Regular expressions (regex) are patterns used to match character combinations in strings. This document introduces regex syntax and shows how to master regex from simple to complex patterns. It explains that regex can be used to avoid writing extensive code by concisely matching strings, and is supported by programming languages, tools like log analyzers, and databases. The document guides the reader through the regex syntax with examples to practice and eventually write their own complex regex patterns.
The document discusses various Python tips and tricks. It covers topics like *args and **kwargs, debugging with pdb, generators, map filter and reduce functions, set data structure, ternary operators, decorators, global and return statements, mutation, __slots__ magic, virtual environments, collections, enumerate, zip and unzip functions, object introspection, comprehensions, exceptions, classes, lambdas, one-liners, for/else loop, Python C extensions, open function, targeting Python 2+3, coroutines, function caching, and context managers. The document is intended as a reference for intermediate and advanced Python programmers to learn additional useful concepts.
1. Install prerequisite packages like GNU make, C compiler, and OpenSSL.
2. Download and extract the PostgreSQL source code.
3. Run configure to check dependencies and settings, then make and make install.
4. Create the default PostgreSQL cluster and start the database server.
5. Optionally install additional contrib modules and create a database template.
/Regex makes me want to (weep|give up|(╯°□°)╯︵ ┻━┻)\.?/ibrettflorio
REGEX! Love it or hate it, sometimes you actually need it. And when that time comes, there's no reason to be afraid or to ask help from that one weirdo on your team who actually loves regular expressions. (I'm that weirdo, fwiw.)
This session is geared towards beginning and intermediate regex users, as well as experienced programmers and developers who just don't really grok regex. We'll cover the following topics using practical examples that you might encounter in your own projects. (ie. No matching against "dog" and "cat".)
* What is regex? How's it work? A brief history.
* Syntax, special characters, character classes
* Grouping, capturing, and common gotchas
* Use cases for matching, validating, and replacing
* More advanced topics like backreferences and lookarounds
JavaScript is a client-side scripting language that allows web pages to become interactive and dynamic. It can update and modify the content of an HTML page without needing to reload the page. JavaScript code can be embedded directly in HTML pages or placed in separate .js files. Common uses of JavaScript include validating form input, detecting the visitor's browser, creating cookies, and adding interactivity to HTML elements like buttons and links.
The document provides instructions for 5 programming problems as part of a weekly challenge. Problem 1 involves writing a program to convert numbers to words. Problem 2 asks to merge two sorted text files. Problem 3 is to modify an encryption program to encrypt user input while preserving non-letter characters. Problem 4 requires generating banner text from a font file and user input. Problem 5 checks for duplicates in a Sudoku puzzle given as user input.
The document discusses JavaScript basics, including syntax, operators, conditional code, loops, functions, and other fundamental concepts. It provides examples and explanations of JavaScript syntax, basic operators, logical operators, comparison operators, conditional statements like if/else, truthy and falsy values, loops like for, while, and do-while, and functions. The document is intended as an introduction and overview of core JavaScript concepts for readers new to programming.
Achievers IT React JS Certification Course in Bangalore. ... UI Development training in Marathahalli ; also benefits as UI training online and UI Developer
Study full Stack development and fast-track your career within the IT enterprise with our entire Stack improvement route. You will come to be an expert in each of the front-stop and returned-quit with JavaScript technologies of the maximum famous MERN stack (MongoDB, specific, React, and Node.Js). You'll look at how to create features from scratch and start your profession as a full-Stack web Developer. . We will grant you interactive and exceptional portions of schooling with one hundred percent placements. Many possibilities are accessible for students who choose to work in this discipline.
The document discusses various Python tips and tricks. It covers topics like *args and **kwargs, debugging with pdb, generators, map filter and reduce functions, set data structure, ternary operators, decorators, global and return statements, mutation, __slots__ magic, virtual environments, collections, enumerate, zip and unzip functions, object introspection, comprehensions, exceptions, classes, lambdas, one-liners, for/else loop, Python C extensions, open function, targeting Python 2+3, coroutines, function caching, and context managers. The document is intended as a reference for intermediate and advanced Python programmers to learn additional useful concepts.
1. Install prerequisite packages like GNU make, C compiler, and OpenSSL.
2. Download and extract the PostgreSQL source code.
3. Run configure to check dependencies and settings, then make and make install.
4. Create the default PostgreSQL cluster and start the database server.
5. Optionally install additional contrib modules and create a database template.
/Regex makes me want to (weep|give up|(╯°□°)╯︵ ┻━┻)\.?/ibrettflorio
REGEX! Love it or hate it, sometimes you actually need it. And when that time comes, there's no reason to be afraid or to ask help from that one weirdo on your team who actually loves regular expressions. (I'm that weirdo, fwiw.)
