211 lines
7.8 KiB
HTML
211 lines
7.8 KiB
HTML
<!DOCTYPE html>
|
||
<html lang="en">
|
||
<head>
|
||
<meta charset="UTF-8" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
<title>Talks & Publications — Veit Heller</title>
|
||
<style>
|
||
@font-face {
|
||
font-family: 'charterregular';
|
||
src: url('charter_regular-webfont.woff') format('woff');
|
||
font-weight: normal;
|
||
font-style: normal;
|
||
font-display: swap;
|
||
}
|
||
html {
|
||
box-sizing: border-box;
|
||
}
|
||
*, *:before, *:after {
|
||
box-sizing: inherit;
|
||
}
|
||
body {
|
||
font-family: 'charterregular', Georgia, serif;
|
||
font-size: 18px;
|
||
width: 100vw;
|
||
height: 100vh;
|
||
margin: 0;
|
||
background-color: #fafaf3;
|
||
}
|
||
.main {
|
||
max-width: 800px;
|
||
padding: 2em;
|
||
margin: auto;
|
||
padding-top: 1em;
|
||
}
|
||
.main h1 {
|
||
font-size: 28px;
|
||
font-weight: 400;
|
||
}
|
||
.main h2 {
|
||
font-size: 22px;
|
||
font-weight: 400;
|
||
margin-top: 2em;
|
||
}
|
||
.main h3 {
|
||
font-size: 18px;
|
||
font-weight: 600;
|
||
margin-bottom: 0.2em;
|
||
}
|
||
.main a {
|
||
color: #000;
|
||
text-decoration: none;
|
||
border-bottom: 2px solid #d6dde3;
|
||
}
|
||
.main p {
|
||
margin-top: 0.3em;
|
||
margin-bottom: 1.2em;
|
||
}
|
||
.main em {
|
||
color: #444;
|
||
}
|
||
article {
|
||
margin-bottom: 2em;
|
||
margin-left: 1em;
|
||
}
|
||
@media(max-width: 700px) {
|
||
.main h1 {
|
||
font-size: 20px;
|
||
}
|
||
}
|
||
</style>
|
||
</head>
|
||
<body>
|
||
<main class="main">
|
||
<h1>Workshops, Talks, Publications</h1>
|
||
|
||
<h2>Bookable Talks & Workshops</h2>
|
||
|
||
<p>Talks & Workshops you can book.</p>
|
||
|
||
<hr/>
|
||
|
||
<h3>Practical threat modelling for engineering teams</h3>
|
||
<p>Lightweight, repeatable threat modelling you can actually run in sprint cadence. We cut jargon, pick a fit-for-purpose method, and get to work quickly. <a href="https://blog.veitheller.de/Threat_Modeling_For_the_Rest_of_Us.html">Read about it here.</a></p>
|
||
<ul>
|
||
<li><strong>Takeaways:</strong> initial model (only for workshops), playbook, templates, 30-day plan to make it stick.</li>
|
||
<li><strong>Formats:</strong> 45–90min talk, ~3h half-day (guided exercise), 6–8h full-day (hands-on)</li>
|
||
</ul>
|
||
<p><a href="mailto:veit@veitheller.de?subject=threat modelling workshop inquiry">Book this workshop</a></p>
|
||
|
||
<hr/>
|
||
|
||
<h3>ISMS & SSDLC that you can work with</h3>
|
||
<p>Let’s turn “we should do security” into a minimal ISMS and an SSDLC that actually holds up in practice. We map controls to your workflows (code, CI/CD, infra) and prove it with artifacts. <a href="https://blog.veitheller.de/Simple_SSDLCs.html">Read about it here.</a></p>
|
||
<ul>
|
||
<li><strong>Takeaways:</strong> control set, CI/CD hooks for evidence (workshop only), audit-ready checklists.</li>
|
||
<li><strong>Formats:</strong> 45–90min talk, ~3h half-day, 6–8h full-day (hands-on)</li>
|
||
</ul>
|
||
<p><a href="mailto:veit@veitheller.de?subject=isms and ssdlc workshop inquiry">Book this workshop</a></p>
|
||
|
||
<hr/>
|
||
|
||
<h3>Funding & buyer readiness</h3>
|
||
<p>What VCs, acquirers, and enterprise buyers actually check, and how to be ready to answer. Architecture narrative, risk posture, and processes that actually give you something in return. <a href="https://blog.veitheller.de/What_good_looks_like_in_a_data_room.html">Read about it here.</a></p>
|
||
<ul>
|
||
<li><strong>Takeaways:</strong> a DD checklist, a clean architecture one-pager, a 30-day prep plan including process refinements (workshop only).</li>
|
||
<li><strong>Formats:</strong> 45–90min talk, ~3h workshop, 6-8h full-day (hands on)</li>
|
||
</ul>
|
||
<p><a href="mailto:veit@veitheller.de?subject=funding and buyer readiness workshop inquiry">Book this workshop</a></p>
|
||
|
||
<hr/>
|
||
|
||
<p>Custom workshops are available; tell me your team’s goals and I’ll tell you if I can help you.</p>
|
||
|
||
