This document provides information about the Flickr API and how to use it. It includes:
- An overview of the Flickr API and what can be done with it, including searching for photos by a user ID.
- Examples of calling specific Flickr API methods like flickr.photos.search and flickr.photos.getInfo to search for a user's photos and get information on a single photo.
- Details on authentication requirements like the API key and how to structure API requests.
- A list of the different Flickr API methods that are available to access data through the REST interface.
Illuminated Hacks -- Where 2.0 101 Tutorialmikel_maron
Some of my favorite hacks
for the pleasure of your hacking sensibility
with the hopeful outcome of illuminating
best practices of putting your website on the geoweb
and hinting at the means
to get exactly what you need.
cause I likes the hacks.
hacks are rad.
Seeding Bugs to Find Bugs: Mutation Testing Revisited
How do you know your test suite is "good enough"? One of the best ways to tell is _mutation testing_. Mutation testing seeds artificial defects (mutations) into a program and checks whether your test suite finds them. If it does not, this means your test suite is not adequate yet.
Despite its effectiveness, mutation testing has two issues. First, it requires large computing resources to re-run the test suite again and again. Second, and this is worse, a mutation to the program can keep the program's semantics unchanged -- and thus cannot be detected by any test. Such _equivalent mutants_ act as false positives; they have to be assessed and isolated manually, which is an extremely tedious task.
In this talk, I present the JAVALANCHE framework for mutation testing of Java programs, which addresses both the problems of efficiency and equivalent mutants. First, JAVALANCHE is built for efficiency from the ground up, manipulating byte code directly and allowing mutation testing of programs that are several orders of magnitude larger than earlier research subjects. Second, JAVALANCHE addresses the problem of equivalent mutants by assessing the _impact_ of mutations on dynamic invariants: The more invariants impacted by a mutation, the more likely it is to be useful for improving test suites.
We have evaluated JAVALANCHE on seven industrial-size programs, confirming its effectiveness. With less than 3% of equivalent mutants, our approach provides a precise and fully automatic measure of the adequacy of a test suite -- making mutation testing, finally, applicable in practice.
Joint work with David Schuler and Valentin Dallmeier.
Andreas Zeller is computer science professor at Saarland University; he researches large programs and their history, and has developed a number of methods to determine the causes of program failures - on open-source programs as well as in industrial contexts at IBM, Microsoft, SAP and others. His book "Why Programs Fail" has received the Software Development Magazine productivity award in 2006.
It is the presentation file used by Jim Huang (jserv) at OSDC.tw 2009. New compiler technologies are invisible but highly integrated around our world, and we can enrich the experience via facilitating LLVM.
Illuminated Hacks -- Where 2.0 101 Tutorialmikel_maron
Some of my favorite hacks
for the pleasure of your hacking sensibility
with the hopeful outcome of illuminating
best practices of putting your website on the geoweb
and hinting at the means
to get exactly what you need.
cause I likes the hacks.
hacks are rad.
Seeding Bugs to Find Bugs: Mutation Testing Revisited
How do you know your test suite is "good enough"? One of the best ways to tell is _mutation testing_. Mutation testing seeds artificial defects (mutations) into a program and checks whether your test suite finds them. If it does not, this means your test suite is not adequate yet.
Despite its effectiveness, mutation testing has two issues. First, it requires large computing resources to re-run the test suite again and again. Second, and this is worse, a mutation to the program can keep the program's semantics unchanged -- and thus cannot be detected by any test. Such _equivalent mutants_ act as false positives; they have to be assessed and isolated manually, which is an extremely tedious task.
In this talk, I present the JAVALANCHE framework for mutation testing of Java programs, which addresses both the problems of efficiency and equivalent mutants. First, JAVALANCHE is built for efficiency from the ground up, manipulating byte code directly and allowing mutation testing of programs that are several orders of magnitude larger than earlier research subjects. Second, JAVALANCHE addresses the problem of equivalent mutants by assessing the _impact_ of mutations on dynamic invariants: The more invariants impacted by a mutation, the more likely it is to be useful for improving test suites.
We have evaluated JAVALANCHE on seven industrial-size programs, confirming its effectiveness. With less than 3% of equivalent mutants, our approach provides a precise and fully automatic measure of the adequacy of a test suite -- making mutation testing, finally, applicable in practice.
