Skywriting on CIEL: Programming the Data Center DEREK G
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Metadata for Semantic and Social Applications
etadata is a key aspect of our evolving infrastructure for information management, social computing, and scientific collaboration. DC-2008M will focus on metadata challenges, solutions, and innovation in initiatives and activities underlying semantic and social applications. Metadata is part of the fabric of social computing, which includes the use of wikis, blogs, and tagging for collaboration and participation. Metadata also underlies the development of semantic applications, and the Semantic Web — the representation and integration of multimedia knowledge structures on the basis of semantic models. These two trends flow together in applications such as Wikipedia, where authors collectively create structured information that can be extracted and used to enhance access to and use of information sources. Recent discussion has focused on how existing bibliographic standards can be expressed as Semantic Metadata for Web vocabularies to facilitate the ingration of library and cultural heritage data with other types of data. Harnessing the efforts of content providers and end-users to link, tag, edit, and describe their Semantic and information in interoperable ways (”participatory metadata”) is a key step towards providing knowledge environments that are scalable, self-correcting, and evolvable. Social Applications DC-2008 will explore conceptual and practical issues in the development and deployment of semantic and social applications to meet the needs of specific communities of practice. Edited by Jane Greenberg and Wolfgang Klas DC-2008 -
Texts and Manuscripts: Description and Research. Presenting the Collections. Presenting the Manuscript. Book Reviews
CONTENTS TEXTS AND MANUSCRIPTS: DESCRIPTION AND RESEARCH. 3 Hiroshi Kumamoto. Sino-Hrntanica Petersburgensia (Part I). 3 1\1. Vorobyova-Dcsyatovskaya. A Sanskrit Manuscript on Birch-Bark from Bairam-Ali. II. .~1'(1(/'711as and l<ltakas (Part 2) IO A. Trotsevich. A Rricf Remark on Korean Rooks Research. 24 M. Fomkin. On the Literary Fate of Works by Sultan Vcled. 27 I. Zaytse\'. On the History of Book in the JUchid Khanates 33 PRESENTING THE COLLECTIONS. 40 E. Rczvan. Oriental Manuscripts of Karl Faberge. I: The Qur'iin 40 PRESENTING THE MANUSCRIPT. 62 0. Akimushkin. A Rare Seventeenth-Century Hagiography of the Naqshbandiyya Mujaddidiyya Slwdhs. 62 BOOK REVIEWS. 68 F r o n t c o v e r: "Portrait of a princess", Muraqqa · X 3 from the St. Petersburg Branch of the Institute of Oriental Studies. Faberge collection. fol. 31 a. 9.5 x 16.5 cm. Moghul school, mid-18th century, watercolour, gouache and gold on paper. Back cover: Decorative composition from clements of the double frontispiece of aQur"anic manuscript, the same album, fol. 29a. dimensions within the outer border 18.0 X 21.0 cm. Presumably Tcbriz. I 540s--- I 560s. Mounted in India, mid-18th century. THESA PUBLISHERS Ir\ <-, J-01'1.IC\ 11< l\ Will I ST. PETERSBURG BRANCH OF THE INSTITUTE OF ORIENTAL STUDIES RUSSIAN ACADEMY OF SCIENCES ll!.Jnnuscriptn Orientnlin "'7nternntionnl douronl for Or1eotnl IY!Jnouscr1pt ~esenrcb Vol. 7 No. I March 200 I 7-5£..Sd\ .,St. f.'etersbur9 70 L'Y!'.)AnuscriptA OrientAliA. VOL. 7 NO. I MARCH 2001 esting parts of the folklore collections preserved in the more so for their presenting in such well-organised and archive. -
Kharosthi Manuscripts: a Window on Gandharan Buddhism*
KHAROSTHI MANUSCRIPTS: A WINDOW ON GANDHARAN BUDDHISM* Andrew GLASS INTRODUCTION In the present article I offer a sketch of Gandharan Buddhism in the centuries around the turn of the common era by looking at various kinds of evidence which speak to us across the centuries. In doing so I hope to shed a little light on an important stage in the transmission of Buddhism as it spread from India, through Gandhara and Central Asia to China, Korea, and ultimately Japan. In particular, I will focus on the several collections of Kharo~thi manuscripts most of which are quite new to scholarship, the vast majority of these having been discovered only in the past ten years. I will also take a detailed look at the contents of one of these manuscripts in order to illustrate connections with other text collections