Skip to content

rpigu-i/talks-workshops-publications

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

41 Commits
Β 
Β 
Β 
Β 

Repository files navigation

β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—      β–ˆβ–ˆβ•—
β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β•β•β•β•β• β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘      β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•”β•β•β•β• β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘   β–ˆβ–ˆβ•‘β•šβ•β•β•β•β•β–ˆβ–ˆβ•‘
β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•      β–ˆβ–ˆβ•‘
β•šβ•β•  β•šβ•β•β•šβ•β•     β•šβ•β• β•šβ•β•β•β•β•β•  β•šβ•β•β•β•β•β•       β•šβ•β•

πŸ”₯ TALKS & PUBLICATIONS πŸ”₯

🌐 NEURAL INTERFACE ESTABLISHED 🌐

> ACCESSING PERSONAL DATABASE...
> STATUS: CONNECTED
> ENCRYPTION: ACTIVE
> MODE: PRESENTATION_ARCHIVE

⚑ SYSTEM OVERVIEW ⚑

$ cat /proc/presentations/manifest

Repository contains digital archives of knowledge transfers across multiple network nodes.
Classification: Public Domain | Security Level: Green

Matrix Blade Runner Status


πŸ“‹ TABLE OF CONTENTS πŸ“‹

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ >> NAVIGATION MATRIX INITIALIZED...                            β”‚
β”‚ >> INDEXING AVAILABLE ARCHIVES...                              β”‚
β”‚ >> ACCESS GRANTED TO ALL SECTORS                               β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ”₯ MATRIX-LEVEL ENGAGEMENTS

πŸ“š DIGITAL ARCHIVES


πŸ”₯ MATRIX-LEVEL ENGAGEMENTS πŸ”₯

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ >> INITIALIZING PRESENTATION MODULES...                        β”‚
β”‚ >> TIMELINE: 2018.07 - 2025.06                                 β”‚
β”‚ >> THREAT LEVEL: EDUCATIONAL                                   β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸŽ™οΈ [2025.06.11] Security Repo Podcast - Reducing Developer Toil, Shifting Security Left, And Using Caution With AI

+ PROTOCOL: Podcast | FORMAT: Interview
+ PRESENTER: Solo Guest Appearance
+ PLATFORM: Security Repo Podcast
+ FOCUS: Developer Experience + Security + AI Caution

Podcast episode discussing the intersection of developer productivity, security practices, and responsible AI usage.

Topics covered include strategies for reducing developer toil, implementing shift-left security practices effectively, and maintaining caution when leveraging AI tools in development workflows.

# Access Points
LINK_PRIMARY="https://podcasts.apple.com/us/podcast/reducing-developer-toil-shifting-security-left-and/id1634401017?i=1000712466664"

πŸ”— [NETWORK_LINK] https://podcasts.apple.com/us/podcast/reducing-developer-toil-shifting-security-left-and/id1634401017?i=1000712466664


πŸŒ† [2025.04.26] BSides San Francisco - Shifting Left: A Hands-on Introductory Guide to DevSecOps

+ PROTOCOL: Workshop | DURATION: 2hrs
+ CO-PRESENTER: Dwayne McDaniel [GitGuardian]
+ TARGET: BSidesSF Attendees
+ OBJECTIVE: DevSecOps CI/CD Pipeline Integration

Hands on workshop at BSides SF co-presented with Dwayne McDaniel from GitGuardian.

This two-hour workshop on Shifting Left guides BSidesSF participants through integrating security tooling into a GitHub Actions based DevSecOps CI/CD pipeline.

BSidesSF attendees will learn about setting up basic CI/CD processes that incorporate security using both open source and commercial tools.

# Access Points
LINK_PRIMARY="https://bsidessf2025.sched.com/event/1x8RA/shifting-left-a-hands-on-introductory-guide-to-devsecops"
COURSE_MATERIAL="https://github.com/tweag/bsidessf-hands-on-devsecops-2025"

πŸ”— [NETWORK_LINK] https://bsidessf2025.sched.com/event/1x8RA/shifting-left-a-hands-on-introductory-guide-to-devsecops

πŸ“‚ [COURSE_ARCHIVE] https://github.com/tweag/bsidessf-hands-on-devsecops-2025


πŸ”οΈ [2025.04.10] BSides Salt Lake City - DevSecOps - a hands on introductory guide

+ PROTOCOL: Workshop | COLLABORATION: Enabled
+ CO-PRESENTER: Bill Reyor
+ TARGET: BSides SLC Attendees  
+ TECH_STACK: GitHub Codespaces + Actions + Advanced Security

This workshop on DevSecOps walks BSides SLC attendees through the basics of integrating security tooling into tooling into a GitHub Actions based DevOps pipelines

BSides SLC attendees will learn about setting up basic DevSecOps CI/CD processes using GitHub Codespaces, Actions, GitHub Advanced Security, open source security tools such as Trivy and secrets scanning.

# Access Points
LINK_PRIMARY="https://www.bsidesslc.org/schedule"
COURSE_MATERIAL="https://github.com/tweag/bsidesslc-2025-shift-left-workshop"

πŸ”— [NETWORK_LINK] https://www.bsidesslc.org/schedule

πŸ“‚ [COURSE_ARCHIVE] https://github.com/tweag/bsidesslc-2025-shift-left-workshop


πŸ”¬ [2025.02.26] Microsoft Reactor - Using the OWASP DSOMM with GitHub

+ PROTOCOL: Talk | COLLABORATION: Microsoft Team Support
+ PRESENTER: Solo + Microsoft Team Support
+ TARGET: Microsoft Reactor Attendees
+ FOCUS: OWASP DSOMM + GitHub Security Integration

In this talk we walk through the OWASP DevSecOps Maturity Model (DSOMM) and look at how implementing GitHub can aid in shifting-left. Alongside discussing the basics of the DSOMM, we also map the use of GitHub services to the model's various dimensions and sub-dimensions and demonstrate how to measure the current maturity state.

# Access Points
LINK_PRIMARY="https://reactor.microsoft.com/en-us/reactor/events/24738/"

πŸ”— [NETWORK_LINK] https://reactor.microsoft.com/en-us/reactor/events/24738/


☁️ [2024.12.02] AWS Re:Invent - GitHub Booth "Shift Security Left with DSOMM and GitHub"

+ PROTOCOL: Lightning Talk | FORMAT: Booth Presentation
+ LOCATION: GitHub Booth #426
+ PRESENTER: Solo Mission
+ FOCUS: DSOMM + GitHub Security Integration

Lightening talk at GitHub booth #426 to show how organizations can shift security left with DSOMM and GitHub and more effectively mitigate threats.


πŸ” [2024.11.09] BSides Connecticut - DevSecOps and Securing your SDLC

+ PROTOCOL: Workshop Support | STATUS: Lab Assistant
+ LEAD_PRESENTER: Bill Reyor
+ ROLE: Technical Support
+ VARIATION: BSides Las Vegas 2024 Workshop

I supported Bill Reyor in the Lab.

A variation on the workshops presented at BSides Las Vegas in 2024.

In this workshop, you'll learn the basics of DevSecOps and securing your SDLC using a range of tools. We'll explore both open-source options and those native to GitHub. Participants will learn how to set up IDE plugins, pre-commit hooks, and other techniques to secure their development environment. We will also cover building a CI/CD pipeline using DevSecOps concepts, including secrets scanning, dependency analysis, and Static Analysis Security Testing (SAST).

# Access Points
LINK_PRIMARY="https://www.bsidesct.org/archives/2024/"
COURSE_MATERIAL="https://github.com/tweag/bsidesct-devsecops-sdlc"

πŸ”— [NETWORK_LINK] https://www.bsidesct.org/archives/2024/

πŸ“‚ [COURSE_ARCHIVE] https://github.com/tweag/bsidesct-devsecops-sdlc


🎰 [2024.08.07] BSides Las Vegas - DevSecOps and Securing your SDLC

+ PROTOCOL: Workshop | COLLABORATION: Team Mission  
+ PRESENTERS: Andy Dennis + Bill Reyor + Sean Clayton
+ TARGET: BSides Las Vegas Participants
+ TECH_STACK: GitHub + Open Source Security Tools

This workshop on DevSecOps and securing your SDLC provides BSides Las Vegas participants with a basic guide to using DevSecOps tooling including open source options, and those native to GitHub BSidesLV attendees will learn about setting up IDE plugins, pre-commit hooks and other techniques to harden their development environment. Attendees will then progress into building out CI/CD pipeline that use DevSecOps concepts such as secrets scanning, dependency analysis and Static Analysis Security Testing.

