Perl Mongers' Site

Houston.pm

🌐
Content About πŸ—ΊοΈ
❓
πŸ”‘

The Read Copy Update Pattern in the Linux Kernel πŸ”—
1474416000  

🏷️ presentations 🏷️ news
September 2016
Presenter: Julian Brown
Continuing with the lock-free architecture topic Julian introduced at an earlier meeting, he covered the Read-Copy-Update strategy.

A Set of Short Talks πŸ”—
1471737600  

🏷️ presentations 🏷️ news
August 2016
Presenter: Various
This month's meeting features a group of 4 short talks by some of our long-time members. Robert Stone discusses connecting objects by reference versus indirectly by some ID. Julian Brown talked about lock-free architectures. J. D. Lightsey demonstrated another SQL injection attack using sqlmap. And, Todd Rinaldo rounds out the talks with a discussion of a Perl vulnerability related to @INC.

Reconstructing an SQL injection from its fix πŸ”—
1466467200  

🏷️ presentations 🏷️ news
June 2016
Presenter: John Lightsey
John Lightsey shows how to use a diff of changes made to fix an SQL injection attack to create an attack against the unpatched code. He shows the use of the sqlmap tool to automatically generate useful attacks.

Binary Tree Serialization Techniques πŸ”—
1463788800  

🏷️ presentations 🏷️ news
May 2016
Presenter: Chris Mevissen
Chris Mevissen gave a report on the research he has been doing on serializable binary trees. He describes the basics of binary tree data structures and descibes a basic implementation in Perl. He works his way through showing how a binary tree can be serialized in a form that can be easily reloaded.

FlexSC: Exception-Less System Calls πŸ”—
1461196800  

🏷️ presentations 🏷️ news
April 2016
Presenter: Julian Brown
Julian Brown covered a presentation describing a method for doing system calls while reducing context switching overhead. The paper the presentation was based on covered an academic project to implement this method and the research showing its effectiveness.

Algorithmic Complexity Made Simple πŸ”—
1458518400  

🏷️ presentations 🏷️ news
March
Presenter: G. Wade Johnson
G. Wade Johnson introduced the idea that analyzing the complexity of algorithms is more than just an academic exercise. He shows how to do relatively simple analysis for quick wins.

Solving Wordbrain πŸ”—
1456012800  

🏷️ presentations 🏷️ news
February 2016
Presenter: Robert Stone
Wordbrain is a puzzle game that involves using letters presented in a clue to created words. Robert Stone describes creating a solver for this game and explores techniques for improving the performance of the solver.

Adding Forks to Your Perly Tableware πŸ”—
1453334400  

🏷️ presentations 🏷️ news
January 2016
Presenter: Julian Brown
Julian Brown used a presentation written by Steven Lembark. The presentation covered unpack and forking in Perl. Julian described a problem that he had been trying to solve and how the information in this talk would have been helpful.

Show and Tell with Role::Tiny and CGI::Application::DispatchUTF-8 and Perl πŸ”—
1445385600  

🏷️ presentations 🏷️ news
October 2015
Presenter: Jim Bacon
Jim Bacon gave a remote presentation describing how he used applied Roles to adapt a CGI::Application-based webapp to support a versioned API.
Presenter: Todd Rinaldo
Todd Rinaldo followed this with a presentation describing what Pelr programmers should know about UTF-8 including information about various gotchas.

Time Progressions with string and DateTimeFrom YAPC::EU@Houston.pm πŸ”—
1442793600  

🏷️ presentations 🏷️ news
September 2015
Presenter: Julian Brown
Julian Brown showed how he summarizes currency trades from a delayed Forex feed into different groupings. His method involves both string manipulation and use of the DateTime module.
Presenter: Nicolas Rochelemagne
Nicolas Rochelemagne summarized the presentations he saw at this year's YAPC::EU. The talks spanned a fairly large spectrum of topics.

A Metasploit module for Locale::Maketext format string attack πŸ”—
1440115200  

🏷️ presentations 🏷️ news
August 2015
Presenter: John Lightsey
This was the second in a series that JD has done on Metasploit modules attacking vulnerabilities in Perl code. This presentation focused on problems with the Locale::Maketext module. JD shows background on the flaw, how it manifests in Locale::Maketext, and the module he built to perform the exploit.

Perl List Operations πŸ”—
1437436800  

🏷️ presentations 🏷️ news
July 2015
Presenter: G. Wade Johnson
Lists are a fundamental data type in Perl, unfortunately people do not make as good a use of them as they could. In this presentation, Wade gives an overview of lists and arrays and the operations that apply to each. He then went over the modules List::Util and List::MoreUtils for more advanced list operations.

Hooking up your distribution to TravisCI and Coveralls.io πŸ”—
1432166400  

🏷️ presentations 🏷️ news
May 2015
Presenter: George S. Baugh
Many development groups use continuous integration to generate quick feedback on the quality of their software. George shows how to use the TravisCI and Coveralls.io systems to provide equivalent functionality for your Perl Modules.

25 most recent posts older than 1432166400
Size:
Jump to:
POTZREBIE
Copyright © 2003-2020 Houston.pm.
Except as otherwise noted, this site is licensed under a Creative Commons Attribution 2.5 License.
The use of the camel image in association with the Perl programming language is a trademark of O'Reilly & Associates, Inc. Used with permission.