SlideShare una empresa de Scribd logo
1 de 57
YAHOO!
HACK
U
JONATHAN
LEBLANC






ALLEN
RABINOVICH






JAMIE
LOCKWOOD
Hack
Day
started
at
Yahoo!
I
hacked
for
24
hours
and
all
I
got...
r
              
of
 Flick
          e  r
      und
  cofo




  cofoun
         der
of
Ya
                       hoo!




Many
cool
judges
Hack
Day
at
Yahoo!
Brazil




Hack
Day
at
Yahoo!
Korea




       The
Hack
heard
around
the
world
And
then
we
made
It
open
Very,
very
open
So
open,
that
Beck
came
to
us
ter,
 c
                         resen ania
                     ur
p e
a
m
                  Yo 
lik
                 an cing
                d




...as
did
GirlTalk
And
Then
the
Hack
Day
Came
To
You.
What’s
Our
Vector,
Victor?
‣ Hack
period
starts
Friday
at
5:30PM
‣ Break
for
food,
liquid
sugar,
caffeine

  and
deep
conversa[ons.
‣ All
hacks
due
Saturday
at
2PM
‣ Present
your
hack
on
Saturday,

  from
2:15PM.
‣ Win!
‣ Sleep
like
a
victorious
baby.
So
Who
Is
This
“Hacker”?
A
hack
is
a
good
idea,
A
hack
is
 a
good
idea,
brought
to
life.
And
good
ideas
come
from...
And
good
ideas
come
from...
‣   No[cing
something
broken
and

    thinking
of
a
fix.
And
good
ideas
come
from...
‣ No[cing
something
broken
and

  thinking
of
a
fix.
‣ Building
something
you’d
use
yourself.
And
good
ideas
come
from...
‣ No[cing
something
broken
and

  thinking
of
a
fix.
‣ Building
something
you’d
use
yourself.
‣ Automa[ng
something
you
are

  too
lazy
to
do
manually.
And
good
ideas
come
from...
‣ No[cing
something
broken
and

  thinking
of
a
fix.
‣ Building
something
you’d
use
yourself.
‣ Automa[ng
something
you
are

  too
lazy
to
do
manually.
‣ Finding
a
place
where
the
world
sucks

  and
figuring
out
how
to
make
it
beaer.
And
good
ideas
come
from...
‣   No[cing
something
broken
and

    thinking
of
a
fix.
‣   Building
something
you’d
use
yourself.
‣   Automa[ng
something
you
are

    too
lazy
to
do
manually.
‣   Finding
a
place
where
the
world
sucks

    and
figuring
out
how
to
make
it
beaer.
‣   Paying
aaen[on
to
trends:
mobile,
video,

    social,
local,
geo,
games,
etc.
A
winning
hack:
InsiderTrades
hap://www.insidertrades.org
A
winning
hack:
InsiderTrades
hap://www.insidertrades.org
What’s
good
about
it?
A
winning
hack:
InsiderTrades
hap://www.insidertrades.org
What’s
good
about
it?
‣   Simple
and
good
idea
A
winning
hack:
InsiderTrades
hap://www.insidertrades.org
What’s
good
about
it?
‣ Simple
and
good
idea
‣ Uniqueness
A
winning
hack:
InsiderTrades
hap://www.insidertrades.org
What’s
good
about
it?
‣ Simple
and
good
idea
‣ Uniqueness
‣ Clean
implementa[on
A
winning
hack:
InsiderTrades
hap://www.insidertrades.org
What’s
good
about
it?
‣ Simple
and
good
idea
‣ Uniqueness
‣ Clean
implementa[on
‣ Free
or
open‐source
tech:
PHP,

