|
| 1 | +--- |
| 2 | +layout: post |
| 3 | +title: "London Scala Talks: Jacob Wang & Lucio Biondi" |
| 4 | +date: 2020-01-21 21:08:06 +0100 |
| 5 | +categories: meetup scala |
| 6 | +--- |
| 7 | + |
| 8 | +Thank you for joining us at Playtech for our year's first round of London Scala talks! We heard from Jacob Wang on type safety and Lucio Biondi on http4s. |
| 9 | + |
| 10 | +# News bites |
| 11 | + |
| 12 | +<iframe src="https://docs.google.com/presentation/d/e/2PACX-1vRMHgO2WmaJQfiOA6A2AFmhP-9BQloBA-Zmyg0QonJmJFSA9kJeDLKXkvteHxmbuIIE1-KAQD2p3J5E/embed?start=false&loop=false&delayms=3000" frameborder="0" width="960" height="569" allowfullscreen="true" mozallowfullscreen="true" webkitallowfullscreen="true"> |
| 13 | +</iframe> |
| 14 | + |
| 15 | +# Jacob Wang: Practical Type Safety |
| 16 | + |
| 17 | +What is type safety? Why should we care? What techniques are possible to improve type safety in my Scala code? should I use them? |
| 18 | + |
| 19 | +Whether you're a beginner or already familiar with Scala, |
| 20 | +this part-philosophical, part-practical will empower you to write better code, and be happier writing them too! |
| 21 | + |
| 22 | +## Slides & recording |
| 23 | + |
| 24 | + |
| 25 | + |
| 26 | +You can find Jacob's slides [here]({{ "/assets/pdf/practical_type_safety_in_scala_jacob_wang.pdf" | relative_url }}). |
| 27 | + |
| 28 | +Watch this space for a video recording. |
| 29 | + |
| 30 | +## Jacob Wang |
| 31 | + |
| 32 | +<div markdown="1" class="lsug-bio"> |
| 33 | +{:class="lsug-bio-image"} |
| 34 | + |
| 35 | +{:.lsug-bio-description} |
| 36 | +Jacob is a software developer at Medidata. He is passionate about better ways to solve problems with software, whether that's functional programming, better tools or a cat on his lap. |
| 37 | +</div> |
| 38 | + |
| 39 | +# Lucio Biondi: Authentication & role-based authorisation for http4s microservices |
| 40 | + |
| 41 | +While developing REST micro-services, and http4s is a good choice to this end, one of the many challenges every team has to face with sooner or later is how to control access to the resources the system provides. This is of course a sensitive topic from a security standpoint, so public and complete implementations from which to draw inspiration are not easily found on the Web. |
| 42 | + |
| 43 | + |
| 44 | +## Slides & recording |
| 45 | + |
| 46 | + |
| 47 | + |
| 48 | +Watch this space for slides and a video recording. |
0 commit comments