In this weeks episode we are joined again by Brian Moses to discuss several of his recent system builds.
We start off the show delving into his recent EconoNAS, highlighting the goals behind the build and how he goes about selecting the hardware parts.
We then discuss his experience using White-label HDD’s for the first time.
From here, we move on to discuss his HTPC - again highlighting the goals and the experience of live-streaming the build.
This leads us on to highlight the AMD Ryzen Threadripper/Intel Coffee Lake i9 series of CPU’s, Graphics card pricing and the Steam Link Box.
Finally, we look at what’s in store for his upcoming DIY NAS 2018 build, FreeNAS AMD support and the different available SSD connectors.
In this weeks episode we are lucky to have Scott Wlaschin back on the show.
We start of discussion by highlighting his most recent talk on composition and some useful analogies to Lego, Brio and Unix.
From here we move on to investigate function and type composition, the difference between a paradigm shift compared to simply a syntax one and the advantages of an opinionated language.
This leads us on to mention how within application design pushing the side-effects to the edge and keeping the core domain pure is beneficial.
Finally, we touch upon testing in functional languages, experiences whilst consulting and Rich Hickey’s ‘Effective Programs’ talk.
In this weeks episode we are joined by Thijs Feryn to discuss his upcoming PHP UK conference talk.
We start of the show highlighting what drew him to a Tech. evangelist role, bridging the gap between code/infrastructure and the ideas behind ‘Infrastructure as Code’.
From here we move on to discuss system and infrastructure provisioning automation tools such Ansible and Terraform.
This leads on to adding Packer into the mix, moving towards immutable infrastructure, testing these automation tools and how history has a way of repeating itself.
Finally, we touch upon the philosophy behind DevOps, focusing on empathy and its core values CAMS.
In this weeks episode we are lucky to be joined again by Scott Arciszewski.
We start off the show by discussing the difference between Symmetric and Asymmetric Encryption, what Authenticated Encryption is and how secret-keys are exchanged using Diffie-Hellman.
From here, we move on to highlight how Elliptic-curve cryptography works, what DNSCrypt is and why prime numbers are so important in cryptography.
Finally, we touch upon multi-factor authentication, how one time passwords work, SMS vulnerabilities and how to manage password recovery.
In this weeks episode we chat to Scott Wlaschin about his new book ‘Domain Modeling Made Functional’.
We start off the show discussing how the book came to be, the process of writing a book and melding the worlds of Domain Modeling/Functional Programing.
This leads us on to highlight what Domain Driven Design is, the importance of communication and the difference between the solution/problem space to garner a shared model.
Finally, we touch upon some of the common patterns that come out of modeling domains such as - how Entities and Value Objects provide identity, maintaing invariants using Aggregates, and communication between modals via Anti-Corruption Layers.
In this weeks episode we continue our discussion with Scott Arciszewski about all things Security and Cryptography.
We start off the show by highlighting what a SQL injection attack is and the differences between (emulated) prepared statements.
This leads us on to look into how to securely handle file uploads, what a reverse shell is and how to defend yourself against XSS/CSRF attacks.
From here we touch upon the recent inclusion of libsodium into PHP, why mcrypt should be avoided, and the side-channel vulnerabilities that brought way to Meltdown and Spectre.
Finally, we mention how computers generate seemingly random numbers, what a Web Application Firewall (WAF) is, and how WARD goes about protecting your systems.
In this weeks episode we chat with Scott Arciszewski about all things Security and Cryptography.
We start off the show by explaining how he got interested in this field of work, correcting PHP security related answers on Stack Overflow and why he focuses on PHP security.
From here, we move on to highlight what the OWASP Top Ten is, how you can distill many security principles into data/code seperation and what is involved in a software audit.
This leads us on to discuss what HTTPS actually is, touching on TLS, PKI’s, Ciphersuites, and reported attacks against TLS and ECB.
Finally, we highlight some important browser security features that can be used, pushing new software releases in a secure manor, thoughts on Cryptocurrencies and how everyone wants to solve their problem with a blockchain at this time.
In this episode we catch up with Joe Watkins to discuss all things PHP.
We start off discussion with his recent move to Spain, the pain of getting a good Internet connection and PHP TestFest.
This leads us on to highlight some recent work he is doing with adding PHP bindings to Bicoin’s Secp256k1 library and a Generic Traits idea.
From here we touch upon the additions that made it into PHP 7.2 and some that have already been accepted for 7.3.
Finally, we get Joe’s opinion on a couple of RFC’s (Call-site pass-by-reference and Operator functions).
In this weeks episode we chat to Andy Raines about all things Serverless.
We start off by discussing what Serverless actually means, advantages of using such a model, design constraints it employs and how it scales.
From here we touch upon the history of how we got to the compute/infrastructure we use today: from on-premise servers, IaaS, PaaS and FaaS/BaaS.
This leads us on to highlight the 12-factor app methodology, how immutability has vast benefits in many contexts and how FaaS platforms work under-the-hood.
Finally, we mention the Serverless PHP project Andy is working on, the motivations behind it and future development he would like to see take place.
In this weeks episode Mick and Edd first touch upon the many new services/features that have been released at AWS re:Invent.
We then move on to discuss Serverless architecture, Server architectural patterns, Amazon Cognito and security/encryption that is available within Amazon Web Services.
This leads us on to highlight the impact of relying on a single company for all your compute/infrastructure needs and ‘putting all your fish in one basket’.
Finally, Mick tells us what Santa might be bringing him for Christmas.