Slides from my talk on API Design Patterns at ScalaBay Meetup at Netflix on 09/09/2014.
http://www.meetup.com/Scala-Bay/events/195982742/
Exploiter le Web Semantic, le comprendre et y contribuerMathieu d'Aquin
The document discusses using Watson, a gateway to the Semantic Web, to both develop applications that exploit online semantic resources and to better understand the Semantic Web. It describes how Watson allows applications to dynamically retrieve and combine relevant ontologies and data. It also explains how Watson has been used as a research platform to characterize ontologies in its collection, understand relations between ontologies, and measure agreement between statements and ontologies.
Google dorks are search operators used to refine Google searches. They can be used to access secure webpages, download files, or access security cameras. Common dorks include "site:", "inurl:", "intitle:", and "filetype:" or "ext:". SQL injection is a code injection technique that exploits security vulnerabilities in database applications. It works by inserting SQL commands into user input fields to alter the meaning of SQL queries and gain unauthorized access to databases. Defenses include input validation, prepared statements, limiting privileges, and intrusion detection systems.
Building Beautiful REST APIs in ASP.NET CoreStormpath
Core 1.0 is the latest iteration of ASP.NET. What’s changed? Everything! Nate Barbettini, .NET Developer Evangelist at Stormpath, does a deep dive on how to build RESTful APIs the right way on top of ASP.NET Web API.
At Stormpath we spent 18 months researching API design best practices. Join Les Hazlewood, Stormpath CTO and Apache Shiro Chair, as he explains how to design a secure REST API, the right way. He'll also hang out for a live Q&A session at the end.
Sign up for Stormpath: https://api.stormpath.com/register
More from Stormpath: http://www.stormpath.com/blog
Les will cover:
REST + JSON API Design
Base URL design tips
API Security
Versioning for APIs
API Resource Formatting
API Return Values and Content Negotiation
API References (Linking)
API Pagination, Parameters, & Errors
Method Overloading
Resource Expansion and Partial Responses
Error Handling
Multi-tenancy
Google dorks, also known as Google hacking, involves using specific search operators and techniques on Google to find sensitive information on websites. Some key points made in the document include:
- Google dorking uses operators like "site:", "filetype:", "intitle:", and "inurl:" to refine search results and maximize search value. This can be used to uncover private information, configurations, backups, and vulnerabilities.
- Information found through Google hacking may remain exposed in Google's cache for months after being removed from websites.
- Google indexes everything publicly available on the internet, making it a powerful tool for passive information gathering, which is an important first step for hackers.
- The document encourages
This document discusses Linked Data and the best practices for publishing and interlinking data on the web. It covers four main principles:
1) Use URIs as names for things and identify real-world objects with HTTP URIs.
2) Use HTTP URIs so that people can look up those names by dereferencing the URIs.
3) Provide useful RDF information when URIs are dereferenced, using formats like RDF/XML, RDFa, N3, or Turtle.
4) Include links to other URIs to discover more related things and connect isolated data silos. This allows data to be interlinked on the Web.
I'm Andrea D'Ubaldo, I am a software developer and cyber security enthusiast. The purpose of this presentation is to warn people about google "hacking".
I don't pretend to teach, I only love sharing knowledge. Hope you enjoy ! Comments and remarks are welcome.
------------------------------------------------
Summary
- What is Google dorks
- Queries syntax
- Queries examples
- Conclusion
Google Dork Definition
"A Google dork is an employee who unknowingly exposes sensitive corporate information on the Internet. The word dork is slang for a slow-witted or in-ept person."
Margaret Rouse
Director, WhatIs.com at TechTarget
@WhatIsDotCom
What is
Google dorks is a powerful advanced search, an instrument to perform queries on Google search engine.
How it works
That queries allows the user to find detailed information over the internet, such files, hidden pages, sensitive documents and so on.
Why use
But...dork queries are considered by many an “hacking technique”. Because of his nature, the dorks can be used for different purposes, often bad purpose and we shall then see...
Queries syntax
a) inurl
Find that word or sentences in the URL
inurl: php?id=
b) related
Find that related websites
related:www.google.com
c) filetype
research by file type
filetype:pdf shakespeare
d) site
Restrict to a specific site
site:fakesite.com
e) intitle
Find that word or sentences in the title of a website
intitle: search
...Other syntax characters and operators.
Examples :
- Search files containing username and password
- Discover vulnerable server, affected by SQL Injection
- Pages containing login portal
- Sensitive directory
Credits and References
What is Google dork? – Margaret Rouse
What is Google dork? - WhatIs.com - TechTarget
whatis.techtarget.com
Conclusion
Be careful and protect your data!
Google hacking
https://en.wikipedia.org/wiki/Google_hacking
Wikipedia.
Google Hacking Database (GHDB)
https://www.exploit-db.com/google-hacking-database/
Exploit Database
Special thanks to all the people who made and released these awesome resources for free:
Presentation template by SlidesCarnival (http://www.slidescarnival.com/)
Photographs by Unsplash (http://unsplash.com/)
An Overview on PROV-AQ: Provenance Access and QueryOlaf Hartig
The slides which I used at the Dagstuhl seminar on Principles of Provenance (Feb.2012) for presenting the main contributions and open issues of the PROV-AQ document created by the W3C provenance working group.
