Presentations for 2013
January 2013
Presenter:
Jay Vogt
Many interesting projects come out of someone scratching their own
itch. Jay Vogt presented a web-based program for querying a bug-tracking
system he uses at work. Although the original system allowed people to enter
all of the information needed to track issues, the query interface was not
powerful enough for some needs.
February 2013
Presenter:
J. D. Lightsey
JD Does an early trial run of his talk about auditing CPAN modules for vulnerabilities.
He covers both techniques for simple security audits and the process of responsible
disclosure of those vulnerabilities to the author.
March 2013
Presenter:
Charles Boyd
Charles Boyd introduces the Pari/GP library and discusses how its design makes
creating bindings to the library easier. He also discusses some current Perl
bindings to the library, as well as future directions for this work.
June 2013
Presenter:
Reini Urban
Reini Urban covered some of the background and low-level details of one of the
efforts to modernize the compiler and run-time for Perl 5.
July 2013
Topic:
Houston.pm July Hack-a-thon
Presenter:
We opened the conference room for anyone to work on their projects or help
others as a Hack-a-thon. Unlike the previous attempt, no official
project was specified that we would work on.
August 2013
Presenter:
Brett Estrade
Brett explains how to use the Redis data store as a work queue. Many of the
features of Redis support producer-consumer queuing.
September 2013
Presenter:
G. Wade Johnson
This meeting was intended to be another hack-a-thon for those people who had
projects to work on. For those relatively new to Perl, Wade was going to run a
help session to answer questions and go over Perl basics.
October 2013
Topic:
A JSON parser regex
Presenter:
brian d foy
brian d foy explains some of Perl's more powerful regular expression features using
a regex written by Randal Schwartz to parse JSON.
November 2013
Topic:
Bitcoin Payment Processing
Presenter:
J. D. Lightsey
Bitcoin is a cryptocurrency based on a 2008 paper by a pseudonymous developer.
The creation an use of bitcoins is decentralized and based on strong
cryptography. JD gives a high level explanation of how bitcoins work and how
they are used. Unlike most information you see on-line, JD also covers some of
the attacks that are possible against bitcoin.