POPULARITY
Cypress 11 has been released and one of the most anticipated new features is the GA release of Cypress Component Testing! We are joined on this episode by Jordan Powell of Cypress to discuss what component testing is, how it is different from traditional Cypress e2e testing, where it might fit in the testing pyramid and most importantly, how to get started. https://docs.cypress.io/guides/component-testing/quickstart-angularhttps://jordanpowell88.comhttps://twitter.com/jordanpowell88https://dreamon.world
Today I’m delighted to be joined by E2open, a company who believes that the level of agility required to capture growth opportunities – plus the resiliency to manage today’s risks – demands a new way of thinking. Their range of intelligent applications allow supply chain leaders to make the best business decisions using real-time information from across their entire internal and external ecosystems. From channel shaping and demand sensing, to business planning and global trade management, E2open offers a full suite of intelligent applications for every stage of your businesses supply chain journey. They aim to unlock your potential with their expertise, delivering you end-to-end visibility, planning and execution, all in real time. I’m joined by Michael Farlekas, President and Chief Executive Officer at E2open, to talk about why the company is a market-leader, the impact of issues like COVID and Brexit on supply chain and why they chose 2021 to take E2open public. IN THIS EPISODE WE DISCUSS: [07.07] A closer look at what E2open does, and their recent big announcement. “We help our customers to connect what is really a disconnected world.” [09.39] Why E2open chose 2021 to take their business public. [11.31] How E2open was founded and why it led to a continuing culture of collaboration. “Collaboration is the foundation of our business.” [14.23] Michael’s advice for businesses considering the route of mergers or acquisitions. “How you technically integrate is the foundation, but it goes much deeper than that – you also need to consider go to market, cultural and back office integration.” [18.14] Why visibility is a growing supply chain trend, and how you create it. “Visibility is what you get when you have a well-constructed supply chain architecture.” [22.28] How customer demand drives business, and how E2open’s software can deliver connectivity to help create a seamless and proactive supply chain, from sales predictions to inventory management. [25.03] E2open’s COVID experience, how they helped their customers and Michael’s reflections on how the pandemic has impacted the future of the industry. [28.14] A customer success case study. [29.54] From an increase in ocean shopping to more manufacturing, Michael’s trends and predictions for 2021 and beyond. [35.21] The future for E2open. RESOURCES AND LINKS MENTIONED: Head over to E2open’s website to find out more and discover how they could help you too. Check out our other podcasts HERE.
Welcome! Today Craig’s got a deep-dive into Anti-Virus software. Which should you use? What is anti-Virus’s pioneer saying? What’s the future? For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: Zoom defenders cite legit reasons to not end-to-end encrypt free calls --- Automated Machine-Generated Transcript: If you're like most people in the online world you have used zoom, you might even have put it in place for your business. They've now come out and said they are going to have end-to-end encryption. What's this all about? [00:00:17] Hi everybody. Craig Peterson here. Welcome back. Thanks for joining us. We're going to talk a little bit about zoom right now. You've heard me. I'm sure. Talked about it before and how I am constantly nagging you guys that if you are a business, you should not use zoom for anything that might be proprietary. [00:00:42] Zoom has been nailed and criticized multiple, multiple times. Zoom has been caught, lying about doing encryption more than once. Zoom was caught routing customer calls through China. Can you imagine that you're using Zoom? You're a business and your calls are going to China. They were caught installing a server on the Mac iOS application platform. [00:01:12] Now this is really, really something. This was the final straw. This is where we absolutely laid down the law with our employees and our customers. You may not use Zoom. Even if you installed zoom from Macko Wes zoom had a piece of software that constantly phoned home information. Even after you want to install the Mac zoom application, this list just goes on and on. [00:01:44] If you bought a higher-end zoom system for your business. And you had one of their controllers in your office, you know, a physical piece of hardware server. It had a brand it's his crazy, basically a zero-day back door wide open that they had put in purposely. That exposed every device on your network to hackers on the internet, anybody on the internet, can you believe that it's absolutely crazy. [00:02:21] Another company we were at just this week, we were doing