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
We all know the power of Google—or do we? Two types of people use Google: normal users like you and me, and the not-so-normal users—the hackers. What types of information can hackers collect from Google? How severe is the damage they can cause? Is there a way to circumvent this hacking? As a security tester, Kiran Karnad uses the GHDB (Google Hacking Database) to ensure their product will not be the next target for hackers. Kiran describes how to effectively use Google the way hackers do, using advanced operators, locating exploits and finding targets, network mapping, finding user names and passwords, and other secret stuff. Kiran provides a recipe of five simple security searches that work. Learn how to automate the Google Hacking Database using Python so security tests can be incorporated as a part of the SDLC for the next product you develop.
The document discusses best practices for designing REST APIs, including following the HATEOAS principle where API responses should document available actions and links. It provides examples of building RESTful APIs in ASP.NET Core that represent resources and collections, use HTTP verbs to represent actions, and are discoverable through HATEOAS links in responses. Code samples demonstrate getting single and collections of users with metadata links and building an API root response.
The document provides tips and techniques for enhancing Google searches, including using quotation marks, operators, and advanced search options. It also discusses Google Scholar for searching academic citations and articles, and alternatives to Google like other search engines and desktop search programs. The final section reminds users to evaluate resources and consider term reusability, popularity, and archives when searching.
The document discusses approaches for building APIs over RDF data sources. It describes limitations of SPARQL and proposes the Linked Data API approach, which maps parameterized URLs to SPARQL queries to extract data views. The Linked Data API aims to optimize for common query patterns, prioritize simple RESTful interactions, and provide a pathway to exploring RDF and SPARQL. It presents a processing model involving selecting views, resources, and output formats. Open source implementations of the Linked Data API are also mentioned.
The document provides an overview of Google search techniques. It discusses what Google is, how it works, basic search functions like phrase searches and Boolean operators, and special syntax like intitle: and site: to narrow searches. It also lists various Google services and specialized search functions available on Google.
The document discusses how to use Google searches and operators to find sensitive information that could be useful for hackers. Some key points discussed include using intitle and inurl operators to find login portals and server configuration files containing passwords. Examples are given of searches to find passwords, credit card numbers, software serial numbers, and even live video feeds from unsecured cameras. The document warns that exploiting any found vulnerabilities would be unethical.
Demystifying Apache Kafka, once and for all | Jonathan Santilli, SnykHostedbyConfluent
In this talk, I would like to facilitate the on-boarding process for anyone starting with Kafka and help to destroy (yeah, destroy!) any barriers preconceived in our minds about Kafka.
Using simple and plain terms, I would explain the main concepts of Kafka and answer questions that I am used to getting, like: “Can you explain to me what Kafka is, like if I were 5 years old?”, “Is a Topic a queue?”, “How do we know how many partitions do we need for this?”, “Should we mix events coming from different sources into the same topic?”, and my favorite one: “Why is Kafka so difficult?”.
I want to share some tips that might sound obvious but they are not for everyone, especially if you are new to Kafka. I would like to guide the newcomers through the main Kafka components and how they are related to each other without leaving them with more questions than answers.
The document discusses the principles of linked open data and Resource Description Framework (RDF). It introduces RDF, SPARQL, and ontologies as standards for the semantic web. It emphasizes using URIs as names for things and linking data to enable discovery on the web. Triples are presented as the basic format for expressing statements about resources in a graph.
This document provides an overview of various HTML elements including text elements, headings, paragraphs, lists, links, and images. It describes the purpose and syntax of common inline elements such as <em> and <strong>. It also covers the use of different types of lists such as unordered and ordered lists. Links are created using the <a> element and its href attribute, and images are added with the <img> tag along with the src, alt, and title attributes. The document concludes by mentioning that next week's topic will cover either writing HTML or styling it with CSS.
The document discusses various topics related to Web 2.0 including web feeds, markup tagging, collaborative filtering, social networking, and text mining. It provides examples of using microformats to add semantics to web pages through tags like XFN for social networks, hCard for contact information, and hCalendar for events. It also discusses using RDFa and embedded RDF for metadata and tools for tagging like Delicious, Flickr, CiteULike, and Connotea.
Google provides a powerful search engine that indexes web pages. It allows for various search techniques like phrase searches using quotes, Boolean logic using AND, OR and parentheses, negation using dashes, and including synonyms using tildes. Google ignores common words by default but they can be explicitly included using plus signs. The site, inurl and related syntaxes allow narrowing searches to specific sites, URLs or related pages. Number ranges and wildcards can be used. The Feeling Lucky button directly takes users to the top search result. Within-results searching allows refining an initial result set.
Building Smarter Search Applications Using Built-In Knowledge Graphs and Quer...Lucidworks
This document discusses improving search precision through better phrase detection, such as recognizing noun phrases using autophrasing. It also describes implementing query autofiltering to map noun and verb phrases in queries to metadata fields, and providing a suggester component that leverages faceted metadata to provide contextual suggestions.
The document appears to be notes from a presentation or lecture about Linked Data and RDF. It includes definitions of key concepts like URI, URL, RDF, and Turtle syntax. Examples are provided of linking data between different datasets using URIs. Descriptions and code snippets show how to represent relationships between resources using RDF triples.
The document provides an overview of techniques for using Google to perform reconnaissance and searches. It discusses using Google to find information about people by searching for files containing personal details. It also describes using advanced Google search operators and techniques like crawling domains to find additional pages. The document warns that exposing sensitive information or vulnerabilities online could enable malicious activities.
