less 99% of the time without the need for surgery. The procedure is completed with minimal to no complications. Our Women's Health Center located in Abu Dhabi** United Arab Emirates** uses the latest medications for medical abortions (RU-486** Mifeprex** Mifegyne** Mifepristone** early options French abortion pill)** Methotrexate and Cytotec (Misoprostol). The safety standards of our Abu Dhabi** United Arab Emirates Abortion Doctors remain unparalleled. They consistently maintain the lowest complication rates throughout the nation. Our

BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTIONBITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION

Bitcoin heist prediction using ML

Testing
RSpec & TDD
Testing
RSpec & TDD
Testing
- Earliest phase of testing
- Focuses on individual unit or component
- Best/Easiest phase to catch bugs in
- Can have 100% passing unit tests but still have
code that doesn’t work as intended
Unit Testing
- Ensure that model validations are present
- Ensure that relationships exist with correct
options
- Ensure helper methods perform as expected
Testing
Unit Testing

Recommended for you

dachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdfdachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdf

dachnug51 | All you ever wanted to know about domino licensing | Uffe Sorensen

dachnugdachnug51dnug
Development of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML TechnologiesDevelopment of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML Technologies

A captivating AI chatbot PowerPoint presentation is made with a striking backdrop in order to attract a wider audience. Select this template featuring several AI chatbot visuals to boost audience engagement and spontaneity. With the aid of this multi-colored template, you may make a compelling presentation and get extra bonuses. To easily elucidate your ideas, choose a typeface with vibrant colors. You can include your data regarding utilizing the chatbot methodology to the remaining half of the template.

chatbot ppt
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...

AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introduction.pdf

awscloudpractitioner
Testing
Unit Testing
Testing
Unit Testing
Testing combinations of separate
components/modules that have been independently
unit tested already.
Testing
Integration Testing
Testing
Integration

Recommended for you

Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...
Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...
Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...

Unlock the full potential of mobile monitoring with ONEMONITAR. Our advanced and discreet app offers a comprehensive suite of features, including hidden call recording, real-time GPS tracking, message monitoring, and much more. Perfect for parents, employers, and anyone needing a reliable solution, ONEMONITAR ensures you stay informed and in control. Explore the key features of ONEMONITAR and see why it’s the trusted choice for Android device monitoring. Share this infographic to spread the word about the ultimate mobile spy app!

hidden mobile spy appmobile spy app for parentsmobile spy app for android
Intro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AIIntro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AI

Sami provided a beginner-friendly introduction to Amazon Web Services (AWS), covering essential terms, products, and services for cloud deployment. Participants explored AWS' latest Gen AI offerings, making it accessible for those starting their cloud journey or integrating AI into coding practices.

cfmlcoldfusionboxlang
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdfResponsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf

What do fleet managers do? What are their duties, responsibilities, and challenges? And what makes a fleet manager effective and successful? This blog answers all these questions.

fleet managersresponsibilities of fleet mana
Testing
Integration
Testing
http://i.imgur.com/qSN5SFR.gifv
Integration
Testing
Verifying that all of the product/business needs have
been met and that end users have the desired
experience.
Acceptance
Testing
Cucumber (with Gherkin)

Recommended for you

Testing
Cucumber (with Gherkin)
Testing
Cucumber (with Gherkin)
Testing
Capybara
Testing
Capybara

Recommended for you

Testing
Resources
http://www.theodinproject.com/ruby-on-
rails/sessions-cookies-and-authentication
https://gorails.com/episodes/user-authentication-
with-devise
http://www.bitspedia.com/2012/05/how-session-
works-in-web-applications.html
http://www.justinweiss.com/articles/how-rails-
sessions-work/
http://www.w3schools.
com/bootstrap/bootstrap_alerts.asp
https://github.com/plataformatec/devise
http://guides.rubyonrails.
org/active_record_validations.html
http://blog.arkency.com/2014/04/mastering-rails-
validations-contexts/
https://octoberclub.files.wordpress.
com/2011/10/red-green-refactor.png
http://david.heinemeierhansson.com/2014/tdd-is-
dead-long-live-testing.html
Resources
http://www.rainforest-alliance.
org/sites/default/files/uploads/4/capybara-
family_15762686447_f9f8a0684a_o.jpg
http://www.can-technologies.
com/images/services/test2.png
http://stumbleapun.magicalfartwizard.org/wp-
content/uploads/2011/06/just-the-tips.jpg
http://stumbleapun.magicalfartwizard.org/wp-
content/uploads/2011/06/just-the-tips.jpg
Resources

