Skip to content

Instantly share code, notes, and snippets.

View tghastings's full-sized avatar
🎯
Focusing

Tom Hastings tghastings

🎯
Focusing
View GitHub Profile
[root@harper (/srv/docker/nginx/config)]# cat nginx.conf
worker_processes 5; ## Default: 1
error_log logs/error.log;
pid logs/nginx.pid;
worker_rlimit_nofile 8192;
events {
worker_connections 4096; ## Default: 1024
}
language: ruby
cache: bundler
bundler_args: --without production
rvm:
- 2.7.0
before_install:
- gem install bundler:2.2.11

Hello World!

Tux, the Linux mascot

@tghastings
tghastings / gist:ac1cf4e1f06988791355156d708a8642
Created August 23, 2022 19:40
Remarkable2 Discount Code - Save $40
https://remarkable.com/referral/75UR-RK9Y
@tghastings
tghastings / January 16, 2023.md
Last active December 9, 2023 16:49
New Paper in IEEE: Continuous Verification of Open Source...

A new research paper published in support of the Ph.D: Continuous Verification of Open Source Components in a World of Weak Links https://ieeexplore.ieee.org/abstract/document/9985184 Abstract:

We are heading for a perfect storm, making open source software poisoning and next-generation supply chain attacks much easier to execute, which could have major im-plications for organizations. The widespread adoption of open source (99% of today's software utilizes open source), the ease of today's package managers, and the best practice of implementing continuous delivery for software projects provide an unprece-dented opportunity for attack. Once an adversary compromises a project, they can deploy malicious code into production under the auspicious of a software patch. Downstream projects will ingest the compromised patch, and now those projects are potentially running the malicious code. The impact could be implementing backdoors, gathering intelligenc

💬 We just finished the Spring 25 semester at UCCS, and I am proud of my students who built some excellent applications in our Advanced Software Engineering course. Students shipped production-ready, AI-enhanced web apps—from a smart to-do list to a plant-ID game—using Django, external APIs, and CI/CD pipelines to identify code coverage metrics, code smells, and security vulnerabilities. Each team acted as a customer group for one group and a development group for another. They learned about full-stack development, cloud deployment solutions, agile methodologies, and teamwork, turning real-world problems into user-focused solutions.

🎧🔊 Listen to our Podcast Reflection

| Team | Project & Purpose | Key Features Built by Students | Stand-out Technical Work