Perl Mongers' Site

Houston.pm

🌐
Content About πŸ—ΊοΈ
❓
πŸ”‘

Solving Wordbrain πŸ”—
1456012800  

🏷️ news
February 2016
Presenter: Robert Stone
Wordbrain is a puzzle game that involves using letters presented in a clue to created words. Robert Stone describes creating a solver for this game and explores techniques for improving the performance of the solver.

Adding Forks to Your Perly Tableware πŸ”—
1453334400  

🏷️ news
January 2016
Presenter: Julian Brown
Julian Brown used a presentation written by Steven Lembark. The presentation covered unpack and forking in Perl. Julian described a problem that he had been trying to solve and how the information in this talk would have been helpful.

Show and Tell with Role::Tiny and CGI::Application::DispatchUTF-8 and Perl πŸ”—
1445385600  

🏷️ news
October 2015
Presenter: Jim Bacon
Jim Bacon gave a remote presentation describing how he used applied Roles to adapt a CGI::Application-based webapp to support a versioned API.
Presenter: Todd Rinaldo
Todd Rinaldo followed this with a presentation describing what Pelr programmers should know about UTF-8 including information about various gotchas.

Time Progressions with string and DateTimeFrom YAPC::EU@Houston.pm πŸ”—
1442793600  

🏷️ news
September 2015
Presenter: Julian Brown
Julian Brown showed how he summarizes currency trades from a delayed Forex feed into different groupings. His method involves both string manipulation and use of the DateTime module.
Presenter: Nicolas Rochelemagne
Nicolas Rochelemagne summarized the presentations he saw at this year's YAPC::EU. The talks spanned a fairly large spectrum of topics.

A Metasploit module for Locale::Maketext format string attack πŸ”—
1440115200  

🏷️ news
August 2015
Presenter: John Lightsey
This was the second in a series that JD has done on Metasploit modules attacking vulnerabilities in Perl code. This presentation focused on problems with the Locale::Maketext module. JD shows background on the flaw, how it manifests in Locale::Maketext, and the module he built to perform the exploit.

Perl List Operations πŸ”—
1437436800  

🏷️ news
July 2015
Presenter: G. Wade Johnson
Lists are a fundamental data type in Perl, unfortunately people do not make as good a use of them as they could. In this presentation, Wade gives an overview of lists and arrays and the operations that apply to each. He then went over the modules List::Util and List::MoreUtils for more advanced list operations.

Hooking up your distribution to TravisCI and Coveralls.io πŸ”—
1432166400  

🏷️ news
May 2015
Presenter: George S. Baugh
Many development groups use continuous integration to generate quick feedback on the quality of their software. George shows how to use the TravisCI and Coveralls.io systems to provide equivalent functionality for your Perl Modules.

Weaponizing Perl Serialization Flaws with Metasploit πŸ”—
1429574400  

🏷️ news
April 2015
Presenter: John Lightsey
In recent years, there have been a few potential security flaws relating to serialization libraries for dynamic languages. This presentation introduces a few of these flaws and shows how they can be turned into actual attacks using Metasploit.

How to Disagree - But Still Be Agreeable πŸ”—
1426896000  

🏷️ news
March 2015
Presenter: Robert Stone
Disagreements are part of any development effort, but they don't have to be unpleasant. Robert Stone discusses how disagreements become disagreeable and strategies for you to avoid being part of the problem.

A Few Short Topics πŸ”—
1424476800  

🏷️ news
February 2015
Presenter: Chris Mevissen
Presenter: Julian Brown
This time we had a pair of short presentations. Chris Mevissen showed the use of bitwise operators in Perl as a followup to his previous talk on BER decoding. Julian Brown was up next showing how to use the D3 JavaScript library to generate candlestick charts in SVG.

Best Practices Gone Bad πŸ”—
1421798400  

🏷️ news
January 2015
Presenter: G. Wade Johnson
Best practices serve as kind-of a short-hand for pointing the way to good programming practices. Unfortunately, there are many ways that people can misuse any given best practice to generate a bad result. G. Wade Johnson covers a few ways that best practices have gone bad in his career.

A Clear Text Explanation of the AES Cipher πŸ”—
1413849600  

🏷️ news
October 2014
Presenter: Robert Stone
Robert is working on a pure Perl implementation of the Rijndael cipher in order to fully understand the algorithm. He presents his findings, with code. This helps others to understand this algorithm that has become critical to modern cryptography.

Introduction to ASN.1 BER Encoding πŸ”—
1408579200  

🏷️ news
August 2014
Presenter: Chris Mevissen
Chris introduced the BER encoding for ASN.1. He showed some code and decoding examples to introduce this notation that underlies several technologies we use every day.

25 most recent posts older than 1408579200
Size:
Jump to:
POTZREBIE
Copyright © 2003-2020 Houston.pm.
Except as otherwise noted, this site is licensed under a Creative Commons Attribution 2.5 License.
The use of the camel image in association with the Perl programming language is a trademark of O'Reilly & Associates, Inc. Used with permission.