in Pali and Chinese. Gandharan Buddhism is itself a large topic, which cannot be adequately described within the scope of the present article. I will therefore confine my observations to the period in which the Kharo~thi script was used as a literary medium, that is, from the time of Asoka in the middle of the third century B.C. until about the third century A.D., which I refer to as the Kharo~thi Period. In addition to looking at the new manuscript materials, other forms of evidence such as inscriptions, art and architecture will be touched upon, as they provide many complementary insights into the Buddhist culture of Gandhara. The travel accounts of the Chinese pilgrims * This article is based on a paper presented at Nagoya University on April 22nd 2004. -
Magic Quadrant for Application Release Automation
Magic Quadrant for Application Release Automation Published: 27 September 2017 ID: G00315074 Analyst(s): Colin Fletcher, Laurie F. Wurster The ARA market is rapidly evolving in response to growing enterprise requirements to both scale DevOps initiatives and improve release management agility across multiple cultures, processes and generations of technology. This research helps I&O leaders make better-informed decisions. Strategic Planning Assumption By 2020, 50% of global enterprises will have implemented at least one application release automation solution, up from less than 15% today. Market Definition/Description Application release automation (ARA) tools provide a combination of automation, environment modeling and release coordination capabilities to simultaneously improve the quality and the velocity of application releases. ARA tools enable best practices in moving application-related artifacts, applications, configurations and even data together across the application life cycle process. These tools are a key part of enabling the DevOps goal of achieving continuous delivery with large numbers of rapid, small releases. Approximately seven years old, the ARA solution market reached an estimated $228.2 million in 2016, up 31.4% from $173.6 million in 2015. The market is continues to be expected to grow at an estimated 20% compound annual growth rate (CAGR) through 2020. Magic Quadrant Figure 1. Magic Quadrant for Application Release Automation Source: Gartner (September 2017) Vendor Strengths and Cautions Arcad Software Founded in 1992, Arcad Software is a privately held company headquartered in Chavanod, France. The company was started by its founder to deliver automation-oriented solutions supporting the Page 2 of 28 Gartner, Inc. | G00315074 IBM i (introduced as AS/400, then later renamed eServer iSeries) platform. -
Research Palm Leaf Manuscripts (Pe Sar)
Journal homepage: http://twasp.info/journal/home Research Palm Leaf Manuscripts (Pe Sar) Dr-Minn Thant1*, Dr- Tin Tin New2, Yee Mon Phay3 1Lecturer, Department of Oriental Studies, Mandalay University, Mandalay, Myanmar 2Professor, Department of Oriental Studies, Mandalay University, Mandalay, Myanmar 3PhD Candidate, School of Liberal Arts, Department of Global Studies, Shanghai University, Shanghai, China *Corresponding author Accepted:25 August, 2019 ;Online: 30 August, 2019 DOI : https://doi.org/10.5281/zenodo.3382013 Abstract : Behind the existing of literature, we want to know about the letters which were written on something. In particular, palm leaves were mostly used. Palm leaves were easily available in large number, and writing on palm leaves was easier than other. So they were dutiful for writing. In this paper, therefore, palm leaf manuscripts and their background history will be presented according to periods and regions. Keywords : Pe Sar, Palm leaf Manuscripts, palm leaf inscriptions. Introduction It is palm leaf manuscripts that have propagandized the Piṭakas and Pᾱḷi Texts of the Buddha Era. It is undeniable that the face texts on Piṭakas in Pᾱḷi and those in Myanmar and skills and knowledge related texts such as classic text onprose and poetry, and medical fortune telling text, which were written by ancient poets and persons of letters belonging to periods from Bagan to late Konbaung, can still be studied until today, is due to the fact that palm leaf manuscripts have been cherished. The palm leaf manuscript is valuable not onlyin terms of subject but also in terms of material. In former times, a palm leaf manuscript was made withdifficulty on a step by step basis. -