# Access Points
LINK_PRIMARY="https://archive.bsideslv.org/2024/"
COURSE_MATERIAL="https://github.com/tweag/bsideslv-devsecops-sdlc"

πŸ”— [NETWORK_LINK] https://archive.bsideslv.org/2024/

πŸ“‚ [COURSE_ARCHIVE] https://github.com/tweag/bsideslv-devsecops-sdlc


πŸ€– [2024.07.12] HOPE XV - Mastering Security in Development

+ PROTOCOL: Hands-on Workshop | COLLABORATION: Team Mission
+ PRESENTERS: Andy Dennis + Sean Clayton + Bill Reyor  
+ FOCUS: Secure Software Development + DevSecOps Integration
+ ENVIRONMENT: Local Development Setup

This is a hands-on workshop that provides participants with an introduction to secure software development and leveraging DevSecOps tooling to aid in this. Participants will learn about setting up a local development environment that includes security tooling.

# Access Points  
LINK_PRIMARY="https://xv.hope.net/talk/EMHGYE/"
COURSE_MATERIAL="https://github.com/tweag/hope-sec-dev-workshop-2024"

πŸ”— [NETWORK_LINK] https://xv.hope.net/talk/EMHGYE/

πŸ“‚ [COURSE_ARCHIVE] https://github.com/tweag/hope-sec-dev-workshop-2024


πŸ” [2024.06.05] Microsoft Reactor - Investigating code security with Copilot

+ PROTOCOL: Talk | COLLABORATION: Microsoft Team Support
+ PRESENTER: Solo + Microsoft Team Support
+ TARGET: Microsoft Reactor Attendees
+ FOCUS: Security Vulnerability Detection + Remediation with Copilot

In this talk we provide a brief walk-through using Copilot to aid in detecting and fixing security vulnerabilities in source code. Topics covered include:

  • A basic introduction to improving SDLC security using IDE and local environment tools
  • Detecting OWASP Top 10 style vulnerabilities in an example application
  • Remediating detected issues
  • Creating .gitignore files to prevent environment files being committed
  • Looking at how GHAS can be combined with Copilot to improve security further
# Access Points
LINK_PRIMARY="https://developer.microsoft.com/en-us/reactor/events/22657/"

πŸ”— [NETWORK_LINK] https://developer.microsoft.com/en-us/reactor/events/22657/


🏝️ [2024.05.18] BSides Puerto Rico - Shift Down: Foundational Security with Internal Developer Platforms

+ PROTOCOL: Talk | FORMAT: Solo Presentation
+ TOPIC: Internal Developer Platforms (IDPs)
+ CONCEPT: "Shift Down" Security Architecture  
+ PLATFORMS: Cortex + Backstage Demonstrations

Talk presented by myself at BSides PR.

When we use the term platform we can use it in many contexts, here we explore two. First, platform meaning the hosting layer and environment that applications are deployed upon. The second, the self-service interface, tools and mechanisms by which individuals can build and expand upon that underlying hosting layer. Internal Developer Platforms (IDPs) sit within this second context, but leverage the first. An IDP enables platform teams to produce a catalog of reusable infrastructure templates and patterns. Supported by portal interfaces product engineers can leverage these reusable components to deploy supporting services themselves. IDP products such as Cortex and Backstage provide the opportunity for security and governance to be baked into these templating processes, ensuring secure-by-design infrastructure. Not only do we have self-service infrastructure, but self-service security. Here engineers can implement pre-canned secure components and shift security downwards. Complementing the move to β€œshift-left”, β€œshifting down” lets engineering teams take advantage of the pre-defined β€œsecurity as code” available at the platform level. This allows teams to focus on the things that count, such as delivering new products, and not worrying about securely deploying infrastructure. In turn it also aids in reducing the burden placed on Infrastructure and DevOps teams. In this talk I will demonstrate how we can reduce the cognitive load on engineering teams to β€œlearn all the security things” by using a β€œshift down” approach to secure platform development and the roll out of Internal Developer Platforms.

