This document discusses computer programming for lawyers. It begins with an agenda that includes modern web architecture, how to learn programming, key concepts, and streamlining legal practice with programming. It then covers topics like APIs, frontend and backend languages, frameworks, databases, and provides an example architecture. It discusses effective ways to learn programming including making mistakes, using Google, and joining communities. Key concepts covered include regular expressions, data types, functions, conditions, and loops. It also provides an example of how a lawyer who codes may spend their day, integrating tools like Python, the command line, and Zapier to streamline copyright infringement tasks. It concludes with additional learning resources.
by Dario Rivera, Solutions Architect, AWS
Artificial Intelligence (AI) services on the AWS cloud bring deep learning (DL) technologies like natural language understanding (NLU), automatic speech recognition (ASR), image recognition and computer vision (CV), text-to-speech (TTS), and machine learning (ML) within reach of every developer. In this session, you will be introduced to several new AI services: Amazon Lex, to build sophisticated text and voice chatbots; Amazon Rekognition, for deep learning-based image recognition; and Amazon Polly, for turning text into lifelike speech. The opportunities to apply one or more of these DL services are nearly boundless and this session will provide a number of examples and use cases to help you get started.
Mikkel Heisterberg - An introduction to developing for the Activity StreamLetsConnect
The future of business is social and the activity stream is the way events and messages are communicated in the social business. In this session you’ll learn all there is to know about the activity stream including exactly what it is and how to interact with it using your favorite development environment whether that be JavaScript, XPages, Java or even the plain vanilla HTTP based REST API. This session is for you if you want to start working the Activity Stream.
This document discusses the three types of internet hosting: domain hosting, email hosting, and web hosting. It explains that domain hosting involves directing web and email traffic to the proper locations. Email hosting provides post office services like POP accounts and auto-responders. Web hosting stores website files and provides tools for analyzing site traffic. All three types can be provided by different vendors and are important for online marketing.
The document discusses various aspects of using the internet, including:
1. Common ways to connect to the internet include dial-up, wireless, and cable connections which require a computer, phone line, modem, and internet service provider.
2. The world wide web allows easy access to global information through web browsers which can locate web pages using their URLs.
3. Search engines help locate information and websites when their exact URLs are unknown.
Overview of Artificial Intelligence at AWS - DevDay Los Angeles 2017Amazon Web Services
The document provides an overview of artificial intelligence services available on Amazon Web Services (AWS), including Amazon Lex, Amazon Polly, Amazon Rekognition, and Apache MXNet. It discusses the capabilities and use cases of each service, such as converting text to speech (Amazon Polly), computer vision capabilities like object detection (Amazon Rekognition), and building conversational chatbots (Amazon Lex). It also covers deep learning frameworks like Apache MXNet and resources for developing AI solutions on AWS.
The document discusses various aspects of computers, the internet, and connecting to the internet. It defines key terms like intranet, HTML, XML, source code, and explains what is needed to access the internet and publish a website. Benefits of the internet mentioned include email, search engines, and access to vast information online.
Make your solution see, hear and talk, leveraging artificial intelligence services based on deep learning and neural networks. We will discover three new AI tools from AWS - Lex, Polly and Rekognition; integrated with AWS IoT and a physical world device for human interaction and environmental awareness.
Initial Usage Analysis of DBpedia's Triple Pattern FragmentsRuben Verborgh
The document summarizes an analysis of the usage of DBpedia's Triple Pattern Fragments interface between November 2014 and February 2015. Over 4 million requests were made to the interface with 99.9994% uptime. The top clients were the TPF client library, crawlers and Chrome browser. Most requests came from Europe, US and China. The analysis found the interface provided highly available querying of DBpedia's data but more work is needed to understand specific queries and build applications for end users.
by Dario Rivera, Solutions Architect, AWS
Artificial Intelligence (AI) services on the AWS cloud bring deep learning (DL) technologies like natural language understanding (NLU), automatic speech recognition (ASR), image recognition and computer vision (CV), text-to-speech (TTS), and machine learning (ML) within reach of every developer. In this session, you will be introduced to several new AI services: Amazon Lex, to build sophisticated text and voice chatbots; Amazon Rekognition, for deep learning-based image recognition; and Amazon Polly, for turning text into lifelike speech. The opportunities to apply one or more of these DL services are nearly boundless and this session will provide a number of examples and use cases to help you get started.
Mikkel Heisterberg - An introduction to developing for the Activity StreamLetsConnect
The future of business is social and the activity stream is the way events and messages are communicated in the social business. In this session you’ll learn all there is to know about the activity stream including exactly what it is and how to interact with it using your favorite development environment whether that be JavaScript, XPages, Java or even the plain vanilla HTTP based REST API. This session is for you if you want to start working the Activity Stream.