This session is geared towards beginning and intermediate regex users, as well as experienced programmers and developers who just don't really grok regex. We'll cover the following topics using practical examples that you might encounter in your own projects. (ie. No matching against "dog" and "cat".)
* What is regex? How's it work? A brief history.
* Syntax, special characters, character classes
* Grouping, capturing, and common gotchas
* Use cases for matching, validating, and replacing
* More advanced topics like backreferences and lookarounds
JavaScript is a client-side scripting language that allows web pages to become interactive and dynamic. It can update and modify the content of an HTML page without needing to reload the page. JavaScript code can be embedded directly in HTML pages or placed in separate .js files. Common uses of JavaScript include validating form input, detecting the visitor's browser, creating cookies, and adding interactivity to HTML elements like buttons and links.
The document provides instructions for 5 programming problems as part of a weekly challenge. Problem 1 involves writing a program to convert numbers to words. Problem 2 asks to merge two sorted text files. Problem 3 is to modify an encryption program to encrypt user input while preserving non-letter characters. Problem 4 requires generating banner text from a font file and user input. Problem 5 checks for duplicates in a Sudoku puzzle given as user input.
The document discusses JavaScript basics, including syntax, operators, conditional code, loops, functions, and other fundamental concepts. It provides examples and explanations of JavaScript syntax, basic operators, logical operators, comparison operators, conditional statements like if/else, truthy and falsy values, loops like for, while, and do-while, and functions. The document is intended as an introduction and overview of core JavaScript concepts for readers new to programming.
Achievers IT React JS Certification Course in Bangalore. ... UI Development training in Marathahalli ; also benefits as UI training online and UI Developer
Study full Stack development and fast-track your career within the IT enterprise with our entire Stack improvement route. You will come to be an expert in each of the front-stop and returned-quit with JavaScript technologies of the maximum famous MERN stack (MongoDB, specific, React, and Node.Js). You'll look at how to create features from scratch and start your profession as a full-Stack web Developer. . We will grant you interactive and exceptional portions of schooling with one hundred percent placements. Many possibilities are accessible for students who choose to work in this discipline.
Java Programming Notes for Beginners by Arun Umraossuserd6b1fd
Shot notes for quick revision. Not explained extensively but suitable for last night preparation. Fit for CBSE Class XII board students for their last minute preparation.
This document provides an introduction to TypeScript, a superset of JavaScript that adds optional static types and classes. It discusses why TypeScript was created due to issues with maintaining large JavaScript codebases. The document then covers TypeScript features like type checking, classes, interfaces, modules, and how it compiles to JavaScript. It provides examples of TypeScript syntax for types, classes, interfaces, and other language features. Overall, the document serves as an introduction to TypeScript for developers familiar with JavaScript.
Regular expressions (regex) allow complex pattern matching in text. The document discusses regex basics like literals, character classes, quantifiers, and flags in Python. It explains how to use the re module to compile patterns into RegexObjects and search/match strings. RegexObjects provide reusable patterns while re module functions provide shortcuts but cache compiled patterns.
A Bonus to the "Three Interviews About Static Analyzers" Article, or Intervie...Andrey Karpov
About a week ago, I published the "Three Interviews About Static Code Analyzers" article at Habrahabr.
This article presents opinions of three experienced programmers from the companies Acronis,
AlternativaPlatform and Echelon Company concerning software development methodologies as well as
some of their ideas about using static code analyzers.
Since the article was sponsored by the OOO "Program Verification Systems" company, developer of the
PVS-Studio static analyzer, I asked Andrey Karpov (CTO) to answer some questions too. In particular, I
asked him to comment upon the most interesting aspects and ideas of all the three interviews and say a
few words for colleagues and readers, too. Here's what we've got - one more interesting interview.
Javascript Deofuscation A manual ApproachGregory Hanis
JavaScript Obfuscation has been used as a means to bypass Antivirus Engines for several years. With a rise in the number of Browser Exploits, the focus on detecting malicious JavaScript used in Web Pages has increased. This causes attackers to push the envelope of JS Obfuscation. This article will cover the concepts and techniques used in Obfuscating JS. A Manual Approach is presented which will help in reversing advanced obfuscations used in the latest Exploits as well. The purpose is to show the advantages of a Manual Approach over automated JS Unpackers. The reader is also introduced to Obfuscation features present in an Exploitation Framework, MSF.
The JavaScript Programming Language document provides an overview of the JavaScript programming language, including its history, key concepts, values, operators, statements, and objects. It notes that JavaScript is a multi-paradigm scripting language that is misunderstood as only for web development. The document outlines JavaScript's core data types, objects, functions, and prototypal inheritance model.
This document provides information about MATLAB, including how to contact The MathWorks for sales, support, or to access the user community. It describes the copyright and trademark policies for MATLAB. The revision history shows that this primer has been updated over time to correspond with new MATLAB releases since 1996.