About One Acre Fund Job Description Career Growth and Development Qualifications
About One Acre Fund Founded in 2006, One Acre Fund supplies smallholder farmers with the agricultural services they need to make their farms vastly more productive. We provide quality farm supplies on credit, delivered within walking distance of farmers homes, and agricultural trainings to improve harvests. We measure our success by our ability to make farmers more prosperous: On average, farmers harvest 50 percent more food after working with One Acre Fund. We are growing quickly. We currently serve more than 800,000 farm families in Eastern and Southern Africa, with more than 7,500 full-time staff, and we aim to serve 1 million farm families by 2020. Job Description As development operations engineer, you would be responsible for increasing the efficiency and effectiveness of the development team- your job would be to make everyone elses job easier. This involves coordination with the IT Operations, Quality Assurance and Development teams, with the primary goal of automating manual tasks. You would be involved in reviewing and altering processes/procedures across the organization, reviewing and integrating third-party tools as appropriate and maintaining the test servers used internally. After training, you would also help automate the production server environment and react to problems as they occur. Career Growth and Development We have a strong culture of constant learning and we invest in developing our people. Youll have weekly check-ins with your manager, access to mentorship and training programs, and regular feedback on your performance. We hold career reviews every six months, and set aside time to discuss your aspirations and career goals. -
Metod Иностранный Язык ПЗ 38.02.04 2019
МИНИCTEPCTBO НАУКИ И ВЫСШЕГО ОБРАЗОВАНИЯ РОССИЙСКОЙ ФЕДЕРАЦИИ Федеральное государственное автономное образовательное учреждение высшего образования «СЕВЕРО-КАВКАЗСКИЙ ФЕДЕРАЛЬНЫЙ УНИВЕРСИТЕТ» Институт сервиса, туризма и дизайна (филиал) СКФУ в г. Пятигорске Колледж Института сервиса, туризма и дизайна (филиал) СКФУ в г. Пятигорске Иностранный язык МЕТОДИЧЕСКИЕ УКАЗАНИЯ ДЛЯ ПРАКТИЧЕСКИХ ЗАНЯТИЙ Специальность СПО 38.02.04 Коммерция (по отраслям) Квалификация: Менеджер по продажам Пятигорск 2019 Методические указания для практических занятий по дисциплине «Иностранный язык» составлены в соответствии с требованиями ФГОС СПО, предназначены для студентов, обучающихся по специальности: 38.02.04 Коммерция (по отраслям) Рассмотрено на заседании ПЦК колледжа ИСТиД (филиал) СКФУ в г. Пятигорске Протокол № 9 от «08» апреля 2019г. 2 Пояснительная записка Программа учебной дисциплины по иностранному языку является частью основной профессиональной образовательной программы в соответствии с ФГОС по специальности 38.02.04 Коммерция (по отраслям) Дисциплина входит в общий гуманитарный и социально – экономический цикл профессиональной подготовки. В результате освоения учебной дисциплины обучающийся должен уметь: говорение – вести диалог (диалог–расспрос, диалог–обмен мнениями/суждениями, диалог–побуждение к действию, этикетный диалог и их комбинации) в ситуациях официального и неофициального общения в бытовой, социокультурной и учебно-трудовой сферах, используя аргументацию, эмоционально-оценочные средства; – рассказывать, рассуждать в связи с изученной -
Scripting Deployment of NIST Use Cases
Report to NIST January 2017 1 / 12 Scripting Deployment of NIST Use Cases BADI’ABDUL-WAHID1,H YUNGRO LEE1,G REGOR VON LASZEWSKI1, AND GEOFFREY FOX1,* 1School of Informatics and Computing, Bloomington, IN 47408, U.S.A. *Corresponding authors: [email protected] January 20, 2017 This document summarizes the NIST Big Data Public Working Group (BDPWG) use-cases document: "Possible Big Data Use Cases Implementation using NBDRA". Additional projects originated from classes taught at Indiana University. The focus of our current work is the development of abstractions capturing the basic concepts we have seen and the development of a REST API implementing some of these ideas. We describe a few of the underlying components for allocating and managing virtual clusters. Additionally, a summary of the ecosystem (Open Source