False Friends the Type Edition
20:03
NodeJsPersonRestApi
48:39
Ай бұрын
Elevator Pitch
17:30
2 ай бұрын
Data Classification
14:51
2 ай бұрын
ScatterGatherMunge
34:44
3 ай бұрын
Technical-Debt
35:17
3 ай бұрын
ConsistantHash
18:55
8 ай бұрын
Estimating
41:17
8 ай бұрын
AsymmetricCrypto
22:34
9 ай бұрын
Sql-Helpers
11:54
10 ай бұрын
MsTestHelpers a NuGet Library
7:08
project-or-suicidal-ideation
9:48
10 ай бұрын
chocolatey
9:23
10 ай бұрын
Tips-For-Developers
11:16
11 ай бұрын
Institutional-Failure
14:56
11 ай бұрын
How-I-Learn-Things
12:48
11 ай бұрын
Non-Functional-Requirements
32:50
Жыл бұрын
How-I-Do-Cloud-Architecture
42:16
Жыл бұрын
Queue-Pacing and Overrun Pattern
18:24
Culture-4-Devs
31:36
Жыл бұрын
Risk-Management-4-Devs
34:58
Жыл бұрын
Redis-Tips
14:15
Жыл бұрын
DDD-Journey-Mapping
40:59
Жыл бұрын
Api Design Considerations
27:01
Жыл бұрын
authorization-strategy
33:47
Жыл бұрын
Cloud Project Preperation
35:03
Жыл бұрын
Error Handling 2
28:54
Жыл бұрын
Cloud-Configuration
17:15
2 жыл бұрын
Пікірлер
@lindalane9496
@lindalane9496 15 күн бұрын
sounds like processes AI adoption should go through...
@morganchamerlain3356
@morganchamerlain3356 15 күн бұрын
why is your github "blitzkrieg software"
@Electro610
@Electro610 Ай бұрын
Great video Stuart! Thank you for sharing your knowledge.
@Vinod_Kumar827
@Vinod_Kumar827 9 ай бұрын
This was an awesome video
@chuckwhittemore7712
@chuckwhittemore7712 Жыл бұрын
I've had the good fortune of working with Stuart on a number of engagements. I recall conversations in which a number of the concepts that Stuart discussed in this video were emphasized. NFRs as a Tag Cloud is a new term to me, but I learned some time ago from Stuart not to create NFRs as Stories (and it has served me and my clients well). Keeping the Abilities to a max of 10 is also a great reminder to keep NFR discussions and activities focused. Lastly: The Risk Triad and Security Egg are useful artifacts to efficiently drive sustainable outcomes. Thx Stuart for sharing your insight and wisdom.
Жыл бұрын
Your presentation was excellent and it helped me sinking a good amount of things related to DDD. It wasn't always easy to relay all the content to practical situations and that's because I certainly don't have an extensive system development experience. Thank you Stuart for the share!
@StuartWilliamsCloud
@StuartWilliamsCloud Жыл бұрын
Glad it was helpful!
@elmalloc
@elmalloc Жыл бұрын
Clear and concise, thanks!
@StuartWilliamsCloud
@StuartWilliamsCloud Жыл бұрын
Glad it was helpful!
@faithdouglas589
@faithdouglas589 Жыл бұрын
Great Explanation, can you share the documentation as well? Thank you
@StuartWilliamsCloud
@StuartWilliamsCloud Жыл бұрын
docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-releases-73002061
@michaelbruno3798
@michaelbruno3798 2 жыл бұрын
2 "watches" or 2 "NFL quarterbacks" 😯
@elmalloc
@elmalloc 2 жыл бұрын
I like to use Azure App Configuration backed by Key Vault.
@StuartWilliamsCloud
@StuartWilliamsCloud Жыл бұрын
Great tip!
@kimjiyoung8655
@kimjiyoung8655 2 жыл бұрын
so helpful. 😘 thank you
@StuartWilliamsCloud
@StuartWilliamsCloud 2 жыл бұрын
Glad it was helpful!
