The Otherside Web-Based Collaborative Multimedia System

Total Page:16

File Type:pdf, Size:1020Kb

The Otherside Web-Based Collaborative Multimedia System The Otherside Web-based Collaborative Multimedia System Ilias Anagnostopoulos University of Sheffield Sound Studios 34 Leavygreave Road S3 7RD, Sheffield United Kingdom I.Anagnostopoulos@sheffield.ac.uk Abstract that users can get involved to the extent of be- The Otherside is an advanced open-source multime- coming developers of the Otherside system. dia system, designed to run as a server application. It is essentially a sound synthesis system that al- lows for the creative collaboration of a number of 1.1.1 Computer Network Collaboration people or machines over computer networks. Un- like most similar attempts to create network-based audio applications, the Otherside does not require Computer Networks are nowadays dominating any specialized audio software or massive amounts the world through the internet. However, most of computer processing power. The audio processing of the well-established network applications are is done on the server side and directed to listeners very simple and are not particularly demand- using a simple Internet Radio protocol. Any listener ing in processing power and network bandwidth. can then choose to participate in the sound creation Digital Signal Processing is a complicated task process by using a simple web-browser-based chat- that only recently became a \household" appli- room, or by utilising their own advanced systems for network control. cation on personal computers. Careful planning and consideration is required to overcome some Keywords of the difficulties posed by computer networks Networks, Collaboration, Server, Streaming, OSC and their use by artistic collaboration systems. 1 Introduction One of these problems is that network con- nections and especially the internet often in- 1.1 Creative Collaboration volve extremely long distances between two The Otherside Server provides a platform for users, thus inevitably data can not be trans- the creative collaboration of any number of peo- ferred seamlessly. There is an evident latency ple, regardless of their understanding of mu- issue that is being treated differently by such sic, computer programming or networking. It project developers. Jeorg Stelkens discusses this is platform-independent, meaning that it will in a paper about his own network collabora- run properly on any operating system and any tion system[1], proposing the integration of la- computer architecture. This makes it easily ac- tency in the creative process, as a unique char- cessible to a large number of people who can acteristic of the computer network as a medium. work together and even communicate, during The Otherside does not attempt to overcome or the course of their session with Otherside. to cover-up latency, unlike most projects men- People can create music together, from ran- tioned by Stelkens. It merely accepts latency as domly changing values and creating random a fact and uses the amount of users simultane- sonic events to carefully crafting their own soft- ously transmitting data to create a sonic situa- ware that will interface with the Otherside like tion where events can either be left to chance, an additional musical instrument. It is an en- creating aleatory music[2], or forcing a user to trance to the world of computer music for peo- take the amount of latency into consideration ple who have no such previous experience. It when crafting a sonic event in order to be able can also serve as an advanced experimentation to predict the outcome. This approach is based platform for users who are already familiar with on the principle of integrating the latency in the the protocols and principles involved. It is open creative process and passing on its acceptance and accessible to several different protocols and as a fact to the users, who will have to take it adheres to the open-source mentality, meaning into account when using this system. 1.2 Related Creative Development 2 Technical Description 2.1 Operating System 1.2.1 NetPD The Otherside is based on open-source prin- ciples, being built on the Ubuntu Linux 8.04 An inspiring project, leading to the ini- Server Edition operating system. The operat- tial thoughts for creating the Otherside was ing system was chosen as it has proved to be NetPD[3]. NetPD is based on Pure-Data[4] and very stable as a server system while being di- enables a group of people to collaborate over a rectly compatible with all the audio software computer network. The idea of collaboration and techniques that were to be used. It is also is common between NetPD and the Otherside, an operating system that is very open to cus- but the Otherside attempts to break the limit tomization, something that was necessary to en- of keeping it only between users of Pure-Data, sure high performance under the load of audio who would have to be comfortable with data- processing and server applications. flow programming and networking. The Oth- The preparation of the computer system on erside allows users to become involved as much which the Otherside was tested started with the as they please. NetPD also features a chat fa- installation of the base Ubuntu 8.04 Server sys- cility within Pure-Data, for communication be- tem, replacing the Linux Server Kernel with the tween participants. Otherside is based on IRC, Linux 2.6.24 RT1 Kernel, which allows audio a well-known chat interface, but goes much fur- processing to be done with Real-Time priority. ther than just using it for communication. It Since audio processing is one of the main func- is worth noting that it is technically possible to tions of the Otherside, real-time implementa- connect NetPD and the Otherside and create a tion was an important step towards high per- collaboration between the two projects. formance. To enable the audio to function on the Ubuntu Server operating system the instal- lation of ALSA[7] was also required. 