some analysis, replacing firewalls with something much, much, much better. And. We're looking at the firewall configuration. Right? Cause you want to do that. You want to make sure, okay. We're putting in a new firewall that has way more features that can monitor what's going on. [00:02:42] That's going to block evilness. That's going to keep itself up to date. Right? All things that the basic firewalls that you buy online are not gonna be able to do for you. So we're looking at the configuration of their existing firewall. Now imagine our shock and amazement. When we saw that the firewall had a port wide open, the HTTPS port, the port you would use for a server that had the port wide open from the outside world. [00:03:15] In other words, anybody can connect to it. And that connected directly to their database server internally to SQL server, which wasn't even patched up. It's absolutely incredible. What's going on? We've got to pull up our socks. You have to do an audit. You know, I think I might do that again. What about a year and a half ago we had over a thousand people. [00:03:41] That we did free cyber health assessments for a lot of them were just home users, a number of businesses. And I have already sent out an email to businesses on my email list saying, Hey, listen, I will pay to have some of my security people talk to you now. Obviously we got to schedule it and everything else, but, um, Talk to you and fix your problems, not sell you a thing. [00:04:06] These are fire jumper, certified security people. Okay. They know what they're doing, but zoom, this is what they're doing. Right. And on top of it, they have most of the development done in China. So the developers aren't costing them hardly anything. Can you believe this? Right? It's a, it's easy to use, but it is a security. [00:04:29] Nightmare. What we use is WebEx teams. That's what we install for our clients. We have WebEx teams, phones. We have WebEx teams, apps on all of our smart devices, right. That's what we use. It is secure and to, and we actually control the security where we have the security keys and everything else. [00:04:53] So it has some of the highest levels of security on it. That's what we use. If you're not going to use WebEx teams, you might consider using Microsoft teams, which is okay. But again, Microsoft misrepresents, just like we talked about Google, uh, the, the levels of security you have. Now, if you dig into the documentation, Microsoft is going to be telling you the truth. [00:05:20] Okay. They're not lying, but the marketers. Excuse me. They just don't understand this stuff well enough, frankly, to make marketing materials because they end up misrepresenting. It goes on and on. Anyhow. So if you have looked. In Twitter, for instance, and you keep track of security stuff. Cause I know a lot of you guys you're the best and the brightest out there, you are watching some of these security conversations that are going on over on Twitter, but you've, I'm sure seen zoom just ripped. [00:05:56] Ripped ripped for his plans to enable end to end the encrypted video. What they're doing right now is an encrypted video from your computer using their 256-bit key, which is, uh, not great, but they encrypt it to their servers. And basically anybody can hop onto any of these zoom calls or they put a few things in place. [00:06:19] That's going to make it a little bit easier, a little bit better. But what they're saying is we're going to add end to end encryption and they have put a document up on Github, which is a website that's used by open source developers, zooms, put a document up there saying, okay, this is what we're planning on doing. [00:06:37] For our security strategy. What do you guys think? We'll see what happens, but Zoom is only going to be providing this end to end encryption for the video and audio and files for their paid customers. So when I looked around a little bit, I found our friends over at the electronic found frontier foundation, really complaining about this. [00:07:04] Because what they're saying is the people that cannot afford to have their messages exposed, cannot afford to pay for the encryption, the quote, right from their site here, we applaud zoom for building strong. And to end encryption into their service, but by limiting this security enhancement to pay the accounts, Zoom is denying privacy protections to the participant who may need them most. [00:07:38] And of course, they're talking about people primarily in third world countries. And giving people special access. Like if, if they gave the FBI or local law enforcement special access to these encrypted sessions, if it's available to one government it's available to more than one government. Right. And so they're concerned about that too. [00:08:01] And I, I think that's absolutely legitimate to be concerned about that, but. We'll see what happens here because what zoom is planning on doing is only having this end to end encryption for the paid accounts because they do not want these pedophiles. And some of the terrorists here are domestic terrorists in the US as well as internationally zoom doesn't want them using their platform to plot. [00:08:30] Plan coordinate, organize, et cetera. Now I talked earlier about signal and what signal is doing and Signal is end to end encrypted, no matter what, right. It is absolutely free. And that's what Moxie Marlinspike put out and why he did it. WhatsApp is the same way, but, uh, well, we'll see what happens with zoom because they're figuring, Hey, if you are paying for an account, You have a credit card that you're paying with there's some way of pain and that can be tracked by law enforcement if they need to track it. [00:09:07] So we'll just leave it at that, right. It's going to make it easy enough. And if you're not paying for it, which is how most of these pedophiles and others are apparently doing it. Do you using free accounts while then you get what you deserve? So don't use Zoom. I can't trust them. They've lied to us again and again and again. [00:09:26] And it's been proven multiple times. They're under investigation right now by a couple of federal agencies for some of these lies and misrepresentations. Don't use zoom use WebEx teams, which is what we use. And we use it with our customers, or maybe look at Microsoft teams, stick around. We've got I'll wrap up. [00:09:50] And one more thing. When we get back, you're listening to Craig Peterson on WGAN. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
Il testing è una fase importantissima dello sviluppo web, specie se si tratta di programmare applicazioni il cui livello di complessità non è triviale.Esistono vali modi per approcciare al testing di una applicazione, in questo episodio vi racconto quello che intendi applicare nel mio nuovo progetto.Lo farò usando cypress uno scintillante tool che semplifica la vita dello sviluppatore e offre out of the box funzionalità indispensabili per una suite di test moderna.## Links- https://www.cypress.io/- https://docs.cypress.io/guides/overview/why-cypress.html#Features- https://slides.com/bahmutov/ts-without-ts#/13- https://glebbahmutov.com/blog/trying-typescript/- https://crossbrowsertesting.com/blog/test-automation/selenium-vs-cypress/- https://martinfowler.com/articles/practical-test-pyramid.html## Contatti@brainrepo su twitter o via mail a info@gitbar.it## CreditiLe sigle sono state prodotte da MondoComputazionaleLe musiche da Blan Kytt - RSPN e Broke For Free - Something Elated
The misinformation spread during the COVID-19 pandemic has made what happened with the 2016 U.S. elections look like the “good old days.” Epidemiologists are on center stage trying to explain complex topics to billions of people concerned for their lives-- and sometimes politicians are aiming to do the same. The multiplier effect is how hopelessly entangled challenging technical issues like end to end encryption and contact tracing via bluetooth on mobile phones are now also being publicly debated.The most natural reaction? Confusion. Kenn White is here to help.During our 60 minute conversation with Kenn, Jack and Dave go past the headlines trumpeting Zoom’s security issues in an attempt to lay bare the real issues with their recent missteps. Their initially misleading claims around end to end (E2E) encryption is our primary focus, but before diving deep into Zoom, Kenn explains exactly how hard it is to make it work by describing his 2 year journey to deliver E2E encryption at MongoDB. We pull apart the remaining concerns and Zoom’s impressive response to provide our take on just how worried you should be, from Johnson Elementary School to the defense industrial base.Kenn has a unique perspective on the idea to use contact tracing via Bluetooth to identify who infected people have been in proximity to in order to slow the spread of a disease. Having spent 10+ years supporting clinical trials, he explains why using our mobile phones to make contact tracing during the COVID-19 pandemic is unlikely to be successful in the near future. We hope this conversation with Kenn brings you clarity and calm at a time when both are in short supply.Note: We spend the first ~15 minutes talking about coping strategies during the pandemic. If you’d like to jump straight to the content focused on E2E encryption it begins right around the 15 minute mark.About KennKenneth White is a security engineer whose work focuses on networks and global systems. He is co-founder and Director of the Open Crypto Audit Project and led formal security reviews on TrueCrypt and OpenSSL. He currently leads applied encryption engineering in MongoDB's global product group. He has directed R&D and security Ops in organizations ranging from startups to nonprofits to defense agencies to the Fortune 50. His work on applied signal analysis has been published in the Proceedings of the National Academy of Sciences. His work on network security and forensics has been cited by the Wall Street Journal, Reuters, Wired, and the BBC. He tweets about security, privacy, cryptography, and biscuits: @kennwhite.
