This document outlines an agenda for analyzing social networks with R. It discusses connecting to social networks like Facebook via APIs, extracting friend data, creating a friendship matrix, and visualizing the resulting friend graph in Gephi. It also provides examples of analyzing Facebook data like extracting post likes counts and generating statistics on popular posts. The document encourages exploring one's own social network data to find insights like common interests between friends or the gender distribution of one's network.
The document provides examples of code smells in Ruby and suggestions for refactoring them. It discusses several smells including duplicate method calls, repeated conditionals, boolean parameters, utility functions, and feature envy. For each smell, it shows an example code snippet demonstrating the smell, then proposes a refactoring and notes potential tradeoffs or caveats. The overall document aims to help improve code quality and design by identifying and addressing common code smells.
This document discusses unit testing in PostgreSQL. It defines a unit in PostgreSQL as domains, types, functions, views, tables, and triggers. It notes some benefits of unit testing include stability and reduced time troubleshooting errors. The document provides examples of unit testing different PostgreSQL elements like functions, views with window functions, and triggers. It recommends testing more complex elements like triggers and functions first before testing simpler elements like domains and types if time allows. A key advantage of PostgreSQL unit testing is not needing mock objects since the database is directly tested.
The document contains the output from running the "strace rm" command on a file. The strace output lists each system call and signal that rm makes when deleting the file. It also contains discussions on using find/xargs, rsync, gentle_unlink, and other commands for deleting large numbers of files. Gentle_unlink is a Perl script that can slowly and safely delete files in batches over time or when processes are interrupted.
The document describes profiling web archives to provide concise summaries of their holdings. It discusses generating different types of profiles, including profiles based on complete URI-Rs, top-level domains (TLDs), sub-URIs, and segment digests. Frequency measurements are included to predict the presence of mementos. The profiles balance size and detail. A sample profile following the described structure is also shown.
The document discusses using Vim and Python together effectively. It provides tips for customizing Vim through options, mappings, and plugins to enhance productivity. Popular plugins are recommended for linting, autocompletion, fuzzy finding, Git integration, and more. Using Neovim over Vim is suggested for its modern features like asynchronous operations and Python integration. Setting up dotfiles is presented as a way to manage Vim/Neovim configuration across systems.
This document discusses genetic relationships between populations. It notes that all human populations share a common ancestry and that genetic variation exists within and between populations. While populations can be genetically differentiated, the degree of biological differences is small compared to total genetic variation. Overall, this document emphasizes the shared genetic commonalities between all human populations.
Modeling avengers – open source technology mix for saving the worldCédric Brun
Planet earth is facing massive challenges: global warming and scarcity of natural resources among others. Those challenges are reaching a level of complexity unknown yet and trying to address those requires deep scientific understanding, real world data, specialized tools, inter-disciplinary collaboration and the ability to evaluate “What If” scenarios.
In collaboration with scientists from INRA (the French National Institute for Agricultural Research) we experienced one of those challenges: the use of natural resources for agricultural activities, especially water consumption. While the scientists insight was required in smart technologies like smart farms, this understanding was required to be expressed at an higher level of abstraction through specific tooling. They felt that providing highly dedicated tools with a small budget would require super powers. To us modeling people it looked like a very good fit for DSL’s (Domain Specific Languages), hence suitable for an experiment : let’s build specific modeling tools for smart farming systems!
This experiment represents a few days of work bringing open-source technologies together: EMF, Xtext, Sirius, Gemoc (a model debugging environment, including specific features for concurrency constraints), OptaPlanner (a constraint satisfaction solver from the JBoss community) and Acceleo, resulting in a collection of Eclipse based tools for farming systems (published on github). Just like in The Avengers, each technology bring its own capability but it is the amalgamation of all of them which lead to amazing power!
The session will start with a demo of the Smart Farming System Tooling, an environment to model, analyze and simulate an agricultural exploitation, biomass growth and water consumption based on user input and open data. Then we will dig deeper in how the technologies are mixed and used, among other questions: which of the textual or graphical syntax is better suited for a given aspect? how can we achieve a “perfect blend” of those syntaxes? how OptaPlanner and EMF can create a powerful synergy? how data from INRA can be structured and fed into the tool?
The talk will then evaluate how useful open-source technologies are in addressing this class of problems and how modeling can be used to support sustainability, enable broader engagement of the community, and facilitate more informed decision-making.
