A Bibliography of O'reilly & Associates and O

Total Page:16

File Type:pdf, Size:1020Kb

A Bibliography of O'reilly & Associates and O A Bibliography of O'Reilly & Associates and O'Reilly Media. Inc. Publishers Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 08 February 2021 Version 3.67 Title word cross-reference #70 [1263, 1264]. #70-059 [1263]. #70-068 [1264]. 2 [949]. 2 + 2 = 5986 [1456]. 3 [1149, 1570]. *# [1221]. .Mac [1940]. .NET [1860, 22, 186, 342, 441, 503, 591, 714, 716, 721, 730, 753, 786, 998, 1034, 1037, 1038, 1043, 1049, 1089, 1090, 1091, 1119, 1256, 1468, 1858, 1859, 1863, 1899, 1900, 1901, 1917, 1997, 2029]. '05 [461, 1532]. 08 [1541]. 1 [1414]. 1.0 [1009]. 1.1 [59]. 1.2 [1582]. 1000 [1511]. 1000D [1073]. 10g [711, 710]. 10th [2109]. 11 [1385]. 1 2 2 [53, 209, 269, 581, 2134, 919, 940, 1515, 1521, 1530, 2023, 2045]. 2.0 [2, 55, 203, 394, 666, 941, 1000, 1044, 1239, 1276, 1504, 1744, 1801, 2073]. 2.1 [501]. 2.2 [201]. 2000 [38, 202, 604, 610, 669, 927, 986, 1087, 1266, 1358, 1359, 1656, 1751, 1781, 1874, 1959, 2069]. 2001 [96]. 2003 [70, 71, 72, 73, 74, 279, 353, 364, 365, 789, 790, 856, 987, 1146, 1960, 2026]. 2003-2013 [1746]. 2004 [1195]. 2005 [84, 151, 755, 756, 1001, 1041, 1042, 1119, 1122, 1467, 2120, 2018, 2056]. 2006 [152, 153]. 2007 [618, 726, 727, 728, 1123, 1125, 1126, 1127, 2122, 1973, 1974, 2030]. 2008 [1468]. 2009 [154]. 2013 [1746]. 21st [625, 626, 942]. 220-601 [333]. 3 [130, 225, 463, 632, 701, 814, 1079, 1185, 1347, 1499, 1522, 1704]. 3.0 [23, 24, 236, 822, 847, 1048, 1077, 1277, 1477, 1612, 1701, 1702]. 3.5 [55, 758, 1045, 1047, 1049, 1468]. 3.x [276]. 4 [44, 226, 666, 1184, 1193, 1259, 1526, 1527, 1710]. 4.0 [26, 27, 719, 1166, 1263, 1264, 1440, 1908]. 4.4BSD [336, 337, 338, 339, 340, 341]. 4.4BSD-Lite [336]. 450D [1074]. 5 [227, 347, 1531, 1533, 1785, 1950, 1990, 1991, 1992]. 5.0 [720, 721]. 5.5 [2]. 56K [417]. 6 [228, 460, 1537, 1538, 1591, 1592]. 6.1 [1363]. 6.2 [1165]. 6th [2114]. 7 [1635, 2019]. 70-058 [1262]. 70-620 [334]. 7th [2115]. 8 [58, 255, 295, 1078, 1197, 1546, 1765, 1971, 2024]. 8.13 [322]. 8.5 [1567]. 802.11b [1686]. 802.11n [569]. 8th [2116]. 9 [296, 1513]. 90 [929, 930]. 92 [952]. 95 [276, 976, 1498, 1725]. 97 [1010, 1011, 1012]. 98 [205, 905, 1439, 2093]. 9th [2108]. = [597, 1101, 1652]. A100 [1237]. Absolute [818, 1100, 1098]. Abstraction [1571]. abuse [83]. Academic [975]. Access [86, 788, 1742, 847, 71, 174, 175, 279, 653, 654, 1123, 1125, 1254, 1462, 1664, 1667, 1672, 1715]. accessible [1871]. Accidental [1606, 1607, 1608]. acquainted [135]. Across [1678]. ActionScript [1766, 1076, 1077, 1273, 1274, 1275, 1276, 1277, 1701, 1702]. Active [389, 906, 1087, 47, 48, 51, 52, 859, 1252]. ActiveX [1660]. Add [1665]. Add-Ins [1665]. Adding [1556, 376]. Addressing [594, 595, 596, 597, 598]. admin [1948]. Administration [170, 237, 606, 607, 608, 611, 612, 849, 851, 852, 853, 964, 1224, 1290, 1433, 1434, 2094, 14, 112, 262, 285, 344, 657, 856, 1292, 1314, 1959]. 