Weblogs Compendium Home | Contact Blog Tools
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Hacker Public Radio
hpr0001 :: Introduction to HPR hpr0002 :: Customization the Lost Reason hpr0003 :: Lost Haycon Audio Aired on 2007-12-31 and hosted by StankDawg Aired on 2008-01-01 and hosted by deepgeek Aired on 2008-01-02 and hosted by Morgellon StankDawg and Enigma talk about what HPR is and how someone can contribute deepgeek talks about Customization being the lost reason in switching from Morgellon and others traipse around in the woods geocaching at midnight windows to linux Customization docdroppers article hpr0004 :: Firefox Profiles hpr0005 :: Database 101 Part 1 hpr0006 :: Part 15 Broadcasting Aired on 2008-01-03 and hosted by Peter Aired on 2008-01-06 and hosted by StankDawg as part of the Database 101 series. Aired on 2008-01-08 and hosted by dosman Peter explains how to move firefox profiles from machine to machine 1st part of the Database 101 series with Stankdawg dosman and zach from the packetsniffers talk about Part 15 Broadcasting Part 15 broadcasting resources SSTRAN AMT3000 part 15 transmitter hpr0007 :: Orwell Rolled over in his grave hpr0009 :: This old Hack 4 hpr0008 :: Asus EePC Aired on 2008-01-09 and hosted by deepgeek Aired on 2008-01-10 and hosted by fawkesfyre as part of the This Old Hack series. Aired on 2008-01-10 and hosted by Mubix deepgeek reviews a film Part 4 of the series this old hack Mubix and Redanthrax discuss the EEpc hpr0010 :: The Linux Boot Process Part 1 hpr0011 :: dd_rhelp hpr0012 :: Xen Aired on 2008-01-13 and hosted by Dann as part of the The Linux Boot Process series. -
Luigi Documentation Release 2.8.13
Luigi Documentation Release 2.8.13 The Luigi Authors Apr 29, 2020 Contents 1 Background 3 2 Visualiser page 5 3 Dependency graph example 7 4 Philosophy 9 5 Who uses Luigi? 11 6 External links 15 7 Authors 17 8 Table of Contents 19 8.1 Example – Top Artists.......................................... 19 8.2 Building workflows........................................... 23 8.3 Tasks................................................... 28 8.4 Parameters................................................ 33 8.5 Running Luigi.............................................. 36 8.6 Using the Central Scheduler....................................... 38 8.7 Execution Model............................................. 41 8.8 Luigi Patterns............................................... 43 8.9 Configuration............................................... 48 8.10 Configure logging............................................ 60 8.11 Design and limitations.......................................... 61 9 API Reference 63 9.1 luigi package............................................... 63 9.2 Indices and tables............................................ 248 Python Module Index 249 Index 251 i ii Luigi Documentation, Release 2.8.13 Luigi is a Python (2.7, 3.6, 3.7 tested) package that helps you build complex pipelines of batch jobs. It handles dependency resolution, workflow management, visualization, handling failures, command line integration, and much more. Run pip install luigi to install the latest stable version from PyPI. Documentation for the latest release is hosted on readthedocs. Run pip install luigi[toml] to install Luigi with TOML-based configs support. For the bleeding edge code, pip install git+https://github.com/spotify/luigi.git. Bleeding edge documentation is also available. Contents 1 Luigi Documentation, Release 2.8.13 2 Contents CHAPTER 1 Background The purpose of Luigi is to address all the plumbing typically associated with long-running batch processes. You want to chain many tasks, automate them, and failures will happen. -
Developing an Argument Learning Environment Using Agent-Based ITS (ALES)