The document provides an overview of Google search techniques in 10 sections, describing what Google is, how it works, basic and advanced search operators, using Google as a calculator, setting search preferences, and understanding Google search results. Key details include that Google is a full-text search engine that indexes web pages using spiders, supports Boolean operators and wildcards, and returns results ordered by relevance with snippets and cached pages.
The document provides an overview of basic and advanced search features available on Google search. It describes how to perform different types of searches like phrase searches, negative searches, and advanced searches using operators. It also lists other features like safe search filtering, number of results, translation, and specific searches for weather, time, calculations, book searches, and more.
This document provides an overview of how to effectively search for information using Google search. It discusses formulating search queries, using Boolean operators and search modifiers, filtering search results, and utilizing advanced search features. Examples of search engines, operators, and modifiers are given. Tips are provided for analyzing topics, using synonyms, describing needs concisely, and quoting phrases. Methods for saving useful websites located through searches are also outlined.
OSCON 2014 - API Ecosystem with Scala, Scalatra, and Swagger at NetflixManish Pandit
This document discusses Netflix's API ecosystem built using Scala, Scalatra, and Swagger. It summarizes Netflix's use of these technologies to build APIs that power their consumer electronics partner portal and enable certification of Netflix ready devices. It describes how the APIs provide a single source of truth for all device data at Netflix and correlate streaming quality metrics. It then discusses aspects of the architecture including the manager layer containing business logic, HTTP layer for handling requests/responses, and use of Scala, Scalatra, Swagger, and deployment process including immutable infrastructure.
The document discusses choosing a font for a music magazine focused on modern rock and indie music. It considers several fonts that could fit the genre by looking edgy or like a band logo. It mentions exploring different colors as well to see which pair best with the selected font. The document concludes it will try out the various fonts being considered for the magazine splash page to see which looks best.
La función es una relación entre dos variables donde a cada valor de la primera variable le corresponde un único valor de la segunda. Existen dos tipos de variables en una función: la variable independiente y la variable dependiente. Una función lineal relaciona las variables a través de la ecuación y=mx, mientras que una función afín lo hace a través de y=mx+n.
The document summarizes activities done from September 16th to 24th, including a distance lecture on digital fabrication, global discussions, introducing works to the class, an introduction on using Moodle and blogging, student presentations on self-reproducing machines, and a visit to FabLab Barcelona which has rooms for 1:1 scale models and model making using various machines like a laser cutter, 3D printer, CNC milling machine, and 3D scanner.
The Google Hacking Database: A Key Resource to Exposing VulnerabilitiesTechWell
We all know the power of Google—or do we? Two types of people use Google: normal users like you and me, and the not-so-normal users—the hackers. What types of information can hackers collect from Google? How severe is the damage they can cause? Is there a way to circumvent this hacking? As a security tester, Kiran Karnad uses the GHDB (Google Hacking Database) to ensure their product will not be the next target for hackers. Kiran describes how to effectively use Google the way hackers do, using advanced operators, locating exploits and finding targets, network mapping, finding user names and passwords, and other secret stuff. Kiran provides a recipe of five simple security searches that work. Learn how to automate the Google Hacking Database using Python so security tests can be incorporated as a part of the SDLC for the next product you develop.
The document discusses best practices for designing REST APIs, including following the HATEOAS principle where API responses should document available actions and links. It provides examples of building RESTful APIs in ASP.NET Core that represent resources and collections, use HTTP verbs to represent actions, and are discoverable through HATEOAS links in responses. Code samples demonstrate getting single and collections of users with metadata links and building an API root response.
The document provides tips and techniques for enhancing Google searches, including using quotation marks, operators, and advanced search options. It also discusses Google Scholar for searching academic citations and articles, and alternatives to Google like other search engines and desktop search programs. The final section reminds users to evaluate resources and consider term reusability, popularity, and archives when searching.
The document discusses approaches for building APIs over RDF data sources. It describes limitations of SPARQL and proposes the Linked Data API approach, which maps parameterized URLs to SPARQL queries to extract data views. The Linked Data API aims to optimize for common query patterns, prioritize simple RESTful interactions, and provide a pathway to exploring RDF and SPARQL. It presents a processing model involving selecting views, resources, and output formats. Open source implementations of the Linked Data API are also mentioned.
The document provides an overview of Google search techniques. It discusses what Google is, how it works, basic search functions like phrase searches and Boolean operators, and special syntax like intitle: and site: to narrow searches. It also lists various Google services and specialized search functions available on Google.
The document discusses how to use Google searches and operators to find sensitive information that could be useful for hackers. Some key points discussed include using intitle and inurl operators to find login portals and server configuration files containing passwords. Examples are given of searches to find passwords, credit card numbers, software serial numbers, and even live video feeds from unsecured cameras. The document warns that exploiting any found vulnerabilities would be unethical.
Demystifying Apache Kafka, once and for all | Jonathan Santilli, SnykHostedbyConfluent
In this talk, I would like to facilitate the on-boarding process for anyone starting with Kafka and help to destroy (yeah, destroy!) any barriers preconceived in our minds about Kafka.
Using simple and plain terms, I would explain the main concepts of Kafka and answer questions that I am used to getting, like: “Can you explain to me what Kafka is, like if I were 5 years old?”, “Is a Topic a queue?”, “How do we know how many partitions do we need for this?”, “Should we mix events coming from different sources into the same topic?”, and my favorite one: “Why is Kafka so difficult?”.
I want to share some tips that might sound obvious but they are not for everyone, especially if you are new to Kafka. I would like to guide the newcomers through the main Kafka components and how they are related to each other without leaving them with more questions than answers.