3 Administrator [937, 938, 1287, 1289, 2024, 122]. Administrators [604, 746, 1359, 1472, 1498, 1908, 593, 996, 1055, 1063]. ADO [1660]. ADO.NET [751, 752, 758]. Adobe [4, 5, 53, 272, 273, 397, 1181, 1182, 1183, 1184, 1186, 1187, 1188]. Adolescent [83]. adolescents [2013, 2014]. Advanced [123, 243, 327, 454, 506, 1170, 1813, 1894]. Advancing [2083]. advantage [1670]. Adventure [1830, 5]. advertising [375]. AEs [220]. Africa [1249]. African [1249]. After [64]. Age [98, 687, 1876, 2048]. Agent [795]. Agents [931, 1721]. agile [1764, 1906, 1907]. aguide [433]. AI [192]. Air [273]. AirPort [569]. AJAX [1022, 2044, 221, 347, 526, 827, 1044, 1132, 1214, 1401, 1491, 1492, 1509, 1556, 1568, 1610, 1632, 1783, 2036]. alcohol [83]. Algorithms [797, 1080, 1245, 2050, 1446]. Alien [1189]. Alpha [1237]. alternative [2031]. amateur [928]. Amazing [715, 1464]. Amazon [119, 1297]. Ambient [1279]. America [185, 381, 1749]. American [466]. Analysis [243, 1075, 1206, 175, 310, 324, 1150, 1216, 1703]. Analytics [1245, 356]. Analyzing [947]. Android [886, 1223, 2141, 2087, 2088]. Animating [953]. Animation [306, 759, 953, 430, 1765]. Annotated [1103]. Annoyances [205, 903, 905, 907, 908, 1010, 1011, 1012, 1013, 115, 116, 164, 617, 689, 787, 873, 880, 913, 915, 916, 1254, 1634, 1870, 1966]. Annoyances.org [907]. annoying [115, 116, 164, 617, 689, 787, 873, 915, 1254, 1634, 1870, 1966]. Annual [2108, 2109, 2114, 2115, 2116]. answers [1127]. Ant [835, 1921]. anthology [57, 455, 2110]. antipatterns [917]. ANTLR [1465]. AOL [381]. Apache [201, 221, 293, 294, 579, 581, 989, 990, 991, 1633, 1821]. API [526, 1670, 1821]. Apollo [272]. App [1706, 1707, 2125, 1817]. Apple [639, 1058, 1547, 1745]. Apples [1547]. AppleScript [676, 1318, 1319, 1488]. AppleWorks [460]. appliance [2124]. appliances [2124]. Application [206, 710, 820, 1097, 2100, 2101]. Applications [270, 627, 721, 729, 750, 796, 840, 1285, 1399, 1597, 1676, 1678, 1760, 1761, 2058, 2064, 2067, 189, 223, 232, 291, 357, 359, 376, 489, 725, 786, 932, 1003, 1038, 1210, 1259, 1313, 1468, 1744, 2036, 2060, 2061, 2076]. Applied [1824]. Applying [177]. approach [229]. Apps [44, 292, 1007, 1817, 1962, 995]. Architecture [1682, 1683, 1210, 1809, 1841, 2075]. Architektur [361]. Arduino [109, 95, 109, 886, 2137]. Arduino-Projekte [109]. Argentina [780, 1354]. Argentine [780]. Art [331, 2055, 6, 2104, 128, 144, 210, 477, 488, 819, 860, 1149, 1163, 1259, 1764, 2099]. Artificial [2145]. artists [172]. ASP [441, 1550, 1551, 2033, 2034]. ASP.NET [54, 55, 440, 941, 1022, 1000, 1032, 1035, 1039, 1044, 1045, 1047, 2044]. AspectJ [1238]. Assembling [176]. assembly [860]. assessing [445]. assessment [1218, 1219]. asset [971]. Asterisk [1790, 1979, 1980, 1981]. Astronomy [1913]. Atlas [2043]. Atom [761]. attack [1598]. attacks [2096]. Audience [1474, 1190]. audiences [1871]. Audio [132, 605, 1595]. Aufgaben [396]. Auflage [547]. Augmented [43, 44]. Ausdr¨ucke [1860]. Ausgabe [547, 545, 546]. Australia [738, 1357]. authentication [1987]. 