An examination of the current data portability design patterns used in Social Media sites. Looking at a possible new Open Stack concept to create true plug and play interfaces for user to exchange data
The document provides guidance on evaluating the reliability and credibility of websites. It recommends checking who authored and published the site, whether sources are cited, if there are signs of bias, and searching the domain on tools like Alexa to understand ownership and backlinks. It also suggests searching topics on Google to compare sites and analyzing the quality and reliability of top results.
The document discusses best practices for search on museum websites. It recommends using Google search for the website but also implementing internal search to better understand the museum's unique content. It provides examples of autocomplete, faceted search, highlighting search terms, and correcting spelling to improve the user search experience. Solr is recommended as an open source tool for implementing these search features.
The document discusses using Google hacking techniques to locate vulnerabilities on websites. It describes what Google hacking is, which is using Google to find sensitive information that may have been exposed due to poor web application security. It provides examples of what attackers can do with vulnerable websites, such as file inclusion, SQL injection, and arbitrary file uploads. It also discusses the Google Hacking Database (GHDB), which is a collection of Google dorks or search queries that have revealed vulnerabilities. Finally, it covers some basics of Google hacking like using the Google cache to crawl website information and using Google as a proxy server.
The document discusses how to use the Yahoo Query Language (YQL) to tap into thousands of APIs and extract data from sources across the web by writing simple SQL-like queries. It provides examples of queries to search Twitter, YouTube, Flickr, Craigslist and more, and explains how to select, filter, sort and limit data from these sources using YQL. Key resources mentioned include the YQL documentation, console and Github account for contributing custom data tables.
This document discusses location-aware apps and hacking location data. It begins with some example photos showing current location and what's around. It then discusses oldest maps, current maps, and questions like where, here, around. It covers getting the current location through asking the user, sniffing the IP, and inferring location. It details the W3C geolocation API, IP sniffing, geocoding, reverse geocoding, and the Yahoo! GeoPlanet API. Finally it discusses some interesting hacks and apps that utilize augmented reality and location data.
New approaches to hypertext and REST in a mobile-first worldIsrael Shirk
The document discusses new approaches to hypertext and REST APIs in a mobile-first world. It proposes using JSON Hyperschema to define self-describing APIs and objects that can be interpreted across different devices through custom components. This allows the backend to remain the same while the frontend is laid out differently for each client type, enabling data-centric design on the server and render-focused clients.
This document provides an overview of various internet tools including Googling, HTTrack, Yahoo Messenger, and FTP. It discusses basic and advanced search techniques for Google including the use of Boolean operators and special search terms. It then explains how to use HTTrack to make offline copies of websites for browsing without an internet connection. Next it shows how to use Yahoo Messenger to communicate with contacts. Finally it briefly introduces FTP for uploading and downloading files over the internet.
This document provides instructions and links for conducting advanced searches on Google and Google Scholar, as well as searches within Google Books. It includes the URLs for Google's advanced search feature and Google Scholar homepage. Several links are also provided to academic papers and books that reference the "deep web" or "dark web".
Redefining technical SEO & how we should be thinking about it as an industry ...WeLoveSEO
It’s time to throw the traditional definition of technical SEO out the window. Why? Because technical SEO is so much bigger than just crawling, indexing, and rendering. Technical SEO is applicable to all areas of SEO, including content development and other creative functions. Join this session to learn how to integrate technical SEO into all areas of your SEO program.
This document provides an overview and demonstration of tools for sourcing candidates and researching professional profiles. It introduces SourceHub for building boolean search strings from job descriptions and mining LinkedIn profiles. Other tools discussed include LinkedIn Xray for bypassing profile view limits, Google Plus search, resume finders, outreach tools like Bullhorn Reach, and analytics platforms for measuring Twitter presence. The document demonstrates how to test these tools and find hidden profiles and documents.
This document discusses searching beyond Google and provides information about different search engines and methods for searching the deep or invisible web. It outlines various search engines including Google, HotBot, and Surfwax. It also discusses indexes and directories. The document defines the deep web as information stored in databases that is only accessible by direct query and estimates it is 500 times larger than the surface web. It provides some methods for navigating the deep web including thinking in terms of databases and lists some additional resources.
The document discusses the rising costs of mobile bills and increasing mobile device usage. It notes that the average US mobile bill is now $139 per month and that people spend over 2.5 hours on their mobile devices daily. However, it also suggests taking occasional breaks from mobile devices to reconnect with family and friends through engaging activities like games to strengthen important relationships.
The document discusses programming social applications. It covers core concepts like social graphs and sharing models. It then discusses techniques for finding user social data like WebFinger, the Open Graph Protocol for defining metadata, Activity Streams for defining user actions, and PubSubHubbub and Salmon for syndicating content updates. The presentation provides examples and homework assignments for implementing these techniques.
This document provides an overview of using Google searches to gather information for hacking purposes. It discusses techniques like Google bombing, using advanced operators and wildcards to refine searches, searching titles, URLs, and filetypes, and using Google as a scanner to find vulnerable CGI scripts. It also covers automation of Google searches and tools like Gooscan for finding security vulnerabilities. The document warns that exploiting vulnerabilities goes beyond passive searching.
Different types of graphs and when you should use each + some random visuals I've always found useful.
Patrick Stox presenting at Digital Elite Day 2020
The document discusses ZoneTag, a photo tagging and sharing mobile application. It describes how ZoneTag allows users to easily upload and tag photos on their phones using location and time metadata. A user study found that motivations for tagging included organization and retrieval of photos, sharing experiences with others, and connecting with the local community. Suggested tags from other photos taken in the same location were found to be very helpful for users.