Educational Data Mining 2009 Developing an Argument Learning Environment Using Agent-Based ITS (ALES) Sa¯a Abbas1 and Hajime Sawamura2 1 Graduate School of Science and Technology, Niigata University 8050, 2-cho, Ikarashi, Niigata, 950-2181 JAPAN [email protected] 2 Institute of Natural Science and Technology, Academic Assembly,Niigata University 8050, 2-cho, Ikarashi, Niigata, 950-2181 JAPAN [email protected] Abstract. This paper presents an agent-based educational environment to teach argument analysis (ALES). The idea is based on the Argumentation Interchange Format Ontology (AIF) using "Walton Theory". ALES uses di®erent mining techniques to manage a highly structured arguments repertoire. This repertoire was designed, developed and implemented by us. Our aim is to extend our previous framework proposed in [3] in order to i) provide a learning environment that guides student during argument learning, ii) aid in improving the student's argument skills, iii) re¯ne students' ability to debate and negotiate using critical thinking. The paper focuses on the environment development specifying the status of each of the constituent modules. 1 Introduction Argumentation theory is considered as an interdisciplinary research area. Its techniques and results have found a wide range of applications in both theoretical and practical branches of arti¯cial in- telligence and computer science [13, 12, 16]. Recently, AI in education is interested in developing instructional systems that help students hone their argumentation skills [5]. Argumentation is classi- ¯ed by most researchers as demonstrating a point of view (logic argumentation), trying to persuade or convince (rhetoric and dialectic argumentation), and giving reasons (justi¯cation argumentation) [12]. -
Tutorial Penggunaan Cpanel Hosting
TUTORIAL PENGGUNAAN CPANEL (WEBHOSTING ACCOUNT CONTROL PANEL) HOSTING Control Panel atau Web Manager merupakan tool yang paling popular untuk mengelola website Anda. Dengan adanya Control Panel, Anda tidak perlu menggunakan metode manual lagi untuk mengelola website Anda. Anda juga tidak perlu lagi menghubungi staff kami untuk pembuatan alamat email baru, subdomain, backup, pembuatan database baru, pergantian password FTP/Control Panel dan sebagainya. Semuanya dapat Anda lakukan sendiri dengan login ke Control Panel . cPanel adalah Control Panel yang populer untuk mengelola account webhosting. Mudah digunakan dan memiliki banyak fitur serta sering di-update oleh penerbitnya. Catatan: • Setup awal cPanel untuk account hosting selalu menggunakan thema "light" yang terdiri dari teks tanpa icon, agar lebih mudah dimengerti bagi yang belum terbiasa, dan memakai bhs. Inggeris. User dapat merubah theme dan language ini setelah login. Untuk bahasa, user bisa memilih bahasa Indonesia, dll. • Fungsi untuk perubahan thema cPanel, dapat dilakukan di menu "Preferences", pilih "Change Look and Feel". Terdapat beberapa jenis thema yang terpasang: rvskinlight, rvskin, x2 (versi lama, tidak dianjurkan), x3 (versi baru, dianjurkan). • Untuk merubah tampilan (style) dari thema yang dipilih tersebut, bisa dilakukan dari menu "Prefenrences", pilih "Change Style". Setiap account webhosting memiliki akses ke cPanel masing-masing, yang diakses melalui web-browser dengan URL: http://<domain-anda>/cpanel atau, http://<domain-anda>:2082 atau, https://<domain-anda>:2083 untuk akses melalui SSL (secure). Akses ke cPanel memerlukan username dan password. Di layar utama cPanel setelah login, anda bisa mengelola: * mengganti password akses ke cPanel (sama dengan password FTP). * e-mail/mailbox (buat baru, ganti password, hapus). * setup email forwarder, dll. -
A Conceptual Social Framework That Delivers KM Values to Corporate Organizations
EMSoD — A Conceptual Social Framework that Delivers KM Values to Corporate Organizations Christopher Adetunji, Leslie Carr Web Science Institute School of Electronics and Computer Science University of Southampton Southampton, England Email: fca6g14, [email protected] Abstract—As social software is becoming increasingly disruptive the Enterprise Mobility and Social [media] Data (EMSoD) to organizational structures and processes, Knowledge Manage- framework, our proposed conceptual social framework, with ment (KM) initiatives that have hitherto taken the form of a KM value at its core. We provide an overview of our previous ‘knowledge repository’ now need redefining. With the emergence work that culminates in an important measure of KM value of Social Media (SM) platforms like Twitter, the hierarchical — actionable knowledge — upon which a significant business boundaries within the organization are broken down and a lateral decision is made by a case study organization. This is un- flow of information is created. This has created a peculiar kind of tension between KM and SM, in which one is perceived as derpinned by the fact that the real essence of knowledge is its threatening the continued relevance of the other. Particularly, actionability, especially when it contributes to the advancement with the advances of social media and social software, KM is more of a proposed undertaking [3]. Measuring the value of such in need of delivering measurable value to corporate organizations, contributions has been one of the main issues of disagreement if it is to remain relevant in the strategic planning and positioning in Knowledge Management, which is why we devised a of organizations. In view of this, this paper presents EMSoD mechanism for measuring the KM value which our framework — Enterprise Mobility and Social Data — a conceptual social helps in delivering to corporate organizations. -
Growing up Online: Identity, Development and Agency in Networked Girlhoods
City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 5-2015 Growing Up Online: Identity, Development and Agency in Networked Girlhoods Claire M. Fontaine Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/923 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] Growing Up Online: Identity, Development and Agency in Networked Girlhoods by Claire M. Fontaine A dissertation submitted to the Graduate Faculty in Urban Education in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2015 2015 Claire M. Fontaine Some rights reserved. (See: Appendix A) This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. http://creativecommons.org/licenses/by-nc-nd/4.0/ ii This manuscript has been read and accepted for the Graduate Faculty in Urban Education to satisfy the dissertation requirement for the degree of Doctor of Philosophy. Wendy Luttrell, PhD ________________________ ________________________________________________ Date Chair of Examining Committee Anthony Picciano, PhD Date Executive Officer Joan Greenbaum, PhD Ofelia García, PhD Supervisory Committee THE CITY UNIVERSITY OF NEW YORK iii Abstract Growing Up Online: Identity, Development and Agency in Networked Girlhoods by Claire M. Fontaine Advisor: Professor Wendy Luttrell Young women’s digital media practices unfold within a postfeminist media landscape dominated by rapidly circulating visual representations that often promote superficial readings of human value. -
Source Code Patterns of Cross Site Scripting in PHP Open Source Projects
Source Code Patterns of Cross Site Scripting in PHP Open Source Projects Felix Schuckert12, Max Hildner1, Basel Katt2 ,∗ and Hanno Langweg12 1 HTWG Konstanz, Department of Computer Science, Konstanz, Baden-W¨urttemberg, Germany [email protected] [email protected] [email protected] 2 Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU, Norwegian University of Science and Technology, Gjøvik, Norway [email protected] Abstract To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed to find out what kind of source code patterns were used. Source code pattern categories were found for sources, concatenations, sinks, HTML context and fixes. Our resulting categories are compared to categories from CWE. A source code sample which might have led developers to believe that the data was already sanitized is described in detail. For the different HTML context categories, the necessary Cross Site Scripting prevention mechanisms are described. 1 Introduction Cross Site Scripting (XSS) is on the fourth place in Common Weakness Enumeration (CWE) top 25 2011 [3] and on the seventh place in Open Wep Application Security Project (OWASP) top 10 2017 [4]. Accordingly, Cross Site Scripting is still a common issue in web security. To discover the reason why the same vulnerabilities are still occurring, we investigated the vulnerable and patched source code from open source projects. Similar methods, functions and operations are grouped together and are called source code patterns. -
LAMP and the REST Architecture Step by Step Analysis of Best Practice
LAMP and the REST Architecture Step by step analysis of best practice Santiago Gala High Sierra Technology S.L.U. Minimalistic design using a Resource Oriented Architecture What is a Software Platform (Ray Ozzie ) ...a relevant and ubiquitous common service abstraction Creates value by leveraging participants (e- cosystem) Hardware developers (for OS level platforms) Software developers Content developers Purchasers Administrators Users Platform Evolution Early stage: not “good enough” solution differentiation, innovation, value flows Later: modular architecture, commoditiza- tion, cloning no premium, just speed to market and cost driven The platform effect - ossification, followed by cloning - is how Chris- tensen-style modularity comes to exist in the software industry. What begins as a value-laden proprietary platform becomes a replaceable component over time, and the most successful of these components finally define the units of exchange that power commodity networks. ( David Stutz ) Platform Evolution (II) Example: PostScript Adobe Apple LaserWriter Aldus Pagemaker Desktop Publishing Linotype imagesetters NeWS (Display PostScript) OS X standards (XSL-FO -> PDF, Scribus, OOo) Software Architecture ...an abstraction of the runtime elements of a software system during some phase of its oper- ation. A system may be composed of many lev- els of abstraction and many phases of opera- tion, each with its own software architecture. Roy Fielding (REST) What is Architecture? Way to partition a system in components -
Postgresql Flyer
PostgreSQL - English Usage Examples Further Information Development system PostgreSQL (2nd Edition), Korry Douglas, Sams Publishing, ISBN: 0672327562 A small system just for developing, running on any supported platform (Unix, Linux, Mac OS, Windows). Beginning Databases with PostgreSQL:From Novice to This system does not need much system resources. Professional, Second Edition, Neil Matthew, Apress, The result can be exported and used in the production ISBN: 1590594789 PostgreSQL system. PostgreSQL Developer's Handbook, Ewald Geschwinde, Sams Publishing, ISBN 0672322609 Beginning PHP and PostgreSQL 8, W. Jason Gilmore, Small to mid-level database server Apress, ISBN 1590595475 A small to mid-level database server has just small PHP and PostgreSQL Advanced Web Programming, hardware requirements. PostgreSQL is not running ex- Ewald Geschwinde and Robert Treat, Sams Publishing, clusive on this system but shares the resources with ISBN 0672323826 other services. A webserver (Blog, CMS) with a data- base backend is a good example. PostgreSQL homepage: www.postgresql.org pgAdmin III: http://www.pgadmin.org Large database server PgFoundry: http://pgfoundry.org phpPgAdmin: http://phppgadmin.sourceforge.net A large database server has extensive hardware re- PostGIS: postgis.refractions.net quirements and is usually dedicated to a single appli- cation or project. PostgreSQL can use the full power Slony: slony.info of the hardware without the need to share resources. PostgreSQL 8.3 What is PostgreSQL? PostgreSQL 8.3, released in early 2008, includes a record PostgreSQL is an object-relational database management number of new and improved features which will greatly system (ORDBMS). It is freely available and usable with- enhance PostgreSQL for application designers, database out licensing fee. -
Online Qualitative Research in the Age of E-Commerce: Data Sources and Approaches [27 Paragraphs]
University of Rhode Island DigitalCommons@URI College of Business Administration Faculty College of Business Administration Publications 2004 Online Qualitative Research in the Age of E- Commerce: Data Sources and Approaches Nikhilesh Dholakia University of Rhode Island, [email protected] Dong Zhang University of Rhode Island, [email protected] Follow this and additional works at: https://digitalcommons.uri.edu/cba_facpubs Part of the E-Commerce Commons, and the Marketing Commons Terms of Use All rights reserved under copyright. Citation/Publisher Attribution Dholakia, Nikhilesh & Zhang, Dong (2004). Online Qualitative Research in the Age of E-Commerce: Data Sources and Approaches [27 paragraphs]. Forum Qualitative Sozialforschung / Forum: Qualitative Social Research, 5(2), Art. 29, http://nbn-resolving.de/ urn:nbn:de:0114-fqs0402299. This Article is brought to you for free and open access by the College of Business Administration at DigitalCommons@URI. It has been accepted for inclusion in College of Business Administration Faculty Publications by an authorized administrator of DigitalCommons@URI. For more information, please contact [email protected]. FORUM: QUALITATIVE Volume 5, No. 2, Art. 29 SOCIAL RESEARCH May 2004 SOZIALFORSCHUNG Online Qualitative Research in the Age of E-Commerce: Data Sources and Approaches Nikhilesh Dholakia & Dong Zhang Key words: Abstract: With the boom in E-commerce, practitioners and researchers are increasingly generating e-commerce, marketing and strategic insights by employing the Internet as an effective new tool for conducting netnography, well-established forms of qualitative research (TISCHLER 2004). The potential of Internet as a rich online qualitative data source and an attractive arena for qualitative research in e-commerce settings—in other words research, cyberspace as a "field," in the ethnographic sense—has not received adequate attention. -