1.2.2 Pure-Data and Data-Flow Programming 2.2 Web interface To achieve an extreme level of accessibility by Pure-Data was created by Miller Puckette, as users who have no interest in turning their per- an open-source project, similar to his Max[5] sonal computer into an audio workstation, all program. It is a data-flow programming lan- functions of the Otherside are accessible from a guage geared towards audio/visual output and simple website interface. control. Pure-Data is a direct descendant of The starting point is a website that is pow- Max, written in 1988[6] by Miller Puckette while ered by the Apache 2 HTTP server[8], the most he was in the Institut de Recherche et Co- widely used HTTP server on the internet. This ordination Acoustique/Musique, Paris, France. links to a Streaming Audio Server, an IRC Chat David Zicarelli together with Puckette later Interface, a help document simply explaining wrote MSP as an addition to Max, thus creat- the basics of the Otherside to the users and an ing Max/MSP, enabling audio-rate digital sin- email link for communication with the adminis- gal processing. Max was only capable of control trator of the system. Apache 2 was chosen due rate processing, as computers in 1988 were not to the fact that all other HTTP servers under fast enough to handle audio-rate signal process- investigation2 were simply not as advanced and ing. Nowadays data-flow programming is used reliable, something which is also evident by the widely for audio applications, as it is a very widespread use of the Apache on the internet. powerful and versatile way of interfacing with various control protocols. Computers nowadays The Streaming Audio Server is using the Ice- have enough processing power to support heavy cast 2 Server[9] to provide a compressed audio digital signal processing applications and net- stream produced by the Otherside to an au- working speeds are high enough to be used cre- dience with an internet connection and a me- atively in interactive applications. This makes dia player on their computer. The Icecast 2 data-flow programming languages an interest- 1An alternative Kernel, with Real-Time capabilities ing option for users who want to explore the 2Examples of other HTTP Servers that were consid- field of complex control in sound generation sys- ered instead of Apache include Mathopd, micro-httpd, tems. mini-httpd and nanoweb Server receives a compressed audio stream, util- Otherside is merely a control interface, there- ising MPEG Layer 3 compression, forwarding fore there is no need for registering a nick-name it to a number of listeners over a computer or a chat-room. network. This is based on the established In- An IRC Server also has the ability to connect ternet Radio Station practice of using an en- to other IRC Servers, forming IRC Networks. coder that streams audio to a Streaming Audio This was one of the most impressive features of Server to be forwarded to any number of listen- the IRC protocol, as it means that there is room ers. The difference here is that instead of encod- for a great amount of evolution for the Oth- ing sound files, the encoder is directly encoding erside, by connecting to other Othersides and and streaming the computer-generated sound of forming a huge Otherside Network in a very sim- the synthesis engine that powers the Otherside. ple and efficient way. This is also an easy way to The link from the main website redirects a user get extensive load off of one server's central pro- to the website interface of the Icecast 2 Server, cessing unit, by interfacing several computers to which contains details about the audio stream run the Otherside System and sharing the load and a link for listening.
Recommended publications
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Simulacijski Alati I Njihova Ograničenja Pri Analizi I Unapređenju Rada Mreža Istovrsnih Entiteta
    SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN Tedo Vrbanec SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Varaždin, 2010. PODACI O MAGISTARSKOM RADU I. AUTOR Ime i prezime Tedo Vrbanec Datum i mjesto rođenja 7. travanj 1969., Čakovec Naziv fakulteta i datum diplomiranja Fakultet organizacije i informatike, 10. listopad 2001. Sadašnje zaposlenje Učiteljski fakultet Zagreb – Odsjek u Čakovcu II. MAGISTARSKI RAD Simulacijski alati i njihova ograničenja pri analizi i Naslov unapređenju rada mreža istovrsnih entiteta Broj stranica, slika, tablica, priloga, XIV + 181 + XXXVIII stranica, 53 slike, 18 tablica, 3 bibliografskih podataka priloga, 288 bibliografskih podataka Znanstveno područje, smjer i disciplina iz koje Područje: Informacijske znanosti je postignut akademski stupanj Smjer: Informacijski sustavi Mentor Prof. dr. sc. Željko Hutinski Sumentor Prof. dr. sc. Vesna Dušak Fakultet na kojem je rad obranjen Fakultet organizacije i informatike Varaždin Oznaka i redni broj rada III. OCJENA I OBRANA Datum prihvaćanja teme od Znanstveno- 17. lipanj 2008. nastavnog vijeća Datum predaje rada 9. travanj 2010. Datum sjednice ZNV-a na kojoj je prihvaćena 18. svibanj 2010. pozitivna ocjena rada Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva koje je rad ocijenilo Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum obrane rada 1. lipanj 2010. Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva pred kojim je rad obranjen Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum promocije SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN POSLIJEDIPLOMSKI ZNANSTVENI STUDIJ INFORMACIJSKIH ZNANOSTI SMJER STUDIJA: INFORMACIJSKI SUSTAVI Tedo Vrbanec Broj indeksa: P-802/2001 SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Mentor: Prof.