Recommended for you

http://www.seguetech.com/blog/2013/07/31/four-
levels-software-testing
http://softwaretestingfundamentals.com/unit-
testing/
https://www.inflectra.com/Ideas/Topic/Testing-
Methodologies.aspx
http://www.can-technologies.
com/images/services/test2.png
Resources

More Related Content

What's hot

Social Connections VI Prague - An introduction to ibm connections as an appde...
Social Connections VI Prague - An introduction to ibm connections as an appde...Social Connections VI Prague - An introduction to ibm connections as an appde...
Social Connections VI Prague - An introduction to ibm connections as an appde...
Mikkel Flindt Heisterberg
 
Ajax learning tutorial
Ajax learning tutorialAjax learning tutorial
Ajax learning tutorial
bharat_beladiya
 
QuickConnect
QuickConnectQuickConnect
QuickConnect
Annu G
 
Web 2.0 security woes
Web 2.0 security woesWeb 2.0 security woes
Web 2.0 security woes
SensePost
 
Top Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.NetTop Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.Net
alsmola
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
Manish Harsh
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
Derek Perkins
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
Stormpath
 
Html5 Fit: Get Rid of Love Handles
Html5 Fit:  Get Rid of Love HandlesHtml5 Fit:  Get Rid of Love Handles
Html5 Fit: Get Rid of Love Handles
Chris Love
 
Our application got popular and now it breaks
Our application got popular and now it breaksOur application got popular and now it breaks
Our application got popular and now it breaks
ColdFusionConference
 
Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016
Kate Walser
 
Difference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.netDifference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.net
Umar Ali
 
Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Microsoft Azure Identity and O365
Microsoft Azure Identity and O365
Kris Wagner
 
Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion
Mary Jo Sminkey
 
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
Amazon Web Services
 
Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)
Stormpath
 
Build A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON APIBuild A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON API
Stormpath
 
User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...
Vahid Jalili
 
Web Development for UX Designers
Web Development for UX DesignersWeb Development for UX Designers
Web Development for UX Designers
Ashlimarie
 

What's hot (19)

Social Connections VI Prague - An introduction to ibm connections as an appde...
Social Connections VI Prague - An introduction to ibm connections as an appde...Social Connections VI Prague - An introduction to ibm connections as an appde...
Social Connections VI Prague - An introduction to ibm connections as an appde...
 
Ajax learning tutorial
Ajax learning tutorialAjax learning tutorial
Ajax learning tutorial
 
QuickConnect
QuickConnectQuickConnect
QuickConnect
 
Web 2.0 security woes
Web 2.0 security woesWeb 2.0 security woes
Web 2.0 security woes
 
Top Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.NetTop Ten Tips For Tenacious Defense In Asp.Net
Top Ten Tips For Tenacious Defense In Asp.Net
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
Authentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrongAuthentication: Cookies vs JWTs and why you’re doing it wrong
Authentication: Cookies vs JWTs and why you’re doing it wrong
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
Html5 Fit: Get Rid of Love Handles
Html5 Fit:  Get Rid of Love HandlesHtml5 Fit:  Get Rid of Love Handles
Html5 Fit: Get Rid of Love Handles
 
Our application got popular and now it breaks
Our application got popular and now it breaksOur application got popular and now it breaks
Our application got popular and now it breaks
 
Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016Responsive Web Design for Universal Access 2016
Responsive Web Design for Universal Access 2016
 
Difference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.netDifference between authentication and authorization in asp.net
Difference between authentication and authorization in asp.net
 
Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Microsoft Azure Identity and O365
Microsoft Azure Identity and O365
 
Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion Advanced Error Handling Strategies for ColdFusion
Advanced Error Handling Strategies for ColdFusion
 
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
SEC303 Top 10 AWS Identity and Access Management Best Practices - AWS re:Inve...
 
Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)Secure Your REST API (The Right Way)
Secure Your REST API (The Right Way)
 
Build A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON APIBuild A Killer Client For Your REST+JSON API
Build A Killer Client For Your REST+JSON API
 
User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...User Authentication and Cloud Authorization in the Galaxy project: https://do...
User Authentication and Cloud Authorization in the Galaxy project: https://do...
 