The document provides an overview of the JavaScript programming language, including its history, key concepts, values, operators, statements, functions, and objects. It discusses JavaScript's origins, misunderstandings, dynamic and loosely typed nature, use of prototypes for inheritance rather than classes, and treatment of arrays and objects.
The JavaScript programming language is a multi-paradigm language that is misunderstood due to its name, design errors in early implementations, and use in web browsers. It is a functional language that uses objects, prototypes, and closures. Values in JavaScript include numbers, strings, Booleans, objects, null, and undefined. All other values are objects.
The JavaScript programming language is a functional language that is commonly misunderstood due to its name, mispositioning, design errors in early implementations, and use in web browsers. It was created in the 1990s and standardized as ECMAScript. JavaScript uses dynamic typing, loose typing, objects as general containers, and prototypal inheritance. Values in JavaScript include numbers, strings, Booleans, objects, null, and undefined. All other values are objects.
The JavaScript programming language is a multi-paradigm language that is misunderstood due to its name, design errors in early implementations, and use in web browsers. It is a functional language that uses objects, prototypes, and closures. Values in JavaScript include numbers, strings, Booleans, objects, null, and undefined. All other values are objects.
The document provides an overview of the JavaScript programming language, including its history, key concepts, values, operators, statements, and objects. It discusses JavaScript's misunderstood nature due to its name, design errors in early implementations, and use in browsers. Some key points made include: JavaScript is a functional language; it uses prototypal inheritance instead of classes; all values are objects except for primitive values; and functions are first-class objects that can be assigned and passed around.
This document discusses Flex and Bison, which are tools for generating lexical analyzers and parsers.
Flex is used for recognizing regular expressions and dividing input streams into tokens. Bison is used for building programs that handle structured input by taking tokens from Flex and grouping them logically based on context-free grammars.
The document explains key concepts such as shift-reduce parsing, lookahead, leftmost and rightmost derivations, and how to specify grammars, tokens, types, rules and actions in a Bison specification to build a parser. It also covers ambiguity, conflicts and how precedence and associativity help resolve shift-reduce conflicts.
Assembly Codes in C Programmes - A Short Notes by Arun Umraossuserd6b1fd
Notes for integration of Assembly language into C programming language. Suitable for novice programmer in C for embedded systems or emulators or simulators.
The document discusses various topics in Python programming including literal constants, numbers, strings, variables, data types, operators, and expressions. It defines literal constants as values that cannot be changed and lists examples. It describes the different number types in Python and issues with floating point numbers. It also covers formatting numbers, simple numeric operations, strings, variable naming rules, data types, assigning values, comments, and indentation in Python code.
The document discusses generics in the Java programming language. It introduces generics as a way to abstract over types in order to avoid casts and increase type safety. Key points include:
- Generics allow type parameters that can be substituted for actual types, like List<Integer>. This avoids casts.
- A generic type is not expanded into multiple copies - it is compiled once. Type parameters are analogous to method parameters.
- For types G and Foo/Bar, G<Foo> is not a subtype of G<Bar> due to the possibility of the collection being modified.
- Wildcard types like Collection<?> represent unknown types and are supertypes of specific collection types.
- Bounded
The document discusses generics in the Java programming language. It introduces generics as a way to abstract over types in container types like lists. Generics allow specifying the type of elements in a container (e.g. List<Integer>) to avoid casts. While this seems similar to C++ templates, generics in Java work differently - the generic code is compiled once, not multiple times. The document covers defining and using generics, wildcards, bounded wildcards, generic methods, and interoperating generics with legacy code.
Chapter 1 Introduction 9
Variables 9
Data types 9
System defined data types (Primitive data types) 10
User defined data types 10
Data Structure 10
Abstract Data Types (ADT’s) 11
Memory and Variables 11
Size of a Variable 12
Address of a Variable 12
Pointers 13
Declaration of Pointers 13
Pointers Usage 13
Pointer Manipulation 14
Arrays and Pointers 15
Dynamic Memory Allocation 15
Function Pointers 16
Parameter Passing Techniques 16
Actual and Formal Parameters 16
Semantics of Parameter Passing 17
Language Support for Parameter Passing Techniques 17
Pass by Value 17
Pass by Result 18
Pass by Value-Result 19
Pass by Reference (aliasing) 20
Pass by Name 21
Binding 22
Binding Times 22
Static Binding (Early binding) 22
Dynamic Binding (Late binding) 23
Scope 23
Static Scope 23
Dynamic Scope 24
Storage Classes 25
Auto Storage Class 25
Extern storage class 26
Register Storage Class 31
Static Storage Class 31
Storage Organization 32
Static Segment 32
Stack Segment 33
Heap Segment 35
Shallow Copy versus Deep Copy 36
This document provides an introduction to regular expressions (regex) in PHP. It begins with a basic explanation of what regex is for - matching patterns in strings. It then covers the basics of regex syntax, including delimiters, character classes, quantifiers, escaping special characters, and using regex in PHP functions like preg_match() and preg_replace(). It also discusses more advanced topics like character classes, subpatterns, backreferences, modifiers, and when not to use regex. The overall message is that regex is a powerful tool for text manipulation but needs to be used appropriately.
