Category: Technology



Many developers still consider WebAssembly to be a leading-edge, niche technology tied to low-level systems programming languages. However, C# and .NET (open-source, cross-platform technologies used by nearly one-third of all professional developers [1]) have run on WebAssembly since 2017. Blazor WebAssembly brought .NET into the browser on open standards, and is now one of the fastest-growing parts of .NET across enterprises, startups, and hobbyists. Next, with WASI we could let you run .NET in even more places, introducing cloud-native tools and techniques to a wider segment of the global developer community. This is a technical talk showing how we bring .NET to WebAssembly. Steve will demonstrate how it runs both interpreted and AOT-compiled, how an IDE debugger can attach, performance tradeoffs, and how a move from Emscripten to WASI SDK lets it run in Wasmtime/Wasmer or higher-level runtimes like wasmCloud. Secondly, you'll hear lessons learned from Blazor as an open-source project – challenges and misconceptions faced bringing WebAssembly beyond early adopters. PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=PIeYw7kJUIg https://www.youtube.com/watch?v=yvbBYW3VCRs



Any GitOps implementation involves managing a wide range of resources. Sooner rather than later, there will become a need to manage sensitive assets, such as passwords or tokens. So, how can these types of assets be handled appropriately so that they are not visible in plain text when stored in a Git repository? Secrets management is a prevalent topic in the cloud native ecosystem and given its importance, tools and frameworks have been developed that can be applied to not only the content itself, but also within GitOps engines. Understanding where, how and when they can be used could make all the difference when employing proper security measures while implementing a GitOps solution. Attendees will learn: * Tools for detecting the presence of sensitive assets within Git repositories * Strategies for encrypting data at rest * Integrations with purpose built secrets management engines * How sensitive assets can be stored and used when working with public cloud providers * The mechanisms for which GitOps engines can aid in the management of sensitive resources Upon completion, attendees will no longer have an excuse to leave sensitive assets unprotected again! PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=FVaaqP7_AJg https://www.youtube.com/watch?v=QFO3SiqqUOM



A crucial aspect of software engineering teams' working agreements are code reviews. By applying the four-eyes principle on code, teams can reduce the number of bugs and errors, uncover misunderstandings early and ensure a certain level of quality across their common code base. In essence, the relevance of code reviews does not change for data teams, including data scientists. However, due to the often experimental nature of data science tasks, standard code reviews do not always work well and therefore need some tweaks. This talk will give a data scientist's view on code reviews, focussing on which aspects data scientists can pull from the general process and what needs to be adjusted in order to have effective and satisfying code reviews. Building on that, you will get recommendations for the following questions: * When and what should I review? * What feedback should I give? * What tools support me in executing this task? Recorded at the PyConDE & PyData Berlin 2022 conference, April 11-13 2022.
https://2022.pycon.de PUBLICATION PERMISSIONS:
PyData provided Coding Tech with the permission to republish PyData talks. CREDITS:
PyData YouTube channel: https://www.youtube.com/c/PyDataTV https://www.youtube.com/watch?v=jpDst5T2vjI