Apresentação da nova Graph API do Facebook, esta que classifica e relaciona o conteúdo da rede social em forma de um grafo contendo objects e connections e seus correlacionamentos
An introduction to Facebook Graph API and OAuth 2. This presentation covers basic example of Facebook Graph API, and including how OAuth 2 client-side flow works.
Apresentação da nova Graph API do Facebook, esta que classifica e relaciona o conteúdo da rede social em forma de um grafo contendo objects e connections e seus correlacionamentos
An introduction to Facebook Graph API and OAuth 2. This presentation covers basic example of Facebook Graph API, and including how OAuth 2 client-side flow works.
Thinking of developing your very own Facebook Apps? Here is a basic guide to start and get to know the important elements of a Facebook application. (Samples are in Java)
Intro to developing for @twitterapi (updated)Raffi Krikorian
A short primer on how to develop for the Twitter API.
This is the newly edited version of http://www.slideshare.net/raffikrikorian/intro-to-developing-for-twitterapi
A few people like to say that passwords are dead, but the reality is far from it. First of all, we can't get rid of passwords entirely, because the alternatives all suck: physical tokens are easy to lose and retina scans are pretty creepy. What we should focus on is eliminating site-specific passwords.
Mozilla Persona was introduced at OSDC last year, but a number of new things have been added to it since. But more importantly, it's still the best shot we have at a decentralized web-wide identity system that works for average users and doesn't violate their privacy.
So I'm back to show you what's new and to talk about what organizations can gain from adding native support on their domain. It's time to solve the password problem on the web.
Overview of three Yahoo! Technologies. Build your Own Search Service (BOSS), Yahoo! Query Language (YQL) and the Yahoo! Application Platform (YAP) for the University of South Carolina
The Mobile Internet is Bigger Than You ThinkJason Grigsby
Presentation given at a Software Association of Oregon event. Overview of mobile technology space, challenges for app developers, and the opportunity.
Includes some slides from the EXCELLENT Morgan Stanley report on the Mobile Internet:
http://www.morganstanley.com/institutional/techresearch/mobile_internet_report122009.html
In fact, the title is borrowed from Mary Meeker's presentation at Web 2.0 Summit. It is my theme for 2010.
Thinking of developing your very own Facebook Apps? Here is a basic guide to start and get to know the important elements of a Facebook application. (Samples are in Java)
Intro to developing for @twitterapi (updated)Raffi Krikorian
A short primer on how to develop for the Twitter API.
This is the newly edited version of http://www.slideshare.net/raffikrikorian/intro-to-developing-for-twitterapi
A few people like to say that passwords are dead, but the reality is far from it. First of all, we can't get rid of passwords entirely, because the alternatives all suck: physical tokens are easy to lose and retina scans are pretty creepy. What we should focus on is eliminating site-specific passwords.
Mozilla Persona was introduced at OSDC last year, but a number of new things have been added to it since. But more importantly, it's still the best shot we have at a decentralized web-wide identity system that works for average users and doesn't violate their privacy.
So I'm back to show you what's new and to talk about what organizations can gain from adding native support on their domain. It's time to solve the password problem on the web.
Overview of three Yahoo! Technologies. Build your Own Search Service (BOSS), Yahoo! Query Language (YQL) and the Yahoo! Application Platform (YAP) for the University of South Carolina
The Mobile Internet is Bigger Than You ThinkJason Grigsby
Presentation given at a Software Association of Oregon event. Overview of mobile technology space, challenges for app developers, and the opportunity.
Includes some slides from the EXCELLENT Morgan Stanley report on the Mobile Internet:
http://www.morganstanley.com/institutional/techresearch/mobile_internet_report122009.html
In fact, the title is borrowed from Mary Meeker's presentation at Web 2.0 Summit. It is my theme for 2010.
Este é um material desenvolvido pelo Facebook para divulgação da ferramenta Gerenciador de Negócios e está sendo utilizado como material de apoio no blog KaueKGG.com.br na série de publicações sobre o Business Manager.