JavaScript SEO Ungagged 2019 Patrick Stoxpatrickstox
Patrick Stox is a product advisor, technical SEO expert, and brand ambassador at Ahrefs. He speaks at various conferences and organizes several meetup groups. He has judged various search awards and is a founder of the Technical SEO Slack group. Stox provides advice on JavaScript frameworks, headless CMS, code splitting, and best practices for JavaScript sites to be search engine friendly. He notes the challenges search engines face in rendering JavaScript content at scale.
Patrick Stox provides a summary of the history and evolution of nofollow, ugc, and sponsored attributes. Originally created to combat comment spam, nofollow was overused which led to Google missing 50% of the web. Google introduced ugc and sponsored to better classify links and pass partial ranking signals. Major platforms like WordPress are adopting the new attributes, but widespread adoption may be slow without incentives from Google. Stox provides best practices tips for using the attributes.
With Great Nerdery Comes Great Responsibility John Anderson
The document discusses the author's concerns about privacy and centralization on the internet and social media platforms. It then describes a project called "Klatsch" that the author has started to build as an alternative. Klatsch is being developed in Go and is intended to provide a decentralized way to archive, search, and share content across social networks. The author hopes others will also create their own tools to address these issues and that the tools could potentially work together.
The document discusses various techniques for determining a user's location for location-aware apps, including asking the user, sniffing the user's IP address, inferring location from content, and using geocoding and reverse geocoding with services like Yahoo GeoPlanet. It provides examples of APIs and techniques like the W3C geolocation API, MaxMind IP geolocation, and placemaking services. The document also lists some example location-based apps and hacks and resources for developing location-aware applications.
W3C Chair training Focus & Poductivity 2014102Arnaud Le Hors
- The document provides guidance for W3C chairs on maintaining focus and productivity in their roles. It outlines challenges such as dealing with public comments and achieving consensus.
- It recommends chairs establish clear timelines and milestones, keep groups on track to deliver on time, and make use of W3C tools to manage issues, action items, and documentation.
- Chairs are advised to drive productive discussions, achieve consensus rather than majority votes, and resolve issues and objections while remaining neutral in their facilitation role.
This document summarizes a meeting about connecting people on the social web using open standards. It discusses the history of semantic web projects like FOAF and RDF that aim to make web documents machine-readable and link people and information. It also addresses disagreements between groups working on these issues and emphasizes finding common ground through collaboration and focusing on shared goals of a more decentralized and interconnected web.
1) Creative Commons licenses have been enforced in courts in various countries, including Belgium, Israel, and Germany. In these cases, authors sued for license breaches when their works were used without proper attribution or for commercial purposes without permission.
2) Community enforcement of Creative Commons licenses also occurs, such as when a far-right political party used an image without attribution and the author sought an injunction.
3) The document argues that while legal enforcement is important, over-reliance on lawyers could undermine the Creative Commons movement. Instead, Creative Commons should focus on building databases and improving licenses to make them more user-friendly, especially for institutions.
Using the CC BY license, Workshop for 2013 OPEN Kick-offJane Park
Summary of session from OPEN Kickoff Conference for DOL TAACCCT Round 2 Grantees: This session will dive into detail about the CC BY licensing requirement and what it takes to apply the license to grantee materials. CC will go over the CC license chooser tool, examples of good license implementation, and content-sharing platforms where you can upload resources under the CC BY license. If enough time and interest, CC will also go over best practices for giving attribution to the creators of CC licensed works, especially as part of a larger resource, such as a textbook or course.
More info: http://open4us.org/events/
Redefining technical SEO & how we should be thinking about it as an industry ...WeLoveSEO
It’s time to throw the traditional definition of technical SEO out the window. Why? Because technical SEO is so much bigger than just crawling, indexing, and rendering. Technical SEO is applicable to all areas of SEO, including content development and other creative functions. Join this session to learn how to integrate technical SEO into all areas of your SEO program.
This document provides an overview and demonstration of tools for sourcing candidates and researching professional profiles. It introduces SourceHub for building boolean search strings from job descriptions and mining LinkedIn profiles. Other tools discussed include LinkedIn Xray for bypassing profile view limits, Google Plus search, resume finders, outreach tools like Bullhorn Reach, and analytics platforms for measuring Twitter presence. The document demonstrates how to test these tools and find hidden profiles and documents.
This document discusses searching beyond Google and provides information about different search engines and methods for searching the deep or invisible web. It outlines various search engines including Google, HotBot, and Surfwax. It also discusses indexes and directories. The document defines the deep web as information stored in databases that is only accessible by direct query and estimates it is 500 times larger than the surface web. It provides some methods for navigating the deep web including thinking in terms of databases and lists some additional resources.
The document discusses the rising costs of mobile bills and increasing mobile device usage. It notes that the average US mobile bill is now $139 per month and that people spend over 2.5 hours on their mobile devices daily. However, it also suggests taking occasional breaks from mobile devices to reconnect with family and friends through engaging activities like games to strengthen important relationships.
The document discusses programming social applications. It covers core concepts like social graphs and sharing models. It then discusses techniques for finding user social data like WebFinger, the Open Graph Protocol for defining metadata, Activity Streams for defining user actions, and PubSubHubbub and Salmon for syndicating content updates. The presentation provides examples and homework assignments for implementing these techniques.