ASCII is so 1963. Nowadays, computers must support a broad range of different characters beyond the 128 we had in the early days of computing - not just accents and emojis but also completely different writing systems used around the globe. The Unicode standard packs a whopping 143,859 characters into an elegant system used by over 95% of the Internet, but PHP's string functions don't play nicely with Unicode by default, making it difficult for developers to properly handle such a wide array of possible user inputs.
In this talk, we'll explore why Unicode is important, how the various encodings like UTF-8 work under-the-hood, how to handle them within PHP, and some nifty tricks and shortcuts to preserve performance.
Modeling avengers – open source technology mix for saving the world econ frCédric Brun
Planet earth is facing massive challenges: global warming and scarcity of natural resources among others. Those challenges are reaching a level of complexity unknown yet and trying to address those requires deep scientific understanding, real world data, specialized tools, inter-disciplinary collaboration and the ability to evaluate “What If” scenarios.
In collaboration with scientists from INRA (the French National Institute for Agricultural Research) we experienced one of those challenges: the use of natural resources for agricultural activities, especially water consumption. While the scientists insight was required in smart technologies like smart farms, this understanding was required to be expressed at an higher level of abstraction through specific tooling. They felt that providing highly dedicated tools with a small budget would require super powers. To us modeling people it looked like a very good fit for DSL’s (Domain Specific Languages), hence suitable for an experiment : let’s build specific modeling tools for smart farming systems!
This experiment represents a few days of work bringing open-source technologies together: EMF, Xtext, Sirius, Gemoc (a model debugging environment, including specific features for concurrency constraints), OptaPlanner (a constraint satisfaction solver from the JBoss community) and Acceleo, resulting in a collection of Eclipse based tools for farming systems (published on github). Just like in The Avengers, each technology bring its own capability but it is the amalgamation of all of them which lead to amazing power!
The session will start with a demo of the Smart Farming System Tooling, an environment to model, analyze and simulate an agricultural exploitation, biomass growth and water consumption based on user input and open data. Then we will dig deeper in how the technologies are mixed and used, among other questions: which of the textual or graphical syntax is better suited for a given aspect? how can we achieve a “perfect blend” of those syntaxes? how OptaPlanner and EMF can create a powerful synergy? how data from INRA can be structured and fed into the tool?
SecureSocial - Authentication for Play Frameworkjaliss
This document provides an overview and agenda for SecureSocial, an authentication module for Play!. It discusses main concepts like identity providers and user services. It covers installation, configuration, protecting actions, and customizing views. It also describes extending SecureSocial by creating new identity providers and internationalizing messages. The document aims to explain how SecureSocial works and how developers can customize it for their needs.
The document contains random characters and symbols with no discernible meaning or structure. It does not provide any essential information that can be summarized in 3 sentences or less.
The document discusses the evolution of written communication from handwriting to typewriters to computers. It notes that handwriting led to issues with readability due to individual letter styles, while typewriters standardized fonts but were limited. Computers now allow text to be edited and stored digitally, addressing prior limitations and facilitating communication. The summary provides the high-level overview of the key points in 3 sentences.
You have your shiny new DSL up and running thanks to the Eclipse Modeling Technologies and you built a powerful tooling with graphical modelers, textual syntaxes or dedicated editors to support it. But how can you see what is going on when a model is executed ? Don't you need to simulate your design in some way ? Wouldn't you want to see your editors being animated directly within your modeling environment based on execution traces or simulator results?
Phing is a PHP build tool, similar to Apache's Ant. Phing can be used for everything from validating your build, running tests, combining/minifying resources to deploying.
Testing Fuse Fabric with Pax Exam
This document discusses testing Fuse Fabric with Pax Exam. It covers the goals of repeatable middleware testing, an introduction to Pax Exam and how it allows running tests in real Karaf containers, and two case studies on using Pax Exam to test a "hello world" Camel route and accessing child containers via SSH. The final section briefly mentions testing the Fabric Master component in a clustered environment.
The document discusses using a logical matrix to track which conferences different people will attend. It begins with a true/false matrix but then optimizes it by representing the values as bits (1s and 0s) to reduce memory usage and allow faster lookups. Various methods for counting the number of 1s in a bit representation are tested, with the cached approach proving fastest.
From simple to more advanced: Lessons learned in 13 months with TableauSergii Khomenko
In the talk described our experience of integration Tableau into our data reporting and Business Intelligence process.