4 AutoCAD [927]. AutoIt [571]. Automated [994]. Automating [898, 1050, 1290, 1668, 1820, 1051, 1649]. automation [291]. automatisieren [1649]. aux [1646]. available [955]. Avian [739]. avoid [1966]. avoiding [917]. awk [410, 1641, 1642, 1640, 69, 409, 414, 1639]. AW T [2102]. AxKit [763]. back [568]. Backbone [2064]. Backup [996, 1559, 1561]. backups [2098]. backyards [1464]. Balancing [194, 2098]. Bandit [2050]. Bandits [101]. barefoot [2048]. Baseball [15]. Based [1659, 700, 1050, 1051, 1149, 1171]. basements [1464]. Bash [30, 1648, 396, 734, 1321, 1322, 1323]. Basic [730, 753, 1001, 1034, 1037, 1041, 1119, 1122, 1467, 2120, 1468, 2018, 1286, 395, 586, 729, 750, 828, 1256, 1665, 1670, 1896]. Basics [600, 1006, 1692]. basierte [1630]. battling [1876]. Bayesian [2099]. Bazaar [1606, 1607, 1608]. Be [123, 124, 1872, 1894]. BEA [952]. BeagleBone [1629, 1630, 2091]. Beans [468]. Beautiful [168, 2117, 1809, 125, 1848]. BEEP [1676]. before [1687]. Beginner [1331, 1337]. beginner`s [1766, 95, 1631]. Beginning [1629, 1922]. behandelt [396, 1112, 1710]. Behind [1688, 1221]. Below [1436]. Ben [1652]. BeOS [123, 124, 1894]. Berkeley [662, 35]. Bernhard [1137, 1138]. Best [187, 2129, 292, 514, 632, 702, 737, 985, 1447, 305, 311, 451, 1127, 1448, 1449, 1617]. Bestselling [1443, 66, 69, 513, 1334, 1643]. Beta [533]. Better [1883, 1237]. Betting [2145]. Beyond [1057, 1189, 1331, 1666, 1884, 2049]. BGP [1969]. Big [694, 1745, 687]. BIND [31, 32, 33, 34, 35, 37, 1063, 1064]. binding [1211]. Bioinformatics [655, 1743, 1922, 1923]. Bipolar [2013]. Birds [739]. Bitcoin [76, 1508, 1867]. bits [482]. black [1948]. Blackberry [1117]. BLAST [956]. bleeding [1204]. blending [127]. Blockchain [1868]. Blocks [1620]. Blogging [400, 812]. Blokzijl [1134]. blue [699]. Blueprint [1867, 1868]. blunders [1947]. Bob [1137]. Book [160, 1119, 313, 433, 584, 694, 819, 870, 971, 1259, 1361, 1686, 1710, 1745, 1848, 1902, 1948, 1995, 2017, 2019, 2020, 2021, 2097, 1204]. Books [1415, 1443, 66, 69, 513, 1334, 1643]. Bookshelf [1437, 1441, 1442, 1443, 1444, 1772, 1774, 66, 69, 513, 521, 554, 775, 1334, 1643, 1775, 1805, 2041]. boot [1848, 1945]. Border [1969]. boss [704]. Bots [2137]. Bourne [396]. Bourne-Shell [396]. Box [1810, 1811, 825, 1995]. Boy [703]. BPF [243]. Braden [1137]. brain [870]. Brazil [741, 811]. Brazilian [811]. Breast [1170, 1169]. Brian [1138]. Bridge [4]. British [781]. broken [1456]. browsing [1202]. BSD [954, 992]. Buch [1710]. Build [58, 1065, 1597, 2089, 291, 864, 955, 1468, 1621, 2073]. Building [54, 55, 65, 117, 208, 230, 275, 572, 573, 627, 721, 767, 809, 850, 932, 1210, 1245, 1285, 1324, 1474, 1475, 1476, 1586, 1620, 1806, 1817, 1912, 1915, 2064, 2085, 2086, 2093, 2103, 1969, 331, 725, 786, 1259, 1465, 1744, 2124]. Built [508, 509]. Built-in [508]. Built-ins [509]. burned [2082]. burning [1833, 2019]. bus [278]. Business [62, 63, 300, 350, 352, 466, 467, 529, 588, 649, 667, 731, 780, 781, 811, 894, 895, 920, 988, 1140, 1249, 1251, 1348, 1349, 1350, 1351, 1352, 1353, 1354, 1355, 5 1356, 1357, 1362, 1586, 1684, 2052, 2068, 792, 947, 1468, 1590, 2078]. Buyer [481, 1914]. C [99, 100, 297, 348, 349, 366, 373, 435, 942, 1060, 1080, 1081, 1452, 1453, 1454, 1455, 1456, 1457, 1565, 1566, 1576, 1620, 1708, 1817, 1821, 1827, 1858, 1859, 1987]. C# [1042, 1860, 21, 22, 23, 24, 26, 27, 166, 420, 421, 422, 719, 720, 721, 821, 822, 847, 1030, 1031, 1033, 1036, 1040, 1043, 1046, 1048, 1257, 1825, 1826, 1863, 1897]. Caching [963, 2046]. California [68]. called [2048]. Camera [4, 18]. Camp [1945]. Can [522, 329]. Canada [2052]. Cancer [522, 1170, 229, 879, 890, 926, 1169]. cancers [879]. Canon [1072, 1073, 1074].