    [Show full text]
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Instalación Y Administración De Servicios De Mensajería Instantánea, Noticias Y Listas De Distribución
    Servicios de red e internet Instalación y administración de servicios de mensajería instantánea, noticias y listas de distribución Raquel Castellanos Crespo Instalación y administración de servicios de mensajería instantánea, noticias y listas de distribución Servicios de red e internet Raquel Castellanos Crespo INDICE 2 Servicios de red e internet | Instalación y administración de servicios de mensajería instantánea, noticias y listas de distribución Servicios de red e internet Raquel Castellanos Crespo Protocolos La mensajería instantánea (conocida también en inglés como IM) es una forma de comunicación en tiempo real entre dos o más personas basada en texto. El texto es enviado a través de dispositivos conectados a una red como Internet. La mensajería instantánea requiere el uso de un cliente de mensajería instantánea que realiza el servicio y se diferencia del correo electrónico en que las conversaciones se realizan en tiempo real. La mayoría de los servicios ofrecen el "aviso de presencia", indicando cuando el cliente de una persona en la lista de contactos se conecta o en qué estado se encuentra, si está disponible para tener una conversación. En los primeros programas de mensajería instantánea, cada letra era enviada según se escribía y así, las correcciones de las erratas también se veían en tiempo real. Esto daba a las conversaciones más la sensación de una conversación telefónica que un intercambio de texto. En los programas actuales, habitualmente, se envía cada frase de texto al terminarse de escribir. Además, en algunos, también se permite dejar mensajes aunque la otra parte no esté conectada al estilo de un contestador automático. Otra función que tienen muchos servicios es el envío de ficheros.
    [Show full text]
  • Ethical Hacking and Countermeasures: Threats and Defense Mechanisms
    EC-Council | Press The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certifi ed information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certifi cation and education. EC-Council certifi cations are viewed as the essential certifi cations needed where standard confi guration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certifi cation programs to fi t academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certifi cation: C|EH – Certifi ed Ethical Hacker Certifi ed Ethical Hacker is a certifi cation designed to immerse the learner in an interactive environment where they will learn how to scan, test, hack and secure information systems. Ideal candidates for the C|EH program are security professionals, site administrators, security offi cers, auditors or anyone who is concerned with the integrity of a network infrastructure.
    [Show full text]
  • Introduction to Online Sexual Exploitation Curriculum 1 Safe Online Outreach Project Learning Objectives
    Introduction To Online Sexual Exploitation: Curriculum February 2003 Safe OnLine Outreach Project © M. Horton 2003 Safe OnLine Outreach Project Acknowledgements This document is the result of many hours of hard work and dedication. I'd like to thank Renata Karrys, Jaynne Aster, Nikki O'Halloran, Charlaine Avery, Lisa Ingvallsen and Elizabeth Nethery for their support and assistance in producing this document. Additionally the SOLO Advisory Committee, the Canadian National Crime Prevention - Community Mobilization Program, the Vancouver Foundation, Athabasca University/MediaCan and Parents Against Sexual Abuse have all been instrumental in turning this idea into a Project. Lastly, David and Conor have been silent contributors to this project since it began. Their support is woven into each page. Merlyn Horton SOLO Project Coordinator February 2003 Safe OnLine Outreach Project February 3, 2003 Introduction to the Curriculum Dear Reader, The curriculum you hold in your hands was produced in a former pottery studio in the middle of a coastal rain forest in British Columbia, Canada; the physical launch pad for this examination of a virtual issue. It is the result of three years of research. This introduction is intended to outline a context for the curriculum and to give you an overview of how to use this curriculum, who should present this curriculum and how appropriate audiences might be chosen. Context The philosophical foundation for this curriculum, and indeed for the Safe OnLine Outreach Project, is the United Nations Convention on the Rights of the Child (CRC)1. The CRC is one of four Conventions created by the United Nations to further the goal of recognizing the inherent dignity and rights of all members of the human family2.
