The document discusses techniques for performing specialized searches and information extraction from web pages and documents. It describes using regular expressions and custom scripts to search for patterns like phone numbers. It also provides examples of using APIs and libraries like JavaScript::V8 to execute JavaScript and extract hidden content from web pages. The goal is to go beyond typical keyword searches to recognize structures and patterns to refine search results and find embedded information.
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
We all know the power of Google—or do we? Two types of people use Google: normal users like you and me, and the not-so-normal users—the hackers. What types of information can hackers collect from Google? How severe is the damage they can cause? Is there a way to circumvent this hacking? As a security tester, Kiran Karnad uses the GHDB (Google Hacking Database) to ensure their product will not be the next target for hackers. Kiran describes how to effectively use Google the way hackers do, using advanced operators, locating exploits and finding targets, network mapping, finding user names and passwords, and other secret stuff. Kiran provides a recipe of five simple security searches that work. Learn how to automate the Google Hacking Database using Python so security tests can be incorporated as a part of the SDLC for the next product you develop.
In this lecture you will study about
Google Dorks
Types of Google Dorks
SQL injection
Types of SQL injection
Defending against SQL injection
GOOGLE DORKS
inurl
intitle
allintitle
allinurl
filetype or ext
allintext
intext
SQL INJECTION
What are injection attacks?
How SQL Injection Works
Exploiting SQL Injection Bugs
Mitigating SQL Injection
Defending Injection Attacks
Living in the Cloud: Hosting Data & Apps Using the Google Infrastructureguest517f2f
In the modern web, the user rules. Nearly every successful web app has to worry about scaling to an exponentially growing user base and giving those users multiple ways of interacting with their data. Pamela Fox, Maps API Support Engineer & Developer advocate, provides an overview of two technologies - Google App Engine and the Google Data APIs - that aim to make web development and data portability easier.
Experiences, Best Pratices How to setup Unit, Functional and Acceptance Tests with PHPUnit and Codeception for TYPO3 Applications. Describes many Codeception modules + Integration with Travis CI
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
We all know the power of Google—or do we? Two types of people use Google: normal users like you and me, and the not-so-normal users—the hackers. What types of information can hackers collect from Google? How severe is the damage they can cause? Is there a way to circumvent this hacking? As a security tester, Kiran Karnad uses the GHDB (Google Hacking Database) to ensure their product will not be the next target for hackers. Kiran describes how to effectively use Google the way hackers do, using advanced operators, locating exploits and finding targets, network mapping, finding user names and passwords, and other secret stuff. Kiran provides a recipe of five simple security searches that work. Learn how to automate the Google Hacking Database using Python so security tests can be incorporated as a part of the SDLC for the next product you develop.
In this lecture you will study about
Google Dorks
Types of Google Dorks
SQL injection
Types of SQL injection
Defending against SQL injection
GOOGLE DORKS
inurl
intitle
allintitle
allinurl
filetype or ext
allintext
intext
SQL INJECTION
What are injection attacks?
How SQL Injection Works
Exploiting SQL Injection Bugs
Mitigating SQL Injection
Defending Injection Attacks
Living in the Cloud: Hosting Data & Apps Using the Google Infrastructureguest517f2f
In the modern web, the user rules. Nearly every successful web app has to worry about scaling to an exponentially growing user base and giving those users multiple ways of interacting with their data. Pamela Fox, Maps API Support Engineer & Developer advocate, provides an overview of two technologies - Google App Engine and the Google Data APIs - that aim to make web development and data portability easier.
Experiences, Best Pratices How to setup Unit, Functional and Acceptance Tests with PHPUnit and Codeception for TYPO3 Applications. Describes many Codeception modules + Integration with Travis CI
I'm Andrea D'Ubaldo, I am a software developer and cyber security enthusiast. The purpose of this presentation is to warn people about google "hacking".
I don't pretend to teach, I only love sharing knowledge. Hope you enjoy ! Comments and remarks are welcome.
------------------------------------------------
Summary
- What is Google dorks
- Queries syntax
- Queries examples
- Conclusion
Google Dork Definition
"A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person."
Margaret Rouse
Director, WhatIs.com at TechTarget
@WhatIsDotCom
What is
Google dorks is a powerful advanced search, an instrument to perform queries on Google search engine.
How it works
That queries allows the user to find detailed information over the internet, such files, hidden pages, sensitive documents and so on.
Why use
But...dork queries are considered by many an “hacking technique”. Because of his nature, the dorks can be used for different purposes, often bad purpose and we shall then see...