Recommended publications
  • Katalog Elektronskih Knjiga
    KATALOG ELEKTRONSKIH KNJIGA Br Autor Naziv Godina ISBN Str. Porijeklo izdavanja 1 Peter Kent Pay Per Click Search 2006 0-471-74594-3 130 Kupovina Engine Marketing for Dummies 2 Terry Large Access 1 2007 Internet Freeware 3 Kevin Smith Excel Lassons & Tutorials 2004 Internet Freeware 4 Terry Michael Photografy Tutorials 2006 Internet Freeware Janine Peterson Phil Pivnick 5 Jake Ludington Converting Vinyl LPs 2003 Internet Freeware to CD 6 Allen Wyatt Cleaning Windows XP 2004 0-7645-7311-X Poklon for Dummies 7 Peter Kent Sarch Engine Optimization 2006 0-4717-5441-2 Kupovina for Dummies 8 Terry Large Access 2 2007 Internet Freeware 9 Dirk Dupon How to write, create, 2005 Internet Freeware promote and sell E-books on the Internet 10 Chayden Bates eBook Marketing 2000 Internet Freeware Explained 11 Kevin Sinclair How To Choose A 1999 Internet Freeware Homebased Bussines 12 Bob McElwain 101 Newbie-Frendly Tips 2001 Internet Freeware 13 Windows Basics 2004 Poklon 14 Michael Abrash Zen of Graphic 2005 Poklon Programming, 2. izdanje 15 13 Hot Internet 2000 Internet Freeware Moneymaking Methods 16 K. Williams The Complete HTML 1998 Poklon Teacher 17 C. Darwin On the Origin of Species Internet Freeware 2/175 Br Autor Naziv Godina ISBN Str. Porijeklo izdavanja 18 C. Darwin The Variation of Animals Internet Freeware 19 Bruce Eckel Thinking in C++, Vol 1 2000 Internet Freeware 20 Bruce Eckel Thinking in C++, Vol 2 2000 Internet Freeware 21 James Parton Captains of Industry 1890 399 Internet Freeware 22 Bruno R. Preiss Data Structures and 1998 Internet
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • Capsicum: Practical Capabilities for UNIX
    Capsicum: practical capabilities for UNIX Robert N. M. Watson Jonathan Anderson Ben Laurie University of Cambridge University of Cambridge Google UK Ltd. Kris Kennaway Google UK Ltd. Abstract significant technical limitations: current OS facilities are simply not designed for this purpose. Capsicum is a lightweight operating system capabil- The access control systems in conventional (non- ity and sandbox framework planned for inclusion in capability-oriented) operating systems are Discretionary FreeBSD 9. Capsicum extends, rather than replaces, Access Control (DAC) and Mandatory Access Control UNIX APIs, providing new kernel primitives (sandboxed (MAC). DAC was designed to protect users from each capability mode and capabilities) and a userspace sand- other: the owner of an object (such as a file) can specify box API. These tools support compartmentalisation of permissions for it, which are checked by the OS when monolithic UNIX applications into logical applications, the object is accessed. MAC was designed to enforce an increasingly common goal supported poorly by dis- system policies: system administrators specify policies cretionary and mandatory access control. We demon- (e.g. “users cleared to Secret may not read Top Secret strate our approach by adapting core FreeBSD utilities documents”), which are checked via run-time hooks in- and Google’s Chromium web browser to use Capsicum serted into many places in the operating system’s kernel. primitives, and compare the complexity and robustness Neither of these systems was designed to address the of Capsicum with other sandboxing techniques. case of a single application processing many types of in- formation on behalf of one user. For instance, a mod- 1 Introduction ern web browser must parse HTML, scripting languages, images and video from many untrusted sources, but be- Capsicum is an API that brings capabilities to UNIX.
