SlideShare une entreprise Scribd logo
1  sur  19
X University Overview
What to Expect at the Hackathon




Jonathan LeBlanc
Developer Evangelist
jleblanc@x.com
@jcleblanc
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
X University: Inaugural Launch




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
X University: What is a Hacker?

• The entrepreneurial spirit.

• The “just get it done”
  attitude.

• The ability to wear many
  hats.

X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What is a Hack: What We’re Looking For

Build something that uses eBay products in new,
fun and innovative ways.

Products include
     – eBay                           – Magento
     – PayPal                         – Milo
     – X.commerce                     – RedLaser


X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What is a Hack: Fix Something

                 Fix Something That Ticks you off




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What is a Hack: Something Different




                                      Build Something
                                      Different




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What is a Hack: Something Fun

                           Build Something Fun
                          Katamari Browser Hack




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Syllabus: Friday Technical Talks

5:00pm – 7:00pm
Technical talks on:
     –   The program overview & how to present your ideas in 90 seconds.
     –   Hacking with eBay APIs
     –   ql.io, our new open source querying system
     –   PayPal APIs


7:00pm – 8:00pm
Dinner and finding teams


X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Syllabus: Saturday – Sunday Hackathon

       Saturday                       Sunday

       11:00am - 12:00pm              12:30pm - 3:30pm
       Hack registration              Hack Presentations

       12:00pm (Saturday) -           3:30pm - 5:00pm
       12:00pm (Sunday)               Judge Deliberation, Winners
       Hacking!                       announced and closing words.




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
What We Need to Cover

      What is X University and the hacker mentality?

      What is a hack?

      The hack event syllabus

      Hack strategies 101



X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: Fail Early

 Fail Early, Fail Fast, Fail
 Often

 “I have not failed. I've
 just found 10,000 ways
 that won't work.”
 - Thomas A. Edison




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: Use Available Tools

                          Don’t Reinvent the wheel




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: Backup Your Code!

                                      Bad stuff happens!

                                      Github
                                      http://github.com

                                      Bitbucket
                                      http://bitbucket.org


X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: Hard Problems First
 Don’t wait to work
 out hard issues.

 "The brain regions that
 are impaired when you
 are sleep-deprived are
 the same ones that are
 impaired with aging,”
 - Todd Maddox


X.commerce University: Georgia Tech
http://www.x.com | @x_commerce
Hack Strategies 101: The Presentation


                      Practice your presentations
                            (3 min in length)

                           Don’t use PowerPoint!




X.commerce University: Georgia Tech
http://www.x.com | @x_commerce

Contenu connexe

Similaire à X University Georgia Tech: Overview

How to Build Your MVP
How to Build Your MVPHow to Build Your MVP
How to Build Your MVPAbby Fichtner
 
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...Steve Omohundro
 
Hackers, hackathons, and you
Hackers, hackathons, and youHackers, hackathons, and you
Hackers, hackathons, and youRTigger
 
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research EssayHIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essaysorayan5ywschuit
 
HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10Scott Edmunds
 
How Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive BidHow Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive BidIntelCollab.com
 
Maryland Library Association 2008 Conference Creating a Technology Petting Zoo
Maryland Library Association 2008 Conference Creating a Technology Petting ZooMaryland Library Association 2008 Conference Creating a Technology Petting Zoo
Maryland Library Association 2008 Conference Creating a Technology Petting ZooBald Geek In Md
 
KSIT Tech Form - Introduction to artificial intelligence (AI)
KSIT Tech Form - Introduction to artificial intelligence (AI)KSIT Tech Form - Introduction to artificial intelligence (AI)
KSIT Tech Form - Introduction to artificial intelligence (AI)Santosh Kumar
 
Opportunities with data science
Opportunities with data scienceOpportunities with data science
Opportunities with data scienceAshiq Rahman
 
Innovation & Problem Solving - Heritage Hub 9 July 2014
Innovation & Problem Solving - Heritage Hub 9 July 2014Innovation & Problem Solving - Heritage Hub 9 July 2014
Innovation & Problem Solving - Heritage Hub 9 July 2014Innovation Birmingham Ltd
 
2012 Confoo: Changing the Face of Identity in Ecommerce
2012 Confoo: Changing the Face of Identity in Ecommerce2012 Confoo: Changing the Face of Identity in Ecommerce
2012 Confoo: Changing the Face of Identity in EcommerceJonathan LeBlanc
 
Drew Conway: A Social Scientist's Perspective on Data Science
Drew Conway: A Social Scientist's Perspective on Data ScienceDrew Conway: A Social Scientist's Perspective on Data Science
Drew Conway: A Social Scientist's Perspective on Data Sciencemortardata
 
How to create a taxonomy for management buy-in
How to create a taxonomy for management buy-inHow to create a taxonomy for management buy-in
How to create a taxonomy for management buy-inMary Chitty
 
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...Christine Souffrant Ntim
 
Thinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventThinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventMike Cardus
 

Similaire à X University Georgia Tech: Overview (20)

How to Build Your MVP
How to Build Your MVPHow to Build Your MVP
How to Build Your MVP
 
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
The AI Platform Business Revolution: Matchmaking, Empathetic Technology, and ...
 
Hacking101 delhi 2013
Hacking101 delhi 2013Hacking101 delhi 2013
Hacking101 delhi 2013
 
2012 UKTI Startup Mission
2012 UKTI Startup Mission2012 UKTI Startup Mission
2012 UKTI Startup Mission
 
Google Innovation Culture
Google Innovation CultureGoogle Innovation Culture
Google Innovation Culture
 
Hackers, hackathons, and you
Hackers, hackathons, and youHackers, hackathons, and you
Hackers, hackathons, and you
 
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research EssayHIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
 
HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10HKU Data Curation MLIM7350 Class 10
HKU Data Curation MLIM7350 Class 10
 
How Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive BidHow Four Statistical Rules Forecast Who Wins a Competitive Bid
How Four Statistical Rules Forecast Who Wins a Competitive Bid
 
Georgia Tech Hack Day
Georgia Tech Hack DayGeorgia Tech Hack Day
Georgia Tech Hack Day
 
Maryland Library Association 2008 Conference Creating a Technology Petting Zoo
Maryland Library Association 2008 Conference Creating a Technology Petting ZooMaryland Library Association 2008 Conference Creating a Technology Petting Zoo
Maryland Library Association 2008 Conference Creating a Technology Petting Zoo
 
KSIT Tech Form - Introduction to artificial intelligence (AI)
KSIT Tech Form - Introduction to artificial intelligence (AI)KSIT Tech Form - Introduction to artificial intelligence (AI)
KSIT Tech Form - Introduction to artificial intelligence (AI)
 
Opportunities with data science
Opportunities with data scienceOpportunities with data science
Opportunities with data science
 
Innovation & Problem Solving - Heritage Hub 9 July 2014
Innovation & Problem Solving - Heritage Hub 9 July 2014Innovation & Problem Solving - Heritage Hub 9 July 2014
Innovation & Problem Solving - Heritage Hub 9 July 2014
 
2012 Confoo: Changing the Face of Identity in Ecommerce
2012 Confoo: Changing the Face of Identity in Ecommerce2012 Confoo: Changing the Face of Identity in Ecommerce
2012 Confoo: Changing the Face of Identity in Ecommerce
 
Drew Conway: A Social Scientist's Perspective on Data Science
Drew Conway: A Social Scientist's Perspective on Data ScienceDrew Conway: A Social Scientist's Perspective on Data Science
Drew Conway: A Social Scientist's Perspective on Data Science
 
York presentation
York presentationYork presentation
York presentation
 
How to create a taxonomy for management buy-in
How to create a taxonomy for management buy-inHow to create a taxonomy for management buy-in
How to create a taxonomy for management buy-in
 
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
Ai Tech Summit Closing Keynote: How to Launch An Exponential Ai Tech Startup ...
 
Thinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First EventThinking Differently. Enabling Innovation - Buffalo Business First Event
Thinking Differently. Enabling Innovation - Buffalo Business First Event
 

Plus de Jonathan LeBlanc

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJonathan LeBlanc
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsJonathan LeBlanc
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessJonathan LeBlanc
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with BoxJonathan LeBlanc
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer WorkshopJonathan LeBlanc
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security PracticesJonathan LeBlanc
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI ElementsJonathan LeBlanc
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingJonathan LeBlanc
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyJonathan LeBlanc
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensJonathan LeBlanc
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data SecurityJonathan LeBlanc
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data SecurityJonathan LeBlanc
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaJonathan LeBlanc
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsJonathan LeBlanc
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityJonathan LeBlanc
 

Plus de Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable Security
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

X University Georgia Tech: Overview

  • 1. X University Overview What to Expect at the Hackathon Jonathan LeBlanc Developer Evangelist jleblanc@x.com @jcleblanc
  • 2. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 3. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 4. X University: Inaugural Launch X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 5. X University: What is a Hacker? • The entrepreneurial spirit. • The “just get it done” attitude. • The ability to wear many hats. X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 6. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 7. What is a Hack: What We’re Looking For Build something that uses eBay products in new, fun and innovative ways. Products include – eBay – Magento – PayPal – Milo – X.commerce – RedLaser X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 8. What is a Hack: Fix Something Fix Something That Ticks you off X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 9. What is a Hack: Something Different Build Something Different X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 10. What is a Hack: Something Fun Build Something Fun Katamari Browser Hack X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 11. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 12. Syllabus: Friday Technical Talks 5:00pm – 7:00pm Technical talks on: – The program overview & how to present your ideas in 90 seconds. – Hacking with eBay APIs – ql.io, our new open source querying system – PayPal APIs 7:00pm – 8:00pm Dinner and finding teams X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 13. Syllabus: Saturday – Sunday Hackathon Saturday Sunday 11:00am - 12:00pm 12:30pm - 3:30pm Hack registration Hack Presentations 12:00pm (Saturday) - 3:30pm - 5:00pm 12:00pm (Sunday) Judge Deliberation, Winners Hacking! announced and closing words. X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 14. What We Need to Cover What is X University and the hacker mentality? What is a hack? The hack event syllabus Hack strategies 101 X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 15. Hack Strategies 101: Fail Early Fail Early, Fail Fast, Fail Often “I have not failed. I've just found 10,000 ways that won't work.” - Thomas A. Edison X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 16. Hack Strategies 101: Use Available Tools Don’t Reinvent the wheel X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 17. Hack Strategies 101: Backup Your Code! Bad stuff happens! Github http://github.com Bitbucket http://bitbucket.org X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 18. Hack Strategies 101: Hard Problems First Don’t wait to work out hard issues. "The brain regions that are impaired when you are sleep-deprived are the same ones that are impaired with aging,” - Todd Maddox X.commerce University: Georgia Tech http://www.x.com | @x_commerce
  • 19. Hack Strategies 101: The Presentation Practice your presentations (3 min in length) Don’t use PowerPoint! X.commerce University: Georgia Tech http://www.x.com | @x_commerce

Notes de l'éditeur

  1. More information at http://x.com
  2. Photo Slurp: https://github.com/jcleblanc/photo_slurp
  3. Katamari browser hack: http://kathack.com/