via GitHub) and Academic (via Indiana University classes) in which Big Data Software is used. There is a brief description of a few of the Use Cases, as well as a description of the major components. In summary: we have implemented two of the NIST Use Cases, with several others under development. Additionally, we are currently implementing DevOps support into Cloudmesh to facilitate scripting of Use Case deployment as started on an API to be exposed as a web service for deployments. An ecosystem analysis of projects on GitHub and classes show a preference for C++, Python, and Java as programming languages, as well as several popular packages as dependencies. © 2017 Keywords: Cloud, Big Data https://github.com/cyberaide/nist-report 1. OVERVIEW Domain knowledge. Important for having understanding con- figuring various components of the software stack to ad- The goal of our work has been to try to understand some com- equately support the task on hand. -
CI-CD-For-Infrastructure-Configuration
Abstract & Overview Organizations of all sizes, from the leanest startup to the stodgiest enterprise, use CI/CD practices to greatly improve production and delivery of software. This yields higher- quality software at a lower cost and allows businesses to deliver ideas to market faster. As development teams adopt CI/CD practices, they start delivering new applications and releases faster and faster. This constantly changing software inevitably requires changes to infrastructure and configuration, but many operations teams aren’t accustomed to the pace—nor do they have the proper tools required. Trying to directly apply successful CI/CD practices for applications is highly unlikely to yield success for infrastructure and configuration changes. In this guide, we explore: • How and why CI/CD has been so successful for application changes • Infrastructure and configuration changes as a new bottleneck • Challenges with CI/CD for infrastructure and configuration changes • How to overcome challenges and implement CI/CD for infrastructure We include a hands-on guide for how to implement this with BuildMaster and Otter. You can do everything in this guide with BuildMaster Free and Otter Free editions! About Inedo, Otter, and BuildMaster We help organizations make the most of their Windows technology and infrastructure through our Windows-native and cross-platform DevOps tools. • BuildMaster, a tool designed to implement CI/CD, automates application releases. • Otter manages infrastructure. Harnessing the power of both tools allows users to manage infrastructure while enjoying all the benefits of CI/CD. Page 1 of 31 Page 2 of 31 Contents CI/CD for Applications: A Quick Refresher ................................................................................................................................................. 4 Pipelines: The Heart of CI/CD .................................................................................................................................................................... -
Title Historical Value of Parabaik and Pei All Authors Moe Moe Oo Publication Type Local Publication Publisher (Journal Name, Is
Title Historical Value of Parabaik and Pei All Authors Moe Moe Oo Publication Type Local Publication Publisher (Journal name, Meiktila University, Research Journal, Vol.IV, No.1, 2013 issue no., page no etc.) Parabaiks and Palm Leaf Manuscripts are important in the rich and old tradition and cultural history of Southeast Asia. Many documents reflected the socio- economic situation and Buddhist text of ancient Myanmar. These sources are Abstract like a treasure-trove for historians. We hope that this Parabaik and Palm leaf will advance the study of the early modern history of Myanmar, as well as that of the whole Southeast Asian region, and will also contribute to the preservation of a valuable cultural heritage in Myanmar. cultural heritage, preservation Keywords Citation Issue Date 2013 61 Meiktila University, Research Journal, Vol.IV, No.1, 2013 Historical Value of Parabaik and Pei Moe Moe Oo1 Abstract Parabaiks and Palm Leaf Manuscripts are important in the rich and old tradition and cultural history of Southeast Asia. Many documents reflected the socio-economic situation and Buddhist text of ancient Myanmar. These sources are like a treasure-trove for historians. We hope that this Parabaik and Palm leaf will advance the study of the early modern history of Myanmar, as well as that of the whole Southeast Asian region, and will also contribute to the preservation of a valuable cultural heritage in Myanmar. Key Words: cultural heritage, preservation Introduction Myanmar Manuscripts are an attempt to deal with the socio- economic life of the people during the Kon-baung period. There are many books both published and unpublished in the forms of research journal and thesis. -