Switching from in-house reporting solution to Tableau reporting, data refreshes with Command Line Utility
and other small tips and tricks. Using Tableau reports for building a flexible system for monitoring KPI of a company.
This document provides an overview of Geb, a browser automation framework for Groovy. It discusses how Geb works, its features like jQuery-like selectors and page object modeling, and provides examples of using Geb to test a todo application. Key sections include an introduction to functional testing with browsers, the history and architecture of Geb, tips for interacting with pages and forms, and best practices for structuring Geb tests with page objects and modules.
Frontend architecture on big and small sitesToni Pinel
This document provides a summary of a presentation on front-end architecture for both large and small sites. It discusses using the same standards and principles for front-end development on all sites, regardless of size. It promotes an atomic and modular approach using single responsibility components with clear separation of concerns between HTML, CSS and JavaScript. The presentation emphasizes best practices like avoiding global scope, writing reusable and self-contained modules, and using a mediator for communication between modules.
WordPress custom posts allow creating custom post types beyond standard posts and pages. This presentation demonstrates how to create a custom post type for product catalogs using post meta boxes and custom fields. It covers registering a custom post type, adding meta boxes to the post editor interface, and saving custom field values to the database on post update. The example creates a "Grills" post type with fields for product details, images, and specifications to structure data entry for a grill catalog site.
IPC13 Munich: Planning the UnplannableRobert Lemke
The document provides an overview of software architecture principles and design patterns for planning flexible and extensible systems. It discusses concepts like loose coupling, high cohesion, the Law of Demeter, and dependency injection. Specific patterns and practices are explained for managing dependencies, configuring components, signaling events, and testing code. The document emphasizes writing code that is readable, maintainable, and adaptable to unknown future needs.
How to configure a server, install WordPress, customize the output, and deploy using git... All in 30 minutes. A presentation for the Philly 'Burbs WordPress Meetup.
This document contains the work schedule for doctors at the Hospital Geral Luiz Viana Filho for the month of September 2015. It lists the doctors' names, specialties, and work hours including morning, afternoon, overnight shifts, and time off. The schedule is subject to changes and all professionals are obligated to work assigned shifts under penalty of pay deductions or notifications for absences.
JavaFX is a software platform for creating and delivering desktop applications, as well as rich internet applications (RIAs) that can run across a wide variety of devices. Some key aspects of the JavaFX platform include its base classes like Application, Scene and Stage; the use of FXML for building the user interface with CSS styling and JavaScript capabilities; JavaFX properties and bindings for observing value changes; and support for animation. The JavaFX architecture provides objects, APIs and utilities to help developers create visually-engaging and responsive user experiences.
Serge Guelton and Pierrick Brunet (Namek): “Pythran: Static Compilation of Parallel Scientific Kernels”
Abstract: As the use of Python coupled to Numpy/SciPy for numerical computation increases, many tools to optimize performance have emerged. Indeed, this duo has relatively poor performance when compared to scientific codes written in legacy languages like C or Fortran. Cython, Numba, numexpr and parakeet belongs to this new compiler ecosystem. And so does Pythran, a Python to C++11 translator for scientific Python.
Pythran uses a static compilation approach a la Cython, but with full backward compatibility with Python. It does not only turns Python code into C++ code, it also performs Python/Numpy specific optimizations, generates calls to a parallel, vectorized runtime and makes it possible to write OpenMP annotation in the original Python code. It supports a large range of Numpy functions and can combine them in efficient ways: it can optimize highlevel modern Python/Numpy codes and not only Fortran with a Python flavor ones.
This talk presents the existing compilation approach and optimization opportunities for numerical Python, their strengths and weaknesses, then focus on the specificities of the Pythran compiler.
In this talk we are going to present a preview of Spring Roo 2.0, a rewrite of the code generating tool for the development of Java web applications based on current Spring technologies like Spring Boot, Spring Data, etc.
Spring scala - Sneaking Scala into your corporationHenryk Konsek
Spring Scala provides an API for defining beans in Scala and wrappers for existing Spring functionality. It allows defining beans as functions, using Scala collections and options instead of Java APIs, and aspect-oriented programming without inner classes. While pure Java configuration can be used with Scala, Spring Scala offers a more Scala-friendly experience when integrating Scala code with existing Spring applications and services. Introducing Spring Scala in an incremental, evolutionary manner is recommended over rewriting large projects.
