Presentations
The Girl Scouts of San Gorgonio put together a collaborative to provide at risk middle school girls with career aspiration building experiences. This includes a computer science experience at the local community college. With the cooperation of the School Districts and support from the San Manual Band of Mission Indians, 300 middle school girls participate in a morning of computer science at SBVC.
With approximately 400,000 software patents in force, patents are a constant risk for software developers. Patents are particularly challenging for free and open source projects because, unlike copyright, a product can infringe a patent even if the developers did not copy the patent owner's work. will discuss various strategies for helping to both mitigate risk and promote free and open software development. These include defensive aggregators, patent pledges, and defensive patent licenses.
Overview the snapcraft features and demo how easily a snap can be created using multiple parts from different sources. We will also show how to create a plugin for unhandled source types.
If you've been around the hardware world, or backed a kickstarter that's manufacturing something, you've seen the delays, the apparent excuses, the the updates that just sound crazy. Well, turns out those excuses and crazy sounding updates are more likely true than not. I intend on trying to pull back the curtain on how hardware is built, and some of things that software folks take for granted in how our hardware gets made and delivered.
HauteLook, 2013: Six-second load times during sale events, constant outages, unhappy members, and millions of dollars left on the table. Learn how HauteLook’s engineering team turned the business’s weakest point into a flash sale money machine. Topics covered include general performance principles, Linux/Infrastructure tuning and scaling PHP for fun and profit.
Learn exactly what makes a "next-gen" filesystem "next-gen". Ars Technica author Jim Salter will go over the features common to ZFS and btrfs, talk about how they work and why you want them, and share performance testing and real-world experience.
I show an async framework with non-blocking sockets, callbacks, and an event loop. It's efficient, but callbacks make a mess! So I build coroutines from Python generators, and update my little framework to use them instead. With no loss of efficiency, we gain the legibility of synchronous code. Indeed, coroutines are clearer in a way: at each point where a coroutine might be interrupted by another, we explicitly mark it with "yield from".
Once you see them implemented, you're on your way toward a rigorous understanding of what "async" means, and how coroutines work in Python 3.
Daniel is a 12 year old who loves working with R. He’s am pretty sure he wants to become a Data Scientist when he grows up. He has been working with data from Baseball, Financials and lately with data from “Magic The Gathering” tournaments. In this presentation he will show you how he learned R and how he has used it to find interesting statistics.
If you want to access MySQL database in the most efficient way you need to understand how indexes work inside MySQL. The first step is to learn how MySQL stores data in indexes and how it uses it for data access. We will be reviewing the most typical use-cases where indexes are hugely beneficial. Each use-case will be illustrated with examples so that you can quickly build high-performance applications.