This document discusses the three types of internet hosting: domain hosting, email hosting, and web hosting. It explains that domain hosting involves directing web and email traffic to the proper locations. Email hosting provides post office services like POP accounts and auto-responders. Web hosting stores website files and provides tools for analyzing site traffic. All three types can be provided by different vendors and are important for online marketing.
The document discusses various aspects of using the internet, including:
1. Common ways to connect to the internet include dial-up, wireless, and cable connections which require a computer, phone line, modem, and internet service provider.
2. The world wide web allows easy access to global information through web browsers which can locate web pages using their URLs.
3. Search engines help locate information and websites when their exact URLs are unknown.
Overview of Artificial Intelligence at AWS - DevDay Los Angeles 2017Amazon Web Services
The document provides an overview of artificial intelligence services available on Amazon Web Services (AWS), including Amazon Lex, Amazon Polly, Amazon Rekognition, and Apache MXNet. It discusses the capabilities and use cases of each service, such as converting text to speech (Amazon Polly), computer vision capabilities like object detection (Amazon Rekognition), and building conversational chatbots (Amazon Lex). It also covers deep learning frameworks like Apache MXNet and resources for developing AI solutions on AWS.
The document discusses various aspects of computers, the internet, and connecting to the internet. It defines key terms like intranet, HTML, XML, source code, and explains what is needed to access the internet and publish a website. Benefits of the internet mentioned include email, search engines, and access to vast information online.
Make your solution see, hear and talk, leveraging artificial intelligence services based on deep learning and neural networks. We will discover three new AI tools from AWS - Lex, Polly and Rekognition; integrated with AWS IoT and a physical world device for human interaction and environmental awareness.
Initial Usage Analysis of DBpedia's Triple Pattern FragmentsRuben Verborgh
The document summarizes an analysis of the usage of DBpedia's Triple Pattern Fragments interface between November 2014 and February 2015. Over 4 million requests were made to the interface with 99.9994% uptime. The top clients were the TPF client library, crawlers and Chrome browser. Most requests came from Europe, US and China. The analysis found the interface provided highly available querying of DBpedia's data but more work is needed to understand specific queries and build applications for end users.
Are you having trouble getting your emails through? Are your emails being rejected or marked as spam? Are your email sending ip addresses getting blacklisted? This presentation is a war story on how we failed with email and how we recovered and improved our email sender reputation. Please share or tweet or whatever if you find this useful!
The ePub3 Revolution: How mobile interactive ebooks will change everything! This introduction to ePub3 and experiential learning analytics gives designers insight to the changing landscape of publishing. We compare and contrast ePub formats dating back to ePub2. It prompted rich discussion about the tools, skill-sets, and design mindset needed to transition from traditional print and web design to highly interactive ePub3 development and production. RepubIT and The Adobe User Group plan to promote this as a series starting in April 2015 - stay tuned.
An Overview of AI at AWS: Amazon Lex, Amazon Polly, Amazon Rekognition, Apach...Amazon Web Services
by Keith Steward, Solutions Architect, AWS
AI services on the AWS cloud bring deep learning technologies like natural language understanding, automatic speech recognition, computer vision, text-to-speech, and machine learning within reach of every developer. For more in-depth deep learning applications, the Deep Learning AMIs let you create managed, auto-scaling clusters of GPUs for large scale training, or run inference on trained models with compute-optimized or general-purpose CPU instances. Whether you’re just getting started with AI or you’re a deep learning expert, this session will provide a meaningful overview of how to improve scale and efficiency with the AWS Cloud. Level 200
API Basics discusses software defined networking (SDN) and REST APIs. SDN separates the control plane and data plane in network devices to allow remote configuration. REST APIs use HTTP to enable communication between applications through requests and responses that include resources, parameters, headers and payloads in JSON or XML format. The document provides examples of REST API components like endpoints, verbs, parameters and data formats to help understand how to work with REST APIs.
This document provides an overview of designing beautiful REST+JSON APIs. It discusses REST fundamentals like resources, methods, media types, and hypermedia as the engine of application state (HATEOAS). It covers best practices for API design like base URLs, versioning, resource formats, linking, pagination, and more. The goal is to help API providers design APIs that are easy for developers to consume while also being scalable and secure.
The Internet is a global network of interconnected computer networks that use common communication protocols. It originated as a US government-funded program called ARPANET, which later merged with other networks and became publicly accessible. The Internet allows for various uses including communication, software sharing, information posting, chatting, e-commerce, and more. It consists of private, public, academic, business, and government networks linked by a broad array of electronic and optical networking technologies.
This document discusses schema design concepts for document databases like MongoDB. It covers key concepts like embedding related data for optimal performance and flexible schemas. The document recommends embedding over referencing in most cases, especially for one-to-one and one-to-many relationships where related objects are often viewed together. Many-to-many relationships are more flexible, with embedding recommended for some use cases and referencing for others depending on the needs of the application. The goal is to design schemas that match how the application will use the data.