This document outlines steps to configure a Lambda function to send logs and events to Splunk Cloud in real-time. It involves setting up a Splunk index and HTTP Event Collector (HEC), creating an HEC token, and modifying the source type. A standalone Splunk Lambda function is created that can be invoked by other application Lambda functions to log events to Splunk Cloud. The application Lambda is modified to invoke the Splunk Lambda after starting EC2 instances to log instance details.
Java Programming Notes for Beginners by Arun Umraossuserd6b1fd
Shot notes for quick revision. Not explained extensively but suitable for last night preparation. Fit for CBSE Class XII board students for their last minute preparation.
This document provides an introduction to TypeScript, a superset of JavaScript that adds optional static types and classes. It discusses why TypeScript was created due to issues with maintaining large JavaScript codebases. The document then covers TypeScript features like type checking, classes, interfaces, modules, and how it compiles to JavaScript. It provides examples of TypeScript syntax for types, classes, interfaces, and other language features. Overall, the document serves as an introduction to TypeScript for developers familiar with JavaScript.
Regular expressions (regex) allow complex pattern matching in text. The document discusses regex basics like literals, character classes, quantifiers, and flags in Python. It explains how to use the re module to compile patterns into RegexObjects and search/match strings. RegexObjects provide reusable patterns while re module functions provide shortcuts but cache compiled patterns.
A Bonus to the "Three Interviews About Static Analyzers" Article, or Intervie...Andrey Karpov
About a week ago, I published the "Three Interviews About Static Code Analyzers" article at Habrahabr.
This article presents opinions of three experienced programmers from the companies Acronis,
AlternativaPlatform and Echelon Company concerning software development methodologies as well as
some of their ideas about using static code analyzers.
Since the article was sponsored by the OOO "Program Verification Systems" company, developer of the
PVS-Studio static analyzer, I asked Andrey Karpov (CTO) to answer some questions too. In particular, I
asked him to comment upon the most interesting aspects and ideas of all the three interviews and say a
few words for colleagues and readers, too. Here's what we've got - one more interesting interview.
Javascript Deofuscation A manual ApproachGregory Hanis
JavaScript Obfuscation has been used as a means to bypass Antivirus Engines for several years. With a rise in the number of Browser Exploits, the focus on detecting malicious JavaScript used in Web Pages has increased. This causes attackers to push the envelope of JS Obfuscation. This article will cover the concepts and techniques used in Obfuscating JS. A Manual Approach is presented which will help in reversing advanced obfuscations used in the latest Exploits as well. The purpose is to show the advantages of a Manual Approach over automated JS Unpackers. The reader is also introduced to Obfuscation features present in an Exploitation Framework, MSF.
The JavaScript Programming Language document provides an overview of the JavaScript programming language, including its history, key concepts, values, operators, statements, and objects. It notes that JavaScript is a multi-paradigm scripting language that is misunderstood as only for web development. The document outlines JavaScript's core data types, objects, functions, and prototypal inheritance model.
This document provides information about MATLAB, including how to contact The MathWorks for sales, support, or to access the user community. It describes the copyright and trademark policies for MATLAB. The revision history shows that this primer has been updated over time to correspond with new MATLAB releases since 1996.
The document provides an overview of the JavaScript programming language, including its history, key concepts, values, operators, statements, functions, and objects. It discusses JavaScript's origins, misunderstandings, dynamic and loosely typed nature, use of prototypes for inheritance rather than classes, and treatment of arrays and objects.
The JavaScript programming language is a multi-paradigm language that is misunderstood due to its name, design errors in early implementations, and use in web browsers. It is a functional language that uses objects, prototypes, and closures. Values in JavaScript include numbers, strings, Booleans, objects, null, and undefined. All other values are objects.
The JavaScript programming language is a functional language that is commonly misunderstood due to its name, mispositioning, design errors in early implementations, and use in web browsers. It was created in the 1990s and standardized as ECMAScript. JavaScript uses dynamic typing, loose typing, objects as general containers, and prototypal inheritance. Values in JavaScript include numbers, strings, Booleans, objects, null, and undefined. All other values are objects.
The JavaScript programming language is a multi-paradigm language that is misunderstood due to its name, design errors in early implementations, and use in web browsers. It is a functional language that uses objects, prototypes, and closures. Values in JavaScript include numbers, strings, Booleans, objects, null, and undefined. All other values are objects.