Web Development for UX Designers
Web Development for UX DesignersWeb Development for UX Designers
Web Development for UX Designers
 

Viewers also liked

Pec4 final version cortina.pptx
Pec4 final version cortina.pptxPec4 final version cortina.pptx
Pec4 final version cortina.pptx
Carlos Mario Cortina
 
POSTER 1
POSTER 1POSTER 1
POSTER 1
Bethany Lilly
 
4.1.4torque
4.1.4torque4.1.4torque
4.1.4torque
Talia Carbis
 
Les a2 1 2-2012
Les a2 1 2-2012Les a2 1 2-2012
Les a2 1 2-2012
SpaanIt
 
Professional Media Kit for Alex Ihama (v2017)
Professional Media Kit for Alex Ihama (v2017)Professional Media Kit for Alex Ihama (v2017)
Professional Media Kit for Alex Ihama (v2017)
Alex Ihama
 
Leeson plan for Septa3
Leeson plan for Septa3Leeson plan for Septa3
Leeson plan for Septa3
Alina John
 
LocalGeo Торговый центр
LocalGeo Торговый центрLocalGeo Торговый центр
LocalGeo Торговый центр
Александр Васильев
 
Introducing Virtual Reality in Your Geography Classroom
Introducing Virtual Reality in Your Geography ClassroomIntroducing Virtual Reality in Your Geography Classroom
Introducing Virtual Reality in Your Geography Classroom
Michael DeMers
 
eidan mosa ali alzahrani- evaluation and measurement- educational administration
eidan mosa ali alzahrani- evaluation and measurement- educational administrationeidan mosa ali alzahrani- evaluation and measurement- educational administration
eidan mosa ali alzahrani- evaluation and measurement- educational administration
alzahrani_eidan
 
Grobuchkina tsc ekbpromo_almaty_2016
Grobuchkina tsc ekbpromo_almaty_2016Grobuchkina tsc ekbpromo_almaty_2016
Grobuchkina tsc ekbpromo_almaty_2016
ekbpromo
 
Sklad russia 2016
Sklad russia 2016Sklad russia 2016
Sklad russia 2016
ekbpromo
 
Resumen Phyla reino Animalia
Resumen Phyla reino AnimaliaResumen Phyla reino Animalia
Resumen Phyla reino Animalia
Fernanda Monguí
 
(Webinar Slides) Choosing Legal Tech for Your Office
(Webinar Slides) Choosing Legal Tech for Your Office(Webinar Slides) Choosing Legal Tech for Your Office
(Webinar Slides) Choosing Legal Tech for Your Office
MyCase Legal Case and Practice Management Software
 
Fijacion del nitrogeno ppt
Fijacion del nitrogeno pptFijacion del nitrogeno ppt
Fijacion del nitrogeno ppt
Marcia Pereira
 
Passive voice
Passive voicePassive voice
Passive voice
becorbedomi99
 
doc
docdoc

Viewers also liked (16)

Pec4 final version cortina.pptx
Pec4 final version cortina.pptxPec4 final version cortina.pptx
Pec4 final version cortina.pptx
 
POSTER 1
POSTER 1POSTER 1
POSTER 1
 
4.1.4torque
4.1.4torque4.1.4torque
4.1.4torque
 
Les a2 1 2-2012
Les a2 1 2-2012Les a2 1 2-2012
Les a2 1 2-2012
 
Professional Media Kit for Alex Ihama (v2017)
Professional Media Kit for Alex Ihama (v2017)Professional Media Kit for Alex Ihama (v2017)
Professional Media Kit for Alex Ihama (v2017)
 
Leeson plan for Septa3
Leeson plan for Septa3Leeson plan for Septa3
Leeson plan for Septa3
 
LocalGeo Торговый центр
LocalGeo Торговый центрLocalGeo Торговый центр
LocalGeo Торговый центр
 
Introducing Virtual Reality in Your Geography Classroom
Introducing Virtual Reality in Your Geography ClassroomIntroducing Virtual Reality in Your Geography Classroom
Introducing Virtual Reality in Your Geography Classroom
 
eidan mosa ali alzahrani- evaluation and measurement- educational administration
eidan mosa ali alzahrani- evaluation and measurement- educational administrationeidan mosa ali alzahrani- evaluation and measurement- educational administration
eidan mosa ali alzahrani- evaluation and measurement- educational administration
 
Grobuchkina tsc ekbpromo_almaty_2016
Grobuchkina tsc ekbpromo_almaty_2016Grobuchkina tsc ekbpromo_almaty_2016
Grobuchkina tsc ekbpromo_almaty_2016
 
Sklad russia 2016
Sklad russia 2016Sklad russia 2016
Sklad russia 2016
 
Resumen Phyla reino Animalia
Resumen Phyla reino AnimaliaResumen Phyla reino Animalia
Resumen Phyla reino Animalia
 
(Webinar Slides) Choosing Legal Tech for Your Office
(Webinar Slides) Choosing Legal Tech for Your Office(Webinar Slides) Choosing Legal Tech for Your Office
(Webinar Slides) Choosing Legal Tech for Your Office
 
