You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In this user track talk, we'll go over how users can leverage Jetpack to more easily customize your site, write great content, grow and engage your audience, all the while improving the security and stability of your site.
This talk will not be a laundry list of Jetpack features, but going in deep to perhaps six or eight, and how they can dramatically impact the success of your site.
Thinking like WordPress: Or, How I Learned to Stop Worrying and Love the Paradigm.
Every system out there that we work with has a different paradigm -- pattern, model, whatever you wish to call it -- upon which its architecture is based. It's the sum total of the design decisions that go into the architecture of the framework.
In this talk, we'll be reviewing a few of the critical decisions that have taken place in the history of WordPress (Rolling into the Wysiwyg Editor, reverting the Post Formats UI, etc), how they all flow from the core philosophies of WordPress, and how we can all build better projects by embracing them as well.
I'll be speaking primarily from my own experience with Jetpack as to how we embrace core philosophies in our own project, such as: Good software should work out of the box, Designing for the majority, Decisions over options, Striving for simplicity, The vocal minority, and more.
Please Note: This is a development-oriented talk, but will not get too deep into code.
Security is hard. Over the last few months there have been a number of high-profile plugin security vulnerabilities, but there is suprisingly little familiarity in the developer community when it comes to properly evaluating and remedying issues when they are discovered.
In this talk, we'll be explaining in basic terms how several types of vulnerabilities work (including Cross-Site Scripting (XSS), SQL Injection (SQLI), Cross-Site Request Forgeries (CSRF), and Clickjacking, see what can be done to defend against them, and what to do when you have a vulnerability reported to you.
Please Note: This is a development-oriented talk, but will not get too deep into code.