Overview of presentations

Here you can find an overview of latest presentations given at a user group or conference by In2it.

Continuous Deployment 2.0: Playtime is Over

Continuous Deployment 2.0: Playtime is over

Testing to reduce support calls

Testing to reduce support calls

For years we have been talking about testing to improve the quality of applications, but there are still many support calls coming in and bug reports submitted. Is it because our code is faulty and our tests are not covering the right components?

The answer lies in the perception of users and customers of the product which differs significantly from what developers and managers believe the user wants or needs. Welcome to user experience testing! In this talk I’ll highlight some of the steps we took to address the ever growing user dissatisfaction of the software we thought was awesome and well tested.

Mutation Testing with Infection

Infection, the PHP Mutation Testing Framework

With the rise of cyber attacks and an increasing competitive market, it’s even more important to ensure that your application delivers exactly what you had envisioned and you can make changes continuously. By providing mutation testing in your set of tests, you at least have a good indicator where to focus your attention and ensure a successful deployment every time.

In this session we’re going to look at Infection, the Mutation Testing Framework for PHP and show with an example application how these mutations can have a negative impact on your application and how you can use Infection to mitigate these risks and improve the quality of your tests and your application source code.

Moving from App Services to Azure Functions

Moving from App Services to Azure Functions

When we first started out with Azure, we created VM’s to run our web applications and backend services. Afterwards we moved our web application logic into App Services while using native Azure Services for our backend requirements. With containers we could isolate our individual web application components even further and allowed us to go full DevOps. Now Azure Functions allows us to remove a complete application stack allowing us to focus purely on functionality.

In this talk I go over the several phases we went through getting our application from bare metal into the cloud and how we now leverage Azure Functions to achieve higher throughput and faster delivery times while reducing the complexity of the web application and costs.

Privacy by design, yes we can!

Privacy By Design

We now have to obey the law and comply with GDPR, ensuring people’s data are securely stored, we track who has access to it and if the client requests to review, update or remove their data, we should do so in an automated fashion. But, are you there yet? Chances are, there’s still a long way to go.

In this talk I will address some of the challenges we solved in greenfield projects as well in old, legacy applications. We introduced “privacy by design” as just another “by design” mantra we already had build in our workflow and as we worked on the project, we applied it everywhere when we saw user data (personal or not) was processed. This ensured that all data was handled and treated the same way and allowed the business to reorient themselves again to be creative in approaching their customers.

DevOps or DevSecOps

In 2009 Patrick Dubois coined the term “DevOps” when he organised the first “DevOpsDays” In Ghent, Belgium. Since then the term has become a term to explain the collaboration between all organisational stakeholders in IT projects (developers, operations, QA, marketing, security, legal, …) to deliver high quality, reliable solutions where issues are tackled early on in the value stream.

But reality shows that many businesses that implement “DevOps” are actually talking about a collaboration between development, QA and operations (DQO). Solutions are being provided but lack the security and/or legal regulations causing hard-to-fix problems in production environments.

In this talk I will explain how the original idea of Patrick to include all stakeholders got reduced to development, QA and operations and why it’s so difficult to apply security or compliance improvements in this model. I will also talk about ways to make the DQO model welcoming for security experts and legal teams and why “DevSecOps” is now the term to be used to ensure security is no longer omitted from the value process.

Finally we’ll have a vote if we keep the term “DevOps” as an all-inclusive representation for all stakeholders or if we need to start using “DevSecOps” to ensure the business understands can no longer ignore the importance of security.

Continuous Deployment 2.0: Playtime is over

Continuous Deployment, TDD and Continuous Integration is nothing new anymore and many of you are already veterans deploying multiple times each day code into production. But you’re still suffering from cutting corners and doing something quick on production when time is pressing, violating the processes you all worked hard on to get approved.

In this talk we take this very concept to the next level and show you how we used unconventional ways to deploy faster with less issues and regained control over a 10+ year old legacy application.

Privacy Preference Center

Strictly Necessary Cookies

Cookies that are necessary for the site to function properly. As example we require a cookie to indicate you have agreed with our privacy settings and accepted the usage of cookies.

gdpr, PHPSESSION, JSESSIONID, wfvt_{hash}

Comment Cookies

When visitors comment on our news articles, and they have opted-in to save their details, we store a cookie on their computer to save their information. This is purely a convenience, so that the visitor doesn't need to re-type all their information again when they want to leave another comment.

They expire a little under one year from the time they're set.

comment_author_{HASH}, comment_author_email_{HASH}, comment_author_url_{HASH}

Marketing Cookies

For marketing purposes we use Google Analytics that will set cookies to capture your information.

_ga, _gid, _gat

3rd Party Cookies

These cookies are provided by third-party solutions providers from who we use their services (e.g. Twitter).

Depending on your own relationship with these services yourself, they also might set some cookies. Please review their privacy policy and cookie usage for more information.

_twitter_sess, ct0, guest_id, personalization_id, eu_cn, tk_tc, tk_ai, tk_qs, twostep_auth, wp-settings-{user_id}
_twitter_sess, ct0, guest_id, personalization_id, eu_cn
tk_tc, tk_ai, tk_qs, twostep_auth, wp-settings-{user_id}