Hernani Marques on Pretty Easy Privacy On this episode I'm joined by Hernani Marques, a hacker and member of the pEp Foundation, talking about Pretty Easy Privacy, a concerted attempt to make adoption of end-to-end email encryption easier and more ubiquitous through automation of key-making and management through partnering with programs like Outlook and Thunderbird. To learn more about pEp, check out the foundation's website and follow or get in touch with Hernani via their website, vecirex.net. - pEp.foundation (Core technology & community entity of pEp) - pEp.software (All usable pEp software, commercial and not, and all Free Software) - gnunet.org (P2P framework for secure decentralized applications, including - for pEp - messaging) - sequoia-pgp.org (new OpenPGP library from former GnuPG devs) Reach Out If you have a topic or guest suggestion for Error451, find us via our contact page on our website and drop us a line. To hear past episodes of the podcast, click the link in these shownotes or find them up at our website or in our podcast feed. Subscribing to our show is free and easy. Support You can also support TFSR/Error451 monetarily. Featured Track Suspect Device by Stiff Little Fingers off of State of Emergency
I detta avsnitt av q-podden diskuterar Lars Linderoth och Ulrika Park kvalitet från ax till limpa. Var börjar och slutar kundresan? Hur organiserar man sig end to end?
We've been overdue for for a rapprochement with one of our favorite past topics: Privacy and Security in Swinging & Polyamory.The team of Mister Pent and Dylan Thomas put together information about securing yourself on the internet that a panel also including Dr. Liz Powell, Mike Joseph, and Cooper S. Beckett could discuss, digest, and put into action. In the age of our ability to connect anywhere and anytime, share information easily, and be as open as we want to be, it's important we arm ourselves with the knowledge necessary to make good decisions about what we put online and the information required to raise our level of computer and internet security. As you listen, don’t forget to tweet at #sspodcast and feel free to ask questions of @MisterPent and @DylanTheThomas! We’re sponsored by Castle Megastore, a one stop shop with everything you could want, from wand vibrators, to harnesses, to lube and condoms, to a complete suite of BDSM equipment including sex furniture. If you use the promo code SWINGSET at check out you can save 20% on your order. While we are definitely going to put together ebook / guide on cybersecurity for perverts, we wanted to list some of the resources we discussed during the podcast here: On Two-Factor Authentication When enabled, two-factor authentication (or 2FA) can surface as a "we don't recognize this device" message sent to an email address or a mobile phone number, or it can refer to an installed mobile app or a physical security token. You can find a list of websites that support 2FA here: https://twofactorauth.org/ In the meantime if you have a Google account, or have logins on sites like Dropbox, Lastpass, or Microsoft, go grab the Google Authenticator app. If you're a steam gamer, grab the Steam app and enable Steam Guard. On Passwords Securityinabox.org has a lot of great contnet with tools and tactics for digital security, they have a particularly good guide on creating, maintaining, remembering, and recording secure passwords, including with a password manager. XKCD's comic on Password Security that we love: On Password Managers and Sharing Passwords: Mister Pent, Cooper S. Beckett, and Dylan Thomas use Lastpass. Lastpass allows you to have a single set of passwords securely accessible over multiple devices and over the web, while setting up two factor authentication to limit access. It includes web browser extensions to automatically log you into sites and an Android app that does the same, depending on desired level of ease of use. It also allows you to share sets of passwords secureiy and simply