Presentations for 2013

January 2013
Presenter: Jay Vogt
Many interesting projects come out of someone scratching their own itch. Jay Vogt presented a web-based program for querying a bug-tracking system he uses at work. Although the original system allowed people to enter all of the information needed to track issues, the query interface was not powerful enough for some needs.
February 2013
Presenter: J. D. Lightsey
JD Does an early trial run of his talk about auditing CPAN modules for vulnerabilities. He covers both techniques for simple security audits and the process of responsible disclosure of those vulnerabilities to the author.
March 2013
Presenter: Charles Boyd
Charles Boyd introduces the Pari/GP library and discusses how its design makes creating bindings to the library easier. He also discusses some current Perl bindings to the library, as well as future directions for this work.
June 2013
Presenter: Reini Urban
Reini Urban covered some of the background and low-level details of one of the efforts to modernize the compiler and run-time for Perl 5.
July 2013
We opened the conference room for anyone to work on their projects or help others as a Hack-a-thon. Unlike the previous attempt, no official project was specified that we would work on.
August 2013
Presenter: Brett Estrade
Brett explains how to use the Redis data store as a work queue. Many of the features of Redis support producer-consumer queuing.
September 2013
Presenter: G. Wade Johnson
This meeting was intended to be another hack-a-thon for those people who had projects to work on. For those relatively new to Perl, Wade was going to run a help session to answer questions and go over Perl basics.
October 2013
Presenter: brian d foy
brian d foy explains some of Perl's more powerful regular expression features using a regex written by Randal Schwartz to parse JSON.
November 2013
Presenter: J. D. Lightsey
Bitcoin is a cryptocurrency based on a 2008 paper by a pseudonymous developer. The creation an use of bitcoins is decentralized and based on strong cryptography. JD gives a high level explanation of how bitcoins work and how they are used. Unlike most information you see on-line, JD also covers some of the attacks that are possible against bitcoin.