DNS / DNSSEC Workshop
1/22/18 DNS / DNSSEC Workshop Hong Kong 22-24 January 2018 Issue Date: Revision: Overview • DNS Overview • BIND DNS Configuration • Recursive and Forward DNS • Reverse DNS • Troubleshooting • DNS Security Overview • DNS Transactions • DNS Security Extensions (DNSSec) • DNSSec Key Management and Automation 2 1 1/22/18 Overview • DNS Overview • BIND DNS Configuration • Recursive and Forward DNS • Reverse DNS • Troubleshooting • DNS Security Overview • DNS Transactions • DNS Security Extensions (DNSSec) • DNSSec Key Management and Automation 3 Domain Name System • A lookup mechanism for translating objects into otHer objects – Mapping names to numbers and vice versa • A globally distributed, loosely coHerent, scalable, reliable, dynamic database • Comprised of tHree components – A “name space” – Servers making tHat name space available – Resolvers (clients) query tHe servers about tHe name space • A critical piece of tHe Internet infrastructure 4 2 1/22/18 IP Addresses vs Domain Names The Internet DNS www.apnic.net202.112.0.46 2001:0400:: 2001:0C00:8888::My Computer www.apnic.net2001:0400:: 5 Old Solution: hosts.txt • A centrally-maintained file, distributed to all Hosts on tHe Internet • Issues witH Having just one file – Becomes Huge after some time – Needs frequent copying to ALL Hosts – Consistency // hosts.txt – Always out-of-date SERVER1 128.4.13.9 WEBMAIL 4.98.133.7 – Name uniqueness FTPHOST 200.10.194.33 – Single point of administration THis feature still exists: [Unix] /etc/Hosts [Windows] c:\windows\Hosts 6 3 1/22/18 DNS Features • Global distribution – SHares tHe load and administration • Loose CoHerency – GeograpHically distributed, but still coHerent • Scalability – can add DNS servers witHout affecting tHe entire DNS • Reliability • Dynamicity – Modify and update data dynamically 7 DNS Features • DNS is a client-server application • Requests and responses are normally sent in UDP packets, port 53 • Occasionally uses TCP, port 53 – for very large requests, e.g. -
Domain Name Systems-Based Electronic Mail Security
DRAFT NIST CYBERSECURITY PRACTICE GUIDE DOMAIN NAME SYSTEMS-BASED ELECTRONIC MAIL SECURITY Scott Rose William C. Barker Santos Jha Chinedum Irrechukwu Karen Waltermire NIST SPECIAL PUBLICATION 1800-6 (INCLUDING PARTS A, B, C) ADDITIONAL CONTENT: https://nccoe.nist.gov/projects/building_blocks/ DRAFT NIST Special Publication 1800-6 NIST Cybersecurity Practice Guide DOMAIN NAME SYSTEMS- BASED ELECTRONIC MAIL SECURITY 1800-6A Scott Rose Executive Summary Information Technology Laboratory National Institute of Standards and Technology 1800-6B Approach, Architecture, and William C. Barker Security Characteristics Dakota Consulting For CIOs, CSOs, and Security Managers Silver Spring, MD 1800-6C Santos Jha How-To Guides Chinedum Irrechukwu For Security Engineers The MITRE Corporation McLean, VA Karen Waltermire National Cybersecurity Center of Excellence National Institute of Standards and Technology November 2016 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Under Secretary of Commerce for Standards and Technology and Director DRAFT DISCLAIMER Certain commercial entities, equipment, products, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST or NCCoE, nor is it intended to imply that the entities, equipment, products, or materials are necessarily the best available for the purpose. National Institute of Standards and Technology Special Publication 1800-6 Natl Inst. Stand. Technol. Spec. Publ. 1800-6, 221 pages (November 2016) CODEN: NSPUE2 Organizations are encouraged to review all draft publications during public comment periods and provide feedback. All publications from NIST’s National Cybersecurity Center of Excellence are available at http://nccoe.nist.gov.