πŸ”— [NETWORK_LINK] https://www.bsides.pr/2024speakers/andy-dennis-


🏝️ [2024.05.18] BSides Puerto Rico - Introduction to DevSecOps Workshop

+ PROTOCOL: Workshop | COLLABORATION: Enabled
+ PRESENTERS: Andy Dennis + William Reyor
+ PLATFORM: GitHub + Open Source Tools
+ FORMAT: Hands-on Learning Experience

The Introduction to DevSecOps Workshop provides BSides PR participants with an introduction to DevSecOps using GitHub and open source tools.

Attendees will learn about setting up a local development environment including pre-commit hooks and other preventative measures. Students will then progress into building out a simple CI/CD pipeline that uses free and open source tooling.

# Access Points
LINK_PRIMARY="https://www.bsides.pr/2024speakers/andy-dennis-"
COURSE_MATERIAL="https://github.com/tweag/bsides-pr-devsecops-2024"

πŸ”— [NETWORK_LINK] https://www.bsides.pr/2024speakers/andy-dennis-

πŸ“‚ [COURSE_ARCHIVE] https://github.com/tweag/bsides-pr-devsecops-2024


🌴 [2024.03.16] BSides Tampa - Shifting Security Left, a Hands on Workshop

+ PROTOCOL: Workshop | FORMAT: Classroom 
+ PRESENTERS: Andy Dennis + Bill Reyor + Rob Barrantes + Sean Clayton
+ SUPPORT: GitHub Team
+ FOCUS: Security Integration + DevSecOps Pipelines

Shifting Security Left a Hands On Workshop provides participants with an introduction to baking security into the software development process and leveraging DevSecOps tooling to support this.

Attendees will learn about setting up a local development environment which includes security tools such as IDE plugins. Students will then progress into learning how to use DevSecOps pipelines to detect security issues such as accidentally committed secrets.

The workshop will then wrap up with tips on how to handle secure deployments and a look to what the future holds in this space.

# Access Points
LINK_PRIMARY="https://events.bsidestampa.net/BSidesTampa2024"
COURSE_MATERIAL="https://github.com/tweag/bsides-tampa-workshop"

πŸ”— [NETWORK_LINK] https://events.bsidestampa.net/BSidesTampa2024

πŸ“‚ [COURSE_ARCHIVE] https://github.com/tweag/bsides-tampa-workshop


β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ >> SWITCHING TO ARCHIVE MODE...                                β”‚
β”‚ >> ACCESSING LEGACY SYSTEMS...                                 β”‚  
β”‚ >> TIMELINE: 2018.07 - 2023.08                                 β”‚
β”‚ >> CLASSIFICATION: HISTORICAL_DATA                             β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ€– [2023.08.11] DEFCON Recon Village - The Perils of Generative AI: Implications for Open Source Intelligence Research

+ PROTOCOL: Research Presentation | FORMAT: Solo Talk
+ DOMAIN: OSINT + AI Security Research
+ VENUE: Recon Village | DEFCON 31
+ THREAT_VECTOR: Generative AI Impact on Intelligence Gathering

ABSTRACT:
The rapid advancement and proliferation of Generative AI in social media and other digital platforms have sparked significant discussion about their potential impact on various sectors, including Open Source Intelligence (OSINT) research. OSINT, a critical resource in security, intelligence, and research fields, heavily relies on social media and other platforms to gather and analyze publicly available data. With the recent proliferation of Large Language Models (LLMs) and their interaction with these platforms, concerns have emerged about their potential to hinder the efficacy and integrity of OSINT.

CORE TOPICS:

  • Background on Generative AI and OSINT capabilities
  • LLM integration with social media platforms
  • Data validity and reliability challenges
  • Information pollution and misinformation vectors
  • Source attribution and provenance complexity
  • AI-driven influence operations detection
  • Mitigation strategies and validation techniques

πŸŽ₯ [VIDEO_ARCHIVE] https://www.reconvillage.org/talks-recon-village-defcon/the-perils-of-generative-ai%3A-implications-for-open-source-intelligence-research


🍊 [2022.11.08] BSides Orlando - DevSecOps on a $ store budget

+ PROTOCOL: Tight Security Budget | COLLABORATION: Solo Presentation 
+ DOMAIN: DevSecOps
+ VENUE: BSides Orlando 2024
+ TECHNIQUE: DevSecOps and Shifting Left 

Security tooling can be expensive, very expensive. Never fear though, there are a multitude of cheap and open source options out there. You too can build a robust DevSecOps pipeline on a dollar store budget.