The document provides an overview of the JavaScript programming language, including its history, key concepts, values, operators, statements, and objects. It discusses JavaScript's misunderstood nature due to its name, design errors in early implementations, and use in browsers. Some key points made include: JavaScript is a functional language; it uses prototypal inheritance instead of classes; all values are objects except for primitive values; and functions are first-class objects that can be assigned and passed around.
This document discusses Flex and Bison, which are tools for generating lexical analyzers and parsers.
Flex is used for recognizing regular expressions and dividing input streams into tokens. Bison is used for building programs that handle structured input by taking tokens from Flex and grouping them logically based on context-free grammars.
The document explains key concepts such as shift-reduce parsing, lookahead, leftmost and rightmost derivations, and how to specify grammars, tokens, types, rules and actions in a Bison specification to build a parser. It also covers ambiguity, conflicts and how precedence and associativity help resolve shift-reduce conflicts.
Assembly Codes in C Programmes - A Short Notes by Arun Umraossuserd6b1fd
Notes for integration of Assembly language into C programming language. Suitable for novice programmer in C for embedded systems or emulators or simulators.
The document discusses various topics in Python programming including literal constants, numbers, strings, variables, data types, operators, and expressions. It defines literal constants as values that cannot be changed and lists examples. It describes the different number types in Python and issues with floating point numbers. It also covers formatting numbers, simple numeric operations, strings, variable naming rules, data types, assigning values, comments, and indentation in Python code.
The document discusses generics in the Java programming language. It introduces generics as a way to abstract over types in order to avoid casts and increase type safety. Key points include:
- Generics allow type parameters that can be substituted for actual types, like List<Integer>. This avoids casts.
- A generic type is not expanded into multiple copies - it is compiled once. Type parameters are analogous to method parameters.
- For types G and Foo/Bar, G<Foo> is not a subtype of G<Bar> due to the possibility of the collection being modified.
- Wildcard types like Collection<?> represent unknown types and are supertypes of specific collection types.
- Bounded
The document discusses generics in the Java programming language. It introduces generics as a way to abstract over types in container types like lists. Generics allow specifying the type of elements in a container (e.g. List<Integer>) to avoid casts. While this seems similar to C++ templates, generics in Java work differently - the generic code is compiled once, not multiple times. The document covers defining and using generics, wildcards, bounded wildcards, generic methods, and interoperating generics with legacy code.
Chapter 1 Introduction 9
Variables 9
Data types 9
System defined data types (Primitive data types) 10
User defined data types 10
Data Structure 10
Abstract Data Types (ADT’s) 11
Memory and Variables 11
Size of a Variable 12
Address of a Variable 12
Pointers 13
Declaration of Pointers 13
Pointers Usage 13
Pointer Manipulation 14
Arrays and Pointers 15
Dynamic Memory Allocation 15
Function Pointers 16
Parameter Passing Techniques 16
Actual and Formal Parameters 16
Semantics of Parameter Passing 17
Language Support for Parameter Passing Techniques 17
Pass by Value 17
Pass by Result 18
Pass by Value-Result 19
Pass by Reference (aliasing) 20
Pass by Name 21
Binding 22
Binding Times 22
Static Binding (Early binding) 22
Dynamic Binding (Late binding) 23
Scope 23
Static Scope 23
Dynamic Scope 24
Storage Classes 25
Auto Storage Class 25
Extern storage class 26
Register Storage Class 31
Static Storage Class 31
Storage Organization 32
Static Segment 32
Stack Segment 33
Heap Segment 35
Shallow Copy versus Deep Copy 36
This document provides an introduction to regular expressions (regex) in PHP. It begins with a basic explanation of what regex is for - matching patterns in strings. It then covers the basics of regex syntax, including delimiters, character classes, quantifiers, escaping special characters, and using regex in PHP functions like preg_match() and preg_replace(). It also discusses more advanced topics like character classes, subpatterns, backreferences, modifiers, and when not to use regex. The overall message is that regex is a powerful tool for text manipulation but needs to be used appropriately.
This document outlines steps to configure a Lambda function to send logs and events to Splunk Cloud in real-time. It involves setting up a Splunk index and HTTP Event Collector (HEC), creating an HEC token, and modifying the source type. A standalone Splunk Lambda function is created that can be invoked by other application Lambda functions to log events to Splunk Cloud. The application Lambda is modified to invoke the Splunk Lambda after starting EC2 instances to log instance details.
The document discusses configuring Bamboo for continuous integration and deployment of Tibco BW6 projects. It includes steps for plan level configuration, defining stages for validating source code, building, deploying to dev, and running regression tests. It also describes creating a deployment project to handle moving builds from test to load environments.
The document discusses various differences between Tibco BW 5 and BW 6, including:
- BW 6 allows for long-running process instances while BW 5 uses short-running instances. BW 6 also introduces conversations.