This document provides an overview of using Google searches to gather information for hacking purposes. It discusses techniques like Google bombing, using advanced operators and wildcards to refine searches, searching titles, URLs, and filetypes, and using Google as a scanner to find vulnerable CGI scripts. It also covers automation of Google searches and tools like Gooscan for finding security vulnerabilities. The document warns that exploiting vulnerabilities goes beyond passive searching.
Different types of graphs and when you should use each + some random visuals I've always found useful.
Patrick Stox presenting at Digital Elite Day 2020
The document discusses ZoneTag, a photo tagging and sharing mobile application. It describes how ZoneTag allows users to easily upload and tag photos on their phones using location and time metadata. A user study found that motivations for tagging included organization and retrieval of photos, sharing experiences with others, and connecting with the local community. Suggested tags from other photos taken in the same location were found to be very helpful for users.
JavaScript SEO Ungagged 2019 Patrick Stoxpatrickstox
Patrick Stox is a product advisor, technical SEO expert, and brand ambassador at Ahrefs. He speaks at various conferences and organizes several meetup groups. He has judged various search awards and is a founder of the Technical SEO Slack group. Stox provides advice on JavaScript frameworks, headless CMS, code splitting, and best practices for JavaScript sites to be search engine friendly. He notes the challenges search engines face in rendering JavaScript content at scale.
Patrick Stox provides a summary of the history and evolution of nofollow, ugc, and sponsored attributes. Originally created to combat comment spam, nofollow was overused which led to Google missing 50% of the web. Google introduced ugc and sponsored to better classify links and pass partial ranking signals. Major platforms like WordPress are adopting the new attributes, but widespread adoption may be slow without incentives from Google. Stox provides best practices tips for using the attributes.
With Great Nerdery Comes Great Responsibility John Anderson
The document discusses the author's concerns about privacy and centralization on the internet and social media platforms. It then describes a project called "Klatsch" that the author has started to build as an alternative. Klatsch is being developed in Go and is intended to provide a decentralized way to archive, search, and share content across social networks. The author hopes others will also create their own tools to address these issues and that the tools could potentially work together.
The document discusses various techniques for determining a user's location for location-aware apps, including asking the user, sniffing the user's IP address, inferring location from content, and using geocoding and reverse geocoding with services like Yahoo GeoPlanet. It provides examples of APIs and techniques like the W3C geolocation API, MaxMind IP geolocation, and placemaking services. The document also lists some example location-based apps and hacks and resources for developing location-aware applications.
W3C Chair training Focus & Poductivity 2014102Arnaud Le Hors
- The document provides guidance for W3C chairs on maintaining focus and productivity in their roles. It outlines challenges such as dealing with public comments and achieving consensus.
- It recommends chairs establish clear timelines and milestones, keep groups on track to deliver on time, and make use of W3C tools to manage issues, action items, and documentation.
- Chairs are advised to drive productive discussions, achieve consensus rather than majority votes, and resolve issues and objections while remaining neutral in their facilitation role.
This document summarizes a meeting about connecting people on the social web using open standards. It discusses the history of semantic web projects like FOAF and RDF that aim to make web documents machine-readable and link people and information. It also addresses disagreements between groups working on these issues and emphasizes finding common ground through collaboration and focusing on shared goals of a more decentralized and interconnected web.
1) Creative Commons licenses have been enforced in courts in various countries, including Belgium, Israel, and Germany. In these cases, authors sued for license breaches when their works were used without proper attribution or for commercial purposes without permission.
2) Community enforcement of Creative Commons licenses also occurs, such as when a far-right political party used an image without attribution and the author sought an injunction.
3) The document argues that while legal enforcement is important, over-reliance on lawyers could undermine the Creative Commons movement. Instead, Creative Commons should focus on building databases and improving licenses to make them more user-friendly, especially for institutions.
Using the CC BY license, Workshop for 2013 OPEN Kick-offJane Park
Summary of session from OPEN Kickoff Conference for DOL TAACCCT Round 2 Grantees: This session will dive into detail about the CC BY licensing requirement and what it takes to apply the license to grantee materials. CC will go over the CC license chooser tool, examples of good license implementation, and content-sharing platforms where you can upload resources under the CC BY license. If enough time and interest, CC will also go over best practices for giving attribution to the creators of CC licensed works, especially as part of a larger resource, such as a textbook or course.
More info: http://open4us.org/events/
The Remix Cycle is a framework for looking at sustainability as a media creator. Remix-it, Share-it, and Prof-it (and then back again, as the cylce goes on and on)
The document discusses options for revising the noncommercial (NC) licenses in Creative Commons' version 4.0 release. It notes that NC licenses have issues like a lack of clear definition, underuse of non-NC licenses, and built-in non-interoperability. Some proposed options are: (1) phasing out NC licenses over time, (2) simplifying the suite by dropping two NC licenses, (3) rebranding NC licenses under a different domain, or (4) clarifying the NC definition. The document analyzes pros and cons of different approaches but does not make a recommendation.
The Korean Copyright Act of 2003 defines key terms related to databases and sui generis rights for databases. It defines a database as a collection of information arranged systematically that can be individually accessed. Database producers are those who make a substantial investment to produce, renew, verify or supplement a database. They have rights to control the reproduction, distribution, broadcasting or transmission of all or a substantial part of the database. Using a substantial part repetitively or systematically in a way that conflicts with the normal use of the database or prejudices the producer's interests violates these rights. The Act provides database producers exclusive rights and protection for 5 years, effectively in perpetuity.