Covering everything from open source SAST tools to free secret scanning and Infrastructure-as-Code audits, this talk walks you through options to build out CI/CD pipelines that help to secure your code base without taking out a second mortgage.

Some basic knowledge of DevOps and CI/CD would be useful but is not mandatory.

# Access Points
LINK_PRIMARY="https://2022.bsidesorlando.org/speakers/index.html"

πŸ”— [NETWORK_LINK] https://2022.bsidesorlando.org/speakers/index.html


πŸ•΅οΈ [2021.08.07] DEFCON Recon Village - Using Passive DNS for gathering Business Intelligence

+ PROTOCOL: Intelligence Gathering | FORMAT: Solo Presentation
+ DOMAIN: Passive DNS + Business Intelligence
+ VENUE: Recon Village | DEFCON 29
+ TECHNIQUE: OSINT + DNS Analysis

πŸŽ₯ [VIDEO_ARCHIVE] https://www.reconvillage.org/talks-recon-village-defcon/using-passive-dns-for-gathering-business-intelligence


πŸ›οΈ [2020.11.14] BSides Connecticut - A basic guide to COBOL Security

+ PROTOCOL: Legacy Systems Security | FORMAT: Solo Talk
+ DOMAIN: Mainframe + Legacy Application Security
+ CONTEXT: Post-COVID Legacy System Stress
+ TARGET: COBOL Maintainers + Threat Modelers

COBOL has come back onto the radar of many of us in the tech industry during 2020 due to the large number of legacy systems struggling to cope with increased traffic. We all heard about unemployment systems in New Jersey lacking the skilled engineers required to help improve COBOL based systems. But did you know, COBOL is still widely used in the banking sector and elsewhere? In this talk we will look at some of the security steps you can take to improve a COBOL systems security posture. Whether maintaining COBOL systems as an engineer, or performing threat modeling on then, this is the talk for you!

πŸŽ₯ [VIDEO_ARCHIVE] https://www.youtube.com/watch?v=2IJEl_gslFQ&list=PL5CtRPjZ1XFEmoWu1TE_QkqfwATyQLc9f&index=7


πŸ—³οΈ [2019.11.16] BSides Connecticut - Election hacking defined and how to fight back

+ PROTOCOL: Research Presentation | SOURCE: Masters Thesis
+ DOMAIN: Electoral Security + Attack Vector Analysis
+ METHODOLOGY: Hexad Attack Surface Model
+ TIMELINE: Research Period 2017-2019

RESEARCH ABSTRACT: Content was derived from my Masters thesis.

What does election hacking mean? Coming up with a definition is fraught with difficulties. Where are the boundaries where an incident is no longer considered hacking, but some other crime? The term is often thrown around in the media but can be ill-defined & nebulous.

KEY RESEARCH QUESTIONS:

  • Is illegal funding an election campaign hacking, or electoral fraud?
  • Do these types of actions which predate the Internet, & computing, in general, constitute hacking?
  • Should traditional ballot stuffing be considered hacking too?

METHODOLOGY: In this presentation drawing upon research conducted from 2017 through 2019, we will seek to narrow the term down into something more concrete. With this goal in mind, we will then look at six proposed attack vectors (called the hexad) that comprise the attack surface elections & referendum can face from hackers.

Following this, we will walk through some real-world examples of actions that meet this criterion, and how some campaigns have successfully fought back. The talk will wrap up with some thoughts on how future electoral campaigns can defend against nefarious actors.

πŸŽ₯ [VIDEO_ARCHIVE] https://www.youtube.com/watch?v=Geeh0fGXAPM&list=PL5CtRPjZ1XFHmd3TwPksbFKjtGQb2azS0


πŸ™οΈ [2018.07.17] NYC DevOps Meetup @ Stack Overflow - Baking static analysis into your CI pipeline

+ PROTOCOL: Meetup Presentation | VENUE: Stack Overflow NYC
+ HOST: Tom Limoncelli
+ DOMAIN: CI/CD + Static Analysis Integration
+ FORMAT: DevOps Community Talk

Recorded July 17 at the Stack Overflow offices in New York for the NYC DevOps meetup.