Fijacion del nitrogeno ppt
Fijacion del nitrogeno pptFijacion del nitrogeno ppt
Fijacion del nitrogeno ppt
 
Passive voice
Passive voicePassive voice
Passive voice
 
doc
docdoc
doc
 

Similar to Startup Institute NY - Authentication, Validation, and Basic Testing

CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
CloudIDSummit
 
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
AD113  Speed Up Your Applications w/ Nginx and PageSpeedAD113  Speed Up Your Applications w/ Nginx and PageSpeed
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
edm00se
 
Session and cookies,get and post methods
Session and cookies,get and post methodsSession and cookies,get and post methods
Session and cookies,get and post methods
baabtra.com - No. 1 supplier of quality freshers
 
1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin
NETUserGroupBern
 
Brown aug11 bsdmag
Brown aug11 bsdmagBrown aug11 bsdmag
Brown aug11 bsdmag
Dru Lavigne
 
Job portal at jiit 2013-14
Job portal at jiit 2013-14Job portal at jiit 2013-14
Job portal at jiit 2013-14
kbabhishek4
 
Developer Night - Opticon18
Developer Night - Opticon18Developer Night - Opticon18
Developer Night - Opticon18
Optimizely
 
Code your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard LearnCode your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard Learn
Dan Rinzel
 
Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?
Daniel Zivkovic
 
SEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEOSEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEO
devbhargav1
 
A A A
A A AA A A
Job portal
Job portalJob portal
Job portal
LoveBug Shashank
 
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
HashiCorp
 
session and cookies.ppt
session and cookies.pptsession and cookies.ppt
session and cookies.ppt
Jayaprasanna4
 
Proxy Caches and Web Application Security
Proxy Caches and Web Application SecurityProxy Caches and Web Application Security
Proxy Caches and Web Application Security
Tim Bass
 
Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...
Looker
 
The Testing Planet Issue 2
The Testing Planet Issue 2The Testing Planet Issue 2
The Testing Planet Issue 2
Rosie Sherry
 
Cookies authentication
Cookies authenticationCookies authentication
Cookies authentication
Rsilwal123
 
Zendesk User Group - May 14 2013 - OpenDNS & Zendesk
Zendesk User Group - May 14 2013 - OpenDNS & ZendeskZendesk User Group - May 14 2013 - OpenDNS & Zendesk
Zendesk User Group - May 14 2013 - OpenDNS & Zendesk
Scott Cressman
 
Website Security
Website SecurityWebsite Security
Website Security
Carlos Z
 

Similar to Startup Institute NY - Authentication, Validation, and Basic Testing (20)

CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
AD113  Speed Up Your Applications w/ Nginx and PageSpeedAD113  Speed Up Your Applications w/ Nginx and PageSpeed
AD113 Speed Up Your Applications w/ Nginx and PageSpeed
 
Session and cookies,get and post methods
Session and cookies,get and post methodsSession and cookies,get and post methods
Session and cookies,get and post methods
 
1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin1,2,3 … Testing : Is this thing on(line)? with Mike Martin
1,2,3 … Testing : Is this thing on(line)? with Mike Martin
 
Brown aug11 bsdmag
Brown aug11 bsdmagBrown aug11 bsdmag
Brown aug11 bsdmag
 
Job portal at jiit 2013-14
Job portal at jiit 2013-14Job portal at jiit 2013-14
Job portal at jiit 2013-14
 
Developer Night - Opticon18
Developer Night - Opticon18Developer Night - Opticon18
Developer Night - Opticon18
 
Code your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard LearnCode your Own: Authentication Provider for Blackboard Learn
Code your Own: Authentication Provider for Blackboard Learn
 
Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?Azure for AWS & GCP Pros: Which Azure services to use?
Azure for AWS & GCP Pros: Which Azure services to use?
 
SEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEOSEO benefits | ssl certificate | Learn SEO
SEO benefits | ssl certificate | Learn SEO
 
A A A
A A AA A A
A A A
 
Job portal
Job portalJob portal
Job portal
 
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
 
session and cookies.ppt
session and cookies.pptsession and cookies.ppt
session and cookies.ppt
 
Proxy Caches and Web Application Security
Proxy Caches and Web Application SecurityProxy Caches and Web Application Security
Proxy Caches and Web Application Security
 
Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...Creating a Single Source of Truth: Leverage all of your data with powerful an...
Creating a Single Source of Truth: Leverage all of your data with powerful an...
 