The document discusses the principles of linked open data and Resource Description Framework (RDF). It introduces RDF, SPARQL, and ontologies as standards for the semantic web. It emphasizes using URIs as names for things and linking data to enable discovery on the web. Triples are presented as the basic format for expressing statements about resources in a graph.
This document provides an overview of various HTML elements including text elements, headings, paragraphs, lists, links, and images. It describes the purpose and syntax of common inline elements such as <em> and <strong>. It also covers the use of different types of lists such as unordered and ordered lists. Links are created using the <a> element and its href attribute, and images are added with the <img> tag along with the src, alt, and title attributes. The document concludes by mentioning that next week's topic will cover either writing HTML or styling it with CSS.
The document discusses various topics related to Web 2.0 including web feeds, markup tagging, collaborative filtering, social networking, and text mining. It provides examples of using microformats to add semantics to web pages through tags like XFN for social networks, hCard for contact information, and hCalendar for events. It also discusses using RDFa and embedded RDF for metadata and tools for tagging like Delicious, Flickr, CiteULike, and Connotea.
Google provides a powerful search engine that indexes web pages. It allows for various search techniques like phrase searches using quotes, Boolean logic using AND, OR and parentheses, negation using dashes, and including synonyms using tildes. Google ignores common words by default but they can be explicitly included using plus signs. The site, inurl and related syntaxes allow narrowing searches to specific sites, URLs or related pages. Number ranges and wildcards can be used. The Feeling Lucky button directly takes users to the top search result. Within-results searching allows refining an initial result set.
Building Smarter Search Applications Using Built-In Knowledge Graphs and Quer...Lucidworks
This document discusses improving search precision through better phrase detection, such as recognizing noun phrases using autophrasing. It also describes implementing query autofiltering to map noun and verb phrases in queries to metadata fields, and providing a suggester component that leverages faceted metadata to provide contextual suggestions.
The document appears to be notes from a presentation or lecture about Linked Data and RDF. It includes definitions of key concepts like URI, URL, RDF, and Turtle syntax. Examples are provided of linking data between different datasets using URIs. Descriptions and code snippets show how to represent relationships between resources using RDF triples.
The document provides an overview of techniques for using Google to perform reconnaissance and searches. It discusses using Google to find information about people by searching for files containing personal details. It also describes using advanced Google search operators and techniques like crawling domains to find additional pages. The document warns that exposing sensitive information or vulnerabilities online could enable malicious activities.
The document provides an overview of Google search techniques in 10 sections, describing what Google is, how it works, basic and advanced search operators, using Google as a calculator, setting search preferences, and understanding Google search results. Key details include that Google is a full-text search engine that indexes web pages using spiders, supports Boolean operators and wildcards, and returns results ordered by relevance with snippets and cached pages.
The document provides an overview of basic and advanced search features available on Google search. It describes how to perform different types of searches like phrase searches, negative searches, and advanced searches using operators. It also lists other features like safe search filtering, number of results, translation, and specific searches for weather, time, calculations, book searches, and more.
This document provides an overview of how to effectively search for information using Google search. It discusses formulating search queries, using Boolean operators and search modifiers, filtering search results, and utilizing advanced search features. Examples of search engines, operators, and modifiers are given. Tips are provided for analyzing topics, using synonyms, describing needs concisely, and quoting phrases. Methods for saving useful websites located through searches are also outlined.
OSCON 2014 - API Ecosystem with Scala, Scalatra, and Swagger at NetflixManish Pandit
This document discusses Netflix's API ecosystem built using Scala, Scalatra, and Swagger. It summarizes Netflix's use of these technologies to build APIs that power their consumer electronics partner portal and enable certification of Netflix ready devices. It describes how the APIs provide a single source of truth for all device data at Netflix and correlate streaming quality metrics. It then discusses aspects of the architecture including the manager layer containing business logic, HTTP layer for handling requests/responses, and use of Scala, Scalatra, Swagger, and deployment process including immutable infrastructure.
The document discusses choosing a font for a music magazine focused on modern rock and indie music. It considers several fonts that could fit the genre by looking edgy or like a band logo. It mentions exploring different colors as well to see which pair best with the selected font. The document concludes it will try out the various fonts being considered for the magazine splash page to see which looks best.
La función es una relación entre dos variables donde a cada valor de la primera variable le corresponde un único valor de la segunda. Existen dos tipos de variables en una función: la variable independiente y la variable dependiente. Una función lineal relaciona las variables a través de la ecuación y=mx, mientras que una función afín lo hace a través de y=mx+n.
The document summarizes activities done from September 16th to 24th, including a distance lecture on digital fabrication, global discussions, introducing works to the class, an introduction on using Moodle and blogging, student presentations on self-reproducing machines, and a visit to FabLab Barcelona which has rooms for 1:1 scale models and model making using various machines like a laser cutter, 3D printer, CNC milling machine, and 3D scanner.
This document provides tips and guidance for speed interviewing and making a strong first impression in interviews. It discusses how first impressions are formed within the first 2-5 minutes and influence how the interviewer perceives the candidate. Key factors that impact first impressions include facial expressions, eye contact, handshakes, body language, and grooming. The document also provides strategies for defining one's personal brand, crafting an elevator pitch, preparing for different types of interviews, asking smart questions, and following best practices during the interview. The overall message is that preparation, researching the company, and knowing one's strengths and story are important for making a great first and lasting impression.