Queries syntax
a) inurl
Find that word or sentences in the URL
inurl: php?id=
b) related
Find that related websites
related:www.google.com
c) filetype
research by file type
filetype:pdf shakespeare
d) site
Restrict to a specific site
site:fakesite.com
e) intitle
Find that word or sentences in the title of a website
intitle: search
...Other syntax characters and operators.
Examples :
- Search files containing username and password
- Discover vulnerable server, affected by SQL Injection
- Pages containing login portal
- Sensitive directory
Credits and References
What is Google dork? – Margaret Rouse
What is Google dork? - WhatIs.com - TechTarget
whatis.techtarget.com
Conclusion
Be careful and protect your data!
Google hacking
https://en.wikipedia.org/wiki/Google_hacking
Wikipedia.
Google Hacking Database (GHDB)
https://www.exploit-db.com/google-hacking-database/
Exploit Database
Special thanks to all the people who made and released these awesome resources for free:
Presentation template by SlidesCarnival (http://www.slidescarnival.com/)
Photographs by Unsplash (http://unsplash.com/)
Shalaka Pawar, who works on SEO with us, will take you through the importance of canonical & other HTML tags to solve duplicate content issues on your website. Through this presentation, she has outlined how canonical tags need to be implemented, which pages need them & where on a page are you supposed to add canonical tags. It will also give you different scenarios that may be prevalent on your or your client’s website and how you can make canonical & language tags work with them.
How to optimise TTFB - BrightonSEO 2020Roxana Stingu
Learn what TTFB is, how to measure it and how to improve it.
Measure using: Chrome developer tools, webpagetest.org, Google Analytics, Sucuri or KeyCDN.
Network timings that go into TTFB measurement:
- Queuing
- Stalled/Blocking
- DNS Lookup
- Initial Connection
- SSL
- Request Sent
- Waiting (TTFB)
- Content Download
Brian hogg word camp preparing a plugin for translationwcto2017
You have a plugin, but you want users to be able to use it in their native language. Learn how to get it ready for translation, things to watch out for, and tips for maintaining it as you change the plugin over time.
Talk based on: Ricardo Baeza-Yates and Carlos Castillo: “Web Retrieval and Mining”.Entry in “Encyclopedia of Library and Information Sciences”, third edition (to appear in 2009).
[EN] DLM Forum Industry Whitepaper 01 Capture Indexing & Auto-Classification | SER | Christa Holzenkamp | Hamburg 2002
1. Introduction
2. The importance of safe indexing
2.1 Description of the problem
2.2 The challenge of rapidly growing document volumes
2.3 The quality of indexing defines the quality of retrieval
2.4 The role of metadata for indexing and information exchange
2.5 The need for quality standards, costs and legal aspects
3. Methods for indexing and auto-categorization
3.1 Types of indexing and categorization methods
3.2 Auto-categorization methods
3.3 Extraction methods
3.4 Handling different types of information and document representations
4. The Role of Databases
4.1 Database types and related indexing
4.2 Indexing and Search methods
4.3 Indexing and retrieval methods using natural languages
5. Standards for Indexing
5.1 Relevant standards for indexing and ordering methods
5.2 Relevant standardisation bodies and initiatives
6. Best Practice Applications
6.1 Automated distribution of incoming documents Project of the Statistical Office of the Free State of Saxony
6.2 Knowledge-Enabled Content Management Project of CHIP Online International GmbH
7. Outlook
7.1 Citizen Portals
7.2 Natural language based portals
Glossary
Abbreviations
Authoring Company
I'm Andrea D'Ubaldo, I am a software developer and cyber security enthusiast. The purpose of this presentation is to warn people about google "hacking".
I don't pretend to teach, I only love sharing knowledge. Hope you enjoy ! Comments and remarks are welcome.
------------------------------------------------
Summary
- What is Google dorks
- Queries syntax
- Queries examples
- Conclusion
Google Dork Definition
"A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person."
Margaret Rouse
Director, WhatIs.com at TechTarget
@WhatIsDotCom
What is
Google dorks is a powerful advanced search, an instrument to perform queries on Google search engine.
How it works
That queries allows the user to find detailed information over the internet, such files, hidden pages, sensitive documents and so on.
Why use
But...dork queries are considered by many an “hacking technique”. Because of his nature, the dorks can be used for different purposes, often bad purpose and we shall then see...
