Customized Book List Computer
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
ROADS and BRIDGES: the UNSEEN LABOR BEHIND OUR DIGITAL INFRASTRUCTURE Preface
Roads and Bridges:The Unseen Labor Behind Our Digital Infrastructure WRITTEN BY Nadia Eghbal 2 Open up your phone. Your social media, your news, your medical records, your bank: they are all using free and public code. Contents 3 Table of Contents 4 Preface 58 Challenges Facing Digital Infrastructure 5 Foreword 59 Open source’s complicated relationship with money 8 Executive Summary 66 Why digital infrastructure support 11 Introduction problems are accelerating 77 The hidden costs of ignoring infrastructure 18 History and Background of Digital Infrastructure 89 Sustaining Digital Infrastructure 19 How software gets built 90 Business models for digital infrastructure 23 How not charging for software transformed society 97 Finding a sponsor or donor for an infrastructure project 29 A brief history of free and public software and the people who made it 106 Why is it so hard to fund these projects? 109 Institutional efforts to support digital infrastructure 37 How The Current System Works 38 What is digital infrastructure, and how 124 Opportunities Ahead does it get built? 125 Developing effective support strategies 46 How are digital infrastructure projects managed and supported? 127 Priming the landscape 136 The crossroads we face 53 Why do people keep contributing to these projects, when they’re not getting paid for it? 139 Appendix 140 Glossary 142 Acknowledgements ROADS AND BRIDGES: THE UNSEEN LABOR BEHIND OUR DIGITAL INFRASTRUCTURE Preface Our modern society—everything from hospitals to stock markets to newspapers to social media—runs on software. But take a closer look, and you’ll find that the tools we use to build software are buckling under demand. -
Writing the Biography of a Notebook
Writing the Biography of a Notebook Interpreting a richly decorated baroque notebook from the collection of the Rijksmuseum Amsterdam MA thesis Conservation and Restoration of Cultural Heritage: Technical Art History Student: Anneke Hoekstra Student number: 10454780 Thesis supervisor: prof. dr. H.H.M. (Erma) Hermens Second reader: dr. H. (Herman) den Otter Word count: 17992 University of Amsterdam, Amsterdam July 2020 Writing the Biography of a Notebook Abstract Juli 2020, Anneke Hoekstra (10454780) In het interdisciplinaire MA-scriptieonderzoek aan de Universiteit van Amsterdam ‘Writing the Biography of a Notebook: interpreting a richly decorated baroque notebook from the collection of the Rijksmuseum Amsterdam’, fungeert het object BK-17172 als primaire bron. De ‘levensloop’ van het object wordt onderzocht, om te achterhalen hoe, waar en wanneer het is vervaardigd en op welke wijze en door wie het is gebruikt. July 2020, Anneke Hoekstra (10454780) In the interdisciplinary MA thesis project at the University of Amsterdam ‘Writing the Biography of a Notebook: interpreting a richly decorated baroque notebook from the collection of the Rijksmuseum Amsterdam’, the object BK-17172 is the primary source. The object’s ‘life cycle’ is investigated, to determine how, where and when it was manufactured and in what manner and by whom it was used. 2 Hoekstra, UvA, 2020 Writing the Biography of a Notebook Figure 1a, b, c. From left to right: front, inside, and back of the notebook. Anonymous, Notebook of tortoise, with decorations of gold, enamel and gemstones. In the closing a pencil, decorated with an enamelled bust, Rijksmuseum Amsterdam, Amsterdam (BK-17172), ca. 1710-1730, Dresden, Tortoise, gold, enamel and gemstones, h. -
Hierarchical Categorisation of Web Tags for Delicious
HIERARCHICAL CATEGORISATION OF WEB TAGS FOR DELICIOUS J. Parra-Arnau, A. Perego, E. Ferrari, J. Forné and D. Rebollo-Monedero1 INTRODUCTION In the scenario of social bookmarking, a user browsing the Web bookmarks web pages and assigns free-text labels (i.e., tags) to them according to their personal preferences. The benefits of social tagging are clear – tags enhance Web content browsing and search. However, since these tags may be publicly available to any Internet user, a privacy attacker may collect this information and extract an accurate snapshot of users’ interests or user profiles, containing sensitive information, such as health-related information, political preferences, salary or religion. In order to hinder attackers in their efforts to profile users, this report focuses on the practical aspects of capturing user interests from their tagging activity. More accurately, we study how to categorise a collection of tags posted by users in one of the most popular bookmarking services, Delicious (http://delicious.com). METHODOLOGY As frequently done in collaborative tagging sites, the profile of a user is modelled as a tag cloud, that is, a visual representation where tags are weighted according to their frequency of use. Note that tag clouds are in essence equivalent to normalized histograms of tags. Nevertheless, the representation of a user profile as a cloud, or equivalently as a normalized histogram, of all the tags submitted by users is clearly an inappropriate approach; not only because of the intractability of the profile, but also because it makes it difficult to have a quick overview of the user interests. For example, for users posting the tags “welfare”, “Dubya” and “Katrina” it would be preferable to have a higher level of abstraction that enables us to conclude, directly from the inspection of the user profile, that these users are interested in politics. -