  HTML/CSS,
cron,
mySQL,
YQL
Hacking
Strategies
Hacking
Strategies
‣   Brainstorm,
but
converge
quickly,
and

    keep
best
details
of
rejected
ideas
handy.
Hacking
Strategies
‣ Brainstorm,
but
converge
quickly,
and

  keep
best
details
of
rejected
ideas
handy.
‣ Scope
the
work
so
the
end
is
in
sight:
set

  an
easy
goal,
and
an
ambi[ous
one.
Hacking
Strategies
‣ Brainstorm,
but
converge
quickly,
and

  keep
best
details
of
rejected
ideas
handy.
‣ Scope
the
work
so
the
end
is
in
sight:
set

  an
easy
goal,
and
an
ambi[ous
one.
‣ Divide
work
by
team
member
strengths.
Hacking
Strategies
‣ Brainstorm,
but
converge
quickly,
and

  keep
best
details
of
rejected
ideas
handy.
‣ Scope
the
work
so
the
end
is
in
sight:
set

  an
easy
goal,
and
an
ambi[ous
one.
‣ Divide
work
by
team
member
strengths.
‣ Ask
for
help!
Hacking
Strategies
‣   Brainstorm,
but
converge
quickly,
and

    keep
best
details
of
rejected
ideas
handy.
‣   Scope
the
work
so
the
end
is
in
sight:
set

    an
easy
goal,
and
an
ambi[ous
one.
‣   Divide
work
by
team
member
strengths.
‣   Ask
for
help!
‣   Minimize
the
amount
of
work
by
using

    free
and
open
source
tech.
Hacking
Strategies
‣   Brainstorm,
but
converge
quickly,
and

    keep
best
details
of
rejected
ideas
handy.
‣   Scope
the
work
so
the
end
is
in
sight:
set

    an
easy
goal,
and
an
ambi[ous
one.
‣   Divide
work
by
team
member
strengths.
‣   Ask
for
help!
‣   Minimize
the
amount
of
work
by
using

    free
and
open
source
tech.
‣   Don’t
forget
to
Ctrl+S!
DEMO
FTW
DEMO
FTW
‣   “I
swear
it
was
just
working...”
‐
have
a

    Plan
B
(screenshots,
video,
etc.)
DEMO
FTW
‣ “I
swear
it
was
just
working...”
‐
have
a

  Plan
B
(screenshots,
video,
etc.)
‣ No
sta[c
slides
‐
leave
PowerPoint
for

  marke[ng.
DEMO
FTW
‣ “I
swear
it
was
just
working...”
‐
have
a

  Plan
B
(screenshots,
video,
etc.)
‣ No
sta[c
slides
‐
leave
PowerPoint
for

  marke[ng.
‣ Prac[ce
your
pitch
a
few
[mes;
make
it

  easy
on
the
ears,
concise
and
funny.
DEMO
FTW
‣ “I
swear
it
was
just
working...”
‐
have
a

  Plan
B
(screenshots,
video,
etc.)
‣ No
sta[c
slides
‐
leave
PowerPoint
for

  marke[ng.
‣ Prac[ce
your
pitch
a
few
[mes;
make
it

  easy
on
the
ears,
concise
and
funny.
‣ Make
a
bang:
demo
what’s
most
exci[ng

  and
cool
about
your
project.
DEMO
FTW
‣   “I
swear
it
was
just
working...”
‐
have
a

    Plan
B
(screenshots,
video,
etc.)
‣   No
sta[c
slides
‐
leave
PowerPoint
for

    marke[ng.
‣   Prac[ce
your
pitch
a
few
[mes;
make
it

    easy
on
the
ears,
concise
and
funny.
‣   Make
a
bang:
demo
what’s
most
exci[ng

    and
cool
about
your
project.
‣   Tell
us
how
you’d
like
the
project
to
grow.
Surely,
Yahoo!
can
help...




hap://developer.yahoo.com
Surely,
Yahoo!
can
help...
‣   Of
course
(but
don’t
call
us
Shirley).




    hap://developer.yahoo.com
Surely,
Yahoo!
can
help...
‣ Of
course
(but
don’t
call
us
Shirley).
‣ Yahoo!
free
and
open
source
projects:




    hap://developer.yahoo.com
Surely,
Yahoo!
can
help...
‣ Of
course
(but
don’t
call
us
Shirley).
‣ Yahoo!
free
and
open
source
projects:
 ‣ YUI




    hap://developer.yahoo.com
Surely,
Yahoo!
can
help...
‣ Of
course
(but
don’t
call
us
Shirley).
‣ Yahoo!
free
and
open
source
projects:
 ‣ YUI
 ‣ YQL
and
Pipes




    hap://developer.yahoo.com
Surely,
Yahoo!
can
help...
‣ Of
course
(but
don’t
call
us
Shirley).
‣ Yahoo!
free
and
open
source
projects:
 ‣ YUI
 ‣ YQL
and
Pipes
 ‣ APIs:
Flickr,
Answers,
del.icio.us,
Fantasy

   Sports,
Fire
Eagle,
GeoPlanet,

   PlaceFinder,
Placemaker...

    hap://developer.yahoo.com
Let’s
talk
details...