- BW 6 allows for hot deployments where changes are refreshed in the JVM without restarts.
- BW 6 uses TEA for administration instead of the classic administrator.
- Processes in BW 6 can be exposed as web services without requiring a transport.
This document discusses invoking REST through an HTTP palette. It states that pages 1 through 3 contain unimportant information and to skip to the end of page 3. The end discusses starting a process and invoking a sample request through a browser to see a response returned. It also mentions invoking the same process through an HTTP palette using the 5.x version.
This document provides instructions and examples for creating dashboards and visualizations in Tableau. It covers connecting to data sources, basic visualization types like maps and bar charts, formatting options, filters, pages, dashboards, custom SQL, linking to web pages, and other advanced functions. The goal is to help users leverage the power of visual perception to communicate information clearly and efficiently through designed dashboards.
This document provides an overview of Tibco BusinessWorks and discusses various concepts including channels, events, destinations, rules, global variables, concepts, scorecards, rule functions, and inferencing. It also demonstrates how to create projects in BE Studio including building CDD files, starting projects locally, handling different event types, using JMS channels, timer events, advisory events, and more. The document contains detailed steps and screenshots to explain key capabilities and functionality within the Tibco BusinessWorks platform.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
Regular expressions
1. Regular Expressions From Beginner To Expert By Varun
Date: December 24, 2018
In this document want to show how to master regex. I wasn’t good at regex until I realized its power and
the necessity to understand and master it.
---- Avoid writing lines and lines of code by using power of regex.
---- The regex shown here will take you from a simple example to the complex patterns.
---- Lot of tools apart from all the programming languages support regex.
---- I personally know integration tools such as Ca-Api-Gateway, Apigee, TibcoFlogo, Mulesoft where
regex can be used and match complex patterns, save unnecessary code for pattern match.
---- Logging slutions like ELK, Splunk support full on regex.
---- Analytical tools such as Tableau support full on regex.
---- Please follow ths document and practice along by the end of it. You will start writing complex regex
on your own.
2. Regexp By Varun Kumar 3134330169
Page 1 of 50
Contents
Introduction ......................................................................................................................................3
What are regular expressions.....................................................................................................3
Why to learn regular expressions ..............................................................................................3
How regex is created ...................................................................................................................3
Tools Used....................................................................................................................................4
Basic Syntax Regex .....................................................................................................................5
All About Characters .......................................................................................................................5
Character Literals.........................................................................................................................5
Character Classes........................................................................................................................6
Forward Boundary .......................................................................................................................7
Character Range...........................................................................................................................8
Regex Live Example ..................................................................................................................10
Negation Characters ..................................................................................................................12
Meta Characters .............................................................................................................................13
What are Meta Characters .........................................................................................................13
Wild Card Meta Characters Part 1 ............................................................................................15
Escaping Meta Characters ........................................................................................................19
Predifined Character Classes ...................................................................................................20
Anchors And Word Boundary.......................................................................................................22
Anchors.......................................................................................................................................22
Word Boundary ..........................................................................................................................24
Quantifiers ......................................................................................................................................26
? quantifier..................................................................................................................................26
* Quantifier..................................................................................................................................28
Matching Example......................................................................................................................28
+ Quantifier .................................................................................................................................32
{} Quantifiers To Limit Range ...................................................................................................33
{min,} Quantifiers .......................................................................................................................33
{min,max} Quantifiers................................................................................................................34
Greedy Quantifiers.....................................................................................................................35
3. Regexp By Varun Kumar 3134330169
Page 2 of 50
Lazy Or Reluctant Quantifiers...................................................................................................36
Alternative For Lazy Quantifiers...........................................................................................36
Greedy Quantifiers vs Lazy Quantifiers...............................................................................38
Increasing the performance of the RegeX...........................................................................39
Groups In Regex ............................................................................................................................40
Group Examples.........................................................................................................................40
Back Refrencing In Groups.......................................................................................................42
Non-Capturing Groups ..............................................................................................................43
Alteration In Groups ..................................................................................................................43
Nesting in Groups/Alternation ..................................................................................................44
Assertions.......................................................................................................................................45
Look Ahead Assertion ...............................................................................................................45
Positive Look Ahead Assertion ................................................................................................45
Negative Look Ahead Assertion ...............................................................................................46
Look Behind Assertions............................................................................................................46
Positive Look Behind Assertion...............................................................................................46
Negative Look Behind Assertion..............................................................................................47
Real Life Scenarios ........................................................................................................................47
Example From My Project Work ...................................................................................................49
4. Regexp By Varun Kumar 3134330169
Page 3 of 50
Introduction
What are regular expressions
Why to learn regular expressions
Used in all programming languages. Also used in caApiGateway and Apigee
For example validating user input into a form
How regex is created
5. Regexp By Varun Kumar 3134330169
Page 4 of 50
Tools Used
Tools used for learning the regex during the course of this document.