The content management vendor landscape is like a subway on game day: crowded, noisy, and confusing. Lots of people seem to be getting to their destination, but it's also easy to get lost. Platform vendors and implementors promise ease of use, low cost of ownership, and the opportunity to provide ROI to stakeholders while engaging audiences from prospective students (and their parents) to alumni, from undergraduates to research lab directors and development offices.
The reality, of course, is far more complex. While technical platforms certainly form a key part of any content management strategy—and every organization will find some platforms a better fit than others—the real challenges are far more human. Choosing an adequate or suitable platform is necessary but by no means sufficient for long-term success. We'll explore some of the key myths of content management as they apply to higher education and uncover the realities those myths obscure.
Designing for Privacy in Mobile and Web Apps - Interaction '14, AmsterdamAmber Case
Practice privacy by design, not privacy by disaster!
See the talk here: http://caseorganic.com/articles/2014/02/12/1/designing-for-privacy-in-mobile-and-web-apps-at-interaction-14-in-amsterdam
Almost every application requires some gathering of personal data today. Where that data is stored, who has access to it, and what is done with that data later on is becoming increasingly important as more and more of our data lives online today. Privacy disasters are costly and can be devastating to a company. UX designers and developers need to have a framework for protecting user data, communicating it to users, and making sure that the entire process is smoothly handled.
This talk covers best practices for designing web and mobile apps with the privacy of individual users in mind. Privacy has been an even bigger issue with location-based apps, and we ran into it head-first when we began work on Geoloqi (now part of Esri). Designing an interface that made one's personal empowering instead of creepy was our goal. The stories from our design decisions with our application will also be included in this talk.
The document discusses how the World Wide Web, which originated as a byproduct of research at CERN, fueled a technological and cultural revolution. It describes how the amount of data produced has grown exponentially since the development of the web. Key impacts discussed include the rise of big data, social networks with billions of users, changes to privacy and commerce, and the replacement of traditional jobs and industries by internet platforms.
Some slides on how museums and related cultural heritage institutions are using Creative Commons to...
1) Share their digital collections
2) Share collection records
3) Engage users and artists, thereby tapping into new communities of stakeholders
...ultimately increasing their impact and reach beyond one entity's website or physical presence.
Note: Photo on Slide 56 is CC BY 4.0 by Frida Gregersen, not SMK.
The document summarizes the results of a survey of 303 WordPress professionals. It found that WordPress powers over 27% of websites and thousands rely on it as their core business strategy. Respondents said their biggest challenges are lack of robust ecommerce solutions and workflow concerns. Over 99% use WordPress as their primary CMS. The majority support the WordPress community through WordCamp participation or contributions.
Scott Taylor is a core committer to WordPress and senior software engineer at The New York Times who has been involved with WordPress for many years. The document outlines his experience with WordPress over time, including his first WordCamp in 2010, working on WordPress at eMusic which involved transitions to PHP and services, speaking at WordCamps in 2011 and 2012, contributing to WordPress releases from 3.3 to 4.0, and advice on how to contribute to WordPress such as having a purpose and being prepared to wait.
Facebook's Growth Hacker on how they put Facebook on the Path to 1 Billion Usersgrowthhackersconference
Watch the whole video course (10 hours long) on Udemy (use this link for $25 off): http://www.udemy.com/growth-hackers-conference/?couponCode=SlideShare50
In this presentation, Chamath Palihapitiya, the founder of the Facebook Growth Team, shares his secrets to putting Facebook on the path to 1 billion users. You can see the full video here: http://www.youtube.com/watch?v=raIUQP71SBU
The document discusses scaling a WordPress platform, community, business, and team. It describes Matt's magic mini-cluster configuration using load balancers, databases, and web servers. It also discusses using HyperDB and Memcached for performance and being stateless. Hiring priorities are listed as personality fit, ability to learn, taste, passion for the space, and familiarity with technologies.
This document discusses experiments in data portability and how the author built demos to showcase social graph and open standards technologies. It provides an overview of microformats, RSS/ATOM, social graph mapping, and how chaining open standards like these provides more value than individual parts. Implementation details are given for parsers, APIs, templates, and specifications used.
How to connect social media with open standardsGlenn Jones
Glenn Jones discusses how to connect social media with open standards by:
1) Adding microformats and RSS/Atom to sites to standardize formats
2) Designing URL structures to be RESTful
3) Adding OAuth authentication to password-protected content for access control
4) Considering discovery standards like XRD to expose APIs and services
The talk outlines how chaining these open standards together provides more value than individual parts alone.
An examination of the current data portability design patterns used in Social Media sites. Looking at a possible new Open Stack concept to create true plug and play interfaces for user to exchange data.
This document discusses the DiSo Project and the open web. It proposes using open standards like OAuth and XRDS to enable cross-site social networking and manage user identity across different sites and services. Portable Contacts (PoCo) is presented as a way to bring friends across sites using vCards and invite friends safely using OAuth. Drupal is suggested to use these open standards to advertise user services and enable cross-site social functionality.
A Platform for Object-Action Semantic Web InteractionRoberto García
Semantic Web applications tests show that their usability is seriously compromised. This motivates the exploration of alternative interaction paradigms, different from the \"traditional\" Web or desktop applications ones. The Rhizomer platform is based on the object-action interaction paradigm, which is better suited for heterogeneous resource spaces such as those common in the Semantic Web. Resources, described by means of RDF metadata, correspond to the objects from the interaction point of view and Rhizomer provides browsing mechanisms for them. Semantic web services, dynamically associated to these objects, correspond to the actions. Rhizomer has been applied in the context of a media house to build an audiovisual content management system. End-users of this system, journalists and archivists, are able to navigate the content repository through semantic metadata describing content pieces and the domain knowledge these pieces are referring to. Those resources constitute the objects to which, when the user selects one of them, semantic web services dynamically associate specialized visualization and interaction views, the actions.