Chapter 12 A Manager’s Guide to the Internetand TelecommuniEstelaJeffery653
Chapter 12: A Manager’s Guide to the Internet
and Telecommunications
12.1 Introduction
12.2 Internet 101: Understanding How the Internet Works
12.3 Getting Where You’re Going
12.4 Last Mile: Faster Speed, Broader Access
363
12.1 Introduction
There’s all sorts of hidden magic happening whenever you connect to the Internet. But what really makes it
possible for you to reach servers halfway around the world in just a fraction of a second? Knowing this is not only
flat-out fascinating stuff; it’s also critically important for today’s manager to have at least a working knowledge
of how the Internet functions.
That’s because the Internet is a platform of possibilities and a business enabler. Understanding how the Internet
and networking works can help you brainstorm new products and services and understand roadblocks that might
limit turning your ideas into reality. Marketing professionals who know how the Internet reaches consumers have
a better understanding of how technologies can be used to find and target customers. Finance firms that rely on
trading speed to move billions in the blink of an eye need to master Internet infrastructure to avoid being swept
aside by more nimble market movers. And knowing how the Internet works helps all managers understand where
their firms are vulnerable. In most industries today, if your network goes down then you might as well shut your
doors and go home; it’s nearly impossible to get anything done if you can’t get online. Managers who know
the Net are prepared to take the appropriate steps to secure their firms and keep their organization constantly
connected.
364
12.2 Internet 101: Understanding How the Internet Works
Learning Objectives
After studying this section you should be able to do the following:
1. Describe how the technologies of the Internet combine to answer these questions: What are you
looking for? Where is it? And how do we get there?
2. Interpret a URL, understand what hosts and domains are, describe how domain registration works,
describe cybersquatting, and give examples of conditions that constitute a valid and invalid domain-
related trademark dispute.
3. Describe certain aspects of the Internet infrastructure that are fault-tolerant and support load
balancing.
4. Discuss the role of hosts, domains, IP addresses, and the DNS in making the Internet work.
The Internet is a network of networks—millions of them, actually. If the network at your university, your
employer, or in your home has Internet access, it connects to an Internet service provider (ISP). Many (but not all)
ISPs are big telecommunications companies like Verizon, Comcast, and AT&T. These providers connect to one
another, exchanging traffic, and ensuring your messages can get to any other computer that’s online and willing
to communicate with you.
The Internet has no center and no one owns it. That’s a good thing. The Internet was designed to be redundant
and fault-tolerant—meaning that ...
The International Journal of Web Services Research (IJWSR) publishes research on web services technologies. Web services allow applications to communicate over the internet using open standards like XML, SOAP, WSDL and UDDI. The journal covers topics related to the development, deployment and use of web services, including issues of security, reliability and performance. It aims to further progress in the field by reporting new research and developments in web services technologies. Papers are subject to a peer review process to ensure high quality academic standards. The journal provides a forum for researchers and practitioners to share new ideas and knowledge about web services.
This document provides an overview of using the internet and the world wide web. It describes the difference between the internet and the world wide web, with the internet being the global network and the world wide web being the system used to access the internet using browsers. It identifies common web browsers like Internet Explorer, Firefox and Chrome. It then details the various components of the Internet Explorer browser, such as the address bar, back and forward buttons, and tabs. It also covers topics like hyperlinks, URLs, search engines, and safety tips for using the internet.
The document provides an overview of how to design a system to scale from serving a single user to millions of users. It begins with a single server setup and discusses moving to multiple servers, using a database, scaling vertically by adding resources to servers versus horizontally by adding more servers, and using a load balancer to distribute traffic across servers for redundancy and high availability. It provides examples of scaling a system architecture in a step-by-step manner.
The document provides an overview of how to design a system to scale from serving a single user to millions of users. It begins with a single server setup and discusses moving to multiple servers, using a database, scaling vertically by adding resources to servers versus horizontally by adding more servers, and using a load balancer to distribute traffic across servers for redundancy and high availability. It provides examples of scaling a system architecture in a step-by-step manner.
Lakshmana Rao Yerra is a software developer with over 8 years of experience developing automation processes using Robotic Process Automation (RPA), specifically with the Automation Anywhere tool. He has expertise in automating web applications, desktop applications, and tasks involving Excel, PDFs, images, and databases. Some of his projects include automating return to vendor processes, job aggregation, insurance claims processing, and portfolio management. He is proficient in various RPA commands and programming languages including VBScript, JavaScript, and VBA.
Jalpesh Vadgama is a co-founder of FutureStack Solution and Microsoft MVP who has over 14 years of experience in web development, cloud solutions, and enterprise applications. He frequently writes about .NET technologies and Azure Active Directory on his blog. Azure Active Directory is a cloud-based identity and access management service that provides directory services, identity governance, application access management, and tools for developers. It can sync with on-premises directories, manage user access from any location, and provide single sign-on for thousands of cloud applications.