Este documento proporciona las clasificaciones de una carrera celebrada el 1 de mayo de 2009 en el Barrio La Cruz. Se dividen las categorías en benjamín, alevín, cadete, juvenil y absoluta para hombres y mujeres. Se incluye el dorsal, nombre, apellidos, club y población de cada participante.
SplashMaps Ltd is a map brand that specializes in mapping areas like Yorkshire. The document discusses how SplashMaps works with other companies to tailor maps for customers, build on mutual influence, and create premium products that satisfy client needs by extending map designs to new materials. It provides contact information for David Overton, the founder of SplashMaps, for those interested in exploring a potential partnership.
Tao helps free a wolf dog and draws pictures with colored shells. Tao's mother's name is revealed to be Vedra. Tao draws animal images in a cave such as bears, bison and mammoths. Tao and Ram meet an elder named Graybeard. Later, Tao hides behind a willow tree and finds Ram and a sick Graybeard after hearing a wolf sound.
10 Yıllık sektörel bilgi, birikim ve deneyim ile 1996 yılında kurulup, 2008 yılı başında tesisi, organizasyon yapısı, ticari ve kurumsal kimliğini geliştirerek, yeniden yapılanan Makro Grup, bağlı firması Makro Teknoloji aracılığı ile yüksek teknoloji ürünü metal dedektörleri üretmektedir.
Silicon Valley Code Camp: 2011 Introduction to MongoDBManish Pandit
This document provides an introduction and overview of MongoDB, a document-oriented NoSQL database. It discusses how MongoDB differs from relational databases, its support for schemaless documents and easy querying. Key concepts covered include collections, documents, inserting and querying data, and replication and scaling architectures like master-slave and replica sets. The document also touches on accessing MongoDB programmatically, object-document mappers, internal architecture details, administration, and comparisons to other NoSQL solutions.
To create a political cartoon, follow these steps:
1. Open a Microsoft program like Word, Publisher, or PowerPoint to build your cartoon. Use tools like the drawing toolbar, pencil tool, and color options to draw figures, images, and diagrams related to your cartoon's meaning.
2. Insert pictures or diagrams to enhance your cartoon visually.
3. Use features in the selected program, such as square objects in Word or layouts in PowerPoint, to construct and design your political cartoon.
Wish you had a 'makeup GPS' that could navigate the beauty aisles and zone in on the BEST skin and beauty products for you? You'll learn from a professional makeup artist & start the journey to becoming your own beauty expert when you get 'a beautiful education' with makeup artist & personal makeup consultant, Lillybeth Melmoth.
More info: http://abeautifuleducation.co.nz/Makeup-Consultations-in-Tauranga.html
The document discusses the systemic risk posed by AIG and how its failure could impact the US and global economy. It notes that AIG operates in over 140 countries, has over $1 trillion in insurance and financial services businesses, and its failure in 2008 threatened to trigger further failures around the world. The summary concludes that AIG's vast interconnected operations, if allowed to fail, would cause turmoil in the US economy and global markets with potentially catastrophic and unforeseen consequences.
The document summarizes research conducted into the potential target audience for a product using music from the band The Joy Formidable. By analyzing comments on the band's website, Facebook page, and YouTube videos, the researcher found that most fans commenting were between the ages of 15-19, indicating that teenagers represent the primary target audience for the product. A smaller portion of older fans over 25 were also identified. Based on this research, the summary concludes that teenagers should be the target audience aimed for.
Presentation given at Future Learning Landscape Workshop held at EC-TEL 2009. Presents some elements about the convergence of pervasive learning and Personal Learning Environments
This document discusses three topics related to project management: 1) an overview of how project management interacts with related practices like strategic planning, 2) using work breakdown structures to communicate processes and commitments, and 3) lessons learned from over 25 years of project management experience around communication, understanding stakeholders, and navigating organizational ecosystems. It provides tips for project managers around obtaining commitments, understanding different perspectives, prioritizing requirements, and making risks visible to stakeholders.
This document discusses API anti-patterns, which are commonly occurring solutions to problems that seem good on the surface but are not actually good solutions. It provides examples of anti-patterns related to request parameters, response codes, and organizational structure of APIs. The document advocates for RESTful design practices and using HTTP methods and status codes as intended to clearly represent operations.
APIs have become a part of the product ecosystem - and help the businesses by extending their developer base, and offering seamless integration with other services or products. Sometimes, the APIs themselves are the product. However, with so many APIs around, patterns emerge. Patterns are repeatable, reusable solutions to commonly occurring problems. Where there are patterns, there are also antipatterns. While APIs are not a new paradigm - there are no set standards or specifications formed by a committees or governing bodies for APIs. On top of this, the APIs are often built at various stages of the product, and have a good chance of being disjoint as more are added. In this talk Netflix engineers will discuss various antipatterns that creep into the API design and implementation, and how to identify and avoid them. They will also share their experiences with building APIs. While the antipatterns do not pose as big a functional challenge, they can and do impact integration efforts, scalability and performance among other things. After this session, you should be able to get familiar with the best practices around solving the most common patterns, and make your engineers and API consumers happy!
API Analytics with Redis and Bigquery. NoSQLmatters Cologne '14 edition. Javi...javier ramirez
At teowaki we have a system for API usage analytics, with Redis as a fast intermediate store and bigquery as a big data backend. As a result, we can launch aggregated queries on our traffic/usage data in just a few seconds and we can try and find for usage patterns that wouldn’t be obvious otherwise.In this session I will talk about how we entered the Big Data world, which alternatives we evaluated, and how we are using Redis and Bigquery to solve our problem.