SC4 Workshop 1: Helena Gellerman: data analyses in transport BigData_Europe
This document discusses tools and processes for analyzing field operational test (FOT) data. It provides an overview of the SAFER analysis platform, which processes complex driving data from multiple sources through several steps: decryption, synchronization, resampling, quality calculation, and event generation. The data is then analyzed to study driver behavior, safety systems, and more. Further development needs include reducing processing time, cloud storage, efficient data structures, automatic video coding, and anonymization solutions while retaining valuable information.
This certificate recognizes that Justine Joshua Kidaaga successfully completed a long-term intensive training course in Management of Modern Information Resources and Products held in Berlin and Potsdam, Germany from September to December 2000. The 65-day program, organized by the DSE Education, Science and Documentation Centre in cooperation with Humboldt University Berlin and University of Potsdam, consisted of 12 modules covering topics such as online information retrieval, database design and management, web design, desktop publishing, CD-ROM production, change management, and continuing education. The training was sponsored by the German Federal Ministry for Economic Cooperation and Development.
This document is a certificate confirming that Chen Yong Sun has been awarded a Bachelor of Mechanical Engineering with Second Class Honours (Upper) by Universiti Tun Hussein Onn Malaysia. The certificate details that Chen Yong Sun attended the 14th Convocation on 11th October 2014 and was conferred the degree with all rights and privileges pertaining thereto. It lists his student ID number, gender, citizenship, year of admission and more.
The document appears to contain code or configuration options related to operating system boot processes and error messages. It includes various status messages that could be displayed if the operating system fails to load, as well as options to modify boot configuration settings like enabling safe mode, boot logging, or driver signature enforcement.
Accessible Web Components_Techshare India 2014BarrierBreak
Presented by Nawaz Khan - Accessibility Evangilist and Srinivasu Chakravarthula - Sr. Accessibility Program Lead, Customer Quality & Engg Services, PayPal at Techshare India 2014.
Many accessibility techniques are existing for which there is much lesser innovation for now. PayPal wanted to bring in some of the innovative things for some existing web components. The main objective of the presentation was to "Show audience how to create accessible web components"
This document appears to be a presentation on PHP and API performance optimization. The agenda includes discussing performance of HTTP requests and responses, database performance, and handling heavy load tasks. Some of the key topics covered include using HTTP caching techniques like ETags and Cache-Control headers to improve performance, optimizing database queries by avoiding auto-increment IDs when possible and understanding different ORM change tracking policies, and using load testing tools to measure and improve performance under heavy loads. There is an emphasis on measuring performance at various points to identify and address bottlenecks.
This document discusses big data analysis and data science. It introduces common data analysis techniques like predictive modeling, machine learning, and recommendation systems. It also discusses tools for working with big data, including Hadoop, HDFS, Pig, HBase, Mahout and languages like R and Python. The document provides an example of using these techniques and tools to build a recommendation system using streaming data from Flume stored in HDFS and analyzed with Pig and HBase.
PyCon APAC 2014 - Social Network Analysis Using Python (David Chiu)David Chiu
This document discusses using Python for social network analysis on Facebook data. It provides examples of:
- Connecting to the Facebook API and obtaining an access token
- Retrieving user and friend data via API calls
- Analyzing likes on posts to determine who likes a user's posts the most
- Performing text mining on post messages using NLTK and Jieba to determine popular topics
- Modeling the friendship network as a graph and using NetworkX and community detection to identify groups within the social network.
Speaking of big data analysis, what comes to mind is possibly using HDFS and MapReduce within Hadoop. But to write a MapReduce program, one must face the problem of learning how to write native java. One might wonder is it possible to use R, the most popular language adapted by data scientist, to implement MapReduce program? And through the integration or R and Hadoop, is it truly one can unleash the power of parallel computing and big data analysis?
This slide introduces how to install RHadoop step by step, and introduces how to write a MapReduce program through R. What is more, this slide will discuss whether RHadoop is really a light for big data analysis, or just another method to write MapReduce Program.
Please mail me if you found any problem toward the slide. EMAIL: tr.ywchiu@gmail.com
談到巨量資料,通常大家腦海中聯想到的就是使用Hadoop 的 MapReduce 和HDFS,但是撰寫MapReduce,則就必須要學會撰寫Java 或透過Thrift 接口才能撰寫。但R是否有辦法運行在Hadoop 上呢 ? 而使用R + Hadoop,是否就真的能結合R強大的分析功能,分析巨量資料呢 ?