with other people. Dylan Thomas also uses mSecure synchronized to a Dropbox account. mSecure has mobile and computer apps. It's not as nice or feature filled as Lastpass, but it's a little extra hassle for a lot of extra security for the most sensitive of passwords. If you need to share a temporary password with someone you can use OneTimeSecret. You create an a self-destructing link that disappears once it's accessed or once a certain amount of time passes. On using VPNs: You can't always trust the access to the internet you have, whether it's because you're in an airport on free airport wireless or a coffee shop or because you're travelling. Sometimes you may just want to tune into BBC Radio 5 using their iPlayer and you happen to not live in the Commonwealth. VPNs can keep your traffic secure when you can't trust your connection, with the added benefit of giving you choice on what country your traffic exits so you can use region specific resources. Dylan Thomas uses BlackVPN. Mister Pent and Cooper S. Beckett use Private Internet Access. Both can support simultaneous connections to cover multiple devices at once, and both allow multiple country exit points It has guides for usage on Windows, OS X, Linux, Android and iOS. On Encrypting your Devices using Passwords or Biometric Authentication: If you don't use a password, pin code, or thumbprint on your mobile devices, set one up! Modern Android and iOS based phones will automatically encrypt your device or give you the option to once you've set a password. While a six digit pin code or better is best, anything is better than nothing. Just Do It. On Encrypting your Computer with Full Disk Encryption! If you have a maching running a Pro version of Windows, use Bitlocker. Windows 7 ||| Windows 10 If you are running any other version of Windows, use Veracrypt. Securityinabox.org has a great guide on using Veracrypt to encrypt an external drive or your entire computer. If you're running MacOS, Backblaze (the Cloud Storage company) has a comprehensive FileVault usage guide, though Apple's isn't so bad. If you're running Linux you probably don't need our assistance. *grin* On Backing up your data & Encryption in the Cloud: One of the biggest risks to your data is physical failure or destruction of your devices. While services like Google Drive, iCloud, Dropbox and Box give us places to put our files in a pretty secure way, information stored on those services can be accessed and recovered by the services themselves in case of an investigation or subpoena. We recommend Backblaze as they encrypt data at rest and support two factor authentication. On Communicating Securely: We recommend using Signal Private Messenger, which includes iOS and Android apps and a Chrome extension and supports private messaging and calling. Whatsapp supports end-to-end encryption. With Facebook Messenger you can enable secret conversations. We suggest never sending sensitive information over email. On Social Media: Check out SecurityInABox.org's guide to security and privacy on social networking sites. On Browsing Secureiy: Drive-by malware downloads and poisoned ad networks, or shady looking porn sites, can mean you may pick something up while browsing the internet, often through no fault of your own. Most of us use both Google Chrome and Mozilla Firefox to browse the web, each for different sets of accounts (Multiple Google Accounts!) and with different sets of extensions installed to help protect ourselves. Mister Pent prefers Ghostery. Dylan Thomas uses Adblock Plus with Google Chrome, and NoScript on Mozilla Firefox. For ultimate browsing privacy, the Tor Browser is a good option. Leave us a review and a five star rating on iTunes! Leave us a review and a five star rating on Stitcher! Subscribe to us on Youtube! Android Users: Download and review our Android App! Leave us a comment on this post or at contact@lifeontheswingset.com or leave us a voicemail at 573-55-SWING (573-557-9464). Find Cooper