πŸŽ₯ [VIDEO_ARCHIVE] https://www.youtube.com/watch?v=c4cgbRgYrVs&t=1032s


πŸ“š DIGITAL ARCHIVES πŸ“š

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ >> ACCESSING PUBLICATION DATABASE...                           β”‚
β”‚ >> TIMELINE: 2013.02 - 2020.09                                 β”‚
β”‚ >> CLASSIFICATION: TECHNICAL_PUBLICATIONS                      β”‚
β”‚ >> FORMAT: PHYSICAL_MEDIA + DIGITAL_DISTRIBUTION               β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

🐳 [2020.09.14] Docker for Developers: Develop and run your application with Docker containers using DevOps tools for continuous delivery

+ PROTOCOL: Technical Publication | CO-AUTHORS: Andrew Dennis, Richard Bullington-McGuire, Michael Schwartz
+ PUBLISHER: Packt Publishing
+ PAGES: 468 | EDITION: 1st | LANGUAGE: English
+ FOCUS: Docker Containerization + DevOps + CI/CD

Docker is the de facto standard for containerizing apps, and with an increasing number of software projects migrating to containers, it is crucial for engineers and DevOps teams to understand how to build, deploy, and secure Docker environments effectively. Docker for Developers will help you understand Docker containers from scratch while taking you through best practices and showing you how to address security concerns.

TECHNICAL SCOPE:

  • Container fundamentals and VirtualBox integration
  • Development environment containerization
  • Production deployment strategies (single-host + clusters)
  • CI/CD pipeline integration (Jenkins, Kubernetes, Spinnaker)
  • Monitoring and scaling (Prometheus, Grafana)
  • Cloud-native deployment (Amazon EKS)
  • Docker security concepts and best practices
# Access Points
LINK_PRIMARY="https://www.packtpub.com/en-us/product/docker-for-developers-9781789539486"

πŸ”— [NETWORK_LINK] https://www.packtpub.com/en-us/product/docker-for-developers-9781789539486


πŸ—οΈ [2016.03.22] Raspberry Pi Computer Architecture Essentials

+ PROTOCOL: Technical Publication | AUTHOR: Solo Mission
+ PUBLISHER: Packt Publishing
+ PAGES: 232 | EDITION: 1st | LANGUAGE: English
+ ISBN-13: 9781784398606
+ FOCUS: Raspberry Pi 2 + Multi-core Programming + Hardware Integration

With the release of the Raspberry Pi 2, a new series of the popular compact computer is available for you to build cheap, exciting projects and learn about programming. In this book, we explore Raspberry Pi 2's hardware through a number of projects in a variety of programming languages.

TECHNICAL SCOPE:

  • Hardware component analysis and setup
  • Multi-language programming environment (Assembly, C/C++, Python)
  • Multi-threaded application development
  • Multi-core processor utilization
  • Storage expansion beyond SD cards
  • Graphics hardware interaction
  • Sound programming fundamentals
  • Python-based web server development
  • Third-party microcontroller integration
# Access Points
LINK_PRIMARY="https://www.packtpub.com/en-us/product/raspberry-pi-computer-architecture-essentials-9781784398606"

πŸ”— [NETWORK_LINK] https://www.packtpub.com/en-us/product/raspberry-pi-computer-architecture-essentials-9781784398606


🏠 [2015.02.25] Raspberry Pi Home Automation with Arduino - Second Edition

+ PROTOCOL: Technical Publication | AUTHOR: Solo Mission
+ PUBLISHER: Packt Publishing
+ PAGES: 148 | EDITION: 2nd | LANGUAGE: English
+ ISBN-13: 9781784393939
+ FOCUS: IoT + Home Automation + Arduino Integration

Unleash the power of the most popular microboards to build convenient, useful, and fun home automation projects, Second Edition.

TARGET AUDIENCE: If you are new to the Raspberry Pi, the Arduino, or home automation and wish to develop some amazing projects using these tools, then this book is for you. Any experience in using the Raspberry Pi would be an added advantage.

