Communication is difficult. Whether it’s between humans or machines or a combination of the two, trying to translate meaningful information is a lossy process.
Converting languages to use the new Unicode standard is hard, but once it's in place, you get this marvellous feature-add: Emoji compatibility. No longer do we have to make faces with symbols, or be forced to platform-specific emoticons! Rejoice in the extended character set!
Emoji has a rich history as a way to allow the communication of ideas in a reduced amount of data, and dates back to a time where this was important: SMS communications in Japan. However, as social networks feverishly try and clamber into this bandwagon, their implementations of the standard create more issues with miscommunication that aren't already possible with a 12x12 pictograph. �
From the technical to the social aspects, this talk will cover why the extended character set provided by the Unicode standard needs to be treated with responsibility by users and platforms alike.
This talk is not just an excuse to see what parts of the conference stack can’t handle Unicode, I promise. �
All kids should learn to code! Yes, I think we programmers all agree with Bill Gates and Sheryl Sandberg that kids should learn programming. But what is programming? What should kids know? What should they practice? How should they practice? And how will we make programming more inclusive?
In her keynote, Felienne will take you through her research on programming for children, as well as her quest to make programming education for everyone.
Core 2 brought big changes and improvements to the authentication system. This was also the perfect opportunity to do a major version update to IdentityServer to incorporate the feedback from the last year, make some under-the-hood changes and add new features.
This talk focuses on the new way to do authentication in 2.0 with IdentityServer4, and gives you an overview of the new features and other things happening in the IdentityServer ecosystem.
After you solve the authentication and identity problem, you inevitably need to think about authorization. This is where things become a bit more complicated. Roles, permissions, resources, rules etc are all different ways to model authorization - and you typically end up building something very application specific (and then again for the next application). We sat down and brainstormed different ways to make that process easier and provide a common solution to authorization.
This talk is about patterns, anti-patterns and what we ultimately came up with. It will also include an announcement…
Face it – it’s going to happen. It’s going to happen to you, it’s going to happen to your company and it’s definitely happened to me! Security incidents are now just a part of normal everyday online life and we need to adapt to the new reality.
In this talk, we’ll look at how security is changing and the things we can do to evolve our approaches in the era of the data breach. You’ll see many of the common attacks organisations are falling victim to today, how our attitudes towards passwords are changing, how to get responsible disclosure right (both as an individual and an organisation) and get a look inside some of the more modern security defences out browsers offer us today.
This talk is a mix of real world events, practical coding and face-palmingly painful security examples.