Goodle Developer Days Munich 2008 - Open Social UpdatePatrick Chanezon
Updates about the OpenSocial ecosystem at Google developer days Munich, including presentations from Xing, Lokalisten, netlog and Viadeo..
OpenSocial is an open specification defining a common API that works on many different social websites, including MySpace, Plaxo, Hi5, Ning, orkut, Friendster Salesforce.com and LinkedIn, among others. This allows developers to learn one API, then write a social application for any of those sites: Learn once, write anywhere.
In addition, in order to make it easier for developers of social sites to implement the API and make their site an OpenSocial container, the Apache project Shindig provides reference implementations for OpenSocial containers in two languages (Java, PHP). Shindig will define a language specific Service Provider Interface (SPI) that a social site can implement to connect Shindig to People, Persistence and Activities backend services for the social site. Shindig will then expose these services as OpenSocial JavaScript and REST APIs.
In this session we will explain what OpenSocial is, show examples of OpenSocial containers and applications, demonstrate how to create an OpenSocial application, and explain how to leverage Apache Shindig in order to implement an OpenSocial container.
Top 5 Tips for Building Viral Social Web Applications and SitesJonathan LeBlanc
The document discusses top tips for building viral social web applications, including building for relevant social graphs, understanding sharing models, using existing technologies, building for all available outlets, and using emerging technologies. It provides examples like OpenSocial, Activity Streams, OAuth, and WebFinger to illustrate how to integrate social features and leverage new protocols. The core principles are presented with polls and examples of successes and failures from companies like Zynga.
The document provides an overview of the semantic web including its goals of making data meaningful and discoverable. It discusses approaches to building the semantic web such as RDF, RDFS, OWL, and SPARQL. It also covers microformats as a more practical approach and provides examples of using RDF, OWL, SPARQL, and various microformats.
The document provides an introduction to the Semantic Web, including:
- The Semantic Web extends the current web by giving information well-defined meaning so computers and people can better work together.
- It aims to make data easier for machines to publish, share, find and understand through smarter data rather than just smarter machines.
- Examples of Semantic Web applications include Bio2RDF, which provides structured data about genes, and the BBC publishing semantic metadata about musical artists.
The document discusses SearchMonkey, an open platform from Yahoo! that allows developers to build structured data into search results. It presents several approaches for providing structured data to SearchMonkey, including embedding RDF or microformats directly into web pages, generating a DataRSS feed from a database, extracting data via XSLT, or calling a remote web service. The document encourages developers to prototype with XSLT initially and provides resources for learning more about SearchMonkey and structured data standards.
Goodle Developer Days London 2008 - Open Social UpdatePatrick Chanezon
This document discusses an OpenSocial ecosystem update presented on September 16, 2008. It includes an introduction to OpenSocial, how to build OpenSocial applications, hosting social applications, monetizing social applications, demos of OpenSocial containers from sites like Hyves and Netlog, and how to become an OpenSocial container using the Shindig open source project.
This document provides an overview of OpenSocial, including its benefits for application developers and social networks, examples of how to build OpenSocial applications using various APIs, and resources for OpenSocial developers.
Mashups & Data Visualizations: The New Breed of Web ApplicationsDarlene Fichter
Web 2.0 is opening the doors to tools and toolkits for do-it-yourself (DIY) programming that requires no knowledge about programming. Find out what mashups are and how libraries are making use of them to create rich, new information services and content. Look at some of the intriguing and robust new data visualization tools, such as IBM’s alphworks, swivel, gapminder (bought by Google), etc. that can put the power of spreadsheets online for everyone in your organization to present their information as tag clouds, bar and pie charts, bubble maps, and more.
Presented by Darlene Fichter October 31, 2007 at Internet Librarian 2007
Palestra ministrada em 08/11/2012, Dia do Conhecimento, na faculdade IST-Rio. A apresentação trata das principais ferramentas que os desenvolvedores Front-end utilizam em seu dia-a-dia. A palestra é um complemento da apresentação sobre SEO realizada na XVII Semana Tecnológica do IST.
Web2.0 2012 - lesson 7 - technologies and mashups Carlo Vaccari
This document discusses key concepts of Web 2.0 technologies including blogs, wikis, tags, social networks, AJAX, APIs, mashups, and frameworks. It provides examples of popular mashups that combine data from multiple sources to create new applications. Both the strengths and weaknesses of mashups are outlined, noting their potential for lightweight development but also dependence on external data sources and APIs.
The document discusses the semantic web and its potential uses for liberal arts campuses. It provides an overview of semantic web technologies like RDF, OWL, and SPARQL. Examples are given of how semantic web tools could be used for campus projects, pedagogy, and research by exposing metadata and linking data. Challenges mentioned include complexity, lack of visible applications, and the ecological growth needed for widespread adoption.
Hi5 is one of the largest social networks with over 70 million users and is focusing on international expansion. They are an early partner in OpenSocial to build applications on their platform without writing a custom system, and their sandbox allows developers to test apps accessible by URL on a user's profile or separate canvas page. The document outlines OpenSocial fundamentals and hi5's implementation including getting user and app data through APIs and posting to activity streams.