    [Show full text]
  • Bigfix Content Sites
    BigFix Content Sites Open Source Licenses and Notices June, 2010 BigFix® Content Sites Open Source Licenses and Notices BigFix delivers its various applications that run on the BigFix Platform through a series of content sites. These content sites contain programs that include the open source software listed below. A list of content sites is attached as Appendix A. The software listed below may be included in only one site or multiple sites. Please contact BigFix at [email protected] if you would like more information regarding which specific open source software components are included on which BigFix content sites and how the content sites correspond to BigFix products. (1) Adobe Auto Complete Copyright (C) 2003‐2006 Adobe Macromedia Software LLC and its licensors. All Rights Reserved. The following is Source Code and is subject to all restrictions on such code as contained in the End User License Agreement accompanying this product. Modified by Jens Krause [www.websector.de] to avoid issues using Flex 3 @see: http://www.websector.de/blog/2008/04/30/quick‐tip‐avoid‐issues‐using‐ adobes‐autocomplete‐input‐component‐using‐flex‐3/ (2) AlivePDF No copyright information is provided in the file for AlivePDF. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
    [Show full text]
  • Sandboxing with Capsicum
    SECURITY Sandboxing with Capsicum PAWEL JAKUB DAWIDEK AND MARIUSZ ZABORSKI Pawel Jakub Dawidek is a ery few programmers have managed to successfully use the principle co-founder and CTO at Wheel of least privilege, as found in OpenSSH, Postfix, and djbdns. Capsi- Systems and a FreeBSD cum, introduced in 2010, adds a capability model designed to make it committer who lives and works V easier for programmers to reason about how to split a program into privileged in Warsaw, Poland. He is the and unprivileged portions. In this article, we describe the changes made in author of various GEOM classes, including the disk-encryption class GELI; he implemented Capsicum since 2010, compare Capsicum to earlier sandboxing techniques, the Highly Available Storage (HAST) daemon and look at the new Casperd, which makes it simpler to split programs. for distributing audit trail files (auditdistd), and Long ago, people started to recognize that security models proposed by the mainstream nowadays is mostly working on the Capsicum operating systems, including Windows, Mac OS X, and all kinds of UNIX-like systems, are framework and the Casper daemon. simply naive: All you need to do is to write programs that have no bugs. That’s indeed naive. [email protected] Let’s also state an obvious rule: The more code we write, the more bugs we introduce, some of which may jeopardize the security of our system. Once we accept this fact, where do we go? Mariusz Zaborski is currently We could only develop very small programs, which are easy to audit, but this again would be working as a software a bit naive.
    [Show full text]
  • Original File Was Cvddn.Tex
    Paul Bowman Durao email: [email protected] Phone: (301) 412-6312 or SKYPE: paul.durao Maryland / Washington DC / Remote Senior Software Architect / Engineer / Software Developer 30+ years of experience full life-cycle software development Exceptionally well-qualified senior software architect engineer with extensive programming skills. Subject matter expert in applying methodologies, processes, and procedures in the execution of full life-cycle approach. There is no substitute for a proper engineering degree, first-rate hands on experience, and sophisticated problem solving methodology, but it’s not for everyone, and that’s where I shine and come through for the team. Flexible Working Classifications 1. 1099 Contract Worker 2. Corp to Corp Contract Worker 3. Statutory Employee 4. At Will Employee 5. Contract ± Sub Contract W-2 Employee 6. Regular W-2 Employee 7. Remote and work at home preferred 8. Willing to travel part, or full time. Technical Qualifications Languages: C, C++, Java, JavaScript, ( Angular Js, DOJO, JQuery), Html, CSS, Ruby, XML, Perl, Python, lisp, Assembly (ARM/Intel), SQL; Operating Systems: Linux, Unix, BSD, OSX. iOS, Motif, Embedded; Database: PL/SQL, Oracle; Library, Middleware and API’s: Java EE, ROR; Additional skills: Data Modeling; MVC; UML, TDD, O/R mapping; Miscellaneous: 508 Compliance (web accessibility). Career Highlights Work Chronology – Independent consulting, and some full time, sometimes there is a mix. I have done consulting on a full/long time basis too, for NASA and IBM for example, as my skill level has improved relative to the market. I have tended to do more independent contracting work as my skill level, comprehension, and abilities are just different, and more specialized, and therefore higher in fidelity, and in quality (Linux, UNIX, OSX, iOS 8 / xcode 6, development centric, all things UNIX related).