Online regex tester
https://regex101.com
https://regexr.com
https://www/regextester.com
Offline Regex Testers
https://atom.io
reach regex by using ctrl+F or below steps
6. Regexp By Varun Kumar 3134330169
Page 5 of 50
Regexp are case sensitive.
Basic Syntax Regex
Used in all programming languages. Also used in Api Management tools such as, caApiGateway and Apigee
All About Characters
Character Literals
Takes the string as it is.
7. Regexp By Varun Kumar 3134330169
Page 6 of 50
Regexby default is case sensitive.
:/Java/gm (Case sensitive)
:/Java/gmi (Case insensitive)
Regex starts searching from left to right
Character Classes
Character class are enclosed in [] brackets
8. Regexp By Varun Kumar 3134330169
Page 7 of 50
Forward Boundary
>> Forward boundary uses the following pattern ‘b’
say in this you want to match only the word bet and not sub string that may contain bet.
9. Regexp By Varun Kumar 3134330169
Page 8 of 50
Character Range
10. Regexp By Varun Kumar 3134330169
Page 9 of 50
Say there are 5 employes and you want to match only the emp 1,2,3
Write a regex to match the first 3 words.
Indexes of alphabets and numbers
11. Regexp By Varun Kumar 3134330169
Page 10 of 50
You needs to match the index when defining the character ranges you need to go from small to big
[A-z] This is correct
[a-Z] This is wrong.
Regex Live Example
<!DOCTYPE html>
<html>
<head>
<title>Testing Regular Expressions in HTML forms</title>
</head>
<body>
<h1>Test your Regular Expressions here</h1>
<fieldset>
<legend>Write your Regular expressions</legend>
<form>
<div>
<label for="display-name"> Prove that you are not a robot:
<span class="warning">*(Enter a single English capital letter.)</span>
</label>
<input type="text" id="display-name" name="ip-display"
pattern="[A-Z]"
title="Enter any single English capital Letter only"/>
</div>
<div>
<input type="submit" class="submit" value="Submit" />
</div>
</form>
</fieldset>
</body>
</html>
13. Regexp By Varun Kumar 3134330169
Page 12 of 50
Negation Characters
Are represented with a ^ symbol inside [] brackets.
[^a-e] will match all characters except a-e
Example 1:-
The First Character should be any character except a comma(,)
The Second Character must be a comma(,)
The Third Character should be any character except a comma(,)
Example 2:-
The First Character must be a vowel(a,e,i,o,u)
The Second Character must be a English alphabet(it can be lowercase or
uppercase English alphabets)
14. Regexp By Varun Kumar 3134330169
Page 13 of 50
The Third Character must a single number
The Fourth Character should be any character except a Hyphen(-)
The Fifth Character must be a Hyphen(-)
The Sixth Character should be any character except a Hyphen(-)
Meta Characters
What are Meta Characters
In regex each character is described as normal character or meta character.
Special character that have special meaning.
15. Regexp By Varun Kumar 3134330169
Page 14 of 50
used to preceed a meta char or predefine character class.
^ negation character and used in anchors
^ Is also used for matching a boundary at the start of the line
$ Is used for matching a boundary at the end of the line
. used to match any character aprart from new line
? quantifiers
* quantifiers
+ quantifiers
{} quantifiers
| Alternation
() Grouping
[] Ranges
= Assertions (look ahead, look behind)
! Assertions (look ahead, look behind)
16. Regexp By Varun Kumar 3134330169
Page 15 of 50
Wild Card Meta Characters Part 1
. meta character is also called wild card metacharacter
To match only one character
17. Regexp By Varun Kumar 3134330169
Page 16 of 50
New line char is represented by n. Line break.
18. Regexp By Varun Kumar 3134330169
Page 17 of 50
s whitespace
Matches new line followed by whitespace
b is a boundary between a word and a non word character
25. Regexp By Varun Kumar 3134330169
Page 24 of 50
Word Boundary
Is used to match the boundary between word and non-word character.
26. Regexp By Varun Kumar 3134330169
Page 25 of 50
Captures all word boundaries
All non-word boundary characters.
27. Regexp By Varun Kumar 3134330169
Page 26 of 50
Quantifiers
In regx there are 4 types of Quantifiers.
A quantifier is used after a charcter or group and decides how the character or group before the quantifier
will occur.
? quantifier
29. Regexp By Varun Kumar 3134330169
Page 28 of 50
* Quantifier
Matching Example
Q.1) Create a Regular Expression to match a pattern like below -
30. Regexp By Varun Kumar 3134330169
Page 29 of 50
User has to provide a valid Name of company in an on line Form and it can have
any alphanumeric value.