A Survey on Content Management System, Software's and Tools
ISSN (Online) 2393-8021 IARJSET ISSN (Print) 2394-1588 International Advanced Research Journal in Science, Engineering and Technology ISO 3297:2007 Certified Vol. 4, Issue 11, November 2017 A Survey on Content Management System, Software's and Tools Madhura K Assistant Professor, Computer Science Department, Presidency University, Bangalore1 Abstract: This paper contains a survey of content management system, content management process, architecture and working. Also contains different types of tools and software. Content Management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format. The term is typically used in reference to administration of the digital content lifecycle, from creation to permanent storage or deletion. The content involved may be images, video, audio and multimedia as well as text. A Content Management System (CMS) is a computer application that supports the creation and modification of digital content. It is typically used to support multiple users working in a collaborative environment. A Content Management System (CMS) is a tool for creating and managing digital content such as documents, text, web pages, videos and images.A content management system (CMS) is a software application or set of related programs that are used to create and manage digital content. CMSes are typically used for Enterprise Content Management (ECM) and Web Content Management (WCM). An ECM facilitates collaboration in the workplace by integrating document management, digital asset management and records retention functionalities, and providing end users with role-based access to the organization's digital assets. A WCM facilitates collaborative authoring for websites. ECM software often includes a WCM publishing functionality, but ECM webpages typically remain behind the organization's firewall. -
Spreading Excellence
IST-004527 ARTIST2 NoE Year 3 JPASE: Joint Programme of Activities for D3-Mgt-Y3 Spreading Excellence IST-004527 ARTIST2 Network of Excellence on Embedded Systems Design Spreading Excellence Artist2 Technical Coordinator: Bruno Bouyssounouse (Verimag) with inputs from all NoE participants The visibility of the ARTIST2 research effort in embedded systems design is worldwide. This is progressively creating a European embedded systems design community, and spreading the “artist culture” in all major research institutions. To ensure that the next generation of researchers will continue in this direction we, as a consortium, devote a great deal of effort to Spreading Excellence, in both academic and industrial circles. Furthermore, through our links with both core and affiliated partners, we are actively setting up permanents links between industry and public research, leveraging on existing partner collaborations with major industrial players in the area. This document shows that ARTIST2 has a strategic impact on the integration of multiple academic research communities, which are necessary to establish the new area of embedded systems design. 1 / 126 IST-004527 ARTIST2 NoE Year 3 JPASE: Joint Programme of Activities for D3-Mgt-Y3 Spreading Excellence Table of Contents 1. Vision and Strategy for Spreading Excellence - Executive Summary.................................5 1.1 Overall Vision and Strategy .........................................................................................5 1.2 Affiliated partners.........................................................................................................6 -
Irmx Installation and Startup
iRMX® Installation and Startup RadiSys Corporation 5445 NE Dawson Creek Drive Hillsboro, OR 97124 (503) 615-1100 FAX: (503) 615-1150 www.radisys.com 07-0683-01 December 1999 EPC, iRMX, INtime, Inside Advantage, and RadiSys are registered trademarks of RadiSys Corporation. Spirit, DAI, DAQ, ASM, Brahma, and SAIB are trademarks of RadiSys Corporation. Microsoft and MS-DOS are registered trademarks of Microsoft Corporation and Windows 95 is a trademark of Microsoft Corporation. IBM and PC/AT are registered trademarks of International Business Machines Corporation. Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corporation. Intel is a registered trademark of Intel Corporation. All other trademarks, registered trademarks, service marks, and trade names are property of their respective owners. December 1999 Copyright 1999 by RadiSys Corporation All rights reserved. ii Quick Contents Section I. Choosing Your Installation Chapter 1. Introduction Section II. iRMX Installation Procedures Chapter 2. Installing on iRMX development/target systems that are PC-compatible Platforms with no DOS Chapter 3. Installing on iRMX development/target systems that are PC-compatible Platforms with DOS Chapter 4. Installing on iRMX Development/Target Systems that are Multibus II Platforms Chapter 5. Installing the iRMX III OS on Multibus I Systems Chapter 6. Installing on Windows NT systems used as iRMX development systems Section III. iRMX Getting Started Chapters Chapter 7. DOSRMX Specifics Chapter 8. iRMX for PCs Specifics Chapter 9. Getting Acquainted with the Operating System Chapter 10. Where To Go From Here Section IV. Appendices Appendix A. Installed Directories Appendix B. Limitations Appendix C. Configuration Requirements for PC Platforms Appendix D. -
Dines Bjørner Research, Bibliography, Biography and Publication List
CV: Dines Bjørner Research, Bibliography, Biography and Publication List Professor of Computing Science (Emeritus). Fredsvej 11, DK-2840 Holte, Denmark Dr.h.c., MAE, MRANS (AB), ACM Fellow, IEEE Fellow May 16, 2010 Dines Bjørner, Sept. 2007 For more photos see Sect. 5 Contents 2.3 Book Covers ............... 5 1 My Research 2 3 Biography 7 2 Publication Notes 3 4 References 9 2.1 Year-by-Year Listing ........... 3 2.2 Statistics ................. 4 5 Photos 24 1 My Research My research, since my IBM Vienna days, has focused on computing science,1 in particular program- ming methodology: on how to construct software. I was never much for the more foundational 1By computing science I understand the study of and knowledge about how to construct the “things” that can exist “inside” computers: data and processes. 1 side of computing, or as I call it, computer science.2 3 I am in particular “smitten” by the question what is a method ?. I see a method as a set of principles to be used in the analysis of problems and in the synthesis of solutions to these problems. I see the analysis and synthesis to be based on techniques and tools. The principles are then about the selection and practical use of the analysis and synthesis techniques and tools — research must uncover these principles, techniques and tools. Software engineering textbooks must cover them.4 I see a good software development method to be one that provides for efficient development approaches resulting in efficient software that meets customers expectations (and only and exactly those) and software that is correct (that is satisfies its requirements). -
Completeness of Higher-Order Duration Calculus *
Completeness of Higher-Order Duration Calculus Zhan Naijun Lab. of Computer Science and Techonology, Institute of Software, the Chinese Academy of Sciences, Beijing, 100080, P.R. China [email protected] Abstract. In order to describe the real-time behaviour of programs in terms of Duration Calculus (DC), proposed by Zhou Chaochen, C.A.R. Hoare and A.P. Ravn in [3], which can specify real-time requirements of computing systems, quantifications over program variables are inevitable, e.g. to describe local variable declaration, to declare internal channel and so on. So a higher-order duration calculus (HDC) is established in [2]. This paper proves completeness of HDC on abstract domains by encod- ing HDC into a complete first-order two-sorted interval temporal logic (IL2 ). This idea is hinted by [9]. All results shown in this paper are done under the assumption that all program variables have finite variability. Keywords: duration calculus higher-order logic interval temporal logic completeness 1 Introduction In order to describe the real-time behaviour of programs in terms of DC, quan- tifications over program variables are inevitable, e.g. to describe local variable declaration and so on. So a higher-order duration calculus is established in [2]. In [2], a real-time semantics of local variables has been demonstrated, and some real-time properties of programs have been derived using HDC. In order to specify the behaviour of real-time programs, program variables Vi,i≥ 0 are introduced into HDC. Predicates of program variables, constants, and global variables, such as (V<3) and (V = x), are taken as states. -
Manifest Domains:Analysis and Description
Downloaded from orbit.dtu.dk on: Oct 02, 2021 Manifest domains:analysis and description Bjørner, Dines Published in: Formal Aspects of Computing Link to article, DOI: 10.1007/s00165-016-0385-z Publication date: 2017 Document Version Peer reviewed version Link back to DTU Orbit Citation (APA): Bjørner, D. (2017). Manifest domains:analysis and description. Formal Aspects of Computing, 29(2), 175-225. https://doi.org/10.1007/s00165-016-0385-z General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. 17 June 2016: 11:32 am: Accepted for publication in Formal Aspects of Computing Manifest Domains: Analysis and Description Dines Bjørner1 1 Fredsvej 11, DK-2840 Holte, Denmark. DTU, DK-2800 Kgs. Lyngby, Denmark. e-mail: [email protected], URL: www.imm.dtu.dk/˜dibj To the memory of Peter Lucas: 13 Jan. 1935 – 2 Feb. 2015 Abstract. We show that manifest domains, an understanding of which are a prerequisite for software requirements prescriptions, can be precisely described: narrated and formalised. -
Dubina Lukáš
Tvorba webových aplikací s využitím Open source CMS Creating web applications using Open source CMS Bakalářská práce Lukáš Dubina Vedoucí „závěrečné“ práce: PaedDr. Petr Pexa Jihočeská univerzita v Českých Budějovicích Pedagogická fakulta Katedra Informatiky 2010 Prohlášení Prohlašuji, ţe svoji bakalářskou práci jsem vypracoval samostatně pouze s pouţitím pramenů a literatury uvedených v seznamu citované literatury. Prohlašuji, ţe v souladu s § 47b zákona č. 111/1998 Sb. v platném znění souhlasím se zveřejněním své bakalářské práce, a to v nezkrácené podobě elektronickou cestou ve veřejně přístupné části databáze STAG provozované Jihočeskou univerzitou v Českých Budějovicích na jejích internetových stránkách. V Českých Budějovicích dne 24. 4. 2010 Anotace Cílem této práce je popsat problematiku tvorby webových stránek s vyuţitím CMS (content management system, redakční systém, systém pro správu obsahu), vytvořit průvodce redakčními systémy a provést jejich srovnání. V úvodní části práce autor popisuje, jak vznikaly redakční systémy a začínajícím uţivatelům upřesňuje jejich funkce, instalaci a moţnosti jejich rozšíření pomocí komponent a modulů. V praktické části autor prezentuje své projekty přímo na internetu, hodnotí a testuje dle kritérií a vyzdvihuje výhody či nevýhody srovnávaných systémů. V závěru je uvedeno doporučení, který redakční systém si vybrat pro určitý typ projektu. Abstract The aim of this work is to describe the problems of creating web pages by using a CMS (content management system, editorial system, system for repair content), create a guide to kontent management system and make their comparison. In the introductory part of the work the author describes, how content management systems started up and for novice users specifies the functions, installation and upgrade with the possibility of thein components and modules. -
Ramcram.Txt MEMORY MANAGEMENT for CD-ROM WORKSTATIONS
ramcram.txt MEMORY MANAGEMENT FOR CD-ROM WORKSTATIONS by Peter Brueggeman Scripps Institution of Oceanography Library University of California San Diego "Memory management for CD-ROM workstations, Part II", CD-ROM PROFESSIONAL, 4(6):74-78, November 1991. "Memory management for CD-ROM workstations, Part I", CD-ROM PROFESSIONAL, 4(5):39-43, September 1991. The nature of the memory in IBM compatible microcomputers can be confusing to understand and worse to manage. If you are lucky, everything runs fine on the CD-ROM workstation or network and an article on memory management will be interesting but lack immediacy. Try to load other software concurrent with CD-ROM software or to implement network access and you may be due for a crash course in DOS memory, its limitations, and management. Running CD-ROM software usually demands considerable memory resources. Software in general has become more memory-hungry with time, and CD-ROM software have a reputation for being very hungry. Many CD-ROM products state that 640K RAM memory is required; this is not the exact memory requirement of the CD-ROM software. The CD-ROM software itself uses some of the 640K RAM as does DOS. Rarely will the exact memory requirement of a CD-ROM software be readily accessible. Sales representatives usually will not know it and only experienced technical support staff may know. CD-ROM workstation/network managers should try to learn the exact memory requirement of their CD-ROM software. Knowing their memory requirement helps greatly in selecting the level of solution(s). Addressing memory shortfalls may involve considerable tinkering and patience and involve seemingly endless rebooting. -
Domain Science & Engineering. a Foundation for Software Development
Downloaded from orbit.dtu.dk on: Sep 28, 2021 Domain Science & Engineering. A Foundation for Software Development Bjørner, Dines Publication date: 2020 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Bjørner, D. (2020). Domain Science & Engineering. A Foundation for Software Development. Technical University of Denmark. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Dines Bjørner Domain Science & Engineering A Foundation for Software Development A Dr.Techn. Thesis Submission for The Technical University of Denmark September 6, 2019: 16:27 www.imm.dtu.dk/~dibj/2019/cacm−research/cacm−research−1.pdf Phenomena of a Universe of Discourse External Qualities E Entities = Describables Indescribables Observer function "states" E Endurants Perdurants Materials = Solids = E