on Twitter @CooperSBeckett, Dylan on Twitter @DylanTheThomas, and Ginger on twitter @GingerNTheProf. You can Cooper’s novel about swinging, A Life Less Monogamous, at alifelessmonogamous.com or his memoir My Life on the Swingset: Adventures in Swinging & Polyamory at mylifeontheswingset.com as an ebook, paperback, or audiobook and if you buy them from his sites, use promo code SWINGSET to save 10%! Our 2017 LOTS THEME comes courtesy of Vlad Lucan and his track: Reverse! Intro Music: Pegboard Nerds - Talk About It f/ Desirée Dawson, off the new Nerds By Nature EP Outtakes Music: Tokyo Machine - PIXEL Outro Music: nanobii - Chipland Cooper S Beckett Dylan Thomas Dr. Liz Powell Mike Joseph Chris Pent
Danny, Erik, & Mark discuss their experiences and current challenges in testing code across their applications and services. Resources Panic - https://github.com/gundb/panic-server Aphyr, Kyle Kingsbury, testing network partitions - https://aphyr.com/posts/281-call-me-maybe-carly-rae-jepsen-and-the-perils-of-network-partitions Lighthouse Github - https://github.com/GoogleChrome/lighthouse Chrome Plugin - https://chrome.google.com/webstore/detail/lighthouse/blipmdconlkpinefehnmjammfjpmpbjk?hl=en Jeff Posnick at PWA Conference - https://developers.google.com/web/shows/pwa-devsummit/amsterdam-2016/to-the-lighthouse-progressive-web-app-summit-2016 Benchmarkjs - https://benchmarkjs.com/ Mocha - https://mochajs.org/ Tape - https://github.com/substack/tape Qunit - https://qunitjs.com/ Jasmine - https://jasmine.github.io/ Sinon - http://sinonjs.org/ Enzyme - https://github.com/airbnb/enzyme Chai - http://chaijs.com/ Selenium - http://www.seleniumhq.org/projects/webdriver/ PTSD (tech talk) - https://youtu.be/BEqH-oZ4UXI JSPerf replacement: http://jsbench.github.io/ Travis (automate tests on push to GitHub) - https://travis-ci.org/
Episode 9 - Three's CompanyLos Spurs lead El Heat 2 games to 1 in the 2013 NBA Finals. Lee McDonald provides his thoughts on the series so far.Listen Now
Episode 8 - Los Spurs at El HeatLee McDonald breaks down the NBA Conference Finals and provides his thoughts on what needs to go right for Spurs and Heat fans for their team to take out the 2013 title. The End to End Hoops podcast, où nous aimons ce jeu.Listen Now
Episode 7 - The Pre-FinalsLee McDonald expresses his humble opinion of the NBA Playoffs leading into the Conference Finals. This is the podcast where every team is a big market team.Listen Now
Lee McDonald breaks down the first round of the NBA Playoffs so far. Not so much of a push off as a helping hand to a fallen comrade.Listen Now
Lee McDonald breaks down games 4 and 5 of the 2012 NBA Finals and explains how the Heat defeated the Thunder to win this year's championship. Not much hilarity but plenty of sanity.... Spot the conspicuous editing and you are guaranteed* to win a prize............. (*not a guarantee).Listen Now
Lee McDonald explains why this NBA Finals is like the not-so-pretty girl from school that everyone had a crush on. The story of game 3 is also discussed as well as what tweaks the Thunder could potentially make for game 4.Couple of corrections in the pod though:1) When I said KD went 1-5 from the field in the 4th quarter of game 3 I meant to say he went 1-5 when guarded by James in the 4th.2) I said that after 3 games that Miami lead the aggregate points scored for the series by 1 point. I should have said OKC rather than Miami.My credibility is shot but my conscience clear!Listen Now
Lee McDonald gives a run down of the Miami Heat's wire-to-wire game 2 win over OKC and what to expect in game 3. Jason Kidd's hygiene advice is also touched on.Listen Now
In episode 2 of the End to End Hoops Podcast Lee McDonald gives a run down of game 1 of the NBA Finals and touches on what to expect in games 2 and 3. Good times are had by all.Listen Now
Lee McDonald summarises the Eastern Conference Finals and previews the 2012 NBA Finals. He also doesn’t fake the funk on any nasty dunks.Listen Now