        YQL
SELECT
*
FROM
Internet
Skills
you
May
Already
Have

SELECT
myColumn,
myTitle
FROM
myTable
WHERE
myColumn
=
'value'

AND
myTitle
=
'[tle‘
LIMIT
3
OFFSET
10
Is
YQL
a
Database?
NO!
The
YQL
Console
hap://developer.yahoo.com/yql/console
Let’s
talk
details...



        YUI
Roger
that,
Roger?
(transla[on:
any
ques[ons?)

Más contenido relacionado

Similar a Hacku 2010 berkeley

FCKUPdesign
FCKUPdesignFCKUPdesign
FCKUPdesign
Jason Nunes
 
CETS 2011, Steve Baker, slides for High-Impact Videos in a Low-Cost World
CETS 2011, Steve Baker, slides for High-Impact Videos in a Low-Cost WorldCETS 2011, Steve Baker, slides for High-Impact Videos in a Low-Cost World
CETS 2011, Steve Baker, slides for High-Impact Videos in a Low-Cost World
Chicago eLearning & Technology Showcase
 
Plan, Build, Launch a Video Blog from Streaming Media Europe 09
Plan, Build, Launch a Video Blog from Streaming Media Europe 09Plan, Build, Launch a Video Blog from Streaming Media Europe 09
Plan, Build, Launch a Video Blog from Streaming Media Europe 09
Jose Castillo
 
Christian Heilmann: Yahoo Open Hack Day
Christian Heilmann: Yahoo Open Hack DayChristian Heilmann: Yahoo Open Hack Day
Christian Heilmann: Yahoo Open Hack Day
eBay Inc
 
Pocket video producer
Pocket video producerPocket video producer
Pocket video producer
Susan Murphy
 
Video for Your Small Business
Video for Your Small BusinessVideo for Your Small Business
Video for Your Small Business
Susan Murphy
 

Similar a Hacku 2010 berkeley (20)

Open Hack Taiwan 2012 - Hacking 101
Open Hack Taiwan 2012 - Hacking 101Open Hack Taiwan 2012 - Hacking 101
Open Hack Taiwan 2012 - Hacking 101
 
Public speaking - FDP tech leads summit - 2018-04-30
Public speaking - FDP tech leads summit - 2018-04-30Public speaking - FDP tech leads summit - 2018-04-30
Public speaking - FDP tech leads summit - 2018-04-30
 
FCKUPdesign
FCKUPdesignFCKUPdesign
FCKUPdesign
 
iSummit 2012 - The Next Best Thing to Sliced Bread
iSummit 2012 - The Next Best Thing to Sliced BreadiSummit 2012 - The Next Best Thing to Sliced Bread
iSummit 2012 - The Next Best Thing to Sliced Bread
 
2010 Fall Hack U
2010 Fall Hack U 2010 Fall Hack U
2010 Fall Hack U
 
CETS 2011, Steve Baker, slides for High-Impact Videos in a Low-Cost World
CETS 2011, Steve Baker, slides for High-Impact Videos in a Low-Cost WorldCETS 2011, Steve Baker, slides for High-Impact Videos in a Low-Cost World
CETS 2011, Steve Baker, slides for High-Impact Videos in a Low-Cost World
 
Plan, Build, Launch a Video Blog from Streaming Media Europe 09
Plan, Build, Launch a Video Blog from Streaming Media Europe 09Plan, Build, Launch a Video Blog from Streaming Media Europe 09
Plan, Build, Launch a Video Blog from Streaming Media Europe 09
 
Design Your Own Life v2014-03-25
Design Your Own Life v2014-03-25Design Your Own Life v2014-03-25
Design Your Own Life v2014-03-25
 
Christian Heilmann: Yahoo Open Hack Day
Christian Heilmann: Yahoo Open Hack DayChristian Heilmann: Yahoo Open Hack Day
Christian Heilmann: Yahoo Open Hack Day
 
What the hack?
What the hack?What the hack?
What the hack?
 