本次講題將介紹如何Step by step 在Hadoop 上安裝RHadoop相關套件,並介紹如何撰寫R的MapReduce 程式。更重要的是,此次將探討使用RHadoop 是否為巨量資料分析找到一盞明燈? 或者只是另一套實作方法而已?
This document discusses using machine learning with R for data analysis. It covers topics like preparing data, running models, and interpreting results. It explains techniques like regression, classification, dimensionality reduction, and clustering. Regression is used to predict numbers given other numbers, while classification identifies categories. Dimensionality reduction finds combinations of variables with maximum variance. Clustering groups similar data points. R is recommended for its statistical analysis, functions, and because it is free and open source. Examples are provided for techniques like linear regression, support vector machines, principal component analysis, and k-means clustering.
R is a programming language for statistical analysis and graphics. It is an open-source language developed by statisticians to allow for easy statistical analysis and visualization of data. The document provides an overview of R, discussing its origins, functionality, uses in data science, and popular packages and IDEs used with R. Examples are given of basic R syntax for vectors, matrices, data frames, plotting, and applying functions to data.
This document discusses using hidden Markov models (HMM) for stock price prediction. HMMs can model time series data as a probabilistic finite state machine. The document explains that HMMs can handle new stock market data robustly and efficiently predict similar price patterns to past data. It provides an overview of HMM components like states, transition probabilities, and emission probabilities. The document also demonstrates building an HMM model on stock data using the RHMM package in R, including training the model with Baum-Welch and predicting state sequences with Viterbi.
AC Atlassian Coimbatore Session Slides( 22/06/2024)apoorva2579
This is the combined Sessions of ACE Atlassian Coimbatore event happened on 22nd June 2024
The session order is as follows:
1.AI and future of help desk by Rajesh Shanmugam
2. Harnessing the power of GenAI for your business by Siddharth
3. Fallacies of GenAI by Raju Kandaswamy
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
What's Next Web Development Trends to Watch.pdfSeasiaInfotech2
Explore the latest advancements and upcoming innovations in web development with our guide to the trends shaping the future of digital experiences. Read our article today for more information.
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
Performance Budgets for the Real World by Tammy EvertsScyllaDB
Performance budgets have been around for more than ten years. Over those years, we’ve learned a lot about what works, what doesn’t, and what we need to improve. In this session, Tammy revisits old assumptions about performance budgets and offers some new best practices. Topics include:
• Understanding performance budgets vs. performance goals
• Aligning budgets with user experience
• Pros and cons of Core Web Vitals
• How to stay on top of your budgets to fight regressions
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threatsanupriti
In the rapidly evolving landscape of blockchain technology, the advent of quantum computing poses unprecedented challenges to traditional cryptographic methods. As quantum computing capabilities advance, the vulnerabilities of current cryptographic standards become increasingly apparent.
This presentation, "Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats," explores the intersection of blockchain technology and quantum computing. It delves into the urgent need for resilient cryptographic solutions that can withstand the computational power of quantum adversaries.
Key topics covered include:
An overview of quantum computing and its implications for blockchain security.
Current cryptographic standards and their vulnerabilities in the face of quantum threats.
Emerging post-quantum cryptographic algorithms and their applicability to blockchain systems.
Case studies and real-world implications of quantum-resistant blockchain implementations.
Strategies for integrating post-quantum cryptography into existing blockchain frameworks.
Join us as we navigate the complexities of securing blockchain networks in a quantum-enabled future. Gain insights into the latest advancements and best practices for safeguarding data integrity and privacy in the era of quantum threats.
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
AI_dev Europe 2024 - From OpenAI to Opensource AIRaphaël Semeteys
Navigating Between Commercial Ownership and Collaborative Openness
This presentation explores the evolution of generative AI, highlighting the trajectories of various models such as GPT-4, and examining the dynamics between commercial interests and the ethics of open collaboration. We offer an in-depth analysis of the levels of openness of different language models, assessing various components and aspects, and exploring how the (de)centralization of computing power and technology could shape the future of AI research and development. Additionally, we explore concrete examples like LLaMA and its descendants, as well as other open and collaborative projects, which illustrate the diversity and creativity in the field, while navigating the complex waters of intellectual property and licensing.
In this follow-up session on knowledge and prompt engineering, we will explore structured prompting, chain of thought prompting, iterative prompting, prompt optimization, emotional language prompts, and the inclusion of user signals and industry-specific data to enhance LLM performance.