    [Show full text]
  • Licensing Information User Manual Release 9.0 Revision 1.2
    Oracle SD-WAN Edge Licensing Information User Manual Release 9.0 Revision 1.2 October 2020 Licensing Information User Manual Oracle SD-WAN Edge 8.2 Oracle SD-WAN Edge Licensing Information ser !an"al# Release 9.0 Copyright Information $o%yrig't ( 2020# Oracle and)or its a*liates. All rig'ts reser+ed. ,'is soft-are and related doc"mentation are %rovided "nder a license agreement containing restrictions on "se and disclosure and are %rotected by intellect"al %ro%ert& la-s. E.ce%t as e.%ressly %ermitted in &o"r license agreement or allo-ed by la-# &o" may not "se# co%&# re%rod"ce# translate# broadcast# modif&# license# transmit# distrib"te# e.'ibit# %erform# %"blish# or display any %art# in any form# or by any means. Re+erse engineering# disassembl&# or decom%ilation of t'is soft-are# "nless re/"ired by la- for intero%erabilit&# is %ro'ibited. ,'e information contained 'erein is sub0ect to change -it'o"t notice and is not -arranted to be error-free. If &o" find any errors, %lease re%ort t'em to "s in -riting. If t'is is soft-are or related documentation t'at is deli+ered to t'e .S. 2o+ernment or an&one licensing it on be'alf of t'e .S. 2o+ernment# t'en t'e follo-ing notice is a%%licable3 .S. 2O4ERN!EN, END SERS3 Oracle %rograms, incl"ding any o%erating s&stem# integrated soft-are# any %rograms installed on t'e 'ard-are# and)or documentation# deli+ered to .S.
    [Show full text]
  • Autocoding Methods for Networked Embedded Systems
    University of Warwick institutional repository: http://go.warwick.ac.uk/wrap A Thesis Submitted for the Degree of PhD at the University of Warwick http://go.warwick.ac.uk/wrap/36892 This thesis is made available online and is protected by original copyright. Please scroll down to view the document itself. Please refer to the repository record for this item for information to help you to cite it. Our policy information is available from the repository home page. Innovation Report AUTOCODING METHODS FOR NETWORKED EMBEDDED SYSTEMS Submitted in partial fulfilment of the Engineering Doctorate By James Finney, 0117868 November 2009 Academic Supervisors: Dr. Peter Jones, Ross McMurran Industrial Supervisor: Dr. Paul Faithfull Declaration I have read and understood the rules on cheating, plagiarism and appropriate referencing as outlined in my handbook and I declare that the work contained in this submission is my own, unless otherwise acknowledged. Signed: …………………………………………………………………….James Finney ii Acknowledgements I would like to thank Rapicore Ltd and the EPSRC for funding this project. I would also like to offer special thanks to my supervisors: Dr. R.P. Jones, Dr. P. Faithfull, and R. McMurran, for their time, support, and guidance throughout this project. iii Table of Contents Declaration ....................................................................................................................... ii Acknowledgements ......................................................................................................... iii Figures
    [Show full text]
  • Review: Classic Mac OS the X Window System ("X") X
    Review: Classic Mac OS The X Window System ("X") • Designed for the user, not the developer • Asente, Reid (Stanford): W window system for V OS, (1982) • First commercially successful GUI system • W moved BWS&GEL to remote machine, replaced local library calls with • Technically few advances synch. communication • One address space, one process, “no” OS • Simplified porting to new architectures, but slow under Unix • But revolutionary approach to UI consistency (HI Guidelines) • MIT: X as improvement over W (1984) • Macintosh Toolbox • Asynchronous calls: much-improved performance • Pascal procedures grouped into Managers, ROM+RAM • Application = client, calls X Library (Xlib) which packages and sends GEL • Extended as technology advanced (color, multiprocessing,...), but calls to the X Server and receiving events using the X Protocol. architecture was showing its age by late 90s • Similar to Andrew, but window manager separate • Inspiration for other GUIs, esp. MS Windows • X10 first public release, X11 cross-platform redesigned Jan Borchers 1 media computing group Jan Borchers 2 media computing group X: Architecture X Server • X11 ISO standard, but limited since static protocol Application • X server process combines GEL and BWS • X is close to Widget Set • Responsible for one keyboard (one EL), but n physical screens UITK our 4-layer WM Xt Intrinsics (GLs) architecture • One machine can run several servers Xlib model Xlib • Applications (with UITK) and WM are clients Network • GEL: Direct drawing, raster model, rectangular clipp. X Server BWS+GEL • X-Server layers: Device-dependent X (DDX), device-independent X (DIX) HW • BWS can optionally buffer output regions Jan Borchers 3 media computing group Jan Borchers 4 media computing group Typical Xlib application (pseudocode) X Protocol #include Xlib.h, Xutil.h Display *d; int screen; GC gc; Window w; XEvent e; main () { • Between X server process and X clients (incl.