The document defines key Internet and web technology terms like Internet, IP, TCP, UDP, domain names, URLs, web browsers, intranets and extranets. It provides details on the basic protocols like IP, TCP and UDP that underlie internet communication and data transmission. It also explains common internet concepts such as domains, top-level domains, hosts, ports and addresses that are fundamental to understanding how computers connect and communicate over the internet.
Clarisoft Software Development Process (Lunch & Learn Presentation)Robert Haines
For non-technical business owners or entrepreneurs, understanding the software development process can be challenging. If not followed properly, cost overruns and project delays can literally cripple your business.
The key is to find a software development partner that makes this process easy and straightforward, going step by step with the business owner to create all the necessary wireframes and specifications.
At Clarisoft, we have been very successful making this complex process simple and valuable for business owners. If you are building a software product and you need some help and expertise, visit us at www.clarisoft.com.
O'Reilly SACon San Jose, CA - 2019 - API design tutorialTom Hofte
This document discusses mapping a domain model to a RESTful web API. It begins with an introduction and agenda for the presentation. It then covers discovering the API domain by identifying domain entities, operations, and relationships. This involves analyzing use cases, events, and domain expert input. The document provides an example of mapping verbs and nouns to entities and operations. It emphasizes grouping related concepts into bounded contexts. The goal is to learn how to map the domain model to REST resources, representations, and operations to define the API interface.
The Guide to becoming a full stack developer in 2018Amit Ashwini
This document provides a guide for becoming a full-stack developer in 2018. It outlines 8 key skills needed: 1) HTML/CSS, 2) JavaScript, 3) a back-end language like Node.js, Ruby, Python, or PHP, 4) databases and web storage, 5) HTTP and REST, 6) web application architecture, 7) Git, and 8) basic algorithms and data structures. For each skill, it provides details on important concepts and tools to learn. The goal is to learn both front-end skills like HTML/CSS and back-end skills like databases, APIs, and server-side programming in order to build complete web applications.
Business Intelligence Solution Using Search Engineankur881120
The document describes a business intelligence solution that uses a search engine to index and search web pages. It discusses using crawlers to index web pages and store them in a repository. An indexer then generates an inverted index from the repository to support keyword searches. The system architecture includes the repository, indexer, and search functionality. It also describes the database structure used to store crawled URLs, the index, and search results. The project aims to build a basic search engine to demonstrate the proposed business intelligence solution.
Are you having trouble getting your emails through? Are your emails being rejected or marked as spam? Are your email sending ip addresses getting blacklisted? This presentation is a war story on how we failed with email and how we recovered and improved our email sender reputation. Please share or tweet or whatever if you find this useful!
The ePub3 Revolution: How mobile interactive ebooks will change everything! This introduction to ePub3 and experiential learning analytics gives designers insight to the changing landscape of publishing. We compare and contrast ePub formats dating back to ePub2. It prompted rich discussion about the tools, skill-sets, and design mindset needed to transition from traditional print and web design to highly interactive ePub3 development and production. RepubIT and The Adobe User Group plan to promote this as a series starting in April 2015 - stay tuned.
An Overview of AI at AWS: Amazon Lex, Amazon Polly, Amazon Rekognition, Apach...Amazon Web Services
by Keith Steward, Solutions Architect, AWS
AI services on the AWS cloud bring deep learning technologies like natural language understanding, automatic speech recognition, computer vision, text-to-speech, and machine learning within reach of every developer. For more in-depth deep learning applications, the Deep Learning AMIs let you create managed, auto-scaling clusters of GPUs for large scale training, or run inference on trained models with compute-optimized or general-purpose CPU instances. Whether you’re just getting started with AI or you’re a deep learning expert, this session will provide a meaningful overview of how to improve scale and efficiency with the AWS Cloud. Level 200
API Basics discusses software defined networking (SDN) and REST APIs. SDN separates the control plane and data plane in network devices to allow remote configuration. REST APIs use HTTP to enable communication between applications through requests and responses that include resources, parameters, headers and payloads in JSON or XML format. The document provides examples of REST API components like endpoints, verbs, parameters and data formats to help understand how to work with REST APIs.
This document provides an overview of designing beautiful REST+JSON APIs. It discusses REST fundamentals like resources, methods, media types, and hypermedia as the engine of application state (HATEOAS). It covers best practices for API design like base URLs, versioning, resource formats, linking, pagination, and more. The goal is to help API providers design APIs that are easy for developers to consume while also being scalable and secure.
The Internet is a global network of interconnected computer networks that use common communication protocols. It originated as a US government-funded program called ARPANET, which later merged with other networks and became publicly accessible. The Internet allows for various uses including communication, software sharing, information posting, chatting, e-commerce, and more. It consists of private, public, academic, business, and government networks linked by a broad array of electronic and optical networking technologies.