The document provides an overview of EthicShare, a platform built using Drupal and Solr to aggregate bioethics research. It describes EthicShare's pilot implementation, funding, and technical components including Drupal, Solr for faceted search, and the indexing and searching processes in Solr. It also covers Solr directory structure, schema configuration including fields, types, and dynamic fields, and how the ApacheSolr module integrates Solr search into Drupal.
Googles rich snippets and creation of schema.org have brought semantic mark up into sharp focus for the SEO industry. The semantic mark up technologies like Microformats, RDFa and Microdata can seem complex and the implementation choices unclear. Glenn will explain the different technologies how to chose one and demonstrate how to mark up HTML so it is picked up by the search engines. Finally, he will take look at the future of how Google could mine social networks data to aid search recommendation within results.
The latest browser APIs now make it possible to redesign how your web pages interact with other applications. Web pages are too often little islands that fail to play well with the wider user interfaces of our devices. This talk will explore the possibilities from Drag and Drop to Web Intents, demonstrating how to make web pages more equal in the world of applications.
This document discusses different methods of marking up data on web pages for search engines, including microformats, RDFa, and Microdata. It provides examples of how to mark up a recipe using the hRecipe microformat, including adding classes to identify ingredients, instructions, ratings, and the author. Properly marking up pages with semantic tags helps search engines understand the structure and content of pages.
Choosing the Right Words - Web Intents/ActionsGlenn Jones
Chrome and Mozilla are working on a new concept called Web Intents/Actions. It extends the hyperlink idea, allowing sites to share features and functionality. A big part of the idea revolves around creating a collection of verbs (calls to action). I want to do a workshop, explaining the Web Intents concept and then ask the following questions:
How do we define 'the right words'?
How do you sort services into collections under a word?
How do you come up with calls to action that work with the broadest audience?
With some of the newer HTML5 API’s it is now possible to redesign how your web pages interact with the desktop. Web pages are too often little islands that fail to interact well with the wider user interface of our devices. This talk will explain the new Drag/Drop and File APIs, demonstrating how to make web pages more equal in the world of applications.
What a UX Designer needs to know about SolrGlenn Jones
The document discusses Solr, an open source search platform. It explains that Solr provides features like boolean logic, term frequency-inverse document frequency scoring, and weighted searches that allow ranking results based on fields or tags. It also discusses using Solr for autocomplete, grouping related search items, and adding navigational facets to improve search relevancy and the user experience.
Re-using data people have left around the webGlenn Jones
The practical reuse of social media data to create better user experience. Combining Google’s Social Graph API with open data sources like RSS and Microformats to provide a wealth information about your users.
the practical reuse of social media data and how it can create better user experience. Combining Google’s Social Graph API with open data sources like RSS and Microformats to provide a wealth information about your users.
Can your website be your API and real lifeGlenn Jones
This talk to tries and answer the question Drew McLellan posed a year ago in his presentation Can Your Website be Your API? I used some of my experience building ufXtract and parsing social networks information to see if it is possible in the real world.
Bepents tech services - a premier cybersecurity consulting firmBenard76
Introduction
Bepents Tech Services is a premier cybersecurity consulting firm dedicated to protecting digital infrastructure, data, and business continuity. We partner with organizations of all sizes to defend against today’s evolving cyber threats through expert testing, strategic advisory, and managed services.
🔎 Why You Need us
Cyberattacks are no longer a question of “if”—they are a question of “when.” Businesses of all sizes are under constant threat from ransomware, data breaches, phishing attacks, insider threats, and targeted exploits. While most companies focus on growth and operations, security is often overlooked—until it’s too late.
At Bepents Tech, we bridge that gap by being your trusted cybersecurity partner.
🚨 Real-World Threats. Real-Time Defense.
Sophisticated Attackers: Hackers now use advanced tools and techniques to evade detection. Off-the-shelf antivirus isn’t enough.
Human Error: Over 90% of breaches involve employee mistakes. We help build a "human firewall" through training and simulations.
Exposed APIs & Apps: Modern businesses rely heavily on web and mobile apps. We find hidden vulnerabilities before attackers do.
Cloud Misconfigurations: Cloud platforms like AWS and Azure are powerful but complex—and one misstep can expose your entire infrastructure.
💡 What Sets Us Apart
Hands-On Experts: Our team includes certified ethical hackers (OSCP, CEH), cloud architects, red teamers, and security engineers with real-world breach response experience.
Custom, Not Cookie-Cutter: We don’t offer generic solutions. Every engagement is tailored to your environment, risk profile, and industry.
End-to-End Support: From proactive testing to incident response, we support your full cybersecurity lifecycle.
Business-Aligned Security: We help you balance protection with performance—so security becomes a business enabler, not a roadblock.
📊 Risk is Expensive. Prevention is Profitable.
A single data breach costs businesses an average of $4.45 million (IBM, 2023).
Regulatory fines, loss of trust, downtime, and legal exposure can cripple your reputation.
Investing in cybersecurity isn’t just a technical decision—it’s a business strategy.
🔐 When You Choose Bepents Tech, You Get:
Peace of Mind – We monitor, detect, and respond before damage occurs.
Resilience – Your systems, apps, cloud, and team will be ready to withstand real attacks.
Confidence – You’ll meet compliance mandates and pass audits without stress.
Expert Guidance – Our team becomes an extension of yours, keeping you ahead of the threat curve.
Security isn’t a product. It’s a partnership.
Let Bepents tech be your shield in a world full of cyber threats.
🌍 Our Clientele
At Bepents Tech Services, we’ve earned the trust of organizations across industries by delivering high-impact cybersecurity, performance engineering, and strategic consulting. From regulatory bodies to tech startups, law firms, and global consultancies, we tailor our solutions to each client's unique needs.