@rooftopvibes6474
@rooftopvibes6474 2 жыл бұрын
kubectl get hpa shows unknown under target. What's the workaround? Please Reply.
@StuartWilliamsCloud
@StuartWilliamsCloud 2 жыл бұрын
Sadly, no idea, it just stopped working as it did.
@sambarindian4505
@sambarindian4505 2 жыл бұрын
Concise, and pretty useful for beginners to threat model!. If you can also attach the referenced project, it would help!
@StuartWilliamsCloud
@StuartWilliamsCloud 2 жыл бұрын
github.com/BlitzkriegSoftware/MicrosoftThreatModelExample
@allanmachado2011
@allanmachado2011 2 жыл бұрын
love it!
@raushanjoshi2009
@raushanjoshi2009 2 жыл бұрын
Very informative!
@mohammedramadan3480
@mohammedramadan3480 2 жыл бұрын
Thank you sir 🙂
@wilditblog1256
@wilditblog1256 2 жыл бұрын
Can yo0u share the model
@StuartWilliamsCloud
@StuartWilliamsCloud 2 жыл бұрын
github.com/BlitzkriegSoftware/MicrosoftThreatModelExample
@putinscat1208
@putinscat1208 2 жыл бұрын
I might be wrong, but openssl should be able to generate keys.
@StuartWilliamsCloud
@StuartWilliamsCloud 2 жыл бұрын
Should, never figured out what combination of args does it, if you figure it out post it.
@sumitchoube3875
@sumitchoube3875 2 жыл бұрын
Thank you
@satan-zg4uc
@satan-zg4uc 2 жыл бұрын
Thank you so much for sharing your knowledge, man of science.
@minupurushothaman1292
@minupurushothaman1292 2 жыл бұрын
what code did u write for fetching value from vcapservice01 from pcf?
@alexgordon4153
@alexgordon4153 2 жыл бұрын
Stuart, excellent introduction to ST. Thank you! I have been in a huge and extremely important project a few years ago and our Chief Architect introduced a so called "Correlation ID" which was generated by the FE and travelled all way through the system to the data store. This solution looks like a ST implementation for me. But what is bothering me is that you seem to suggest that ST are NOT to be used for REAL business activities but rather they represent kind of "fake" little things to check the system from end to end. Now my question: "Why not to make a ST a part of the "official" business processes for ALL activities?" What is wrong with that? Please, elaborate. NOTE: You can elaborate over the next class. :-)
@StuartWilliamsCloud
@StuartWilliamsCloud Жыл бұрын
you can use CorrelationIds everywhere for everything.
@martinaandersson8352
@martinaandersson8352 2 жыл бұрын
I don't understand..... won't the private and public key be the same for every user if you load them from files? I mean, how do you generate a new private and public key for each user on the machine?
@putinscat1208
@putinscat1208 2 жыл бұрын
Yes. The idea is to create a token with private key, and then verify the token with public key. The contents of the token are readable by anyone on the internet. But the signature guarantees the contents were not manipulated. The claims in the token determine who/what can get access. You should never put anything secret in the claims.
@johnjohn7549
@johnjohn7549 3 жыл бұрын
Very nice 👌
@StuartWilliamsCloud
@StuartWilliamsCloud 3 жыл бұрын
Thanks 😊
@Emis333
@Emis333 3 жыл бұрын
Great tutorial, somewhere we can check out the code?
@StuartWilliamsCloud
@StuartWilliamsCloud 3 жыл бұрын
github.com/BlitzkriegSoftware/Resiliancy
@manjunaika1993
@manjunaika1993 3 жыл бұрын
can u make a video or share link of implementing same jwt(RSA256) using Web API .net core 2.0
@StuartWilliamsCloud
@StuartWilliamsCloud 3 жыл бұрын
.NET Core 2.x is deprecated. Please switch to Core 3.1.x LTS for success.
@alexvalchuk3452
@alexvalchuk3452 3 жыл бұрын
Thanks!
@StuartWilliamsCloud
@StuartWilliamsCloud 3 жыл бұрын
Welcome!