    [Show full text]
  • Sample Pages
    TitlePgsInternetRev 3/5/05 8:13 AM Page 3 Defining Moments the internet revolution Kevin Hillstrom 615 Griswold, Detroit MI 48226 DM - Internet FM 3/7/05 4:46 PM Page v Table of Contents Preface . .vii How to Use This Book . .xi Important People, Places, and Terms . .xiii Chronology . .xxi NARRATIVE OVERVIEW Prologue . .3 Chapter One: Early Origins of the Internet . .5 Chapter Two: Invention of the World Wide Web . .23 Chapter Three: How the Internet Works . .33 Chapter Four: Opening the Internet for Commerce . .45 Chapter Five: The “Dot.Com Boom” Goes Bust . .57 Chapter Six: The Societal Impact of the Internet . .67 Chapter Seven: The Future of the Internet . .89 BIOGRAPHIES Marc Andreessen . .103 Creator of the Netscape Navigator Web Browser Tim Berners-Lee . .107 Inventor of the World Wide Web Sergey Brin and Larry Page . .112 Co-Founders of Google v DM - Internet FM 3/7/05 4:46 PM Page vi Defining Moments: The Internet Revolution Steve Case . .115 Co-Founder of America Online (AOL) Vinton Cerf . .120 Developer of Early Internet Architecture David Filo and Jerry Yang . .124 Co-Founders of the Yahoo! Search Engine Robert Taylor . .129 Leading Scientist in the Development of the ARPANET PRIMARY SOURCES Vinton Cerf Recalls the Early Development of the Internet . .135 Steve Crocker Launches the “Request for Comments” Series . .144 A Computer Scientist Describes the Internet Worm of 1988 . .152 The First World Wide Web Page with Hypertext Links . .164 Tim Berners-Lee Remembers Inventing the World Wide Web . .166 A Librarian Shares the Joy of “Surfing” the Internet .
    [Show full text]
  • The Law of the Horse: What Cyberlaw Might Teach
    FINALHLS.DOC 12/03/99 – 10:19 AM COMMENTARIES THE LAW OF THE HORSE: WHAT CYBERLAW MIGHT TEACH Lawrence Lessig* INTRODUCTION A few years ago, at a conference on the “Law of Cyberspace” held at the University of Chicago, Judge Frank Easterbrook told the assembled listeners, a room packed with “cyberlaw” devotees (and worse), that there was no more a “law of cyberspace” than there was a “Law of the Horse”;1 that the effort to speak as if there were such a law would just muddle rather than clarify; and that legal academics (“dilettantes”) should just stand aside as judges and lawyers and technologists worked through the quotidian problems that this souped-up telephone would present. “Go home,” in effect, was Judge Easterbrook’s welcome. As is often the case when my then-colleague speaks, the intervention, though brilliant, produced an awkward silence, some polite applause, and then quick passage to the next speaker. It was an interesting thought — that this conference was as significant as a conference on the law of the horse. (An anxious student sitting behind me whispered that he had never heard of the “law of the horse.”) But it did not seem a very helpful thought, two hours into this day-long conference. So marked as unhelp- ful, it was quickly put away. Talk shifted in the balance of the day, and in the balance of the contributions, to the idea that either the law of the horse was significant after all, or the law of cyberspace was something more. ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– * Jack N. and Lillian R.
    [Show full text]