The Testing Planet Issue 2
The Testing Planet Issue 2The Testing Planet Issue 2
The Testing Planet Issue 2
 
Cookies authentication
Cookies authenticationCookies authentication
Cookies authentication
 
Zendesk User Group - May 14 2013 - OpenDNS & Zendesk
Zendesk User Group - May 14 2013 - OpenDNS & ZendeskZendesk User Group - May 14 2013 - OpenDNS & Zendesk
Zendesk User Group - May 14 2013 - OpenDNS & Zendesk
 
Website Security
Website SecurityWebsite Security
Website Security
 

Recently uploaded

active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptxactive-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
sudsdeep
 
ANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdfANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdf
sachin chaurasia
 
Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.
shivamt017
 
How we built TryBoxLang in under 48 hours
How we built TryBoxLang in under 48 hoursHow we built TryBoxLang in under 48 hours
How we built TryBoxLang in under 48 hours
Ortus Solutions, Corp
 
Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …
908dutch
 
COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...
COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...
COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...
Hironori Washizaki
 
Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)
miso_uam
 
A Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdfA Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdf
kalichargn70th171
 
Break data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud ConnectorsBreak data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud Connectors
confluent
 
Attendance Tracking From Paper To Digital
Attendance Tracking From Paper To DigitalAttendance Tracking From Paper To Digital
Attendance Tracking From Paper To Digital
Task Tracker
 
What is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for FreeWhat is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for Free
TwisterTools
 
MVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptxMVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptx
Mitchell Marsh
 
Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...
Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...
Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTIONBITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
ssuser2b426d1
 
dachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdfdachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdf
DNUG e.V.
 
Development of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML TechnologiesDevelopment of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML Technologies
MaisnamLuwangPibarel
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...
karim wahed
 
Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...
Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...
Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...
onemonitarsoftware
 
Intro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AIIntro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AI
Ortus Solutions, Corp
 
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdfResponsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Trackobit
 

Recently uploaded (20)

active-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptxactive-directory-auditing-solution (2).pptx
active-directory-auditing-solution (2).pptx
 
ANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdfANSYS Mechanical APDL Introductory Tutorials.pdf
ANSYS Mechanical APDL Introductory Tutorials.pdf
 
Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.Shivam Pandit working on Php Web Developer.
Shivam Pandit working on Php Web Developer.
 
How we built TryBoxLang in under 48 hours
How we built TryBoxLang in under 48 hoursHow we built TryBoxLang in under 48 hours
How we built TryBoxLang in under 48 hours
 
Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …Prada Group Reports Strong Growth in First Quarter …
Prada Group Reports Strong Growth in First Quarter …
 
COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...
COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...
COMPSAC 2024 D&I Panel: Charting a Course for Equity: Strategies for Overcomi...
 
Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)Software development... for all? (keynote at ICSOFT'2024)
Software development... for all? (keynote at ICSOFT'2024)
 
A Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdfA Comparative Analysis of Functional and Non-Functional Testing.pdf
A Comparative Analysis of Functional and Non-Functional Testing.pdf
 
Break data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud ConnectorsBreak data silos with real-time connectivity using Confluent Cloud Connectors
Break data silos with real-time connectivity using Confluent Cloud Connectors
 
Attendance Tracking From Paper To Digital
Attendance Tracking From Paper To DigitalAttendance Tracking From Paper To Digital
Attendance Tracking From Paper To Digital
 
What is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for FreeWhat is OCR Technology and How to Extract Text from Any Image for Free
What is OCR Technology and How to Extract Text from Any Image for Free
 
MVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptxMVP Mobile Application - Codearrest.pptx
MVP Mobile Application - Codearrest.pptx
 
Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...
Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...
Abortion pills in Fujairah *((+971588192166*)☎️)¥) **Effective Abortion Pills...
 
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTIONBITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
BITCOIN HEIST RANSOMEWARE ATTACK PREDICTION
 
dachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdfdachnug51 - All you ever wanted to know about domino licensing.pdf
dachnug51 - All you ever wanted to know about domino licensing.pdf
 
Development of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML TechnologiesDevelopment of Chatbot Using AI\ML Technologies
Development of Chatbot Using AI\ML Technologies
 
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...
AWS Cloud Practitioner Essentials (Second Edition) (Arabic) Course Introducti...
 
Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...
Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...
Discover the Power of ONEMONITAR: The Ultimate Mobile Spy App for Android Dev...
 
Intro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AIIntro to Amazon Web Services (AWS) and Gen AI
Intro to Amazon Web Services (AWS) and Gen AI
 
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdfResponsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
Responsibilities of Fleet Managers and How TrackoBit Can Assist.pdf
 

Startup Institute NY - Authentication, Validation, and Basic Testing