Skip to content

Instantly share code, notes, and snippets.

@georgestephanis
Last active August 29, 2015 14:00
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save georgestephanis/fa0bd7b02ad5c56f6ee7 to your computer and use it in GitHub Desktop.
Save georgestephanis/fa0bd7b02ad5c56f6ee7 to your computer and use it in GitHub Desktop.
Miscellaneous Session Proposals

Come Fly With Me

In this user track talk, we'll go over how users can leverage Jetpack to more easily customize your site, write great content, grow and engage your audience, all the while improving the security and stability of your site.

This talk will not be a laundry list of Jetpack features, but going in deep to perhaps six or eight, and how they can dramatically impact the success of your site.

Thinking like WordPress: Or, How I Learned to Stop Worrying and Love the Paradigm.

Every system out there that we work with has a different paradigm -- pattern, model, whatever you wish to call it -- upon which its architecture is based. It's the sum total of the design decisions that go into the architecture of the framework.

In this talk, we'll be reviewing a few of the critical decisions that have taken place in the history of WordPress (Rolling into the Wysiwyg Editor, reverting the Post Formats UI, etc), how they all flow from the core philosophies of WordPress, and how we can all build better projects by embracing them as well.

I'll be speaking primarily from my own experience with Jetpack as to how we embrace core philosophies in our own project, such as: Good software should work out of the box, Designing for the majority, Decisions over options, Striving for simplicity, The vocal minority, and more.

Please Note: This is a development-oriented talk, but will not get too deep into code.

Understanding Security Holes

Security is hard. Over the last few months there have been a number of high-profile plugin security vulnerabilities, but there is suprisingly little familiarity in the developer community when it comes to properly evaluating and remedying issues when they are discovered.

In this talk, we'll be explaining in basic terms how several types of vulnerabilities work (including Cross-Site Scripting (XSS), SQL Injection (SQLI), Cross-Site Request Forgeries (CSRF), and Clickjacking, see what can be done to defend against them, and what to do when you have a vulnerability reported to you.

Please Note: This is a development-oriented talk, but will not get too deep into code.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment