SlideShare ist ein Scribd-Unternehmen logo
1 von 19
X University Overview
What to Expect at the Hackathon




Jonathan LeBlanc
Developer Evangelist
jleblanc@x.com
@jcleblanc
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
X University: Inaugural Launch




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
X University: What is a Hacker?

• The entrepreneurial spirit.

• The “just get it done”
  attitude.

• The ability to wear many
  hats.

X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What is a Hack: What We’re Looking For

Build something that uses eBay products in new,
fun and innovative ways.

Products include
     – eBay                           – Magento
     – PayPal                         – Milo
     – X.commerce                     – RedLaser


X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What is a Hack: Fix Something

                 Fix Something That Ticks you off




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What is a Hack: Something Different




                                      Build Something
                                      Different




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What is a Hack: Something Fun

                           Build Something Fun
                          Katamari Browser Hack




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Syllabus: Friday Technical Talks

5:00pm – 7:00pm
Technical talks on:
     –   The program overview & how to present your ideas in 90 seconds.
     –   Hacking with eBay APIs
     –   ql.io, our new open source querying system
     –   PayPal APIs


7:00pm – 8:00pm
Dinner and finding teams


X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Syllabus: Saturday – Sunday Hackathon

       Saturday                       Sunday

       11:00am - 12:00pm              12:30pm - 3:30pm
       Hack registration              Hack Presentations

       12:00pm (Saturday) -           3:30pm - 5:00pm
       12:00pm (Sunday)               Judge Deliberation, Winners
       Hacking!                       announced and closing words.




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: Fail Early

 Fail Early, Fail Fast, Fail
 Often

 “I have not failed. I've
 just found 10,000 ways
 that won't work.”
 - Thomas A. Edison




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: Use Available Tools

                          Don’t Reinvent the wheel




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: Backup Your Code!

                                      Bad stuff happens!

                                      Github
                                      http://github.com

                                      Bitbucket
                                      http://bitbucket.org


X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: Hard Problems First
 Don’t wait to work
 out hard issues.

 "The brain regions that
 are impaired when you
 are sleep-deprived are
 the same ones that are
 impaired with aging,”
 - Todd Maddox


X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: The Presentation


                      Practice your presentations
                            (3 min in length)

                           Don’t use PowerPoint!




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce

Weitere ähnliche Inhalte

Ähnlich wie X University Georgia Tech: Overview

How to Build Your MVP
How to Build Your MVPHow to Build Your MVP
How to Build Your MVPAbby Fichtner
 
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...Steve Omohundro
 
Hackers, hackathons, and you
Hackers, hackathons, and youHackers, hackathons, and you
Hackers, hackathons, and youRTigger
 
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research EssayHIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essaysorayan5ywschuit
 
HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10Scott Edmunds
 
How Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive BidHow Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive BidIntelCollab.com
 
Maryland Library Association 2008 Conference Creating a Technology Petting Zoo
Maryland Library Association 2008 Conference Creating a Technology Petting ZooMaryland Library Association 2008 Conference Creating a Technology Petting Zoo
Maryland Library Association 2008 Conference Creating a Technology Petting ZooBald Geek In Md
 
KSIT Tech Form - Introduction to artificial intelligence (AI)
KSIT Tech Form - Introduction to artificial intelligence (AI)KSIT Tech Form - Introduction to artificial intelligence (AI)
KSIT Tech Form - Introduction to artificial intelligence (AI)Santosh Kumar
 
Opportunities with data science
Opportunities with data scienceOpportunities with data science
Opportunities with data scienceAshiq Rahman
 
Innovation & Problem Solving - Heritage Hub 9 July 2014
Innovation & Problem Solving - Heritage Hub 9 July 2014Innovation & Problem Solving - Heritage Hub 9 July 2014
Innovation & Problem Solving - Heritage Hub 9 July 2014Innovation Birmingham Ltd
 
2012 Confoo: Changing the Face of Identity in Ecommerce
2012 Confoo: Changing the Face of Identity in Ecommerce2012 Confoo: Changing the Face of Identity in Ecommerce
2012 Confoo: Changing the Face of Identity in EcommerceJonathan LeBlanc
 
Drew Conway: A Social Scientist's Perspective on Data Science
Drew Conway: A Social Scientist's Perspective on Data ScienceDrew Conway: A Social Scientist's Perspective on Data Science
Drew Conway: A Social Scientist's Perspective on Data Sciencemortardata
 
How to create a taxonomy for management buy-in
How to create a taxonomy for management buy-inHow to create a taxonomy for management buy-in
How to create a taxonomy for management buy-inMary Chitty
 
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...Christine Souffrant Ntim
 
Thinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventThinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventMike Cardus
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for DummiesLiberteks
 

Ähnlich wie X University Georgia Tech: Overview (20)

How to Build Your MVP
How to Build Your MVPHow to Build Your MVP
How to Build Your MVP
 
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
 
Hacking101 delhi 2013
Hacking101 delhi 2013Hacking101 delhi 2013
Hacking101 delhi 2013
 
Google Innovation Culture
Google Innovation CultureGoogle Innovation Culture
Google Innovation Culture
 
Hackers, hackathons, and you
Hackers, hackathons, and youHackers, hackathons, and you
Hackers, hackathons, and you
 
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research EssayHIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
 
HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10
 
How Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive BidHow Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive Bid
 
Georgia Tech Hack Day
Georgia Tech Hack DayGeorgia Tech Hack Day
Georgia Tech Hack Day
 
Maryland Library Association 2008 Conference Creating a Technology Petting Zoo
Maryland Library Association 2008 Conference Creating a Technology Petting ZooMaryland Library Association 2008 Conference Creating a Technology Petting Zoo
Maryland Library Association 2008 Conference Creating a Technology Petting Zoo
 
KSIT Tech Form - Introduction to artificial intelligence (AI)
KSIT Tech Form - Introduction to artificial intelligence (AI)KSIT Tech Form - Introduction to artificial intelligence (AI)
KSIT Tech Form - Introduction to artificial intelligence (AI)
 
Opportunities with data science
Opportunities with data scienceOpportunities with data science
Opportunities with data science
 
Innovation & Problem Solving - Heritage Hub 9 July 2014
Innovation & Problem Solving - Heritage Hub 9 July 2014Innovation & Problem Solving - Heritage Hub 9 July 2014
Innovation & Problem Solving - Heritage Hub 9 July 2014
 
2012 Confoo: Changing the Face of Identity in Ecommerce
2012 Confoo: Changing the Face of Identity in Ecommerce2012 Confoo: Changing the Face of Identity in Ecommerce
2012 Confoo: Changing the Face of Identity in Ecommerce
 
Drew Conway: A Social Scientist's Perspective on Data Science
Drew Conway: A Social Scientist's Perspective on Data ScienceDrew Conway: A Social Scientist's Perspective on Data Science
Drew Conway: A Social Scientist's Perspective on Data Science
 
York presentation
York presentationYork presentation
York presentation
 
How to create a taxonomy for management buy-in
How to create a taxonomy for management buy-inHow to create a taxonomy for management buy-in
How to create a taxonomy for management buy-in
 
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
 
Thinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventThinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First Event
 
System Engineering for Dummies
System Engineering for DummiesSystem Engineering for Dummies
System Engineering for Dummies
 

Mehr von Jonathan LeBlanc

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessJonathan LeBlanc
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer WorkshopJonathan LeBlanc
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security PracticesJonathan LeBlanc
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI ElementsJonathan LeBlanc
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingJonathan LeBlanc
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyJonathan LeBlanc
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data SecurityJonathan LeBlanc
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data SecurityJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityJonathan LeBlanc
 

Mehr von Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable Security
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

X University Georgia Tech: Overview

  • 1. X University Overview What to Expect at the Hackathon Jonathan LeBlanc Developer Evangelist jleblanc@x.com @jcleblanc
  • 2. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 3. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 4. X University: Inaugural Launch X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 5. X University: What is a Hacker? • The entrepreneurial spirit. • The “just get it done” attitude. • The ability to wear many hats. X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 6. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 7. What is a Hack: What We’re Looking For Build something that uses eBay products in new, fun and innovative ways. Products include – eBay – Magento – PayPal – Milo – X.commerce – RedLaser X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 8. What is a Hack: Fix Something Fix Something That Ticks you off X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 9. What is a Hack: Something Different Build Something Different X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 10. What is a Hack: Something Fun Build Something Fun Katamari Browser Hack X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 11. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 12. Syllabus: Friday Technical Talks 5:00pm – 7:00pm Technical talks on: – The program overview & how to present your ideas in 90 seconds. – Hacking with eBay APIs – ql.io, our new open source querying system – PayPal APIs 7:00pm – 8:00pm Dinner and finding teams X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 13. Syllabus: Saturday – Sunday Hackathon Saturday Sunday 11:00am - 12:00pm 12:30pm - 3:30pm Hack registration Hack Presentations 12:00pm (Saturday) - 3:30pm - 5:00pm 12:00pm (Sunday) Judge Deliberation, Winners Hacking! announced and closing words. X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 14. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 15. Hack Strategies 101: Fail Early Fail Early, Fail Fast, Fail Often “I have not failed. I've just found 10,000 ways that won't work.” - Thomas A. Edison X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 16. Hack Strategies 101: Use Available Tools Don’t Reinvent the wheel X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 17. Hack Strategies 101: Backup Your Code! Bad stuff happens! Github http://github.com Bitbucket http://bitbucket.org X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 18. Hack Strategies 101: Hard Problems First Don’t wait to work out hard issues. "The brain regions that are impaired when you are sleep-deprived are the same ones that are impaired with aging,” - Todd Maddox X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 19. Hack Strategies 101: The Presentation Practice your presentations (3 min in length) Don’t use PowerPoint! X.commerce University: Georgia Tech http://www.x.com | @x_commerce

Hinweis der Redaktion

  1. More information at http://x.com
  2. Photo Slurp: https://github.com/jcleblanc/photo_slurp
  3. Katamari browser hack: http://kathack.com/