UiPath Automation Suite – Cas d'usage d'une NGO internationale basée à GenèveUiPathCommunity
Nous vous convions à une nouvelle séance de la communauté UiPath en Suisse romande.
Cette séance sera consacrée à un retour d'expérience de la part d'une organisation non gouvernementale basée à Genève. L'équipe en charge de la plateforme UiPath pour cette NGO nous présentera la variété des automatisations mis en oeuvre au fil des années : de la gestion des donations au support des équipes sur les terrains d'opération.
Au délà des cas d'usage, cette session sera aussi l'opportunité de découvrir comment cette organisation a déployé UiPath Automation Suite et Document Understanding.
Cette session a été diffusée en direct le 7 mai 2025 à 13h00 (CET).
Découvrez toutes nos sessions passées et à venir de la communauté UiPath à l’adresse suivante : https://community.uipath.com/geneva/.
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Safe Software
FME is renowned for its no-code data integration capabilities, but that doesn’t mean you have to abandon coding entirely. In fact, Python’s versatility can enhance FME workflows, enabling users to migrate data, automate tasks, and build custom solutions. Whether you’re looking to incorporate Python scripts or use ArcPy within FME, this webinar is for you!
Join us as we dive into the integration of Python with FME, exploring practical tips, demos, and the flexibility of Python across different FME versions. You’ll also learn how to manage SSL integration and tackle Python package installations using the command line.
During the hour, we’ll discuss:
-Top reasons for using Python within FME workflows
-Demos on integrating Python scripts and handling attributes
-Best practices for startup and shutdown scripts
-Using FME’s AI Assist to optimize your workflows
-Setting up FME Objects for external IDEs
Because when you need to code, the focus should be on results—not compatibility issues. Join us to master the art of combining Python and FME for powerful automation and data migration.
DevOpsDays SLC - Platform Engineers are Product Managers.pptxJustin Reock
Platform Engineers are Product Managers: 10x Your Developer Experience
Discover how adopting this mindset can transform your platform engineering efforts into a high-impact, developer-centric initiative that empowers your teams and drives organizational success.
Platform engineering has emerged as a critical function that serves as the backbone for engineering teams, providing the tools and capabilities necessary to accelerate delivery. But to truly maximize their impact, platform engineers should embrace a product management mindset. When thinking like product managers, platform engineers better understand their internal customers' needs, prioritize features, and deliver a seamless developer experience that can 10x an engineering team’s productivity.
In this session, Justin Reock, Deputy CTO at DX (getdx.com), will demonstrate that platform engineers are, in fact, product managers for their internal developer customers. By treating the platform as an internally delivered product, and holding it to the same standard and rollout as any product, teams significantly accelerate the successful adoption of developer experience and platform engineering initiatives.
Shoehorning dependency injection into a FP language, what does it take?Eric Torreborre
This talks shows why dependency injection is important and how to support it in a functional programming language like Unison where the only abstraction available is its effect system.
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Christian Folini
Everybody is driven by incentives. Good incentives persuade us to do the right thing and patch our servers. Bad incentives make us eat unhealthy food and follow stupid security practices.
There is a huge resource problem in IT, especially in the IT security industry. Therefore, you would expect people to pay attention to the existing incentives and the ones they create with their budget allocation, their awareness training, their security reports, etc.
But reality paints a different picture: Bad incentives all around! We see insane security practices eating valuable time and online training annoying corporate users.
But it's even worse. I've come across incentives that lure companies into creating bad products, and I've seen companies create products that incentivize their customers to waste their time.
It takes people like you and me to say "NO" and stand up for real security!
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAll Things Open
Presented at All Things Open RTP Meetup
Presented by Brent Laster - President & Lead Trainer, Tech Skills Transformations LLC
Talk Title: AI 3-in-1: Agents, RAG, and Local Models
Abstract:
Learning and understanding AI concepts is satisfying and rewarding, but the fun part is learning how to work with AI yourself. In this presentation, author, trainer, and experienced technologist Brent Laster will help you do both! We’ll explain why and how to run AI models locally, the basic ideas of agents and RAG, and show how to assemble a simple AI agent in Python that leverages RAG and uses a local model through Ollama.
No experience is needed on these technologies, although we do assume you do have a basic understanding of LLMs.
This will be a fast-paced, engaging mixture of presentations interspersed with code explanations and demos building up to the finished product – something you’ll be able to replicate yourself after the session!
Dark Dynamism: drones, dark factories and deurbanizationJakub Šimek
Startup villages are the next frontier on the road to network states. This book aims to serve as a practical guide to bootstrap a desired future that is both definite and optimistic, to quote Peter Thiel’s framework.
Dark Dynamism is my second book, a kind of sequel to Bespoke Balajisms I published on Kindle in 2024. The first book was about 90 ideas of Balaji Srinivasan and 10 of my own concepts, I built on top of his thinking.
In Dark Dynamism, I focus on my ideas I played with over the last 8 years, inspired by Balaji Srinivasan, Alexander Bard and many people from the Game B and IDW scenes.
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSeasia Infotech
Unlock real estate success with smart investments leveraging agentic AI. This presentation explores how Agentic AI drives smarter decisions, automates tasks, increases lead conversion, and enhances client retention empowering success in a fast-evolving market.
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?Lorenzo Miniero
Slides for my "RTP Over QUIC: An Interesting Opportunity Or Wasted Time?" presentation at the Kamailio World 2025 event.
