Screencasts

Page 1 of 20123451020Last »

Webinars   /   Dec 17, 2015

Webinar: Typesafe and Chariot – Building the Real-Time Organization

This webinar will describe a reference architecture using the Typesafe Reactive Platform and other tools such as Cassandra, Kafka, and Spark that can be used to build out the real-time organization.

Tags:, , , , , ,

View screencast

ETE 2015   /   Oct 12, 2015

Philly ETE 2015 #52 – Tom DeVane, Rick Nucci, Mike Rappaport, Beth Bunting Arnholt – Creating a Workplace to Retain Your Tech Talent

When your top talent gets a call from your competitor down the street offering a 10% bump in salary, will they stay or jump? Is money everything? What can else can you offer them so that they will stay with you? There are no absolutes, but there are companies with low turn-over and the things they pay attention to tend to be quite different from what the companies that have retention issues pay attention to.

Tags:,

View screencast

ETE 2015   /   Oct 12, 2015

Philly ETE 2015 #51 – Duncan K. DeVore – Distributed Eventsourcing with Akka

This talk will explain the rationale behind CQRS/ES, how it fits the Reactive paradigm and the advantages regarding both the technology and business level.

Tags:,

View screencast

ETE 2015   /   Oct 12, 2015

Philly ETE 2015 #50 – Jamie Allen, Erik Osheim, Brendan McAdams, Michael Pilquist, Brian Clapper – Typesafe Scala, Typelevel Scala: What’s Going On Anyway?

From the abstract: Last year, Miles Sabin wrote that “there is ... a significant constituency at the core of the Scala community whose needs are not being fully met [by Typesafe’s focus on stability and Java 8 compatibility].” That statement summarizes the mission behind Typelevel.org, a project that currently consists of a fork of the […]

Tags:, , ,

View screencast

  /   Sep 25, 2015

Simple Akka Clustering

Setting up Akka clustering is quite easy and provides a way to distribute work across multiple machines in the cluster. In many cases this requires no changes to an Actor compared to a non-cluster deployment. In this screencast, I walk through setting up a cluster and compare deploying an actor in a local actor system […]

Tags:,

View screencast

ETE 2015   /   Sep 25, 2015

Philly ETE 2015 #49 – Tracey Welson-Rossman, Christopher Wink, Sylvester Mobley & Charles Eaton – New Pipelines for Diverse IT Talent

Join our panelists who are part of a growing movement of non-profits working to change the discussion among women and minorities to learn more about their programs, what lessons they are learning about working with these groups, how they are helping to teach organizations to create diverse talent and potentially, how you can help solve this issue.

Tags:, , , ,

View screencast

ETE 2015   /   Sep 25, 2015

Philly ETE 2015 #48 – Caryl Rivers and Rosalind C. Barnett – Why the Face of Tech Remains Stubbornly Male

Caryl Rivers and Rosalind C. Barnett have received wide critical praise for their books about women, men, work and society. Hear as they analyze the tech field in terms of gender.

Tags:, , ,

View screencast

ETE 2015   /   Sep 22, 2015

Philly ETE 2015 #47 – Seth Vargo – Taming the Modern Data Center

This talk will discuss the problems faced in the modern data center, and how a set of innovative open source tooling can be used to tame the rising complexity curve. Join me on an adventure with Vagrant, Consul, and Terraform as we take your data center from chaos to control.

Tags:, , , , ,

View screencast

ETE 2015   /   Sep 21, 2015

Philly ETE 2015 #46 – Valerie Thomas – Social Engineering Overview: How to Prevent Your Company from Getting Hacked

Social engineers use a dangerous combination of technology and old-fashioned con artistry to infiltrate organizations every day. In this talk we’ll walk through the social engineering process including research, target selection, attack selection, and attack execution.

Tags:, , ,

View screencast

  /   Sep 11, 2015

Michael Pigg at Open Source Bridge – Using Asterisk to Stop Robocallers

Robocallers are very annoying. Even when the Do Not Call list works, it doesn't cover all robo callers. This talk is about combining Asterisk (an open source PBX) running on a BeagleBone and some inexpensive hardware to really stop these annoying callers. Note - this is a YouTube video and so the content cannot be […]

View screencast
Page 1 of 20123451020Last »