Yahoo! Hack India: Hyderabad 2013 | YDN & Hacking 101
Yahoo! Hack India: Hyderabad 2013 | YDN & Hacking 101Yahoo! Hack India: Hyderabad 2013 | YDN & Hacking 101
Yahoo! Hack India: Hyderabad 2013 | YDN & Hacking 101
 
What the hack - Yahoo! Hack India Hyderabad 2013
What the hack -  Yahoo! Hack India Hyderabad 2013What the hack -  Yahoo! Hack India Hyderabad 2013
What the hack - Yahoo! Hack India Hyderabad 2013
 
Going Live with Ustream
Going Live with UstreamGoing Live with Ustream
Going Live with Ustream
 
Pocket video producer
Pocket video producerPocket video producer
Pocket video producer
 
Hack u intro
Hack u introHack u intro
Hack u intro
 
Video for Your Small Business
Video for Your Small BusinessVideo for Your Small Business
Video for Your Small Business
 
NEPA BlogCon 2014: Session 4 - Laurie McMillan & Lindsey Wotanis, WinkyFace
NEPA BlogCon 2014: Session 4 - Laurie McMillan & Lindsey Wotanis, WinkyFaceNEPA BlogCon 2014: Session 4 - Laurie McMillan & Lindsey Wotanis, WinkyFace
NEPA BlogCon 2014: Session 4 - Laurie McMillan & Lindsey Wotanis, WinkyFace
 
5 ROOKIE MISTAKES you should ABSOLUTELY not make
5 ROOKIE MISTAKES you should ABSOLUTELY not make5 ROOKIE MISTAKES you should ABSOLUTELY not make
5 ROOKIE MISTAKES you should ABSOLUTELY not make
 
Video to podcast via Google Hangouts OnAir
Video to podcast via Google Hangouts OnAirVideo to podcast via Google Hangouts OnAir
Video to podcast via Google Hangouts OnAir
 
Instant Audio & Video: Tools Igniting the Digital World
Instant Audio & Video: Tools Igniting the Digital WorldInstant Audio & Video: Tools Igniting the Digital World
Instant Audio & Video: Tools Igniting the Digital World
 

Más de Jonathan LeBlanc

Más de Jonathan LeBlanc (20)

JavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the ClientJavaScript App Security: Auth and Identity on the Client
JavaScript App Security: Auth and Identity on the Client
 
Improving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data InsightsImproving Developer Onboarding Through Intelligent Data Insights
Improving Developer Onboarding Through Intelligent Data Insights
 
Better Data with Machine Learning and Serverless
Better Data with Machine Learning and ServerlessBetter Data with Machine Learning and Serverless
Better Data with Machine Learning and Serverless
 
Best Practices for Application Development with Box
Best Practices for Application Development with BoxBest Practices for Application Development with Box
Best Practices for Application Development with Box
 
Box Platform Overview
Box Platform OverviewBox Platform Overview
Box Platform Overview
 
Box Platform Developer Workshop
Box Platform Developer WorkshopBox Platform Developer Workshop
Box Platform Developer Workshop
 
Modern Cloud Data Security Practices
Modern Cloud Data Security PracticesModern Cloud Data Security Practices
Modern Cloud Data Security Practices
 
Box Authentication Types
Box Authentication TypesBox Authentication Types
Box Authentication Types
 
Understanding Box UI Elements
Understanding Box UI ElementsUnderstanding Box UI Elements
Understanding Box UI Elements
 
Understanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scopingUnderstanding Box applications, tokens, and scoping
Understanding Box applications, tokens, and scoping
 
The Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments GloballyThe Future of Online Money: Creating Secure Payments Globally
The Future of Online Money: Creating Secure Payments Globally
 
Modern API Security with JSON Web Tokens
Modern API Security with JSON Web TokensModern API Security with JSON Web Tokens
Modern API Security with JSON Web Tokens
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Node.js Authentication and Data Security
Node.js Authentication and Data SecurityNode.js Authentication and Data Security
Node.js Authentication and Data Security
 
PHP Identity and Data Security
PHP Identity and Data SecurityPHP Identity and Data Security
PHP Identity and Data Security
 
Secure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication MediaSecure Payments Over Mixed Communication Media
Secure Payments Over Mixed Communication Media
 
