600 Citations


unravelsports Documentation โ unravelsports 1.2.0 documentation
LinkedIn Profile: https://www.linkedin.com/in/joris-bekkers-33138288/
Sports Analytics meets Open Source | PySport
Football Match Intelligence is a Streamlit app that converts SkillCorner tracking plus event data into interactive tactical analysis. You can explore match overviews (pass networks, shot maps, momentum and xG), dive into player profiling (heatmaps, speed zones and movement patterns), analyze team structure (field tilt, defensive organization and possession chains), compare players head-to-head with pizza charts, and reconstruct key events frame by frame with a tactical board that highlights passing options. Live app: https://lnkd.in/eChbEpud Repository: https://lnkd.in/e-drHUD2
๐๐จ๐ฐ ๐ ๐ฅ๐๐๐ซ๐ง๐๐ ๐ญ๐จ ๐ฐ๐จ๐ซ๐ค ๐ฐ๐ข๐ญ๐ก ๐๐จ๐จ๐ญ๐๐๐ฅ๐ฅ ๐ญ๐ซ๐๐๐ค๐ข๐ง๐ ๐๐๐ญ๐ (๐๐ง๐ ๐ฐ๐ก๐๐ญ ๐ข๐ญ ๐ฅ๐๐ ๐ญ๐จ) A few months ago, I realized something: If you want to understand football tactics, event data isnโt enough. You have to learn from space, motion, and interaction. That curiosity sent me deep into research on transformers, graph neural networks, and spatiotemporal modeling โ and directly led me to build my first transformer-based similarity retrieval system for the SkillCorner ร PySport Analytics Cup. The system learns from full-pitch scenes (22 players + ball) to: โข retrieve tactically identical plays โข cluster recurring patterns โข automatically classify team actions and sequences โข make visual insights easier for analysts and coaches to use Papers that shaped my thinking ๐ 1๏ธโฃ A Graph Neural Network deep-dive into successful counterattacks Joris Bekkers Amod Sahasrabudhe https://lnkd.in/gnDwBm5a The purpose of this research is to build gender-specific Graph Neural Networks to model the likelihood of a counterattack being successful and uncover what factors make them successful in professional soccer. 2๏ธโฃ Graph representations for the analysis of multi-agent spatiotemporal sports data Dominik Raabe Prof. Dr. Daniel Memmert Reinhard Nabben https://lnkd.in/g36xemtf Proposed Tactical Graphs, an alternative graph-based format capable of producing integrative, contextualized models for machine learning applications 3๏ธโฃ ๐๐๐ญ๐๐๐ญ๐ข๐จ๐ง ๐จ๐ ๐ญ๐๐๐ญ๐ข๐๐๐ฅ ๐ฉ๐๐ญ๐ญ๐๐ซ๐ง๐ฌ ๐ฎ๐ฌ๐ข๐ง๐ ๐ฌ๐๐ฆ๐ข-๐ฌ๐ฎ๐ฉ๐๐ซ๐ฏ๐ข๐ฌ๐๐ ๐ ๐ซ๐๐ฉ๐ก ๐ง๐๐ฎ๐ซ๐๐ฅ ๐ง๐๐ญ๐ฐ๐จ๐ซ๐ค๐ฌ Pascal Bauer Gabriel Anzer https://lnkd.in/gvy9VyBe Presenting practical applications of approach using the detection of overlapping runs as a showcase 4๏ธโฃ ๐๐๐ฅ๐-๐๐ฎ๐ฉ๐๐ซ๐ฏ๐ข๐ฌ๐๐ ๐๐๐ฉ๐ซ๐๐ฌ๐๐ง๐ญ๐๐ญ๐ข๐จ๐ง๐ฌ ๐๐จ๐ซ ๐๐ซ๐๐๐ค๐ข๐ง๐ ๐๐๐ญ๐ Karun Singh https://lnkd.in/gsKbiCrF Building tools that leverage tracking data to help accelerate video analysis workflows. 