Join EIS Founder & CEO Seth Earley and special guest Nick Usborne, Copywriter, Trainer, and Speaker, as they delve into these methodologies to improve AI-driven knowledge processes for employees and customers alike.
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
Blockchain and Cyber Defense Strategies in new genre timesanupriti
Explore robust defense strategies at the intersection of blockchain technology and cybersecurity. This presentation delves into proactive measures and innovative approaches to safeguarding blockchain networks against evolving cyber threats. Discover how secure blockchain implementations can enhance resilience, protect data integrity, and ensure trust in digital transactions. Gain insights into cutting-edge security protocols and best practices essential for mitigating risks in the blockchain ecosystem.
How to Avoid Learning the Linux-Kernel Memory ModelScyllaDB
The Linux-kernel memory model (LKMM) is a powerful tool for developing highly concurrent Linux-kernel code, but it also has a steep learning curve. Wouldn't it be great to get most of LKMM's benefits without the learning curve?
This talk will describe how to do exactly that by using the standard Linux-kernel APIs (locking, reference counting, RCU) along with a simple rules of thumb, thus gaining most of LKMM's power with less learning. And the full LKMM is always there when you need it!
MYIR Product Brochure - A Global Provider of Embedded SOMs & SolutionsLinda Zhang
This brochure gives introduction of MYIR Electronics company and MYIR's products and services.
MYIR Electronics Limited (MYIR for short), established in 2011, is a global provider of embedded System-On-Modules (SOMs) and
comprehensive solutions based on various architectures such as ARM, FPGA, RISC-V, and AI. We cater to customers' needs for large-scale production, offering customized design, industry-specific application solutions, and one-stop OEM services.
MYIR, recognized as a national high-tech enterprise, is also listed among the "Specialized
and Special new" Enterprises in Shenzhen, China. Our core belief is that "Our success stems from our customers' success" and embraces the philosophy
of "Make Your Idea Real, then My Idea Realizing!"
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
3. AGENDA
What is Social Network?
Why to Analyze Social Network?
How to Analyze
Social Network Connection (Oauth, Oauth2, OpenID)
Social Network Analysis With R
Social Network Visualization (Gephi)
Facebook Post Liked Analysis
Conclusion
6. WHAT DO WE WANT TO KNOW?
Who knows whom, and which people are common to their
social networks?
How frequently are particular people communicating with one
another?
Which social network connections generate the most value for
a particular niche?
How does geography affect your social connections in an
online world?
Who are the most influential/popular people in a social
network?
What are people chatting about (and is it valuable)?
What are people interested in based upon the human language
that they use in a digital world?
8. LESSON 1: CONNECT TO SOCIAL NETWORK
OAuth Flow
Oauth v.s. OAuth2
OpenID
9. OAUTH FLOW
Open standard for authorization. OAuth provides a method for
clients to access server resources on behalf of a resource owner
10. DIFFERENCE BETWEEN OAUTH AND OAUTH2
More OAuth Flows to allow better support for non-browser
based applications