This document discusses schema design concepts for document databases like MongoDB. It covers key concepts like embedding related data for optimal performance and flexible schemas. The document recommends embedding over referencing in most cases, especially for one-to-one and one-to-many relationships where related objects are often viewed together. Many-to-many relationships are more flexible, with embedding recommended for some use cases and referencing for others depending on the needs of the application. The goal is to design schemas that match how the application will use the data.
Chapter 12 A Manager’s Guide to the Internetand TelecommuniEstelaJeffery653
Chapter 12: A Manager’s Guide to the Internet
and Telecommunications
12.1 Introduction
12.2 Internet 101: Understanding How the Internet Works
12.3 Getting Where You’re Going
12.4 Last Mile: Faster Speed, Broader Access
363
12.1 Introduction
There’s all sorts of hidden magic happening whenever you connect to the Internet. But what really makes it
possible for you to reach servers halfway around the world in just a fraction of a second? Knowing this is not only
flat-out fascinating stuff; it’s also critically important for today’s manager to have at least a working knowledge
of how the Internet functions.
That’s because the Internet is a platform of possibilities and a business enabler. Understanding how the Internet
and networking works can help you brainstorm new products and services and understand roadblocks that might
limit turning your ideas into reality. Marketing professionals who know how the Internet reaches consumers have
a better understanding of how technologies can be used to find and target customers. Finance firms that rely on
trading speed to move billions in the blink of an eye need to master Internet infrastructure to avoid being swept
aside by more nimble market movers. And knowing how the Internet works helps all managers understand where
their firms are vulnerable. In most industries today, if your network goes down then you might as well shut your
doors and go home; it’s nearly impossible to get anything done if you can’t get online. Managers who know
the Net are prepared to take the appropriate steps to secure their firms and keep their organization constantly
connected.
364
12.2 Internet 101: Understanding How the Internet Works
Learning Objectives
After studying this section you should be able to do the following:
1. Describe how the technologies of the Internet combine to answer these questions: What are you
looking for? Where is it? And how do we get there?
2. Interpret a URL, understand what hosts and domains are, describe how domain registration works,
describe cybersquatting, and give examples of conditions that constitute a valid and invalid domain-
related trademark dispute.
3. Describe certain aspects of the Internet infrastructure that are fault-tolerant and support load
balancing.
4. Discuss the role of hosts, domains, IP addresses, and the DNS in making the Internet work.
The Internet is a network of networks—millions of them, actually. If the network at your university, your
employer, or in your home has Internet access, it connects to an Internet service provider (ISP). Many (but not all)
ISPs are big telecommunications companies like Verizon, Comcast, and AT&T. These providers connect to one
another, exchanging traffic, and ensuring your messages can get to any other computer that’s online and willing
to communicate with you.
The Internet has no center and no one owns it. That’s a good thing. The Internet was designed to be redundant
and fault-tolerant—meaning that ...
The International Journal of Web Services Research (IJWSR) publishes research on web services technologies. Web services allow applications to communicate over the internet using open standards like XML, SOAP, WSDL and UDDI. The journal covers topics related to the development, deployment and use of web services, including issues of security, reliability and performance. It aims to further progress in the field by reporting new research and developments in web services technologies. Papers are subject to a peer review process to ensure high quality academic standards. The journal provides a forum for researchers and practitioners to share new ideas and knowledge about web services.
This document provides an overview of using the internet and the world wide web. It describes the difference between the internet and the world wide web, with the internet being the global network and the world wide web being the system used to access the internet using browsers. It identifies common web browsers like Internet Explorer, Firefox and Chrome. It then details the various components of the Internet Explorer browser, such as the address bar, back and forward buttons, and tabs. It also covers topics like hyperlinks, URLs, search engines, and safety tips for using the internet.
The document provides an overview of how to design a system to scale from serving a single user to millions of users. It begins with a single server setup and discusses moving to multiple servers, using a database, scaling vertically by adding resources to servers versus horizontally by adding more servers, and using a load balancer to distribute traffic across servers for redundancy and high availability. It provides examples of scaling a system architecture in a step-by-step manner.
The document provides an overview of how to design a system to scale from serving a single user to millions of users. It begins with a single server setup and discusses moving to multiple servers, using a database, scaling vertically by adding resources to servers versus horizontally by adding more servers, and using a load balancer to distribute traffic across servers for redundancy and high availability. It provides examples of scaling a system architecture in a step-by-step manner.
Lakshmana Rao Yerra is a software developer with over 8 years of experience developing automation processes using Robotic Process Automation (RPA), specifically with the Automation Anywhere tool. He has expertise in automating web applications, desktop applications, and tasks involving Excel, PDFs, images, and databases. Some of his projects include automating return to vendor processes, job aggregation, insurance claims processing, and portfolio management. He is proficient in various RPA commands and programming languages including VBScript, JavaScript, and VBA.