Hint:
-----
Name of a company can contain alphanumeric characters
Assumption:
-----------
Here, we assume that the names of the company does not contain any other
special characters. If your requirement is to match a company name with special
characters as well, then the RegeX will change accordingly.
Different waves to achieve it.
34. Regexp By Varun Kumar 3134330169
Page 33 of 50
{} Quantifiers To Limit Range
{min,} Quantifiers
35. Regexp By Varun Kumar 3134330169
Page 34 of 50
{min,max} Quantifiers
36. Regexp By Varun Kumar 3134330169
Page 35 of 50
Greedy Quantifiers
There is a fix for the greedy natures of the quantifiers by making the quantifiers “Lazy” or “Reluctant”
quantifiers.
37. Regexp By Varun Kumar 3134330169
Page 36 of 50
Lazy Or Reluctant Quantifiers
Alternative For Lazy Quantifiers
When making a quantifier Lazy this will result in increased processing time and this when used in
applications(bulding live applications) will cause lags. This can be over come by using negation characters.
39. Regexp By Varun Kumar 3134330169
Page 38 of 50
Greedy Quantifiers vs Lazy Quantifiers
40. Regexp By Varun Kumar 3134330169
Page 39 of 50
In the pattern match of xml tags we have seen earlier the Lazy quantifiers are much better than greedy
quantifiers.
Increasing the performance of the RegeX
The normal behavior of a quantifier is always Greedy and in some cases, Greedy quantifiers can lead to performance issues and in
some cases, Lazy Quantifier can also lead to performance issues.
Note:
If we find that Greedy Quantifiers have performance issue in your search pattern, then try changing it to Lazy Quantifier and see if it
improves the performance. On the other hand, if you have a lazy Quantifier which has a performance issue, try to change it into Greedy
Quantifier to see if the performance increases. We can also try to use the Negation character to improve the performance.
The key to performance is to always remember -
41. Regexp By Varun Kumar 3134330169
Page 40 of 50
** Greedy matches the longest possible string
** Lazy matches the smallest possible string
So, remember this, if we try to make Greedy quantifier as Lazy then the meaning will change like this -
{min,max}? - Repeat minimum 'min' times and maximum 'max' times, but as few times as possible(lowest is 'min' times)
{min,}? - Repeat minimum 'min' times and maximum any times, but as few times as possible(lowest is 'min' times)
*? - Repeat any number of times, but as few times as possible(lowest is 0 time)
+? - Repeat any number of times, but as few times as possible(lowest is 1 time)
?? - Repeat either 0 time or 1 time, but as few times as possible(lowest is 0 time)
Groups In Regex
1) Improves the redability of regex
2) Groups can be reused in complex expressions.
Group Examples
42. Regexp By Varun Kumar 3134330169
Page 41 of 50
The above regex is to match word regex and match only 3 numbers after it.
43. Regexp By Varun Kumar 3134330169
Page 42 of 50
Back Refrencing In Groups
In order to match all the words in the list
44. Regexp By Varun Kumar 3134330169
Page 43 of 50
Non-Capturing Groups
In order to optimize a regex it is better to make a group non-capturing group it optimizes the regex and
increases the performance.
A group can be made non-capturing by using the following syntax (:?)
Alteration In Groups
45. Regexp By Varun Kumar 3134330169
Page 44 of 50
Nesting in Groups/Alternation
46. Regexp By Varun Kumar 3134330169
Page 45 of 50
Assertions
Look Ahead Assertion
Positive Look Ahead Assertion
48. Regexp By Varun Kumar 3134330169
Page 47 of 50
Negative Look Behind Assertion
Real Life Scenarios
index.html style.css validation.js
Matching First/Last Name
Rules to be followed for First Last name
49. Regexp By Varun Kumar 3134330169
Page 48 of 50
Modify the first/last name as shown below
Matching Username
Modify the .js as shown
Matching Passwords
50. Regexp By Varun Kumar 3134330169
Page 49 of 50
Matching Email
Matching Phone Number
Example From Real World
After learning what I learnt from the start till this point in this document was able to do complex regex directly
in the real world.
Payload
{
"shipments": [
{
"pickup": "1000000061",
"distributionCenter": "CLSCL1",
"packages": [
{
"consigneeAddress": {
"address1": "apt 123",
"address2": "apt 123",
"address3": "SANTIAGO",
"city": "REGION METROPOLITANA",
"country": "CL",
51. Regexp By Varun Kumar 3134330169
Page 50 of 50
"email": "test@email.com",
"name": "Test Name",
"phone": "5555555",
"state": "REGION METROPOLITANA"
},
"packageDetails": {
"currency": "CLP",
"orderedProduct": "501180",
"packageDesc": "Desc",
"packageId": "TEST1234L1",
"weight": 10,
"weightUom": "G"
}
}
]
}
]
}
Match "shipments": [ from the payload