Protecting the Future of Mobile Payments
Protecting the Future of Mobile PaymentsProtecting the Future of Mobile Payments
Protecting the Future of Mobile Payments
 
Future of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable SecurityFuture of Identity, Data, and Wearable Security
Future of Identity, Data, and Wearable Security
 

Hacku 2010 berkeley

Notas del editor

  1. Modify the names to include the name / logo of the school and names of the presenters.
  2. Talk about origins of Hack Day: The original “clap-o-meter” for judging Hacks, a very grassroots effort among engineers to get away from daily routine and do something quick and cool.
  3. A free t-shirt is the best prize for an engineer -- and winners got specially produced ones.
  4. After clap-o-meter was deemed a bit unreliable, Hack Days got some esteemed judges.
  5. The Hack Day spread to other Yahoo offices, with huge success
  6. In fact, it was so successful internally that we decided we want to make it public. The first Open Hack Day took place on Yahoo campus.
  7. Campus became campground: people put up tents on Yahoo! lawn and hacked from there, as well as from inside the buildings.
  8. Yahoo! provided quality entertainment
  9. And some more quality entertainment the next Open Hack Day
  10. But just making the Hack Day public wasn’t enough -- there are many promising hackers at every university in the US who don’t have the means to travel -- so we are coming to you!
  11. The Hack Agenda: modify according to where you are presenting.
  12. Talk about the idea of hacker as someone who can dream up a great idea and then implement it. Dreamer + coder.
  13. It’s not enough for a hack to be a good idea or concept -- the point is that you have the ability to bring it to life.
  14. It’s not enough for a hack to be a good idea or concept -- the point is that you have the ability to bring it to life.
  15. Where do good ideas come from?
  16. Where do good ideas come from?
  17. Where do good ideas come from?
  18. Where do good ideas come from?
  19. Where do good ideas come from?
  20. A case study of a hack: InsiderTrades provides alerts whenever a particular stock you choose to follow is traded by insiders. The alerts are based on information publicly available from SEC. Other sources for this info? Delayed and expensive. So what’s good about this idea?
  21. A case study of a hack: InsiderTrades provides alerts whenever a particular stock you choose to follow is traded by insiders. The alerts are based on information publicly available from SEC. Other sources for this info? Delayed and expensive. So what’s good about this idea?
  22. A case study of a hack: InsiderTrades provides alerts whenever a particular stock you choose to follow is traded by insiders. The alerts are based on information publicly available from SEC. Other sources for this info? Delayed and expensive. So what’s good about this idea?
  23. A case study of a hack: InsiderTrades provides alerts whenever a particular stock you choose to follow is traded by insiders. The alerts are based on information publicly available from SEC. Other sources for this info? Delayed and expensive. So what’s good about this idea?
  24. A case study of a hack: InsiderTrades provides alerts whenever a particular stock you choose to follow is traded by insiders. The alerts are based on information publicly available from SEC. Other sources for this info? Delayed and expensive. So what’s good about this idea?
  25. So, how do we build a winning hack? Here are some strategies.
  26. So, how do we build a winning hack? Here are some strategies.
  27. So, how do we build a winning hack? Here are some strategies.
  28. So, how do we build a winning hack? Here are some strategies.
  29. So, how do we build a winning hack? Here are some strategies.
  30. So, how do we build a winning hack? Here are some strategies.
  31. But it’s not enough to just build a winning hack -- in order for it to win, you have to showcase it. Demo strategies are important.
  32. But it’s not enough to just build a winning hack -- in order for it to win, you have to showcase it. Demo strategies are important.
  33. But it’s not enough to just build a winning hack -- in order for it to win, you have to showcase it. Demo strategies are important.
  34. But it’s not enough to just build a winning hack -- in order for it to win, you have to showcase it. Demo strategies are important.
  35. But it’s not enough to just build a winning hack -- in order for it to win, you have to showcase it. Demo strategies are important.
  36. Can Yahoo! be of service?
  37. Can Yahoo! be of service?
  38. Can Yahoo! be of service?
  39. Can Yahoo! be of service?
  40. Can Yahoo! be of service?
  41. A 15 minute intro to YQL, with demos.
  42. A 15 minute intro to YUI, with demos.