Jalpesh Vadgama is a co-founder of FutureStack Solution and Microsoft MVP who has over 14 years of experience in web development, cloud solutions, and enterprise applications. He frequently writes about .NET technologies and Azure Active Directory on his blog. Azure Active Directory is a cloud-based identity and access management service that provides directory services, identity governance, application access management, and tools for developers. It can sync with on-premises directories, manage user access from any location, and provide single sign-on for thousands of cloud applications.
The document defines key Internet and web technology terms like Internet, IP, TCP, UDP, domain names, URLs, web browsers, intranets and extranets. It provides details on the basic protocols like IP, TCP and UDP that underlie internet communication and data transmission. It also explains common internet concepts such as domains, top-level domains, hosts, ports and addresses that are fundamental to understanding how computers connect and communicate over the internet.
Clarisoft Software Development Process (Lunch & Learn Presentation)Robert Haines
For non-technical business owners or entrepreneurs, understanding the software development process can be challenging. If not followed properly, cost overruns and project delays can literally cripple your business.
The key is to find a software development partner that makes this process easy and straightforward, going step by step with the business owner to create all the necessary wireframes and specifications.
At Clarisoft, we have been very successful making this complex process simple and valuable for business owners. If you are building a software product and you need some help and expertise, visit us at www.clarisoft.com.
O'Reilly SACon San Jose, CA - 2019 - API design tutorialTom Hofte
This document discusses mapping a domain model to a RESTful web API. It begins with an introduction and agenda for the presentation. It then covers discovering the API domain by identifying domain entities, operations, and relationships. This involves analyzing use cases, events, and domain expert input. The document provides an example of mapping verbs and nouns to entities and operations. It emphasizes grouping related concepts into bounded contexts. The goal is to learn how to map the domain model to REST resources, representations, and operations to define the API interface.
The Guide to becoming a full stack developer in 2018Amit Ashwini
This document provides a guide for becoming a full-stack developer in 2018. It outlines 8 key skills needed: 1) HTML/CSS, 2) JavaScript, 3) a back-end language like Node.js, Ruby, Python, or PHP, 4) databases and web storage, 5) HTTP and REST, 6) web application architecture, 7) Git, and 8) basic algorithms and data structures. For each skill, it provides details on important concepts and tools to learn. The goal is to learn both front-end skills like HTML/CSS and back-end skills like databases, APIs, and server-side programming in order to build complete web applications.
Business Intelligence Solution Using Search Engineankur881120
The document describes a business intelligence solution that uses a search engine to index and search web pages. It discusses using crawlers to index web pages and store them in a repository. An indexer then generates an inverted index from the repository to support keyword searches. The system architecture includes the repository, indexer, and search functionality. It also describes the database structure used to store crawled URLs, the index, and search results. The project aims to build a basic search engine to demonstrate the proposed business intelligence solution.
Virtual & Remote Practice: Reach from the Beach & Manage from the MountainsGarrett P. Laborde
Virtual & Remote Practice: Reach from the Beach & Manage from the Mountains demonstrates key concepts of a “Virtual” and “Remote” law practice including an overview of many of the leading technologies currently enabling lawyers to remain virtually and remotely connected to clients, their firms and the vital information and knowledge of each, irrespective of his/her physical location; explores a few of the practice models employing these tools.
Introduction to Backend Development (1).pptxOsuGodbless
Backend development is the behind-the-scenes work that powers websites and applications. It involves storing and managing data, implementing business logic, ensuring security and reliability, and enabling scalability. While the frontend handles what users see, the backend orchestrates their experience through content delivery, response to actions, and personalized experiences based on user data. Programming languages are crucial tools for backend developers, underpinning functionality through code. Popular languages include Python, Java, and Node.js. Key backend processes include user registration, which involves receiving and validating data, database interaction, and response to the user.
OpenLink Virtuoso - Management & Decision Makers OverviewKingsley Uyi Idehen
OpenLink Virtuoso is a multi-model database developed by OpenLink Software that allows for data integration across various data sources. It provides data virtualization capabilities through its middleware layer and pluggable linked data cartridges. Virtuoso has powerful performance and scalability and is used as the core platform behind large linked open data projects like DBpedia and the Linked Open Data cloud. It supports a variety of standards that enable loosely coupled integration with various tools and applications.
The document discusses various web technologies and concepts including websites, web applications, intranets, extranets, the internet, URLs, IP addresses, domain name servers, internet service providers, protocols like TCP/IP and HTTP, and email systems. Key topics covered include the client-server model, static and dynamic web pages, advantages of using websites for businesses, and the functions of user agents and message transfer agents in email systems.