They describe my efforts studying and prototyping QUIC and RTP Over QUIC (RoQ) in a new library called imquic, and some observations on what RoQ could be used for in the future, if anything.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Slack like a pro: strategies for 10x engineering teamsNacho Cougil
You know Slack, right? It's that tool that some of us have known for the amount of "noise" it generates per second (and that many of us mute as soon as we install it 😅).
But, do you really know it? Do you know how to use it to get the most out of it? Are you sure 🤔? Are you tired of the amount of messages you have to reply to? Are you worried about the hundred conversations you have open? Or are you unaware of changes in projects relevant to your team? Would you like to automate tasks but don't know how to do so?
In this session, I'll try to share how using Slack can help you to be more productive, not only for you but for your colleagues and how that can help you to be much more efficient... and live more relaxed 😉.
If you thought that our work was based (only) on writing code, ... I'm sorry to tell you, but the truth is that it's not 😅. What's more, in the fast-paced world we live in, where so many things change at an accelerated speed, communication is key, and if you use Slack, you should learn to make the most of it.
---
Presentation shared at JCON Europe '25
Feedback form:
http://tiny.cc/slack-like-a-pro-feedback
Autonomous Resource Optimization: How AI is Solving the Overprovisioning Problem
In this session, Suresh Mathew will explore how autonomous AI is revolutionizing cloud resource management for DevOps, SRE, and Platform Engineering teams.
Traditional cloud infrastructure typically suffers from significant overprovisioning—a "better safe than sorry" approach that leads to wasted resources and inflated costs. This presentation will demonstrate how AI-powered autonomous systems are eliminating this problem through continuous, real-time optimization.
Key topics include:
Why manual and rule-based optimization approaches fall short in dynamic cloud environments
How machine learning predicts workload patterns to right-size resources before they're needed
Real-world implementation strategies that don't compromise reliability or performance
Featured case study: Learn how Palo Alto Networks implemented autonomous resource optimization to save $3.5M in cloud costs while maintaining strict performance SLAs across their global security infrastructure.
Bio:
Suresh Mathew is the CEO and Founder of Sedai, an autonomous cloud management platform. Previously, as Sr. MTS Architect at PayPal, he built an AI/ML platform that autonomously resolved performance and availability issues—executing over 2 million remediations annually and becoming the only system trusted to operate independently during peak holiday traffic.
#2: I am going to talk about lots of technology some of which you may not of hear of. I have made a extensive list of URLs which I will post with these slidesToday I want to primary look at social media user experience and how it can be enhanced with portable data.
#3: The birth place of the data portability comes from the frustration of not been able to move friends profile between social network site.
#6: Problem 1: Give someone your password and at some point they will use abuse it
#7: Problem 2: I need to be different things to different peopleWe should not underestimate the issue of multiple personas, it is one of the major drivers for privacy We have limited personas system with content mark for friends, family, co-workers, or public
#8: Privacy is not a crime people want it,Our feeling towards data are changing all the time. I would personally say as a society we are all still very immature about data issues. Although some would wish to you cannot drive social change faster than your audience wants to change
#10: Problem 4: Don’t present me too many options or too few choicesURL’s are too long to rememberDiscovery + selection is the way to go
#11: Problem 4: The quality or quantity of data imported just is not worth the effortProfiles may not be the best candidate for this try of contact importTalk about amazons address selection feature
#12: You use feed readers like Google Reader to pull together hundred of data sourcesBut RSS has extended so much other its often used without the user knowledge to created featuresIt built into a vast array of software and devices
#13: Every one has a different perspective of social media. This is just my conceptual modelConversation – is discourse between users, forums comments. That can be moderated through conversations around the media, direct conversations Utility – is the utility you gain from a site. So flickr allows me to upload and share photo’s.Youtube allows the same for video. Aggregation – Most modern social media site deal in aggregation. The best example of aggregation is Last.fm. Where you give last.fm data about your listing habits and it looks at the frequency and aggregates it chart of the music you like or aggregate your data against others a charts of the groups music tasteToday I will be talking mainly about Utility and Aggregation, that does not mean that don’t think Conversation is important
#15: But what I really love about RSS is its pluggableNot just for use as designers or developers, but for our usersWe can design site where a user can plug in there own data and design there own content experence
#16: There are many reference to open stack on the webIn general the phase referrers to a collection of open technic which as a collection functionality Here I am talking about the collection of tools I am using to create open specification APIs for data portability
#24: If you go the home page of data portability .org these are the logo you will find.Below is there mission statement. Today I am going to try and give you a real world view of this space.What features we can build now and how do we design the interfaces
#25: The birth place of the data portability comes from the frustration of not been able to move friends profile between social network site.
#26: This is Dopplr’spage that helps you find relationship links It parses the your twitter page finding the hCard which represent your friends.It then cross references these all its accounts twitter accounts and finds the intersecting groupAn interesting to note is that the data displayed is from Dropplr’s own databaseSo on twitter Dave Stone has a username builtbydave yet here we see his full name from the DropplrbasebaseAlso his location in Twitter is Brighton, UK.
#27: So here we see a real mixture of approach to transferring data between different systemsTwitter and Digg are pull public information using hCard, XFN or the more full mixed hCard/XFN patternFacebook and Yahoo - looked like their are using API’s Gmail, Hotmail, AOL – Password anti-pattern
#29: I wanted to show you more than one example and I am sure out there, but its not commonHere it is not only import the hCard for from Flickr but also offering the option to subscribing to it
#30: This is not always though of in relation to social network data portability But discovering your other profile on the web can make for a nice user experience