Confira em http://kauekgg.com.br/business-manager
Facebook Open Graph - The Semantic WalletJonathan Laba
This deck covers how Facebook is becoming a hub for consumer devices, apps and services to connect to each other in a secure manner to share data.
Facebook's allowance for the input and retrieval of structured data based on semantic web principles is positioning them to be the gold standard in the management of a unified digital identity.
This deck covers:
- What Social Means to Developers
- What is the Semantic Web
- Facebook's Evolution into Structured Data
- The Semantic Wallet
- Some Questions
Participating websites with Facebook Connect will be able to display information personalized to your interests — without requiring you to sign in at that website or provide it with any information.
I present how using very simple HTML5 techniques integrating SVG in the DOM we can have a mobile HTML5 app on "creating moods" with a short production cycle. The I show how to integrate it to Facebook with a pure JavaScript solution.
In the beginning, progressive enhancement was simple: HTML layered with CSS layered with JavaScript. That worked fine when there were two browsers, but in today's world of multiple devices and multiple browsers, it's time for a progressive enhancement reboot. At the core is the understanding that the web is not print - the same rules don't apply. As developers and consumers we've been fooled into thinking about print paradigms for too long. In this talk, you'll learn just how different the web is and how the evolution of progressive enhancement can lead to better user experiences as well as happier developers and users.
This deck is a conference-agnostic one, suitable to be shown anywhere without site-specific jokes!
A presentation on mashing up Twitter Annotations with the Semantic Web. June 24, 2010 at the Semantic Technology Conference, San Francisco (SemTech 2010).
Progressive Enhancement 2.0 (jQuery Conference SF Bay Area 2011)Nicholas Zakas
In the beginning, progressive enhancement was simple: HTML layered with CSS layered with JavaScript. That worked fine when there were two browsers, but in today's world of multiple devices and multiple browsers, it's time for a progressive enhancement reboot. At the core is the understanding that the web is not print - the same rules don't apply. As developers and consumers we've been fooled into thinking about print paradigms for too long. In this talk, you'll learn just how different the web is and how the evolution of progressive enhancement can lead to better user experiences as well as happier developers and users.
These are the slides I used for a workshop/presentation about HTML5 and related techniques to build web and mobile applications. The session was about half theoretical and half practical. The audience consisted of students wanting to get up to speed with new HTML5/CSS3 related techniques in web development.
Leveraging games lifecycle to increase revenue & retention
There is no longer any argument that mobile games have shifted from Premium to Freemium business models.
However, there are few who understand how to deliver this model effectively.
In this Webinar Papaya Mobile's Oscar Clark will take a look at the > different life stages of games and how developers can leverage this to increase the engagement and enjoyment for their players.
He will talk about how designers can predict the user-lifecycle stages of Discovery, Learning, Earning and Churning to get the most out of the flow of the game.
These are the design techniques employed by companies who have created mobile social games generating 15% conversion and ARPPDAU of $30+
Build Your First Mobile App in 1 hour with Windows App StudioNick Landry
Microsoft App Studio is an innovative new tool to design and build a starter app for Windows Phone and Windows Store without writing any code.
Whether you’re a mobile development neophyte or a savvy developer filled with great ideas but not enough time to prototype them, App Studio can help you get started by building the core of your application using multiple page templates and data sources, such as RSS feeds, YouTube videos, Flickr photos, HTML content, custom collections and more.
In this session, we’ll build a live & working mobile app for both Windows Phone and Windows Store on the fly, exploring the various options of App Studio. We’ll then generate the source code and dive into Visual Studio to understand the various parts produced by App Studio and how to extend them. We’ll discuss how to add custom features to the starter app, turning our prototype into a real-world app, such as advertising, in-app purchasing and such. Lastly we’ll go over what’s involved to get the app published, how the submission process works, and where to take your app from there. If you still haven’t published any mobile apps, it doesn’t get any easier than with App Studio.