Queries syntax
a) inurl
Find that word or sentences in the URL
inurl: php?id=
b) related
Find that related websites
related:www.google.com
c) filetype
research by file type
filetype:pdf shakespeare
d) site
Restrict to a specific site
site:fakesite.com
e) intitle
Find that word or sentences in the title of a website
intitle: search
...Other syntax characters and operators.
Examples :
- Search files containing username and password
- Discover vulnerable server, affected by SQL Injection
- Pages containing login portal
- Sensitive directory
Credits and References
What is Google dork? – Margaret Rouse
What is Google dork? - WhatIs.com - TechTarget
whatis.techtarget.com
Conclusion
Be careful and protect your data!
Google hacking
https://en.wikipedia.org/wiki/Google_hacking
Wikipedia.
Google Hacking Database (GHDB)
https://www.exploit-db.com/google-hacking-database/
Exploit Database
Special thanks to all the people who made and released these awesome resources for free:
Presentation template by SlidesCarnival (http://www.slidescarnival.com/)
Photographs by Unsplash (http://unsplash.com/)
Shalaka Pawar, who works on SEO with us, will take you through the importance of canonical & other HTML tags to solve duplicate content issues on your website. Through this presentation, she has outlined how canonical tags need to be implemented, which pages need them & where on a page are you supposed to add canonical tags. It will also give you different scenarios that may be prevalent on your or your client’s website and how you can make canonical & language tags work with them.
How to optimise TTFB - BrightonSEO 2020Roxana Stingu
Learn what TTFB is, how to measure it and how to improve it.
Measure using: Chrome developer tools, webpagetest.org, Google Analytics, Sucuri or KeyCDN.
Network timings that go into TTFB measurement:
- Queuing
- Stalled/Blocking
- DNS Lookup
- Initial Connection
- SSL
- Request Sent
- Waiting (TTFB)
- Content Download
Brian hogg word camp preparing a plugin for translationwcto2017
You have a plugin, but you want users to be able to use it in their native language. Learn how to get it ready for translation, things to watch out for, and tips for maintaining it as you change the plugin over time.
Talk based on: Ricardo Baeza-Yates and Carlos Castillo: “Web Retrieval and Mining”.Entry in “Encyclopedia of Library and Information Sciences”, third edition (to appear in 2009).
[EN] DLM Forum Industry Whitepaper 01 Capture Indexing & Auto-Classification | SER | Christa Holzenkamp | Hamburg 2002
1. Introduction
2. The importance of safe indexing
2.1 Description of the problem
2.2 The challenge of rapidly growing document volumes
2.3 The quality of indexing defines the quality of retrieval
2.4 The role of metadata for indexing and information exchange
2.5 The need for quality standards, costs and legal aspects
3. Methods for indexing and auto-categorization
3.1 Types of indexing and categorization methods
3.2 Auto-categorization methods
3.3 Extraction methods
3.4 Handling different types of information and document representations
4. The Role of Databases
4.1 Database types and related indexing
4.2 Indexing and Search methods
4.3 Indexing and retrieval methods using natural languages
5. Standards for Indexing
5.1 Relevant standards for indexing and ordering methods
5.2 Relevant standardisation bodies and initiatives
6. Best Practice Applications
6.1 Automated distribution of incoming documents Project of the Statistical Office of the Free State of Saxony
6.2 Knowledge-Enabled Content Management Project of CHIP Online International GmbH
7. Outlook
7.1 Citizen Portals
7.2 Natural language based portals
Glossary
Abbreviations
Authoring Company
ATI Courses Professional Development Short Course Remote Sensing Information ...Jim Jenkins
This three-day workshop will review remote sensing concepts and vocabulary including resolution, sensing platforms, electromagnetic spectrum and energy flow profile. The workshop will provide an overview of the current and near-term status of operational platforms and sensor systems. The focus will be on methods to extract information from these data sources. The spaceborne systems include the following; 1) high spatial resolution (< 5m) systems, 2) medium spatial resolution (5-100m) multispectral, 3) low spatial resolution (>100m) multispectral, 4) radar, and 5) hyperspectral. The two directional relationships between remote sensing and GIS will be examined. Procedures for geometric registration and issues of cartographic generalization for creating GIS layers from remote sensing information will also be discussed.
Slides about "Usecases for Information Extraction with UIMA" for "Information management on the Web" course at DIA (Computer Science Department) of Roma Tre University
With more and more sites falling victim to data theft, you've probably read the list of things (not) to do to write secure code. But what else should you do to make sure your code and the rest of your web stack is secure ? In this tutorial we'll go through the basic and more advanced techniques of securing your web and database servers, securing your backend PHP code and your frontend javascript code. We'll also look at how you can build code that detects and blocks intrusion attempts and a bunch of other tips and tricks to make sure your customer data stays secure.
Kicking off with Zend Expressive and Doctrine ORM (PHPNW2016)James Titcumb
You've heard of Zend's new framework, Expressive, and you've heard it's the new hotness. In this talk, I will introduce the concepts of Expressive, how to bootstrap a simple application with the framework using best practices, and finally how to integrate a third party tool like Doctrine ORM.
Using php as a server-side scripting language, I have created a simple user authentication module. The module can be directly implemented in a website with some minor changes to provide user signup ability in a webpage. HTML and CSS have been used for the designing of the webpage, and MySQL for backend database management.
Breno Oliveira, Líder Técnico Moip, ministrou o workshop "Elastic Search: Turbinando sua aplicação PHP", no PHP Experience 2016.
O iMasters PHP Experience 2016 aconteceu nos dias 21 e 22 de Março de 2015, no Hotel Tivoli em São Paulo-SP
http://phpexperience2016.imasters.com.br/
Kicking off with Zend Expressive and Doctrine ORM (ZendCon 2016)James Titcumb
You've heard of the new Zend framework, Expressive, and you've heard it's the new hotness. In this talk, I will introduce the concepts of Expressive, how to bootstrap a simple application with the framework using best practices, and how to integrate a third party tool like Doctrine ORM.
Cassandra & puppet, scaling data at $15 per monthdaveconnors
Constant Contact shares lessons learned from DevOps approach to implementing Cassandra to manage social media data for over 400k small business customers. Puppet is the critical in our tool chain. Single most important factor was the willingness of Development and Operations to stretch beyond traditional roles and responsibilities.
Beyond php it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just wrting PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
Profiling PHP - AmsterdamPHP Meetup - 2014-11-20Dennis de Greef
Your application needs to be fast nowadays in order to stand out from the crowd. Study has shown that application performance has a psychological effect on customer satisfaction. Profiling can give you more insight in how your application really works internally. It gives you an overview of where the resource bottlenecks in your application reside. In this talk, I am going to give an overview of some profiling methods that exist today, and where I think we should be heading. After this talk, you will be able to use some basic profiling tricks to analyse the performance constraints in your application.
http://www.meetup.com/AmsterdamPHP/events/168161882/
Beyond php - it's not (just) about the codeWim Godden
Most PHP developers focus on writing code. But creating Web applications is about much more than just wrting PHP. Take a step outside the PHP cocoon and into the big PHP ecosphere to find out how small code changes can make a world of difference on servers and network. This talk is an eye-opener for developers who spend over 80% of their time coding, debugging and testing.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. Information is being generated at a faster
rate than ever before
The speed at which information can be
generated is continually increasing
Continuous improvements in computers,
storage, and networking make much of this
information readily available to indviduals
5. Most search engines use a keyword based
approach
If a document contains all of the keywords
specified it is returned as a match
Ranking algorithms (e.g. PageRank) are used
to put the most relevant results at the top of
the list and the least relevant at the bottom
6. Not everything can be easily expressed as a
keyword
Suppose you want to search for unknown
phone numbers? How can you do this with
keywords?
How do we recognize a phone number when
we see one?
7.
8. We recognize a phone number by recognizing
the pattern of digits
◦ (XXX) XXX-XXXX
While it is hard to express such a pattern in
the form of a keyword, it is really easy to
express it in the form of a regular expression
(s?(?d{3})?[-s.]?d{3}[-.]d{4})
9. #!usr/bin/perl
use strict;
use warnings;
(my $string=<<'LIST');
John (555) 555-5555 fits pattern
Bob 234 567-8901
Mary 734-234-9873
Tom 999 999-9999
Harry 111 111 1111 does not fit pattern
LIST
while($string=~/(s?(?d{3})?[-s.]?d{3}[-.]d{4})/g){
print "$1n";
}
10. Conduct a broad key word search using an
existing search engine
Use your custom coded application to take
the returned search results and perform
regular expression based pattern matching
The results that match your regular
expression are your refined search results
11. General Search APIs Specialized Search APIs
Bing
Yahoo BOSS
Blekko
Yandex
Twitter
Medicine – Pubmed
Physics –Arxiv
Government –
GovTrack
Finance – Yahoo
Finance
etc
12. Seeking to Extract: DFN [A-Z]d+
Script described in:
http://www.biomedcentral.com/1472-6947/7/32
13. #!usr/bin/perl
use LWP;
use strict;
use warnings;
#sets query and congress session
my $query='fracking';
my $congress=112;
my $ua = LWP::UserAgent->new;
my $url="http://www.govtrack.us/api/v2/bill?q=$query&congress=$congress";
my $response=$ua->get($url);
my $result=$response->content;
print $result;
Returns JSON formatted
output
14. #!usr/bin/perl
use LWP;
use XML::LibXML;
use strict;
use warnings;
my $ua=LWP::UserAgent->new();
my $query='perl programming';
my $url="http://blekko.com/ws/?q=$query+/rss";
my $response=$ua->get($url);
my $results=$response->content; die unless $response->is_success;
my $parser=XML::LibXML->new;
my $domtree=$parser->parse_string($results);
my @Records=$domtree->getElementsByTagName("item");
my $i=0;
foreach(@Records){
my $link=$Records[$i]->getChildrenByTagName("link");
print "$i $linkn";
my $description=$Records[$i]->getChildrenByTagName("description");
print "$descriptionnn";
$i++;
}
15.
16. Allows programmers to extract code samples
pertaining to a set of keywords
Recognizes the patterns associated with
CC++ functions and CC++ Control
structures
int myfunc ( ){
//code here
}
while ( ) {
//code here
}
17. use Text::Balanced qw(extract_codeblock);
#delimiter used to distinguish code blocks for use with Text::Balanced
$delim='{}';
#regex used to match keywords/patterns that precede code blocks
my $regex='(((int|long|double|float|void)s*?w{1,25})|if|while|for)';
foreach $link(@links){
$response=$request->get("$link"); # gets Web page
$results=$response->content;
while($results=~s/<script.*?>.*?</script>//gsi){}; # filters out Javascript
pos($results)=0;
while($results=~s/.*?($regexs*?(.*?)s*?){/{/s){
$code=$1 . extract_codeblock($results,$delim);
print OFile "<h3><a href="$link">$link</a></h3> n";
print OFile "$code" . "n" . "n";
}
}
18.
19. A common challenge to performing
information extraction and text mining on
many Web pages or parts of Web pages is
that the content is served up by JavaScript
This can be dealt with by putting the
JavaScript that serves up the content through
a JavaScript Engine like V8
20. <title>Contact XYZ inc</title>
<H1>Contact XYZ inc</H1><br>
<p>For more information about XYZ inc, please contact us at the following Email address</p>
<script type="text/javascript" language="javascript">
<!--
// Email obfuscator script 2.1 by Tim Williams, University of Arizona
// Random encryption key feature by Andrew Moulden, Site Engineering Ltd
// This code is freeware provided these four comment lines remain intact
// A wizard to generate this code is at http://www.jottings.com/obfuscator/
{ coded = "OKUxkq@KwtoO2K.0ko"
key = "l7rE9B41VmIKiFwOLq2uUGYCQaWoMfzNASycJj3Ds8dtRkPv6XTHg0beh5xpZn"
shift=coded.length
link=""
for (i=0; i<coded.length; i++) {
if (key.indexOf(coded.charAt(i))==-1) {
ltr = coded.charAt(i)
link += (ltr)
}
else {
ltr = (key.indexOf(coded.charAt(i))-shift+key.length) % key.length
link += (key.charAt(ltr))
}
}
document.write("<a href='mailto:"+link+"'>"+link+"</a>")
}
//-->
</script><noscript>Sorry, you need Javascript on to email me.</noscript>
21.
22. #!usr/bin/perl
use JavaScript::V8;
use LWP;
use Text::Balanced qw(extract_codeblock);
use strict;
use warnings;
#delimiter used to distinguish code blocks for use with Text::Balanced
my $delim='{}';
#downloads Web page
my $ua=LWP::UserAgent->new;
my $response=$ua->get('http://localhost/email.html');
my $result=$response->content;
#print "$resultnn";
#extracts JavaScript
my $js;
if($result=~s/.*?http://www.jottings.com/obfuscator/s*{/{/s){
$js=extract_codeblock($result,$delim);
}
#modified JS to make it processable by V8 module
$js=~s/document.write/write/;
$js=~s/'/'/g;
#print "$jsnn";
#processes JS
my $context = JavaScript::V8::Context->new();
$context->bind_function(write => sub { print @_ });
my $mail=$context->eval("$js");
print "$mailnn";