Integrating with Blogs
CHAPTER 5 Integrating with Blogs Blogs (also known as weblogs) have become lightweight, general-purpose platforms for publication, self-expression, and collaboration. Bloggers push the limits of new-media production, especially in the area of integration, because they want ultimately to discuss anything they can see or think or hear—without any effort, of course. Because you can directly tie blogs in with other systems—often without any programming on your own part—you’ll now study how to combine blogs with other applications and data sources. In this chapter, I cover end-user functionality that lets you publish content to a blog from a web site or a desktop application. In Chapter 7, you’ll study how you can program the relevant web APIs to read and publish blog content. I close this chapter by applying lessons from blog integration to wikis, which I believe are ripe for a similar type of remixing. In this chapter, you will do the following: * You’ll learn how to configure your WordPress or Blogger blog to receive pictures from Flickr through Flickr’s Blog This button. * You’ll study the mechanisms behind blog integration by studying how it’s done with Flickr. * You’ll learn how to use a desktop blogging client to take advantage of a richer writing environment for blogging. * You’ll see how the combination of syndication feeds and blogging can be recursive (that is, how content from blogs can be refashioned into new blog entries). * You’ll experience the forward-looking social browser integration of Flock, which combines a Web browser, Flickr photos, and blogging all in one user interface. -
Automatic Evaluation of Design Alternatives with Quantitative Argumentation Pietro Baroni∗ , Marco Romanoa, Francesca Tonib , Marco Aurisicchioc and Giorgio Bertanzad
Argument and Computation, 2015 Vol. 6, No. 1, 24–49, http://dx.doi.org/10.1080/19462166.2014.1001791 Automatic evaluation of design alternatives with quantitative argumentation Pietro Baroni∗ , Marco Romanoa, Francesca Tonib , Marco Aurisicchioc and Giorgio Bertanzad aDip. Ingegneria dell’Informazione, University of Brescia, Brescia, Italy; bDepartment of Computing, Imperial College London, UK; cDepartment of Mechanical Engineering, Imperial College London, London, UK; d Dip. Ingegneria Civile, Architettura, Territorio, Ambiente e Matematica, University of Brescia, Brescia, Italy (Received 15 May 2014; accepted 21 October 2014) This paper presents a novel argumentation framework to support Issue-Based Information Sys- tem style debates on design alternatives, by providing an automatic quantitative evaluation of the positions put forward. It also identifies several formal properties of the proposed quantita- tive argumentation framework and compares it with existing non-numerical abstract argumen- tation formalisms. Finally, the paper describes the integration of the proposed approach within the design Visual Understanding Environment software tool along with three case studies in engineering design. The case studies show the potential for a competitive advantage of the proposed approach with respect to state-of-the-art engineering design methods. Keywords: argumentation; debate; design rationale; Issue-Based Information System (IBIS); decision support Engineering design is often described as an information-processing activity based on problem-solving within the constraints of bounded rationality (Simon, 1996; Simon & Newell, 1971). It consists of decomposing an initial problem into a range of sub-problems, proposing and assessing partial solutions, and integrating them as to satisfy the overall problem. This pro- cess is collaborative and often involves communication between non-co-located engineers.