Come learn how to get from “Idea” to “Publish” in just a few hours.
Here are some examples of live published apps I have built with App Studio, all but one created live in front of the audience in one of these sessions:
About WoW (Gamer hub for World of Warcraft players)
http://aka.ms/aboutwow
The Second City (for fans of the famous improve comedy theatre)
http://aka.ms/2ndcity
Halo Central Hub (for fans of the Halo franchise)
http://aka.ms/halohub-wp8
Shadowrun Gamer Hub (for fans of the Shadowrun cyberpunk franchise)
http://aka.ms/shadowrun-wp8
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
6. http://graph.facebook.com/hellokitty
{
"id": "40444963499",
"name": "Hello Kitty",
"picture": "http://profile.ak.fbcdn.net/hprofile-ak-snc4/
hs625.ash1/27537_40444963499_5441_s.jpg",
"link": "http://www.facebook.com/hellokitty",
"category": "Public_figures_other",
"username": "hellokitty",
"affiliation": "Sanrio Inc. USA",
"birthday": "11/01/-001",
"personal_info": "Hello Kitty's Official Fan Page!nHello Kitty lives in the
suburbs of London with her parents and her twin sister Mimmy. She has lots of
friends at school with whom she shares many adventures.nHer trademark is
her red bow that she always wears over her left ear.nHello Kitty is as heavy as
three apples and as tall as five apples.",
"personal_interests": "Traveling, listening to music, reading, eating yummy
cookies, and making new friends. As Hello Kitty always says, u201cYou can
never have too many friends!"nShe collects small, cute objects like ribbons,
hair accessories, candy, stars, and goldfish.",
"fan_count": 267913,
"type": "page"
}
9. http://graph.facebook.com/hellokitty/posts
{
"data": [
{
"id": "40444963499_420034668499",
"from": {
"name": "Hello Kitty",
"category": "Public_figures_other",
"id": "40444963499"
},
"message": "Check out the cute Hello Kitty Nerds tote featured in Us Weekly! Find this and more Hello Kitty
u201cNerdsu201d stuff at Sanrio.com and select Sanrio Boutiques.nnhttp://bit.ly/brVYHTn",
"picture": "http://photos-h.ak.fbcdn.net/hphotos-ak-ash2/
hs003.ash2/33501_420032663499_40444963499_4947695_6515646_s.jpg",
"link": "http://www.facebook.com/photo.php?pid=4947695&fbid=420032663499&id=40444963499",
"name": "Nerd Alert!",
"caption": "5 new photos",
"icon": "http://static.ak.fbcdn.net/rsrc.php/z2E5Y/hash/8as8iqdm.gif",
"type": "photo",
"created_time": "2010-08-20T01:04:30+0000",
"updated_time": "2010-08-20T01:04:30+0000",
"likes": 892,
"comments": {
"count": 76
}
},
{
"id": "40444963499_419689583499",
"from": {
"name": "Hello Kitty",
"category": "Public_figures_other",
"id": "40444963499"
},
"message": "Weu2019ve been playing with the Hello Kitty 35 mm Fisheye camera by Lomography and wanted to share
some of the fun pictures weu2019ve taken! Has anyone else taken any awesome pictures with their Hello Kitty Fisheye
cameras? Post them to our wall, we wanna see them! nnThe Hello Kitty Fisheye Camera is now available at Sanrio.com, select
Sanrio Boutiques, Urban Outfitters, Lomography.com and Lomography gallery stores. nnhttp://bit.ly/91unb4n",
"picture": "http://photos-f.ak.fbcdn.net/hphotos-ak-snc4/
hs389.snc4/45262_419686073499_40444963499_4941020_5615227_s.jpg",
"link": "http://www.facebook.com/photo.php?pid=4941020&fbid=419686073499&id=40444963499",
"name": "Fisheye Camera Photos",
"icon": "http://static.ak.fbcdn.net/rsrc.php/z2E5Y/hash/8as8iqdm.gif",
"type": "photo",
11. Access Token
•Obtained when a user gives
permissions to a Facebook
application
•Used for making Graph API calls
For testing, try: http://oauth.twoalex.com
13. How to get an access token
• Redirect to OAuth
• https://graph.facebook.com/oauth/authorize ...
