Roy M Mezan

Roy is an enthusiastic Python programmer, Finished his B.CS at the age of 18.
Lead the drone department at the University R&D Lab.
Was a Drone development officer at the IDF & Project manager of AR/VR development team.
Worked on autonomous drones in the defense industry.
Currently working as a senior developer at Ownbackup in the Security group.


Sessions

07-17
13:45
90min
Food For Rabbits: Celery From Zero to Hero
Roy M Mezan

In a world, full of Micro-Services, distributing tasks is a constant challenge, and there's only one tool that can rule them all.

In this workshop, we'll introduce Celery - a tool for distributing tasks in an easy, fast, and flexible manner, and take you from zero to hero!
- We're going to understand why we need a distributed task system, and why to choose Celery.
- We'll write our first Celery task.
- Understand how to configure and run Celery.
- Familiarize ourselves with Celery's fundamental concepts.
- Dive into celery customizable options.
- Finally, we'll see a real-life example of how we used Celery in our production system and how we customized it to fit our needs, and discuss how you can do the same.

TBD - Multiple Tracks (2023)
Club B
07-17
15:30
90min
Food For Rabbits: Celery From Zero to Hero
Roy M Mezan

In a world, full of Micro-Services, distributing tasks is a constant challenge, and there's only one tool that can rule them all.

In this workshop, we'll introduce Celery - a tool for distributing tasks in an easy, fast, and flexible manner, and take you from zero to hero!
- We're going to understand why we need a distributed task system, and why to choose Celery.
- We'll write our first Celery task.
- Understand how to configure and run Celery.
- Familiarize ourselves with Celery's fundamental concepts.
- Dive into celery customizable options.
- Finally, we'll see a real-life example of how we used Celery in our production system and how we customized it to fit our needs, and discuss how you can do the same.

TBD - Multiple Tracks (2023)
Club B
07-21
11:20
30min
Face Off: Brute-force attack on Biometrical-databases
Roy M Mezan

Magic happens every time you take your phone out of your pocket. Somehow, just by looking at the screen, your phone recognizes you (and only you) and magically unlocks.

Have you ever stopped for a minute and thought to yourself - How does that even work? And maybe more importantly, how secure is it?

In this session, we're going to understand how facial recognition works under the hood. We'll dive into some potential security problems, and we'll show you how we were able to break into a biometric database built on the Dlib-python-library by applying a sophisticated brute-force attack. The results will surprise you.

Security (2023)
PyCharm (Forum Hall)