2. AGENDA
Modern web architecture
How to learn to program
Key programming concepts
Streamlining your practice
Resources to learn programming
3. Nehal Madhani
Founder & CEO
Alt Legal
@nehalm
Nehal Madhani is the founder and CEO of Alt Legal,
whose software makes it easy for law firms to
create and manage IP filings. Before starting Alt
Legal, Nehal practiced as an attorney at Kirkland &
Ellis, LLP. He is a self-taught Python/Django
programmer.
Nehal has a J.D. from the University of Pennsylvania
Law School, a Certificate in Business and Public
Policy from the Wharton School of Business, and a
B.A. from Northwestern.
5. HOW DOES THE INTERNET WORK?
1. Enter a website address (URL).
2. The DNS service translates this into a
specific IP address.
3. The web server at the IP address
corresponding to the domain name you
requested is then contacted over the
internet.
4. The server comes back with data, and your
web browser translates the data to content
like text, images, animations, etc.
6. HOW DO MODERN WEBSITES AND MOBILE APPS WORK?
Request data
Receive data
7. UNDERSTANDING MODERN WEB ARCHITECTURE
• Web servers are just computers. Your computer can be a web server too,
but it’s best practice to use a dedicated computer (usually one with
hardware specially selected for that purpose) in a datacenter managed by
professional administrators.
• TCP/IP, DNS, and HTTP are all plain text that is sent as messages delivered
over existing networks such as cable lines, phone lines, or specially built
high capacity phone lines or fiber optic lines.
• Databases are also just a program run on a computer (again, perhaps on a
dedicated machine with specialized hardware), but you can run one. You
probably will use your own small database as you learn to program.
8. UNDERSTANDING MODERN WEB ARCHITECTURE
• You make a “request” when you click a link or type in an address into your
web browser.
• Your request is translated into the location of a specific file on a specific
computer. This file is broken into small chunks called packets and sent to
your device.
• Your device assembles the chunks and passes them to your browser. The
file you have been sent (we'll say an HTML file) is a small program meant
for your browser. That program contains instructions on how to present
and style a web document.
10. UNDERSTANDING MODERN WEB ARCHITECTURE
• Your browser is just receiving a file full of plain text instructions, which is
why you can view the source.
• Contrast this with programs that you install on your computer like Word.
This program is compiled directly into machine code, so if you open it, you
can't read it. It is just a series of numbers that correspond to specific
instructions for your CPU.
• On the web, almost everything is transparent, and it should be this way
because you don’t know who is sending your computer instructions.
• This creates a secure, transparent environment (in theory) : the browser;
and a public database of who is who: DNS; and then we all let each other
run programs that each other wrote on our computers.
11. WHAT IS AN API?
• An API is an Application Programming Interface.
• An interface is a boundary between two things. In this case, the boundary
between a person and a service. A user interface on the web is a webpage.
Twitter has a user interface where you can read tweets, send tweets,
follow, DM, favorite, etc.
• An API is a programmatic interface. Twitter also has an API that lets you
tweet, follow, DM, etc. APIs are how two programs integrate, or even how
a mobile app communicates back to the servers.
• Amazon is famous for using APIs everywhere. The warehouse is an API to
let any authorized user (within the company or among partners) check
stock, reorder, place pull or ship requests, etc.
12. WHAT IS AN API?
1. An API is an Application Programming Interface.
2. An interface is boundary between two things. In this case, the boundary between a person
and a service. A user interface on the web is a webpage. Twitter has a user interface where
you can read tweets, send tweets, follow, DM, favorite, etc.
3. An API is a programmatic interface. Twitter also has an API that lets you tweet, follow, DM,
etc. APIs are how two programs integrate, or even how a mobile app communicates back
to the servers.
4. Amazon is famous for using APIs everywhere. The warehouse is an API to let any authorized
user (within the company or among partners) check stock, reorder, place pull or ship
requests, etc.
13. WHAT ARE APIs?
Source: An introduction to APIs, https://zapier.com/learn/apis/chapter-1-introduction-to-apis/
25. THE RIGHT WAY TO LEARN PROGRAMMING: BE PART OF THE COMMUNITY
• Join local communities like Meetup
• Contribute to open source projects on Github
• Contribute to discussions on Stack Overflow, LinkedIn, and Twitter
27. REGULAR EXPRESSIONS
• Regular expressions (regex) are a compact way to specify a pattern of
characters in text using specific rules.
• Using this language, you can set the rules for the set of potential strings
you want to match. This could include sentences, statutes, and email
addresses.
• For example, you can ask questions like “Does all statute cites follow a
particular pattern?”
• It can even be used to do advanced searches in Microsoft Word.
28. REGEX SYNTAX
• d: Matches any digit [0-9]
• d{3,5}: Matches 3, 4, or 5 digits
• d+: Matches any positive interger
• D: Matches any non-digit character (anything other than a digit)
• w: Matches any alphanumeric character (any digit, lowercase letter, or
uppercase letter)
• w+: Matches ny word
• W: Matches any non-alphanumeric character (anything other than a
digit, lowercase letter, uppercase letter)
• s: Matches space
• [Pp]ython: Matches “Python” or “python”
29. DATA TYPES
• Strings: A collection of characters like “This is a trademark”.