• https://graph.facebook.com/oauth/access_token ...
• Javascript SDK
• User clicks on login button
• SDK stores the access token into a cookie
14. Extended Permissions
When authenticating, can ask the user for
extended permissions:
• user_photos, friend_photos
• user_likes, friend_likes
• read_stream, publish_stream
• email
• offline_access
• and many more....
21. Major Changes for Canvas Apps
By end of this year (2010):
1. Canvas FBML will be deprecated...
you must use Canvas iframe!
2. The Facebook “session_key” will disappear...
you must use access_token for API calls!
3. The “fb_sig” parameters will disappear...
you must query and cache user data!
22. 1. Must use canvas iframe
• Many FBML tags not supported in iframe
• Use Javascript SDK to get XFBML (which is a
subset of FBML tags for iframe apps)
<fb:name uid=’4’></fb:name>
• After end of 2010, FBML apps cannot be created.
23. 2. Must use access token
• You need to upgrade your SDK library
• All calls to Facebook must be made with an
access token:
‣ FQL Query
https://api.facebook.com/method/fql.query?query=...&access_token=...
‣ Old REST API calls
https://api.facebook.com/method/stream.publish?access_token=...
https://api.facebook.com/method/pages.isFan?page_id=...&access_token=...
26. 3. Must query and cache user data
• Instead of many “fb_sig” parameters, Facebook will
only pass a signed_request (containing access
token and user id)
• Many parameters will disappear, so you will need
to query and cache them yourself...
• fb_sig_friends =>
https://graph.facebook.com/me/friends?...
• fb_sig_locale =>
https://api.facebook.com/methods/users.getInfo?...
27.
28. Types of Facebook Apps
Authentication Markup Access Token
Canvas
FBML
FBML signed
request
Canvas
iframe Redirect to
OAuth
from cookie
Javascript
(placed by
Website SDK XFBML Javascript
SDK)
Mobile
website
29. Summary: What to do?
• Switch to new SDK
• Use new login and get permissions
• Convert all FQL queries and Old REST
API calls into Graph API calls
• Remove any references to fb_sig
• For performance, set up caching
34. but this one...
http://graph.facebook.com/http://www.imdb.com/title/tt0117500/
{
"id": "114324145263104",
"name": "The Rock (1996)",
"picture": "http://profile.ak.fbcdn.net/hprofile-ak-snc4/
hs344.snc4/41581_114324145263104_7037_s.jpg",
"link": "http://www.imdb.com/title/tt0117500/",
"category": "Movie",
"description": "Directed by Michael Bay. With Sean Connery, Nicolas Cage, Ed
Harris. A group of U.S. marines, under command of a renegade general, take over
Alcatraz and threat San Francisco Bay with biological weapons. A chemical weapons
specialist and the only man to have ever escaped from the Rock are the only ones
who can prevent chaos. Visit IMDb for Photos, Showtimes, Cast, Crew, Reviews, Plot
Summary, Comments, Discussions, Taglines, Trailers, Posters, Fan Sites",
"fan_count": 931
}
39. Graph API for checkins
Extended permissions:
user_checkins, friend_checkins
https://graph.facebook.com/[user id]/checkins
https://graph.facebook.com/[place page id]/checkins
https://graph.facebook.com/search?type=checkins
40. See where your friends have checked in:
http://fbfetcher.heroku.com/
welcome/places
41. Graph API
• What is it?
Simple new REST API with OAuth2.0
• What to do?
Rewrite your apps using new SDKs
• What’s new?
Open Graph, Facebook Places.