5๏ธโฃ ๐๐๐ฆ๐ฉ๐จ๐ซ๐๐ฅ ๐๐ซ๐๐ฉ๐ก ๐๐๐ญ๐ฐ๐จ๐ซ๐ค ๐ ๐ซ๐๐ฆ๐๐ฐ๐จ๐ซ๐ค ๐๐จ๐ซ ๐๐ฎ๐๐ง๐ญ๐ข๐๐ฒ๐ข๐ง๐ ๐๐๐ฌ๐ฌ ๐๐๐๐๐ฉ๐ญ๐ข๐จ๐ง ๐๐ซ๐จ๐๐๐๐ข๐ฅ๐ข๐ญ๐ข๐๐ฌ ๐๐ ๐๐ข๐ง๐ฌ๐ญ ๐๐๐๐๐ง๐ฌ๐ข๐ฏ๐ ๐๐ญ๐ซ๐ฎ๐๐ญ๐ฎ๐ซ๐๐ฌ Pegah Rahimian Laszlo Toka https://lnkd.in/gpAW5DEC Proposed a framework for evaluating passing decisions against defensive structures using temporal graph networks
๐๐ฟ๐๐ถ๐ณ๐ถ๐ฐ๐ถ๐ฎ๐น ๐๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ ๐ถ๐ป ๐ฆ๐ฝ๐ผ๐ฟ๐๐ ๐๐ป๐ฎ๐น๐๐๐ถ๐ฐ๐ course at University of Toronto.
Football analytics often happens behind closed doors, both in science and in practice. I want to do the exact opposite: ๐ฏ๐ฒ ๐ฎ๐ ๐ผ๐ฝ๐ฒ๐ป ๐ฎ๐ ๐ฝ๐ผ๐๐๐ถ๐ฏ๐น๐ฒ. Thatโs why Iโm proud that I was invited to present ๐๐๐ญ๐๐๐๐ฅ๐ฅ๐๐ฒ at the PyData Eindhoven X PySport Conference last December. ๐๐๐ญ๐๐๐๐ฅ๐ฅ๐๐ฒ is an open-source Python package for football analytics, focused on contextualized and tactical analysis by ๐ฐ๐ผ๐บ๐ฏ๐ถ๐ป๐ถ๐ป๐ด ๐๐ฟ๐ฎ๐ฐ๐ธ๐ถ๐ป๐ด ๐ฎ๐ป๐ฑ ๐ฒ๐๐ฒ๐ป๐ ๐ฑ๐ฎ๐๐ฎ. Since PyData and PySports share these values, they recorded the presentation (and all others!) and made it freely available: ๐ฅ ๐ช๐ฎ๐๐ฐ๐ต ๐๐ต๐ฒ ๐ณ๐๐น๐น ๐๐ฎ๐น๐ธ ๐ต๐ฒ๐ฟ๐ฒ:ย https://lnkd.in/ekQJSDt9 Open source isnโt just codeโitโs collaboration, transparency, and progress. Thanks to the community, ๐๐๐ญ๐๐๐๐ฅ๐ฅ๐๐ฒ has grown further than I could have imagined (>45k downloads!). Iโm excited to see what the future brings! ๐ ๐ฆ๐ผ๐๐ฟ๐ฐ๐ฒ ๐ฐ๐ผ๐ฑ๐ฒ: https://lnkd.in/ey6MxCjJ ๐ ๐๐ผ๐ฐ๐๐บ๐ฒ๐ป๐๐ฎ๐๐ถ๐ผ๐ป:ย https://lnkd.in/en9jrX6U ๐ See the comments for the code to create a visualization like the one below using ๐๐๐ญ๐๐๐๐ฅ๐ฅ๐๐ฒ. Thanks for the open source community for all your help, support, and guidance. Special thanks to Daan Grob who intially set up ๐๐๐ญ๐๐๐๐ฅ๐ฅ๐๐ฒ with me and to Tygo Nikamp for showcasing your pressure analysis at the conference with me.


2 October 2025


Sources: Mike Holcomb LinkedIn post
Want hands-on experience in OT cybersecurity?
Start with these FREE projects – no power plant required!
Getting started in OT/ICS cybersecurity doesn’t have to be hard.
And it doesn’t have to be expensive.
So start with these projects and build from there!
1. Setup Your Own “Attack & Defend” OT/ICS Lab with Labshock
Labshock is a new virtual OT environment that helps you get started!