This document discusses web scraping using PHP. It provides an overview of HTTP requests like GET and POST, libraries for making requests like cURL and PEAR HTTP Client, parsing responses, and best practices for web scraping applications.
BDD to the Bone: Using Behave and Selenium to Test-Drive Web ApplicationsPatrick Viafore
Talk about Behavior-driven Development, Behave, Selenium and Python
Project is found at https://github.com/pviafore/BddToTheBone
Presented at PyTennessee 2017
YouTube video -> https://youtu.be/H2FuJYlbzDg
Learning How to Shape and Configure an OData Feed for High Performing Web Sit...Woodruff Solutions LLC
This document provides an overview and best practices for configuring an OData feed. It discusses the server-side and client-side aspects of OData, including understanding REST principles, configuring server settings like validation and filtering, debugging client applications, and consuming OData in different platforms. The presentation emphasizes testing OData implementations, restricting queries for security and performance, and provides examples of custom validators.
Nicolas Grenie's presentation from HTML5 Dev Conf. 2014:
There is currently a major shift sweeping over the software industry. With each passing day the world is becoming more and more API-driven. When building an API there are many design options and Hypermedia is the new emerging way of designing APIs. Hypermedia APIs are widely used by companies such as Paypal and Amazon. In this session I will discuss the principles of Hypermedia APIs and the different ways to implement one in Node.js. I will first introduce you to a basic implementation using Express and then move on to a more advanced solution using a dedicated framework: Fortune.js. I will also share my experience of building APIbunny (http://apibunny.com), an API-driven easter game.
This document discusses the need for identifiers for things on the web to be attributable, discoverable, and allow for declarations of equivalences. It presents Subj3ct as a core model for subject declarations, equivalence statements, and resource statements with provenance that can help creators and consumers of linked data find existing and related identifiers through its ATOM/SKOS feeds, REST API, and web UI. Subj3ct aims to make mash-ups easier, applications smarter, and expand the knowledge base by helping connect linked data.
Learning How to Shape and Configure an OData Service for High Performing Web ...Woodruff Solutions LLC
This document discusses best practices for configuring OData feeds for high performance web applications. It covers topics like understanding REST principles, using query options like $filter and $orderby, enabling server-side paging, adding validation to queries, and debugging client-side OData usage. The presentation provides many examples of OData queries and recommendations for optimizing query performance and security.
Cloudera Impala provides a fast, ad hoc query capability to Apache Hadoop, complementing traditional MapReduce batch processing. Learn the design choices and architecture behind Impala, and how to use near-ubiquitous SQL to explore your own data at scale.
As presented to Portland Big Data User Group on July 23rd 2014.
http://www.meetup.com/Hadoop-Portland/events/194930422/
This document discusses the power of open data and how making data available online can enable new applications and discoveries. It provides examples of how open government data allowed for the creation of apps like a gas pump inspection checker. The document also discusses how RESTful principles and APIs have allowed systems like Twitter to be used in new ways not envisioned by their creators by opening their data to developers through standardized interfaces. Overall, the key message is that opening data can fuel innovation and discovery at a relatively low cost.
An examination of the current data portability design patterns used in Social Media sites. Looking at a possible new Open Stack concept to create true plug and play interfaces for user to exchange data.
This document discusses RESTful web services and compares them to SOAP. It proposes redesigning the Flickr API to be more RESTful by defining resources like users, photos, tags and comments and allowing them to be manipulated via HTTP methods at URI endpoints. It also discusses representing resources in different formats like XML, JSON and addressing challenges of HATEOAS through hypermedia links between related resources.
The document discusses building semantic web applications using linked open data and ontologies, describing how the speaker's company has built applications like a resource list management tool that collects, organizes, and shares course materials using RDF and SPARQL. Advice is provided on reusing existing ontologies, including links between ontologies, and best practices for URIs, HTTP methods, and handling incomplete or conflicting data from multiple sources.
Creating a RESTful API requires considering REST principles, API practices of major tech companies, and balancing purist and pragmatic approaches. The document provides guidance on designing URLs, HTTP verbs and status codes, authentication, versioning, and other concepts to create a usable and discoverable API. It emphasizes building APIs for application developers using standard patterns like OAuth2 and focusing on common use cases.
This document discusses disaster recovery, including definitions of key terms like RTO, RPO, availability, and reliability. It explains that disaster recovery plans aim to minimize data loss (RPO) and downtime (RTO) in the event of failures or disasters. Common approaches to disaster recovery include backup and restore, pilot light, warm standby, and multi-site/cloud configurations, with varying costs and abilities to reduce RTO and RPO. The document stresses testing disaster recovery plans through failure simulation, designing for fault tolerance, and monitoring systems to ensure plans can be executed successfully.
Serverless Architectures on AWS in practice - OSCON 2018Manish Pandit
From functions to containers to databases, serverless is a huge paradigm shift. The ability to only pay for what we use and not worry about underlying infrastructure is very tempting to developers and DevOps engineers, and the rate of innovation in this area has been very rapid across all major public cloud providers. Serverless architectures are the natural evolution of microservices design. While Lambda has become synonymous with serverless in AWS, there are several new and upcoming patterns that take serverless architectures to the next level.
Manish Pandit explains how to identify these patterns and put them to use. Using Marqeta’s efforts to move its payments infrastructure to the public cloud as an example, Manish explores the services that Marqeta considered, customized, hacked around, and successfully implemented as a part of this move.
