Episodes
حلقة جديدة من AskDeveloper Podcast مع محمد الجيش
محمد يشغل منصب Chief Architect في شركة Voicera و له خبرة طويلة في مجالات الأنظمة الموزعة و الذكاء الصناعي في شركات مثلMicrosoft و LinkedIn
نتحدث عن خبراته و مواضيع متعددة.
Agenda
Biography
Chief Architect - Voicera
Before joining Voicera, Mohamed was an engineering manager at LinkedIn working on feed personalization and relevance in addition to building a human-in-the-loop platform, and incubating venture bets by leading “moonshot” projects....
Published 11/25/18
في هذا اللقاء الشيق نلتقي مع المهندس على حلمي, المتخصص في مجال برمجة الألعاب و يرأس حالياً أحد الفرق البرمجية في مجال ال Animation في شركة Ubisoft العالمية لتطوير الألعاب بالسويد, و سبق له العمل في شركات ألعاب اخرى شهيرة مثل Crytek و ألعاب مثل Crysis 3 و غيرها.
نتطرق في الحديث لعديد من المواضيع من أهمها
1. أهمية دراسة الهاردوير و الربط بين الهاردوير و السوفتوير في برمجة الألعاب
2. تحدي البداية في برمجة الألعاب, و كيف تحصل على عمل في هذا المجال
3. كيف تطور من امكانياتك و مهاراتك لتصل...
Published 09/30/18
Mostafa has a computer science degree from Cairo University. He started a company back in Egypt in 2011, and when the company failed he moved to work for Microsoft in Egypt. He later moved to Europe where he became a product manager for Booking.com in Amsterdam. He later moved to GoEuro in Berlin, and now he is a product manager at Zalando where he overlooks Zalando development infrastructure and developer tooling
Ekshef...
Published 09/23/18
حوار شيق مع المهندس احمد عصام و رحلته في مجال التكنولوجيا و البرمجيات من البداية في القاهرة مرورا بمراحل مختلفة في اوروبا و الولايات المتحدة الأمريكية و حتى المرحلة الحالية من العمل في شركة Apple
• What defines ethical? -- *
• Failing and realizing why it happened.
• Respect your own capabilities with consideration of (is it hard enough?)
• What do you do at work?
• You as a brand, what message do you want to deliver? "What you do is perceived as who you are"
• Dare to disrupt your...
Published 09/16/18
General Data Protection Regulation
Following the Data Protection Directive of 1995
ePrivacy Directive of 2002 (cookie law)
Articles
https://www.smashingmagazine.com/2018/02/gdpr-for-web-developers/
https://www.theverge.com/2018/3/28/17172548/gdpr-compliance-requirements-privacy-notice
General Data Protection Regulation
EU Site:
https://www.gdpreu.org/
Privacy by Design
https://www.smashingmagazine.com/2017/07/privacy-by-design-framework/
Questions
• What?
• Why?
• Who is affected ?...
Published 04/03/18
- Quick history
○ Distance learning
○ Open educational resource movement
○ MOOC coined in 2008 by Dave Cormier
○ Khan Academy, P2PU, and Udemy
○ Udemy has tools for pros to create courses and publish (also attracting corporate trainers to create courses for enterprises)
○ Udacity growing out of Stanford CS courses by Sebastian Thrun
○ Coursera growing out of Stanford's Andrew Ng and Daphne Koller
○ MITx launched by MIT in response to commercialization of MOOC, then joined by...
Published 07/08/17
من هو المبرمج الصنايعي
من هو المبرمج المهندس
الموضوع مش بالشهادات
سؤال الفرق بين المبرمج والمهندس
الألقاب
تأثير الثانوية العامة علي ترتيب الوظائف في البرمجة
المهندس الكويس مش شرط يكون حرفي كويس
علاقة المهن في البرمجة بالوظائف الإدراية
سؤال "أنا ما أعرفش أي حاجة، وعايز أدخل المجال"
سواء أخدت شهادة أو ما أخدتش شهادة، إيه هي الحاجات اللي المفروض أتعلمها؟
Published 04/12/17
- Follow up on Encryption episode (Google blocking Symantec certs)
○ Sep 2015 incident (Thawte issuing a goolge.com cert without authorization. Attributed to employee error and resolved by termination
§ Oct 2015 Symantec disclosed 23 test certs issued without owners knowledge, more certs uncovered by Certificate Transparency logs, symantec extended the audit and found additional 164 certs, and 2458 certs issued for domains never registered...
Published 04/06/17
○ Digital Signatures
§ Goal: verify Authenticity of a message.
§ Based on Asymmetric Cryptography.
§ Basic operations
1. Public / Private keys generation (using some algorithm like RSA)
2. Signing algorithm using the private key
3. Signature verification algorithm using the corresponding public key
i. Extending previous Example
• Steps (Order is very important, bold stuff is the difference added to authenticate sender)
® Party 1 (Alice)
1. Generates a...
Published 03/18/17
هل الطريقة الحالية لتقييم المطورين بالتركيز على أسئلة الخوارزميات هي الطريقة المثلى؟
روابط ذكرت في اللقاء
DHH (The author of Ruby on Rails)
https://twitter.com/dhh/status/834146806594433025?lang=en
https://github.com/tmcw/presentations/blob/gh-pages/advice-to-the-graduate/index.md
http://www.yegor256.com/2017/02/21/say-no-to-google-recruiters.html
قائمة مجمعة بالشركات التي تعتمد طرق اخرى في تقييم المبرمجين
https://github.com/poteto/hiring-without-whiteboards
Our facebook...
Published 03/10/17
الحلقة السابقة
https://soundcloud.com/askdeveloper/ep46-askdeveloper-podcast-cryptography-part-1-introduction-and-hashing
○ Encryption (Two Ways)
§ Symmetric Encryption
□ Same key both encrypts and decrypts the data.
□ Very fast, yet exchanging key is tricky
□ Very Algorithmic
□ Examples
® DES Data Encryption Standard (BROKEN)
◊ Uses key of 56 bit length
® Triple DES (3DES)
◊ Uses three keys (or two unique keys) of 56 bit each
® AES Advanced...
Published 10/16/16
Information Security
1. Introduction
○ Security by obscurity
§ Steganography
□ Hiding data inside another form of data, like using non-used bits in image to hide a message
§ Cool, but not practical.
§ Disadvantages
◊ Algorithm secrecy vs. key secrecy
○ Cryptography is everywhere and yet if done right, you can barely see it.
○ Goals:
§ Confidentiality
□ Secrets stay secret.
§ Integrity
□ Data is not tampered with.
§ Non-Repudiation
□ No party...
Published 10/01/16
• What's wrong with the world as it is today?
○ Gatekeepers and Walled Gardens
○ The Master Switch by Tim Wu
▪ Tim Wu is the one who coined the Net Neutrality term.
▪ This book tells the story of how every communication medium starts a revolution that upsets the order, then eventually it gets controlled. The same thing could happen to the Internet.
• Bitcoin
○ Is this about money, or about technology
○ Is this about the technology or bitcoin, or the technology of distributed...
Published 04/30/16