TECHNICAL SCOPE:

  • Raspberry Pi and Cooking Hacks Arduino bridge shield setup
  • Electronic component circuit building
  • Interactive application development
  • Environmental monitoring (thermistors, FSRs, photoresistors)
  • Ethernet-based Pi-Arduino communication
  • Email notification systems
  • Mains power control via relay shields
  • Motor integration and control
  • Flood/damp detection systems
# Access Points
LINK_PRIMARY="https://www.packtpub.com/en-us/product/raspberry-pi-home-automation-with-arduino-second-edition-9781784393939"

πŸ”— [NETWORK_LINK] https://www.packtpub.com/en-us/product/raspberry-pi-home-automation-with-arduino-second-edition-9781784393939


πŸ–₯️ [2013.11.20] Raspberry Pi Super Cluster

+ PROTOCOL: Technical Publication | AUTHOR: Solo Mission
+ PUBLISHER: Packt Publishing
+ PAGES: 126 | EDITION: 1st | LANGUAGE: English
+ ISBN-13: 9781783286201
+ FOCUS: Parallel Computing + Cluster Architecture + Distributed Systems

A cluster is a type of parallel/distributed processing system which consists of a collection of interconnected stand-alone computers cooperatively working together. Using Raspberry Pi computers, you can build a two-node parallel computing cluster which enhances performance and availability.

TECHNICAL SCOPE:

  • Multi-node Raspberry Pi hardware setup
  • Operating system configuration and optimization
  • Parallel computing fundamentals
  • Hadoop ecosystem implementation
  • MPICH (Message Passing Interface) integration
  • MapReduce programming patterns
  • Cluster management and monitoring
  • Performance optimization techniques

LEARNING PATH: Starting from a pile of hardware, this book guides you through exciting tutorials that will help you turn your hardware into your own super-computing cluster. The journey progresses from basic hardware setup through advanced distributed computing concepts, culminating in practical ancillary projects and resources for further development.

# Access Points
LINK_PRIMARY="https://www.packtpub.com/en-us/product/raspberry-pi-super-cluster-9781783286201"

πŸ”— [NETWORK_LINK] https://www.packtpub.com/en-us/product/raspberry-pi-super-cluster-9781783286201


🏠 [2013.02.05] Raspberry Pi Home Automation with Arduino - First Edition

+ PROTOCOL: Technical Publication | AUTHOR: Solo Mission
+ PUBLISHER: Packt Publishing
+ PAGES: 176 | EDITION: 1st | LANGUAGE: English
+ ISBN-10: 1849695865 | ISBN-13: 978-1849695862
+ STATUS: OUT_OF_PRINT | CLASSIFICATION: LEGACY_ARCHIVE

HISTORICAL SIGNIFICANCE: Currently out of print. Use of the Arduino, Raspberry Pi and Gertboard for IoT projects.

TECHNICAL SCOPE:

  • Arduino and Raspberry Pi integration fundamentals
  • Gertboard hardware interface utilization
  • IoT project development methodologies
  • Home automation system architecture
  • Electronic prototyping and circuit design

ARCHIVE STATUS: This publication represents the foundational work in the home automation series, introducing core concepts that were expanded upon in the Second Edition. While no longer in active distribution, it established the framework for subsequent publications in the series.


╔══════════════════════════════════════════════════════════════════╗
β•‘                     CONNECTION TERMINATED                        β•‘
β•‘                                                                  β•‘
β•‘  "I've seen things you people wouldn't believe. Attack ships     β•‘
β•‘   on fire off the shoulder of Orion. I watched C-beams           β•‘
β•‘   glitter in the dark near the TannhΓ€user Gate.                  β•‘
β•‘   All those moments will be lost in time, like tears in rain.    β•‘
β•‘   Time to die."                                                  β•‘
β•‘                                                                  β•‘
β•‘                          - Roy Batty, Blade Runner               β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•
> SESSION_COMPLETE
> ARCHIVE_STATUS: SYNCED
> NEURAL_LINK: DISCONNECTED
> THANK_YOU_FOR_FLYING_NEXUS_CORP

πŸŒ† EOF πŸŒ†

About

Links to my talks, workshop, papers and publications. Start here to learn more!

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors