The document summarizes the key points of PEP 8, the Python style guide. It discusses sections of PEP 8 such as layout, imports, whitespace, comments, and docstrings. The style guide provides recommendations for file formatting, indentation, maximum line length, blank lines, and other stylistic choices to improve readability and consistency of Python code. Following PEP 8 helps make Python code more uniform, clear, and maintainable. Images are included to illustrate some of the concepts.
Brittany Bates is passionate about fashion, yoga, shoes, music, and living in Los Angeles. She enjoys the fashion styles of the 1920s and 1970s and finds people's everyday style more intriguing than formalwear. Her inspirations include art nouveau architecture, romance, and art deco from the 1920s. She can be contacted at her email or cell phone and address in Fort Collins, Colorado.
The document is a portfolio for someone pursuing a career in game development and animation. It summarizes their skills and experience, including a lifelong passion for creativity, strengths in animation since high school, experience independently working on their own ideas and projects, and an ability to both create art/animation as well as lead others. They value variety in work, continual self-growth, and working with others who can joke under pressure.
Lance Chabot: Different (My Visual Resume)lancechabot
The document provides biographical and professional information about Lance Chabot. It summarizes his experience in several areas including youth ministry, public speaking, counseling, training, music, mechanics, and technology. Images are included throughout to illustrate the text. The document emphasizes Chabot's passion for quality, creativity, authenticity, efficiency, growth, and being different. It provides his contact information and lists sources for the images. The overall purpose is to introduce Lance Chabot and highlight his diverse skills and experiences.
The document appears to be a collection of images and snippets of text from various sources on the topics of software development, marketing, and business management. There are over 80 images and short passages with no clear overall theme or narrative connecting them. The document touches on subjects like continuous integration, marketing databases, software testing, board games, church websites, and more with no apparent purpose or goal.
The document discusses trends related to the role of the chief information officer (CIO) and information technology (IT) management. It addresses two main functions of the CIO: managing internal IT as well as acting as the CEO of external IT. It also summarizes key IT trends in 2008 such as flat IT spending, higher regulatory standards, and greater demand for IT services. The document provides recommendations for implementing an Office of the CIO and IT governance tools to improve IT strategy alignment, transparency, and return on investment.
Brittany Bates is passionate about fashion, yoga, shoes, music, and living in Los Angeles. She enjoys the fashion styles of the 1920s and 1970s and finds people's everyday style more intriguing than formalwear. Her inspirations include art nouveau architecture, romance, and art deco from the 1920s. She can be contacted at her email or cell phone and address in Fort Collins, Colorado.
The document is a portfolio for someone pursuing a career in game development and animation. It summarizes their skills and experience, including a lifelong passion for creativity, strengths in animation since high school, experience independently working on their own ideas and projects, and an ability to both create art/animation as well as lead others. They value variety in work, continual self-growth, and working with others who can joke under pressure.
Lance Chabot: Different (My Visual Resume)lancechabot
The document provides biographical and professional information about Lance Chabot. It summarizes his experience in several areas including youth ministry, public speaking, counseling, training, music, mechanics, and technology. Images are included throughout to illustrate the text. The document emphasizes Chabot's passion for quality, creativity, authenticity, efficiency, growth, and being different. It provides his contact information and lists sources for the images. The overall purpose is to introduce Lance Chabot and highlight his diverse skills and experiences.
The document appears to be a collection of images and snippets of text from various sources on the topics of software development, marketing, and business management. There are over 80 images and short passages with no clear overall theme or narrative connecting them. The document touches on subjects like continuous integration, marketing databases, software testing, board games, church websites, and more with no apparent purpose or goal.
The document discusses trends related to the role of the chief information officer (CIO) and information technology (IT) management. It addresses two main functions of the CIO: managing internal IT as well as acting as the CEO of external IT. It also summarizes key IT trends in 2008 such as flat IT spending, higher regulatory standards, and greater demand for IT services. The document provides recommendations for implementing an Office of the CIO and IT governance tools to improve IT strategy alignment, transparency, and return on investment.
This is a presentation I gave at the Sept. Milwaukee Interactive Marketing Association Meeting in 2013. It talks about how I found my passion and created my "Dream Job."
History of CHI (Human-Computer Interaction)Erik Duval
This document provides a history of the development of user interfaces in computing. It traces the evolution from early computers that used switches and punch cards for programming to modern graphical user interfaces. Key developments discussed include the mouse, windows-based interfaces, and touchscreens. The document highlights pioneering systems from ENIAC to Xerox PARC that introduced new interaction paradigms. It emphasizes Doug Engelbart's influential work introducing concepts like the mouse and hypertext in the 1960s. The summary concludes by looking at potential future interfaces involving ubiquitous, tangible, and brain-computer interfaces.
Slides from Adobe webinar, October 29, 2013. For a complete recording of the webinar, go to adobe.ly/19Q5hPb
Human beings have always been both artifact creators, and cultural developers of concepts and meanings that interpret their artifacts collectively. In the world of ubiquitous, time-shifted, liquid content, our consumers often provide the high added value content that completes our own production.
The document discusses strategies for mobile game developers on the BlackBerry 10 platform. It recommends focusing on user discovery through the BlackBerry World storefront and Games app, retention through BBM and cross-platform leaderboards and achievements, and monetization through the BlackBerry payment ecosystem and marketing opportunities. Developers are encouraged to create exciting games rather than relying solely on tools and features to succeed on BlackBerry 10.
The document discusses the topics of social networks, big data, and some of the risks associated with online activity. It defines social networks as connections between people, emotions, technology, and information. Big data is described as the large volume of data created on the internet that is analyzed for trends and insights. Some of the risks mentioned include sexting, cyberbullying, interacting with strangers, and having a permanent digital footprint starting at a young age. It emphasizes thinking before posting online and being aware of these potential issues.
This document provides a list of various web-based teaching tools organized by topic: computer literacy, word processing, graphics/multimedia, desktop publishing, slide shows, spreadsheets, databases, and HTML. Some of the tools listed include Google Docs, Prezi, Animoto, Weebly, and Khan Academy.
Software engineering is not an easy profession. You have to constantly learn new things to improve your coding skills and make sure you produce better and cleaner code over time. It’s not difficult, but you have to be aware of a few basic principles. With them in mind you will feel a better engineer and will gain respect from your fellow engineers. And the Lord said: “Thou shall always remember to write unit tests - no matter the deadline. Remember to keep the build green. Thou shall commit often and with meaningful messages (...)”
The document describes the RailsConf 2008 conference that took place from May 29 to June 1, 2008 in Portland, Oregon. It provides details on the various sessions, speakers, tutorials, and events at the conference, including sessions on refactoring, testing, scaling Ruby applications, and using Rails to build entrepreneurial projects. Links are provided to photos and videos from the different parts of the conference program.
Within 60 seconds:
- 710 computers are sold worldwide with 555 containing Intel processors
- 1,820 terabytes of new data are created, filling over 2.6 million CDs
- 232 computers worldwide become infected with malware
- Over $75,000 is added to Google's revenue
- 2 million internet users watch online pornography
- 1.1 million instant messages are sent
- 103 Blackberries are sold
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
This is a presentation I gave at the Sept. Milwaukee Interactive Marketing Association Meeting in 2013. It talks about how I found my passion and created my "Dream Job."
History of CHI (Human-Computer Interaction)Erik Duval
This document provides a history of the development of user interfaces in computing. It traces the evolution from early computers that used switches and punch cards for programming to modern graphical user interfaces. Key developments discussed include the mouse, windows-based interfaces, and touchscreens. The document highlights pioneering systems from ENIAC to Xerox PARC that introduced new interaction paradigms. It emphasizes Doug Engelbart's influential work introducing concepts like the mouse and hypertext in the 1960s. The summary concludes by looking at potential future interfaces involving ubiquitous, tangible, and brain-computer interfaces.