Disaster recovery aims to minimize downtime and data loss in the event of a disaster. Key metrics for disaster recovery include:
RPO (Recovery Point Objective) is the maximum tolerable data loss measured backwards from the present. A lower RPO means less potential data loss.
RTO (Recovery Time Objective) is the maximum downtime tolerated before business impact. A lower RTO means faster restoration of services.
The business determines acceptable RTO and RPO based on their needs. Options to reduce RTO and RPO include backup/restore, pilot light, warm standby and multi-site configurations but with increasing costs. Regular testing of disaster recovery plans is important to measure readiness.
This document provides an overview of OAuth2 as an authorization standard. It describes the key concepts in OAuth2 including the resource owner, client, authorization server, access tokens, refresh tokens, and different grant types (authorization code, implicit, resource owner password, client credentials). It provides examples of OAuth2 flows and demonstrates some implementations.
Immutable AWS Deployments with Packer and JenkinsManish Pandit
This document discusses using Packer and Jenkins to create immutable AWS deployments. Packer is used to build machine images from the ground up with all necessary software and code pre-installed. Provisioners further configure and customize the images. Jenkins automates building the images with Packer whenever code is committed. The immutable images prevent drift and ensure consistency. The process allows fully automated deployments through launching instances from the pre-built images.
AWS Lambda with Serverless Framework and JavaManish Pandit
Serverless is a node.js based framework that makes creating, deploying, and managing serverless functions a breeze. We will use AWS Lambda as our FaaS (Function-as-a-Service) provider, although Serverless supports IBM OpenWhisk and Microsoft Azure as well.
In this session, we will talk about Serverless Applications, and Create and deploy a java-maven based AWS Lambda API. We will also explore the command line interface to manage lambda, which is provided out of the box by serverless framework.
This document provides an introduction and overview of key AWS services, including:
- Infrastructure as a Service (IaaS) offerings like EC2, EBS, S3, and regions/availability zones.
- Platform as a Service (PaaS) like RDS, DynamoDB, Lambda, and analytics services.
- Software as a Service (SaaS) examples.
It discusses architecture principles of availability, fault tolerance, and scalability that AWS supports. Brief histories of AWS and its evolution are also presented.
Securing your APIs with OAuth, OpenID, and OpenID ConnectManish Pandit
As products and companies move towards IoT model, users and machines alike need to interact with various APIs. Securing these APIs in a connected world can be a challenge faced by many. Fortunately, there are open standards addressing even the most complex of use cases - OAuth, OpenID and OpenID Connect happen to be widely adopted and have a growing support across many API and Identity Providers. In this session I'll talk about these standards, and walk through common use cases/flows from an API Provider as well as consumer's side. We will explore how these standards come together to not only secure the APIs, but also manage identity.
The document discusses motivation in the workplace. It notes that motivation creates a better work environment and encourages leadership, communication, innovation and growth. Motivation can come from intrinsic factors like personal satisfaction or extrinsic factors like pay. Different people are motivated by different things such as solving problems, passion, or recognition. Company culture also impacts motivation. Highly motivated employees are important for knowledge work especially. Organizations should find ways to improve motivation through communication, rewards, and leading by example.
Building Apis in Scala with Playframework2Manish Pandit
My talk at Silicon Valley Code Camp 2013.
Two years ago I gave a talk on PlayFramework with Java at SVCC. As with everything, PlayFramework has evolved into a far mature ecosystem with native Scala support, and Typesafe backing. PlayFramework 2 is a simple, MVC-based, convention over configuration web application framework for Java and Scala. It is rapidly gaining popularity as more and more companies are adopting it for building scalable, performant, share-nothing architectures. In this talk I'll cover the fundamentals of Play! Framework2, a brief overview of Scala, and demonstrate building a simple, RESTful API. This will be a very interactive, and hands-on session. It'd be awesome if you have played around with Scala, but if you have not, the scope of this talk does not require you to be a Scala expert. It will however be very useful if you've worked with other Web Application Frameworks like Jersey, CXF, etc. so you can cross-relate the concepts.
My talk at Scala Bay Meetup at Netflix about Powering the Partner APIs with Scalatra and Netflix OSS. This talk was delivered on September 9th 2013, at 8 PM at Netflix, Los Gatos.
Introducing Scala to your Ruby/Java Shop : My experiences at IGNManish Pandit
With the move to SOA, IGN's API engineering became a traditional Java/Ruby shop. We introduced Scala to the team in August '11. As of April '12 we have our major services running on Scala, and we could not be happier. I'll talk about the strategic & tactical rationale, gradual introduction to the new language, cultivating experts and mentoring junior developers. We will also cover the common roadblocks the leaders may run into, addressing the concerns of engineers and stakeholders, and building an engineering culture that facilitates innovation and talent growth. Please note that this talk is not a Ruby/Java/Scala religious debate - we believe in using the best tool for the job; and what works for us may not work for every org (which is where the culture comes in). My team's journey from "Holy crap! This looks academic and scary!" to "Let me whip out a service by EOD today" in a matter of months is something I am very proud of, and would love to share it with fellow developer community.
Java programs run on the Java Virtual Machine (JVM). The JVM provides a runtime environment that executes Java bytecode. Key aspects of Java include its use of object-oriented programming, garbage collection, and strong typing. Popular integrated development environments for Java include Eclipse and IntelliJ IDEA.