Use it to explore defensive capabilities like detection and SEIM.
As well as having an OT environment to attack!
https://lnkd.in/eG-Y-Z2z
2. Hack Into a Power Plant with GRFICSv2
GRFICS takes a fun twist with virtual OT networks.
Giving you a CCTV feed to watch over the environment.
And then allowing you to see what changes happen due to your “testing.”
Is that smoke I see coming out of the power plant???
https://lnkd.in/eam3eQDx
3. Setup an OT/ICS Honeypot
Honeypots are systems that are designed to be hacked.
Set one of these virtual honeypots up for target practice.
Take your time to interact with different OT protocols like Modbus.
github.com/mushorg/conpot
Probably the most popular OT/ICS honeypot to get started with
https://lnkd.in/emiiasR3
Another OT/ICS honeypot from T-Mobile (yes, THAT T-Mobile)
4. Analyze Real World OT/ICS Cyber Incidents
While this might not be as exciting as some of the others…
Learning from real world incidents can help you learn.
-> Understand how attackers break into OT environments
-> Learn what attackers do once they are inside OT networks
-> Figure out how to prevent the same attacks from occuring again
OT/ICS cybersecurity companies such as Dragos and Mandiant release some incredible research on the latest incidents.
Need help getting started?
Lookup Stuxnet, TriSIS, Colonial and Fuxnet.
And don’t stop!
5. Find OT/ICS Assets Exposed to the Internet and Contact the Owners
Want to learn more about finding OT/ICS assets on the Internet?
Check out my YouTube video here:
https://lnkd.in/e7e2VkbA
Once you find these assets without obtrusive means, see if you can determine who the asset owner is.
If you’re really feeling brave, reach out and contact them.
Honestly, most of the time your work will fall on deaf ears.
But every once in a while it has a significant impact!
Just don’t share sensitive information with others.
6. Write Your Own Modbus Scanner with Python and/or ChatGPT
Writing defensive and offensive tools can be a great way to learn!
Not a developer like me? Use ChatGPT or other GenAI tools.
Interested in using ChatGPT to create security tools?
Watch “Hacking ICS/OT (& IT) with ChatGPT”
https://lnkd.in/eVduTgcC
Don’t forget – the best way to learn is to share!
As you work through your projects…
-> Document your steps
-> Take screenshots
-> Post and share
-> Have fun!
-> ๐
P.S. What would you start with first?
๐ Follow Mike Holcomb for more OT/ICS cybersecurity
โป๏ธ Useful? Share to help others!

Sumber: Post LinkedIn Gilang Bhagaskara
Dulu saya kenal dua orang programmer.
Yang satu jago banget. Web dev, frontend-nya rapi, backend-nya efisien, debugging cepet. Tapi dia punya satu kebiasaan:
nggak mau belajar hal baru.
Udah nyaman di stack lama, ogah ngulik bahasa lain, bahkan anti banget sama hal-hal di luar “zona aman” dia.
“Ngapain belajar lagi? Gue udah cukup senior kok.”
Dan iya, saat itu… dia memang salah satu yang paling top di tim.
Yang satu lagi, anak baru.
Skillnya waktu itu pas-pasan. Tapi attitude-nya? Luar biasa.
Apapun dilempar, dia coba.
Disuruh ngulik Rust? Digas.
Dapet proyek mobile? Buka docs Flutter, mulai dari nol.
Sempat salah, sempat di-review habis-habisan, tapi nggak pernah berhenti belajar.
Fast forward 5 tahun…
Yang pertama masih di tempat yang sama.
Masih web dev, masih stack lama, dan gajinya stagnan.
Sementara yang kedua, sekarang lead engineer di perusahaan multinasional, megang sistem skala besar, dan gajinya?
Di atas 50 juta per bulan.
Kenapa?
Karena skill itu bisa diasah. Tapi growth mindset nggak bisa dipaksain.
Dan di dunia tech yang berubah setiap hari, yang tahan lama bukan yang paling jago, tapi yang paling mau belajar.
Kita nggak selalu butuh orang yang “bisa segalanya.”
Tapi kita butuh orang yang nggak takut belajar apa aja.