OAuth 2.0 no longer requires client applications to have
cryptography
OAuth 2.0 signatures are much less complicated
OAuth 2.0 Access tokens are "short-lived"
OAuth 2.0 is meant to have a clean separation of roles
between the server responsible for handling OAuth requests
and the server handling user authorization
18. REQUIRED PACKAGES
RCurl
General network (HTTP/FTP/...) client interface for R
rjson
JSON for R
XML
Tools for parsing and generating XML within R and S-Plus
igraph
Network analysis and visualization
bitops
Bitwise Operations
19. REQUIRED PACKAGE
i sa lp ca e( ( rs n,Ru l ,X L, ir p'' io s) dp ne c e= RE
n tl . ak gs c' jo ''C r' 'M ' ' g ah,b tp ' ,e ed ni sT U)
l ba yr sn
i rr ( jo )
l ba yR ul
i rr ( Cr )
l ba yX L
i rr ( M)
l ba yi rp )
i rr ( ga h
l ba yb tp )
i rr ( io s
20. FACEBOOK CONNECT
f _o nc < f nt o ( p t = " e, ac s_ oe = tk n ot os {
b cn e t - u c in a h
m" ce s tk n
o e, p in )
i ( !i sn (p i n) )
f m si go to s {
o to s< s rn f "% " ps e nm s o to s ,"" ul s( pi n) c la s ="
p i n - p i t( ?s, a t( ae ( pi n) =, ni to t os , ol pe
&
o to s< g u( ,, "2 " o to s
p i n - s b "" %C, p in )
u l< s rn f "t p: / r p .a eo kc m% % &c es tk n % " pt , ot os a c
r - p it ( ht s /g ah fc bo . o/ssac s _o e= s, a h pi n , c
}e s {
le
u l< s rn f "t p: / r p .a eo kc m% ? ce st kn %" p t, a cs _o e )
r - p it ( ht s /g ah fc bo . o/sa cs _ oe=s , ah c es t kn
}
dt < gt R ( u l s l vr fp e =F LE )
aa - e UL r , s. ei y er
AS
fo JO (d t )
rm S N aa
}
22. EXECUTED RESULT
> f_ on c( m" a cs _o e)
bc n et "e ,c es t kn
$d
i
[ ]" 72 48 "
1 7 8 28 9
$ ae
nm
[ ]" ai C i"
1 Dvd hu
$ is _a e
f rt n m
[ ]" ai "
1 Dvd
$ at nm
l s_ a e
[ ]" hu
1 Ci"
$ ik
ln
[ ]" tp :/ w. a eo kc mC i Y"
1 h t s/ ww fc bo . o/ hu W
$ sr ae
u en m
[ ]" hu W
1 C i Y"
23. GET FRIEND LIST
> fi ns < f_ on c (a h" ef in s,a cs _o e=c es tk n
re d - bc n et pt =m / re d" c es t kn ac s_ oe )
> fi ns
re d
24. GET FRIEND GROUP LIST
f in go p < f _ on c( pt = m/ re di t" a cs _ oe =c es tk n
r ed r us - bc ne t a h" ef in l ss, ce st kn ac s _o e)
f in go p. d < sp l (r ed ru s d t,f nt o()xi)
r ed r us i
- a py fi n go p$ aa u c inx $d
f in go p. ae < sp l (r ed ru s d t,f nt o()xn m)
r ed r us nm - a py fi n go p$ aa u c inx $a e
25. FACEBOOK ELEMENT EXTRACTOR
# Gt Fi ns If r ai nF o F
e r ed n om to rm B
m < f_ on c( a h" e, ac s _o e= ce st k n o t osls (f ed ""d nm ,o
e - b cn et pt =m " c es tk na c s_ oe , pi n=it " il s=i, a el c
m nm < m$ ae
y ae - e nm
f in s< m $r ed
r ed - e fi n s
# Et at Fc bo I s
xr c a eo k D
f in si < sp l (r ed $a a fn to ( )x i)
r ed . d - a py fi n sd t , u ci nx $ d
# Et at F Mt I fr ai n
xr c B ea n om t o
f in sn m < u l s( ap yf i ns dt ,f nt o () i ov xn m , o' T 8, u= " )
r ed . ae - ni ts p l( re d$ aa uc in x
c n( $a e t= UF 's b " ) )
f in sg ne < s pl (r ed $ aa fn t o( )u ls ( fi . u l x gn e ) " o e e
r ed . ed r - a py f in sd t, u ci nx ni ti (s nl ( $e dr ) nn " l
f in sl ct o. d < u l s( ap yf in s dt,f nt o () xl ct o$ d )
r ed . oa in i - ni ts p l( re d$ aa uc in x $o a in i)
f in sl ct o. a e< u ls (a py fi n sd t , fn t o( ){ f( s n l ( $ oa in
r ed . oa in nm - n it s pl (r ed $a a u ci nx i i. ulxl c to$
f in sh mt w. a e< u ls (a py fi n sd t , fn t o( ){ f( s n l ( $ oe on
r ed . oe on nm - n it s pl (r ed $a a u ci nx i i. ulxh m tw$
26. GET FRIENDSHIP MATRIX