Slides from Adobe webinar, October 29, 2013. For a complete recording of the webinar, go to adobe.ly/19Q5hPb
Human beings have always been both artifact creators, and cultural developers of concepts and meanings that interpret their artifacts collectively. In the world of ubiquitous, time-shifted, liquid content, our consumers often provide the high added value content that completes our own production.
The document discusses strategies for mobile game developers on the BlackBerry 10 platform. It recommends focusing on user discovery through the BlackBerry World storefront and Games app, retention through BBM and cross-platform leaderboards and achievements, and monetization through the BlackBerry payment ecosystem and marketing opportunities. Developers are encouraged to create exciting games rather than relying solely on tools and features to succeed on BlackBerry 10.
The document discusses the topics of social networks, big data, and some of the risks associated with online activity. It defines social networks as connections between people, emotions, technology, and information. Big data is described as the large volume of data created on the internet that is analyzed for trends and insights. Some of the risks mentioned include sexting, cyberbullying, interacting with strangers, and having a permanent digital footprint starting at a young age. It emphasizes thinking before posting online and being aware of these potential issues.
This document provides a list of various web-based teaching tools organized by topic: computer literacy, word processing, graphics/multimedia, desktop publishing, slide shows, spreadsheets, databases, and HTML. Some of the tools listed include Google Docs, Prezi, Animoto, Weebly, and Khan Academy.
Software engineering is not an easy profession. You have to constantly learn new things to improve your coding skills and make sure you produce better and cleaner code over time. It’s not difficult, but you have to be aware of a few basic principles. With them in mind you will feel a better engineer and will gain respect from your fellow engineers. And the Lord said: “Thou shall always remember to write unit tests - no matter the deadline. Remember to keep the build green. Thou shall commit often and with meaningful messages (...)”
The document describes the RailsConf 2008 conference that took place from May 29 to June 1, 2008 in Portland, Oregon. It provides details on the various sessions, speakers, tutorials, and events at the conference, including sessions on refactoring, testing, scaling Ruby applications, and using Rails to build entrepreneurial projects. Links are provided to photos and videos from the different parts of the conference program.
Within 60 seconds:
- 710 computers are sold worldwide with 555 containing Intel processors
- 1,820 terabytes of new data are created, filling over 2.6 million CDs
- 232 computers worldwide become infected with malware
- Over $75,000 is added to Google's revenue
- 2 million internet users watch online pornography
- 1.1 million instant messages are sent
- 103 Blackberries are sold
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
4. BeauLful
is
be"er
than
ugly
h"p://www.dailystab.com/blog/wp-‐content/uploads/2009/06/ugly.jpg
4
5. Explicit
is
be"er
than
implicit
h"p://cache2.artprinLmages.com/p/LRG/19/1922/GWT9D00Z/art-‐print/parental-‐advisory-‐explicit-‐lyrics.jpg
5
6. Simple
is
be"er
than
complex
h"p://musikality.net/wp-‐content/uploads/simplicity.jpg
6
7. Complex
is
be,er
than
complicated
h"p://vipdicLonary.com/img/life_geXng_complicated.jpg
7
8. Flat
is
be"er
than
nested
h"p://3.bp.blogspot.com/_L1y4XexY16s/S_0WXArDtWI/
AAAAAAAAVU0/oUjxL8kI0iY/s1600/NestedDoll0.jpg
8
9. Sparse
is
be"er
than
dense
h"p://www.pitch.com/imager/come-‐october-‐royals-‐dont-‐need-‐all-‐those-‐seats/b/original/
2568438/9885/Empty_seats_at_the_Royals_game_thumb.jpg
9
15. In
the
face
of
ambiguity,
refuse
the
tempta>on
to
guess.
h"p://www.doublejourney.com/wp-‐content/ambiguity.jpg
15
16. There
should
be
one-‐-‐
and
preferably
only
one
-‐-‐obvious
way
to
do
it.
h"p://www.motorcycles-‐ok.com/mokpics/x/obvious.jpg
16
17. Although
that
way
may
not
be
obvious
at
first
unless
you're
Dutch.
