Skip to content

Commit

Permalink
Merge pull request #1187 from pyvideo/misspelled-video-json-keys
Browse files Browse the repository at this point in the history
Fix a batch of misspelled keys in video.json files
  • Loading branch information
jonafato authored Aug 13, 2024
2 parents ff3f25c + be75793 commit df5e1c0
Show file tree
Hide file tree
Showing 24 changed files with 23 additions and 24 deletions.
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
{
"description": "Donna Benjamin\nhttps://2016.pycon-au.org/schedule/201/view_talk\nDrupal and Django have much in common. They\u2019re both open source tools for building the web. They\u2019re also marked by some fundamental differences. However, both are so much more than that.\n\n\"Every human creature is constituted to be that profound secret and mystery to every other. A solemn consideration, when I enter a great city by night, that every one of those darkly clustered houses encloses its own secret; that every room in every one of them encloses its own secret!\" - Charles Dickens.\n\nLet\u2019s explore the darkly clustered houses of these two different communities of open source people. \n\n - What common challenges do we face?\n - What different approaches do we take?\n - What can we learn from each other?\n\nAnd finally, what could we do together?",
"langauge": "eng",
"language": "eng",
"recorded": "2016-08-12",
"related_urls": [
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"duration": 1809,
"language": "eng",
"recorded": "2018-11-11",
"relatd_urls": [
"related_urls": [
{
"label": "Author website",
"url": "https://ganssle.io"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "OSS is open to anyone by design, whether it is developers or malicious users. Authors typically hide their identity through nicknames, however they have no protection against attribution techniques. This talk will present attacks on Python developers identity and discuss protection methods.\n\n---\n\nThe rapid increase in open source software is an attestation of a new standard in software development. Today over 80 percent of any software code is open source, according to a recent study by Sonatype. Python replaced Java as the second-most popular language on GitHub, with 40 percent more pull requests opened this year than last by GitHub Inc.'s annual report.\n\nAs the popularity of open source software increases, so do privacy concerns of individual contributors that often wish to remain anonymous. The majority of open-source repositories (GitHub, Google Code, SourceForge, etc.) allow users to keep their identity private while sharing their code. While in the past it was often sufficient, with the evolution of author attribution technology the question of how private the identity of software developers is becoming increasingly important.\n\nSoftware author attribution aims to decide who wrote a computer program, given its source or binary code. The main premise of this technique lies in the assumption that programmers unconsciously tend to use the same coding patterns. These patterns comprised of a number of distinctive features allow to characterise a programmer\u2019s style and uniquely identify his/her works. Applications of software author attribution are wide and include software forensics - where the analyst wants to determine the author of a program given a set of potential programmers, plagiarism detection - where the analyst wants to identify illicit code reuse, ghostwriting detection - where given a suspicious piece of code the analysis wants to determine if it has been plagiarized from one of the programs in a given set, and in general any scenario where software ownership needs to be determined.\n\nIn this session we will show how analysts can identify the author of Python software and how this process can be deceiving. We present two attacks on current attribution systems: author imitation and author hiding. The first attack can be applied on Python developer's identity in open-source projects. The attack transforms syntactical representation of attacker\u2019s source code to a version that mimics the victim\u2019s coding style while retaining functionality of original code. This is particularly concerning for Python open-source contributors who are unaware of the fact that by contributing to open-source projects they reveal identifiable information that can be used to their disadvantage. For example, one can easily see that by imitating someone\u2019s coding style it is possible to implicate any software developer in wrongdoing. To resist this attack we discuss multiple approaches of hiding a coding style of Python software author before contribute to open-source.",
"duration": 1705,
"recorded": "2018-11-11",
"relatd_urls": [
"related_urls": [
{
"label": "Talk page",
"url": "https://2018.pycon.ca/talks/talk-PC-55116/"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"duration": 731,
"language": "eng",
"recorded": "2018-11-11",
"relatd_urls": [
"related_urls": [
{
"label": "Talk page",
"url": "https://2018.pycon.ca/talks/talk-PC-53138/"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"duration": 607,
"language": "eng",
"recorded": "2018-11-11",
"relatd_urls": [
"related_urls": [
{
"label": "Talk page",
"url": "https://2018.pycon.ca/talks/talk-PC-55513/"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"duration": 779,
"language": "eng",
"recorded": "2018-11-11",
"relatd_urls": [
"related_urls": [
{
"label": "Talk page",
"url": "https://2018.pycon.ca/talks/talk-PC-55513/"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "This talk will show a set of Python libraries that will allow audience to learn how to automate Jenkins and create complex build pipelines.",
"language": "eng",
"recorded": "2015-06-19",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/61/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "Have you ever used IPython and wondered how it worked? And if you can build your own kernel to use with the great IPython tools like notebook? This talk will walk you through how you can do that with an example kernel built by me.",
"language": "eng",
"recorded": "2015-06-19",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/44/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "When you can't use ORM and have to have a rock solid and consistent business logic in database why not using the power of Python as part of database?\n\nUsing functions and triggers and PostgreSQL magic with plpy.",
"language": "eng",
"recorded": "2015-06-19",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/60/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "In this talk we will discuss the 'multiprocessing' module, which allows parallel programming on multicore processors. We will do a comparison with the 'threading' module, then cover the core functionality and finally discuss applications and limitations.",
"language": "eng",
"recorded": "2015-06-18",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/54/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "How to handle multi-gigabyte datasets, multi-hour runs and debug them quickly using Python.",
"language": "eng",
"recorded": "2015-06-19",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/47/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "Sphinx can extract paragraphs from sphinx document and store them into gettext format translation catalog files. Gettext format translation catalog is easy to translate from one language to other languages. Also Sphinx support internationalization by using such catalog files. You can use your favorite editors or services to translate your sphinx docs.",
"language": "eng",
"recorded": "2015-06-18",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/49/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "MySQL utilities are a set of command-line utilities and a Python library for making the common tasks much easier and time-saving to accomplish. The library is written entirely in Python, meaning that it is not necessary to have any other tools or libraries installed to make it work. It is currently designed to work with Python v2.6 or later and there is no support (yet) for Python v3.1.",
"language": "eng",
"recorded": "2015-06-18",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/69/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "ExpEYES is an Open Source Pocket Science Lab for developing science experiments, classroom demonstrations and a test equipment for electronics hobbyists. ExpEYES combines the real-time measurement capability of micro-controllers with the ease and flexibility of Python programming language for data analysis and visualization. http://www.expeyes.in/",
"language": "eng",
"recorded": "2015-06-18",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/59/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "This talk will covers ways that help process and analyse visualise data faster in Python. The primary focus is on the technique (should you optimise? what to optimise? how to optimise?) while covering libraries that help with this (line_profiler, Pandas, Numba, etc.)",
"language": "eng",
"recorded": "2015-06-19",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/45/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "Testing code with Pytest is an absolute pleasure. Less boilerplate makes your test more concise and its fixtures system helps you share setup code while still keeping your tests clear and understandable. I'll tell you all about how to get basic unit testing done, and I'll show you how to use Voidspace's Mock library to test collaborations between your objects, too.",
"language": "eng",
"recorded": "2015-06-18",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/50/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "Many recent advances in computer vision, speech recognition and Natural Language Processing (NLP) have come from Deep Learning research. One key enabler has been the use of GPUs to train bigger models on larger datasets. The Python module \"Theano\" can generate GPU code automatically - so that high level ideas can be implemented in high performance code seamlessly within the Python ecosystem.",
"language": "eng",
"recorded": "2015-06-19",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/65/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "Using Python, I have developed a program that attempts to be helpful in Deep Packet Inspection. Deep Packet Inspection is a process mainly used in network security to ensure integrity of network data sent across the network. Deep Packet Inspection is used to pre-empt and prevent malicious data from being transmitted over a network in order to ensure the security of the organization.",
"language": "eng",
"recorded": "2015-06-19",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/40/index.html"
Expand Down
2 changes: 1 addition & 1 deletion pycon-sg-2015/videos/opening-keynote-pycon-sg-2015.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "An insomniac software engineer for Spotify, founder of the San Francisco Chapter of PyLadies, board member of the Python Software Foundation, and member of the Django Software Foundation.",
"language": "eng",
"recorded": "2015-06-18",
"related_url": [
"related_urls": [
{
"label": "Slides",
"url": "https://speakerdeck.com/roguelynn/spotlight-python"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "Discussion on real-time stream processing and how to build a Python application to analyse data streams.",
"language": "eng",
"recorded": "2015-06-18",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/64/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "A look at Sarah's Dream. How Blender was used to create a short animation for this \"Make a Wish Foundation\" project. And a look at Gnome production - The art, process & technical challenges.",
"language": "eng",
"recorded": "2015-06-18",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/70/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "Have you ever wondered how the whole Non-Blocking IO thing works? As a web developer, you may have heard of Non-Blocking network libraries and web servers, you may even know what they actually do or probably you have even used them, but do you really know what is going on behind the scene? In this talk, we are going to see how Non-Blocking IO is implemented and understand the concept better.",
"language": "eng",
"recorded": "2015-06-18",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/39/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "Writing a programming language interpreter is usually considered black magic. This talk aims to demystify the process by walking through the steps of building a simple interpreter from scratch using Python.",
"language": "eng",
"recorded": "2015-06-19",
"related_url": [
"related_urls": [
{
"label": "Abstract",
"url": "https://pycon.sg/archive/2015/schedule/presentation/42/index.html"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"description": "Marya DeVoto\nhttp://lanyrd.com/2015/writethedocs/sdmwyg/\nEvery tech company or organization organically produces docs in some form, but as scale increases, the information design decisions you started with will almost certainly serve some information consumers better than others. Depending on who's creating information and who's using it, the approach to designing and delivering information can be dramatically different, with very different outcomes that probably won't work across an entire larger organization. Be aware of the information design decisions you're making so you can plan for growth. Design by default is not a good strategy!\nThis talk discusses how:\nInformation inherently includes design, whether or not you meant to do it. Information also requires design, no matter how simple and straightforward it may seem.\nTechnical information can be roughly sorted into modes such as descriptive, defensive, procedural, and tutorial. (These are different from concept-task-reference.)\nEach of these modes has different design implications that address different audiences and needs.\nBeing aware of your design priorities can help you understand how to make your stakeholders happier as your documentation base grows with the organization.",
"language": "eng",
"recorded": "2015-05-18",
"reltated_urls": [
"related_urls": [
"http://lanyrd.com/2015/writethedocs/sdmwyg/"
],
"speakers": [
Expand Down

0 comments on commit df5e1c0

Please sign in to comment.