<h2>Selected Talks & Publications</h2>
|
||
|
||
<p>I speak and write about systems of all shapes and sizes. Here are some of the works I’m happy with.</p>
|
||
|
||
<section>
|
||
<h2>Talks</h2>
|
||
<article>
|
||
<h3>gt4llm – Software Development with LLMs in Glamorous Toolkit</h3>
|
||
<p><em>European Smalltalk User Group, 2024</em><br>
|
||
An overview of LLM integration into Glamorous Toolkit, with a focus on reproducibility and development workflows.</p>
|
||
<p><a href="https://www.youtube.com/watch?v=ukgsng9bIVw">Watch →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>gt4python – Working with Python inside Glamorous Toolkit</h3>
|
||
<p><em>European Smalltalk User Group, 2024</em><br>
|
||
A talk on Python inside Glamorous Toolkit.</p>
|
||
<p><a href="https://www.youtube.com/watch?v=Lvtgk4w9zo4">Watch →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>gt4atproto – A Programmable Environment for Social Media</h3>
|
||
<p><em>European Smalltalk User Group, 2023</em><br>
|
||
A demonstration of working with the AT Protocol inside Glamorous Toolkit, emphasizing customization and tooling.</p>
|
||
<p><a href="https://www.youtube.com/watch?v=azSz7fkY7jU">Watch →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>Implementing an IDE in GT</h3>
|
||
<p><em>European Smalltalk User Group, 2022</em><br>
|
||
A talk on building an IDE for Carp inside Glamorous Toolkit.</p>
|
||
<p><a href="https://www.youtube.com/watch?v=G-0Vic9fQU0">Watch →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>Brainfuck, Carp, Macros, and Futamura Projections</h3>
|
||
<p><em>LambdaLounge, 2021</em><br>
|
||
A technical presentation connecting minimal languages, metaprogramming, and interpreter folding techniques.</p>
|
||
<p><a href="https://www.youtube.com/watch?v=G-0Vic9fQU0">Watch →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>All I Have is a Hammer, Now Give Me All Your Nails!</h3>
|
||
<p><em>EnthusiastiCon, 2020</em><br>
|
||
A short talk on abstractions as axioms.</p>
|
||
<p><a href="https://www.youtube.com/live/EkbcI3KgUuY?feature=shared&t=8360">Watch →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>Programming Languages and Trust</h3>
|
||
<p><em>Datengarten 96</em><br>
|
||
On compilers, interpreters, and safety.</p>
|
||
<p><a href="https://media.ccc.de/v/dg-96">Watch →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>Automate Yourself Within Six Months</h3>
|
||
<p><em>DeNOG, 2019 (w/ Christian Dieckhoff)</em><br>
|
||
A retrospective on automating an ISP’s network infrastructure.</p>
|
||
<p><a href="https://media.ccc.de/v/denog11-26-automate-yourself-within-six-months">Watch →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>Abstractions! How Do I Even?</h3>
|
||
<p><em>EnthusiastiCon, 2019</em><br>
|
||
A short reflection on abstractions and philosophy.</p>
|
||
<p><a href="https://www.youtube.com/watch?v=71FQXcC6RL8">Watch →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>Carp—A Language for the 21st Century</h3>
|
||
<p><em>clojuTRE, 2018</em><br>
|
||
An introduction to Carp.</p>
|
||
<p><a href="https://www.youtube.com/watch?v=BQeG6fXMk28">Watch →</a></p>
|
||
</article>
|
||
</section>
|
||
|
||
<section>
|
||
<h2>Publications</h2>
|
||
|
||
<article>
|
||
<h3>Efficient Module-Level Dynamic Analysis for Dynamic Languages with Module Recontextualization</h3>
|
||
<p><em>ESEC/FSE 2021 — Distinguished Paper Award</em><br>
|
||
Describes a method for performing dynamic analysis at the module level to enable module-level execution security. I only worked on the Racket implementation, not the JavaScript part.</p>
|
||
<p><a href="https://dl.acm.org/doi/10.1145/3468264.3468574">Read →</a></p>
|
||
</article>
|
||
|
||
<article>
|
||
<h3>Eventually Consistent Partying</h3>
|
||
<p><em>SIGBOVIK, 2019</em><br>
|
||
This one might be a joke.</p>
|
||
<p><a href="https://sigbovik.org/2019/proceedings.pdf">Read →</a></p>
|
||
</article>
|
||
</section>
|
||
</main>
|
||
</body>
|
||
</html>
|