@thewanderingwandererwander2015
@thewanderingwandererwander2015 3 жыл бұрын
Nicely explained thanks
@zahidhussain3897
@zahidhussain3897 3 жыл бұрын
Actually I develop one website in Asp.net mvc with sql server database. I was upload lot of images link inside my database. I try to fetch all image on xamarin Platform. So I need code.
@something13996
@something13996 3 жыл бұрын
Erorr mine in GetExtension why?
@StuartWilliamsCloud
@StuartWilliamsCloud 3 жыл бұрын
Post your error details and I'll look. Post the link to your Q on stackoverflow.com/
3 жыл бұрын
T h a n k - y o u - s o - m u c h
@AllenAndersonTaylor
@AllenAndersonTaylor 3 жыл бұрын
how the heck did you learn all this stuff???
@StuartWilliamsCloud
@StuartWilliamsCloud 3 жыл бұрын
Pull the code, and practice, practice, practice...
@StuartWilliamsCloud
@StuartWilliamsCloud 2 жыл бұрын
50 years a programmer
@Samastano
@Samastano 3 жыл бұрын
Thank you!
@omoruyio
@omoruyio 3 жыл бұрын
Great overview. Thanks for putting this together
@uttamsuthar9940
@uttamsuthar9940 3 жыл бұрын
Thank you..I have been searching this for last 2 days
@user-gb4iv7yd5i
@user-gb4iv7yd5i 3 жыл бұрын
0:23 Need software developer? whatsapp +79671570581
@richardurena5867
@richardurena5867 3 жыл бұрын
Great video! Externalizing my nodeJs config is something that’s been on my mind and your video helped clear things up.
@leeyahav4754
@leeyahav4754 3 жыл бұрын
thnx a lot well explained
@fercho9267
@fercho9267 4 жыл бұрын
thanks for the video, where would you save the .pem files in production?
@StuartWilliamsCloud
@StuartWilliamsCloud 4 жыл бұрын
I would save them in a key vault like Hasicorp, Azure Vault, etc.
@fercho9267
@fercho9267 4 жыл бұрын
@@StuartWilliamsCloud thanks
@rajenderkumar8485
@rajenderkumar8485 4 жыл бұрын
Thanks for the video and detailed explanation
@sam4jones1
@sam4jones1 4 жыл бұрын
Wow great video. Thank you
@000basin
@000basin 4 жыл бұрын
Great explanation. Thank you for putting it together.
@luanrodrigues4645
@luanrodrigues4645 4 жыл бұрын
Great job, 3 yrs old video and still very helpful! And the github link for people want to see the code: github.com/BlitzkriegSoftware/NodeJwtRsa
@damiangilz
@damiangilz 4 жыл бұрын
Wow, your explains are amazing.
@mayankvelivela3797
@mayankvelivela3797 4 жыл бұрын
Hello Stuart I need to know more information about Threat and Risk Analysis Automotive cyber security if you have the information can you please let me know how to contact you on whatsapp or Skype or Zoom
@StuartWilliamsCloud
@StuartWilliamsCloud 4 жыл бұрын
I'm not expert in the automotive domain, I can speak to general Security Development Life-cycle for applications. You can get assistance from our professional services organization by using the contact-me on our magenic.com/contact page
@mayankvelivela3797
@mayankvelivela3797 4 жыл бұрын
Nice explanation
@adityamittal4357
@adityamittal4357 4 жыл бұрын
very helpful btw
@adityamittal4357
@adityamittal4357 4 жыл бұрын
how to keep adding new endpoints
@sunevolve
@sunevolve 4 жыл бұрын
repo link plz ?
@StuartWilliamsCloud
@StuartWilliamsCloud 4 жыл бұрын
github.com/BlitzkriegSoftware?tab=repositories
@SpencerDavis2000
@SpencerDavis2000 4 жыл бұрын
super amazing clear tutorial. works great. thanks
@StuartWilliamsCloud
@StuartWilliamsCloud 4 жыл бұрын
You're welcome!