Joint work with David Schuler and Valentin Dallmeier.
Andreas Zeller is computer science professor at Saarland University; he researches large programs and their history, and has developed a number of methods to determine the causes of program failures - on open-source programs as well as in industrial contexts at IBM, Microsoft, SAP and others. His book "Why Programs Fail" has received the Software Development Magazine productivity award in 2006.
It is the presentation file used by Jim Huang (jserv) at OSDC.tw 2009. New compiler technologies are invisible but highly integrated around our world, and we can enrich the experience via facilitating LLVM.
KepMenKeh 1983, Penetapan Lapas Menjadi Rutanrutanprabumulih
Keputusan menteri Kehakiman Tahun 1983, perihal penetapan Lembaga Pemasyarakatan menjadi Rumah Tahanan Negara, termasuk Lapas Prabumulih menjadi Rutan Klas IIB Prabumulih
Dire que les études de médecine sont parmi les plus longues est un lieu commun. L’internat de santé publique et médecine sociale n’y fait pas exception. Grâce à un apprentissage de 4 ans, comprenant tant une formation théorique par l’acquisition de connaissances transversales et spécialisées qu’une formation pratique variée à travers 8 stages en milieu professionnel, cette formation permet d’aboutir à des postes à responsabilité dans le domaine de la santé publique.
L'enquête AISP (ancien internes de santé publique), portant sur le devenir des médecins spécialistes de santé publique et présentée lors de la journée du CLISP le 6 juillet 2012, a révélé de nombreux points positifs :
La formation pratique de l'internat de santé publique, avec ses 8 semestres d'expéreince professionnelle, constitue un atout exceptionnel et est considérée comme indispensable.
Un exercice professionnel ultérieur très divers avec certes une prédominance de l'exercice en établissement public, mais aussi des lieux d'exercice variés, dans le secteur public ou privé.
Une satisfaction prosaïque qui tord le cou aux idées reçues : chômage quasi-inexistant avec un taux himalayen de 0.6 % et des rémunérations mensuelles nettes supérieures à 4000 € pour la majorité des praticiens.
reseauprosante.fr
This is source code of a simple web that can search 500 youtube clips. To run the web you need to obtain YOUR API KEY
You can test this html file at the following address
http://phanhung20.blogspot.com/2015/09/javascript-for-searching-videos.html
KepMenKeh 1983, Penetapan Lapas Menjadi Rutanrutanprabumulih
Keputusan menteri Kehakiman Tahun 1983, perihal penetapan Lembaga Pemasyarakatan menjadi Rumah Tahanan Negara, termasuk Lapas Prabumulih menjadi Rutan Klas IIB Prabumulih
Dire que les études de médecine sont parmi les plus longues est un lieu commun. L’internat de santé publique et médecine sociale n’y fait pas exception. Grâce à un apprentissage de 4 ans, comprenant tant une formation théorique par l’acquisition de connaissances transversales et spécialisées qu’une formation pratique variée à travers 8 stages en milieu professionnel, cette formation permet d’aboutir à des postes à responsabilité dans le domaine de la santé publique.
L'enquête AISP (ancien internes de santé publique), portant sur le devenir des médecins spécialistes de santé publique et présentée lors de la journée du CLISP le 6 juillet 2012, a révélé de nombreux points positifs :
La formation pratique de l'internat de santé publique, avec ses 8 semestres d'expéreince professionnelle, constitue un atout exceptionnel et est considérée comme indispensable.
Un exercice professionnel ultérieur très divers avec certes une prédominance de l'exercice en établissement public, mais aussi des lieux d'exercice variés, dans le secteur public ou privé.
Une satisfaction prosaïque qui tord le cou aux idées reçues : chômage quasi-inexistant avec un taux himalayen de 0.6 % et des rémunérations mensuelles nettes supérieures à 4000 € pour la majorité des praticiens.
reseauprosante.fr
This is source code of a simple web that can search 500 youtube clips. To run the web you need to obtain YOUR API KEY
You can test this html file at the following address
http://phanhung20.blogspot.com/2015/09/javascript-for-searching-videos.html
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.