f in si s< f nt o( {
r ed h p - u c in )
pi t" ee ai g fi ns i mt i"
rn ( Gn rt n re d hp a rx)
N< l nt (r ed .d
- e gh fi n si )
fi ns i. ar x < m t i(,, )
re d hp mt i - ar x0N N
fr ( i 1N {
o i n :)
p it ps ei f in sn m[ ] )
r n (a t( ,r ed . ae i)
t p< f cb o( pt = at (m /u ul r ed " fi nsi [ ] sp"" , ac s _o e
m - a e o k a h p s e " e m t a f i n s , r e d . d i , e =/ )
c es tk
m ta fi ns < sp l (m $a a fn to () xi)
u u lr ed - a py tp d t, uc i nx $d
f in si .a r xi fi ns i %n m ta fi n s < 1
r e dh pm ti [, r ed .d i % u u lr ed ] }
#C et c ne to sw t m fi ns
r a e o nc i n ih y r ed
fi ns cn < c1N
re d _o - ( :)
fi ns cn ]< 1
re d _o [ #A dt i vc o a a c lm t te fi n si m ti
d hs et r s
o un o h r ed hp a rx
fi ns i. ar x < c i df in si .a r xf in sc n
re d hp mt i - bn (r e dh pm ti ,r e d_ o)
#A pn m fi n si w t m s l
p e d y r ed hp i h ye f
fi ns i. ar x < r i df in si .a r xa pn (r e d_ o, )
re d hp mt i - bn (r e dh pm ti ,p e df in sc n 0 )
rw ae (r ed h pm ti )< a pn (r e d. aemn m )
on m sf in si .a r x - pe df in sn m,y ae
cl ae (r ed h pm ti )< a pn (r e d. aemn m )
on m sf in si .a r x - pe df in sn m,y ae
rt r (r ed hpmt i )
eu n fi ns i.a rx
}
27. FRIEND GRAPH
f in ga h< f nt o( r ed hpmt i ) {
r ed r p - u c in fi ns i.a rx
f i n s i . r p < g a h a j c n y f i n s i . a r x m d = (u d r c e " , w i h e =
re d hp ga h - r p.d ae c ( re d hp mt i, o ec"n i et d) e g tdN
Vf in si .r p )g ne < a pn (r ed .e d r m s l$ ed r
(r e dh pg ah $e d r - p ed fi n sg ne , ye fg ne )
V f i n s i . r p ) l c t o < a p n ( r e d . o a i nn m , m s l $ o a i n n m )
(r e dh pg ah $o a in - pe df i ns lc to . ae y ef lc t o$ ae
V f i n s i . r p ) h m t w < a p n ( r e d . o e o nn m , m s l $ o e o n n m )
(r e dh pg ah $o e on - pe df i ns hm tw . ae y ef hm t w$ ae
Vf in si .r p )L bl < Vf in si . rp )n m
(r e dh pg ah $a e - ( re dh pg ah $ ae
rt r ( re dh p ga h
eu n fi ns i. rp )
}
28. DRAW FRIENDSHIP GRAPH
f mt i < f in s is )
_ ar x - re dh p(
f ga h< f in ga hf m ti)
_ rp - r ed r p( _a rx
w ie ga hf ga h "r e d. rp m" fr a =g ah l )
r t. r p ( _r p, f in sg a hl ,o mt "r p m"
32. MODULARITY
Measure of the structure of networks or graphs. It was
designed to measure the strength of division of a network into
modules
Networks with high modularity have dense connections
between the nodes within modules but sparse connections
between nodes in different modules
34. GET LIKES COUNT OF POSTS
r qi ep y)
e ur ( lr
p ss < f_ on c( ah " ep ss ,a cs _ oe =c es t kn ot o sl s( fe d "" i
o t - bc ne t pt =m /o t " ce st kn a cs _o e, p in =i t "i ls =l
p s. ie < sp l (o t$ aa f nt o( ) xl ks
o tl k s - a py ps s dt , uc in x $i e )
p s. ie .a a< s pl ( ot lk s fn to () x dt )
o tl k sd t - ap yp s. i e, uc i nx $ aa
l =l s (
i
it )
f r( i 1l nt ( ot lk sd t ){
o i n : eg hp s. i e. aa )
fr ( i 1(e g hp s. ie . aa [])1)
o j n :l nt (o t lk sd t [ i]- ){
l < a p n ( i p s . i e . a a [ ] [ j ]n m )
i - p ed l, o tl ks d t[ i] []$a e
}
}
d =d. al ri dd t. r m, l)
f
oc l( bn . aa fa e i
c la e( f < c " ae )
o nm s d) - (n m"
d py d, .n m) s ma i e N m us =l nt (a e )
d l( f ( ae , um rz , uS b
e g hn m)
36. YOUR TURN TO DO SOME ANALYSIS
Find Popular Checkins Among Your Friends
Common Interest Between Your Friends
Female/Male Distribution of Your Know Friends
Most Pupular Photos Being Liked
Asociation Rule of Friends (Gossip)