Dutch
Flag
h"p://ew.cachefly.net/snm/images/nm/flags/nl-‐lgflag.gif
17
18. Now
is
be"er
than
never.
h"ps://lh6.googleusercontent.com/_zGnH6HWaAi0/TY_3ysjUkOI/AAAAAAAAKSI/S168q0DA9vs/never_regret.jpg
18
19. Although
never
is
oFen
be,er
than
*right*
now.
Why,
Eddie?
h"p://idioelashback.files.wordpress.com/2010/02/van_halen_logo.jpg
19
20. If
the
implementa>on
is
hard
to
explain,
it's
a
bad
idea.
h"p://img256.imageshack.us/img256/8379/magnets.jpg
20
21. If
the
implementa>on
is
easy
to
explain,
it
may
be
a
good
idea.
h"p://images.cheezburger.com/completestore/2011/6/11/6c21f0de-‐4f50-‐4194-‐94bd-‐10ba19b77d8f.jpg
21
22. Namespaces
are
one
honking
great
idea
-‐-‐
let's
do
more
of
those!
h"p://1.bp.blogspot.com/_GfY7dNRDwYI/TUHlJyG7YKI/AAAAAAAAArU/yk-‐RtF96ZWM/s1600/ponies-‐and-‐rainbows.jpg
22
27. Lay
Out
• 4
spaces
– Unless
you’re
working
on
some
old
stuff
that
is
already
using
8
spaces
• Ver>cal
Alignment
– Either
align
with
opening
delimiter
– Or
use
extra
indenta>on
27
28. Lay
Out
• Tabs
and
Spaces
– Never
mix
the
two
(like
liquor
and
beer)
– If
in
doubt,
go
with
spaces,
only.
• Maximum
Line
Length
– 79
char.
– Use
the
implicit
line
wrap
within
parenthesis
28
28
30. Lay
Out
• Blank
Lines
– 2
lines
between
top
level
func>on
and
class
defini>on
– Use
blank
lines
to
logically
group
sec>ons
– It’s
not
MLA.
Don’t
double-‐space
your
code.
• Encodings
– Core
code
=
ASCII
or
La>n-‐1
– Code
>
3.0
should
use
UTF-‐8
30
30
32. Imports
• One
import
per
line
• Put
at
the
top
of
the
document
aFer
comments
and
doc
strings
– First
Standard
Library
– Then
related
third-‐party
imports
– Last,
applica>on
/
library
specific
imports
32
33. Whitespace
Too
much
is
too
much.
h"p://www.alistapart.com/d/whitespace/whitespace.jpg
33
34. Whitespace
• Don’t
get
cute
and
add
whitespace
within
parenthesis
or
brackets,
around
binary
operators.
– Write
it
how
you
would
normally
write
it
• Do
use
spaces
around
arithme>c
operators
– Math
is
hard
as
it
is,
don’t
make
it
harder
my
squishing
things
together...
34
34
35. Whitespace
• Don’t
put
compound
statements
on
one
line.
• Spread
that
stuff
out
so
it
is
easy
to
find
the
various
clauses
and
stuff.
35
35
36. Comments
• Comments
should
match
the
code.
• If
there
is
a
conflict,
change
one
of
them!
• Comments
should
be
complete
sentences,
wri,en
in
English.
• Lean
towards
using
block
comments.
• Use
inline
comments
sparingly.
• Don’t
be
the
obvious
troll.
36
37. Doc
Strings
• Use
them!
• PEP
257
h"p://catmacros.files.wordpress.com/2010/05/itoldyouno"odothat.jpg
37
39. Naming
ConvenLons
• Avoid:
– ‘l’,
‘O’,
‘I’
• Modules
should
be
short,
lowercase
• Classes
in
CamelCase
• Func>ons
should
be
lower_with_underscores
• Constants
should
be
UPPER_WITH_UNDER
39
39
40. Programming
RecommendaLons
• Thing
about
the
other
guys.
• Don’t
use
equality
when
comparing
singletons
• “if
X
is
not
None”
is
not
the
same
as
“if
X”
40