• Integers: A whole number like 1, 2, -2, and -1.
• Floats: A number with a decimal point like 0.1 and 1.1.
• Booleans: Variables whose value is expressed as True or False.
• Array: List of other data types like
Classes = [“Evidence”, “Property”, “Contracts”]
Values in arrays can be retrieved using Classes[0].
30. FUNCTIONS
Function is a group of code that has been given a name.
Example:
def update_case(x):
```Code that accesses government databases, queries a
```particular case, updates the case, and saves the information
return x
31. CONDITIONS (TESTS A COMPUTER CAN COMPLETE)
• Greater than: Is one value greater than another value (>)
• Lesser than: Is one value lesser than another value (<)
• Greater than or equal: Is one value greater or equal to another value (>=)
• Lesser than or equal: Is one value lesser or equal to another value (<=)
• Equal: Is one value equal to another value (==)
• Unequal: Is one value not equal to another value (!=)
32. CONDITIONS (PSEUDO CODE)
If a trademark application receives a new office action:
• Find the current status date (the date the office action was issued)
• Add a new entry in my calendar: “Respond to the office action.”
• Use the date the office action was issued and add six months as the
deadline to respond.
33. TRANSLATING INTO CODE USING CONDITIONS
If TM_APPLICATION_CURRENT_STATUS == “office action”:
STATUS_DATE = TM_APPLICATION_CURRENT_STATUS_DATE
CALENDAR_ENTRY_TITLE = “Respond to office action”
CALENDAR_ENTRY_DEADLINE = STATUS_DATE + 6m
34. LOOPS
Loops are used to repeat a piece of code some set number of times or while
a particular condition is true.
Example:
cases = ['124201', '125201', '178304']
for case in cases:
print "Updating " + case
update_case(case)
35. LOOPS
Another way to create loops:
index = 0
cases = [124201, 125201, 178304]
while index < len(cases):
print “Updating case number ” + cases[index]
update_case(cases[index])
index = index + 1
37. • Administrative work: Work that requires minimal interpretation like
calendaring and billing
• Repetitive work: Legal tasks that are repetitive in nature and ripe for
automation
• Legal work: Substantive legal tasks that require interpretation and are
not entirely repetitive
DIVIDING AND CONQUERING
38. A DAY IN THE LIFE OF A LAWYER WHO CODES
Meet Sarah. Sarah is an IP lawyer. She has a broad practice where she
helps clients protect their IP rights. Sarah prosecutes patents, trademarks,
and copyrights registrations on behalf of her clients.
39. A DAY IN THE LIFE OF A LAWYER WHO CODES
At 9AM, Sarah reads an email from a client whose photos are being made
available for download illegally. The infringing party has copies all the
photos all over its website and hasn't even bothered to change the names
of the files.
40. A DAY IN THE LIFE OF A LAWYER WHO CODES
Sarah’s client sent her a file with all of the filenames that he says are being
infringed. Sarah uses the command line to parse the text file of file names
and remove the file paths and saves it as a CSV file.
She then writes a small python program to spider the infringing website
and find the links and save them back to a new file.
41. A DAY IN THE LIFE OF A LAWYER WHO CODES
Next, Sarah looks up the ownership information of the infringing website
and finds out who is hosting the content. She just launches Terminal on her
Mac and just types in whois and the infringing party’s website.
Whois www.istealphotographs.com
Domain Name: ISTEALPHOTOGRAPHS.COM
Registrar: GODADDY.COM, LLC
Registry Registrant ID:
Registrant Name: Cosmo Kramer
Registrant Organization: Vandalay Industries
Registrant Street: 1500 First Street
Registrant City: New York
Registrant State/Province: New York
Registrant Postal Code: 10011
Registrant Country: United States
42. A DAY IN THE LIFE OF A LAWYER WHO CODES
Then, Sarah loads up her Word template for a cease and desist letter and a
DMCA takedown notice for the hosting company and emails them to the
respective parties with a particular subject.
Sarah uses Google Apps for her email and has created a rule that
automatically tag emails “DMCA Notices” if the email subject starts with
“Copyright Infringement.”
43. A DAY IN THE LIFE OF A LAWYER WHO CODES
Using Zapier, if a new email is tagged DMCA Notice, it automatically
creates (1) follow-up reminders in Clio (her practice management
software); (2) a new matter; and (3) a new billing entry.
45. RESOURCES
• Codecademy (use this to get familiar with syntax and HTML)
• Learn python the hard way
• Learn command line the hard way
• Regex Tutorial
• Harvard CS50 Course
• Stack Overflow (programming forum)
• Treehouse (paid service)
• Codeschool (paid service)
• Dash by General Assembly (HTML, CSS, Javascript Intro)