This document discusses object-oriented principles and design. It begins by explaining procedural code versus object-oriented code, then discusses key OO concepts like classes, objects, encapsulation, inheritance, polymorphism, interfaces, and design patterns. Specific examples are provided like modeling a game application. Overall it provides a high-level introduction to fundamental concepts in object-oriented programming and design.
Silicon Valley Code Camp 2011: Play! as you RESTManish Pandit
This document summarizes a presentation about using the Play! framework to build RESTful services. It includes an agenda that covers REST principles, traditional Java web development, the benefits of frameworks like Play!, an overview of Play! components and architecture, and a demonstration of building a RESTful API with Play! and MongoDB. The presentation promotes Play! as a developer-friendly framework that allows for rapid prototyping through features like hot reloading and convention over configuration.
My lightening talk presentation at NoSQLCamp in SF on MongoDB at IGN.
Video here - https://www.youtube.com/watch?v=aOUeqCpXaio
MongoSF 2011 - Using MongoDB for IGN's Social PlatformManish Pandit
Using MongoDB for IGN’s Social Platform
IGN uses MongoDB to power its social platform which receives 30M API calls and 7M activities daily. MongoDB is used to store activity streams, comments, notifications and other social data. Some challenges include large amounts of data, sorting activities in reverse order, and filtering activities. Caching of activity streams in Memcached improved performance. Monitoring, backups, and tools like MMS are used to manage the MongoDB deployment. Future plans include moving more data to MongoDB and sharding relationships across servers.
Silicon Valley Code Camp 2010: Social Platforms : What goes on under the hoodManish Pandit
In this session I'd share the design, architecture and implementation of some of the most common elements of any social platform - Open API, profiles, searches, lists and activity streams. These "pillers" of a social platform bear most of the weight behind a jazzy UI, and scaling them has its own challenges. I will also talk about how we built the Social Platform at IGN from ground up, including not-so-unique challenges like integration with legacy systems.
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungenpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-und-verwaltung-von-multiuser-umgebungen/
HCL Nomad Web wird als die nächste Generation des HCL Notes-Clients gefeiert und bietet zahlreiche Vorteile, wie die Beseitigung des Bedarfs an Paketierung, Verteilung und Installation. Nomad Web-Client-Updates werden “automatisch” im Hintergrund installiert, was den administrativen Aufwand im Vergleich zu traditionellen HCL Notes-Clients erheblich reduziert. Allerdings stellt die Fehlerbehebung in Nomad Web im Vergleich zum Notes-Client einzigartige Herausforderungen dar.
Begleiten Sie Christoph und Marc, während sie demonstrieren, wie der Fehlerbehebungsprozess in HCL Nomad Web vereinfacht werden kann, um eine reibungslose und effiziente Benutzererfahrung zu gewährleisten.
In diesem Webinar werden wir effektive Strategien zur Diagnose und Lösung häufiger Probleme in HCL Nomad Web untersuchen, einschließlich
- Zugriff auf die Konsole
- Auffinden und Interpretieren von Protokolldateien
- Zugriff auf den Datenordner im Cache des Browsers (unter Verwendung von OPFS)
- Verständnis der Unterschiede zwischen Einzel- und Mehrbenutzerszenarien
- Nutzung der Client Clocking-Funktion
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, presentation slides, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
Analyze the growth of meme coins from mere online jokes to potential assets in the digital economy. Explore the community, culture, and utility as they elevate themselves to a new era in cryptocurrency.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
TrsLabs - Fintech Product & Business ConsultingTrs Labs
Hybrid Growth Mandate Model with TrsLabs
Strategic Investments, Inorganic Growth, Business Model Pivoting are critical activities that business don't do/change everyday. In cases like this, it may benefit your business to choose a temporary external consultant.
An unbiased plan driven by clearcut deliverables, market dynamics and without the influence of your internal office equations empower business leaders to make right choices.
Getting things done within a budget within a timeframe is key to Growing Business - No matter whether you are a start-up or a big company
Talk to us & Unlock the competitive advantage
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
7. REST
API
REST
is
not
a
standard,
but
an
architecture
@lobster1234
8. REST
API
REST
is
not
a
standard,
but
an
architecture,
which
uses
HTTP
as
a
model
for
all
interac.ons.
If
HTTP
is
a
standard,
REST
is
a
conven&on.
@lobster1234
56. HTTP
200
OK
{
“success”
:
false
}
@lobster1234
57. HTTP
200
OK
{
“error”
:
”Person
jdoe
not
found”
}
@lobster1234
58. 2xx
for
success
3xx
for
redirects/caching
4xx
for
request/client
errors
5xx
for
server
errors
@lobster1234
59. Some
Useful
(and
not
so
common)
Codes
Return
aGer
a
delete
-‐
204
Failed
database
constraint
-‐
409
Method
not
supported
-‐
405
Trying
to
ask
for
too
much
data
-‐
413
Valida&on
Failure
-‐
418
@lobster1234
92. Requests
either
modify
the
state
of
a
resource,
or
read
it.
All
requests
to
the
cluster
see
the
same
state
of
the
resource
@lobster1234
93. Avoid
state
as
much
as
possible.
Maintain
the
state
in
the
database.
If
you
need
to
store
transient
state
on
the
server,
it’s
a
code
(or
architecture)
smell.
@lobster1234
94. Versioning
Using
301s
to
redirect/re&re
APIs
Caching
Using
HTTP
headers
correctly
Caching
response
bodies
@lobster1234