    [Show full text]
  • Botnets, Zombies, and Irc Security
    Botnets 1 BOTNETS, ZOMBIES, AND IRC SECURITY Investigating Botnets, Zombies, and IRC Security Seth Thigpen East Carolina University Botnets 2 Abstract The Internet has many aspects that make it ideal for communication and commerce. It makes selling products and services possible without the need for the consumer to set foot outside his door. It allows people from opposite ends of the earth to collaborate on research, product development, and casual conversation. Internet relay chat (IRC) has made it possible for ordinary people to meet and exchange ideas. It also, however, continues to aid in the spread of malicious activity through botnets, zombies, and Trojans. Hackers have used IRC to engage in identity theft, sending spam, and controlling compromised computers. Through the use of carefully engineered scripts and programs, hackers can use IRC as a centralized location to launch DDoS attacks and infect computers with robots to effectively take advantage of unsuspecting targets. Hackers are using zombie armies for their personal gain. One can even purchase these armies via the Internet black market. Thwarting these attacks and promoting security awareness begins with understanding exactly what botnets and zombies are and how to tighten security in IRC clients. Botnets 3 Investigating Botnets, Zombies, and IRC Security Introduction The Internet has become a vast, complex conduit of information exchange. Many different tools exist that enable Internet users to communicate effectively and efficiently. Some of these tools have been developed in such a way that allows hackers with malicious intent to take advantage of other Internet users. Hackers have continued to create tools to aid them in their endeavors.
    [Show full text]
  • Sample Chapter
    5674ch01.qxd_jt 9/24/03 8:44 AM Page 1 11 TheThe OnlineOnline WorldWorld 5674ch01.qxd_jt 9/24/03 8:44 AM Page 2 Today’s online world has changed dramatically in the last decade. Back then, online to the average user meant a telephone connection directly to either another computer or to an online service, such as CompuServe or AOL. The Internet now dominates all online activity. In popular parlance, the Internet is synonymous with the World Wide Web, although it is much more, as we’ll explain in this book. The Internet can be described generally as a “network” of networks. It is a transportation vehicle for applications. In fact, the visual representations of the Net look like a road map. If lines are drawn between each connection, between larger and larger connections, and between smaller and smaller ones, the end result is a web of connections—a virtual road map. This book is divided into four rough sections. The first is for beginners. It is to get anyone up to speed quickly with the information needed about the Web. Each chapter has recommended Web sites (to type the address, or Uniform Resource Locator [URL] into your Web browser) to help direct you. The second section has more detailed information about downloads, email, secu- rity, and information on virus protection. The third part is about how to create a Web site, Web tools, blogging, and what you can add to your Web site (such as streaming media, RSS feeds, and XML, among other things). The fourth part is by far the densest.
    [Show full text]
  • Way of the Ferret: Finding and Using Resources on the Internet
    W&M ScholarWorks School of Education Books School of Education 1995 Way of the Ferret: Finding and Using Resources on the Internet Judi Harris College of William & Mary Follow this and additional works at: https://scholarworks.wm.edu/educationbook Part of the Education Commons Recommended Citation Harris, Judi, "Way of the Ferret: Finding and Using Resources on the Internet" (1995). School of Education Books. 1. https://scholarworks.wm.edu/educationbook/1 This Book is brought to you for free and open access by the School of Education at W&M ScholarWorks. It has been accepted for inclusion in School of Education Books by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. DOCUMENT RESUME IR 018 778 ED 417 711 AUTHOR Harris, Judi TITLE Way of the Ferret: Finding andUsing Educational Resources on the Internet. SecondEdition. Education, Eugene, INSTITUTION International Society for Technology in OR. ISBN ISBN-1-56484-085-9 PUB DATE 1995-00-00 NOTE 291p. Education, Customer AVAILABLE FROM International Society for Technology in Service Office, 480 Charnelton Street,Eugene, OR 97401-2626; phone: 800-336-5191;World Wide Web: http://isteonline.uoregon.edu (members: $29.95,nonmembers: $26.95). PUB TYPE Books (010)-- Guides -Non-Classroom (055) EDRS PRICE MF01/PC12 Plus Postage. Mediated DESCRIPTORS *Computer Assisted Instruction; Computer Communication; *Educational Resources;Educational Technology; Electronic Mail;Information Sources; Instructional Materials; *Internet;Learning Activities; Telecommunications; Teleconferencing IDENTIFIERS Electronic Resources; Listservs ABSTRACT This book is designed to assist educators'exploration of the Internet and educational resourcesavailable online. An overview lists the five basic types of informationexchange possible on the Internet, and outlines five corresponding telecomputingoptions.
    [Show full text]
  • IRC Channel Data Analysis Using Apache Solr Nikhil Reddy Boreddy Purdue University
    Purdue University Purdue e-Pubs Open Access Theses Theses and Dissertations Spring 2015 IRC channel data analysis using Apache Solr Nikhil Reddy Boreddy Purdue University Follow this and additional works at: https://docs.lib.purdue.edu/open_access_theses Part of the Communication Technology and New Media Commons Recommended Citation Boreddy, Nikhil Reddy, "IRC channel data analysis using Apache Solr" (2015). Open Access Theses. 551. https://docs.lib.purdue.edu/open_access_theses/551 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Graduate School Form 30 Updated 1/15/2015 PURDUE UNIVERSITY GRADUATE SCHOOL Thesis/Dissertation Acceptance This is to certify that the thesis/dissertation prepared By Nikhil Reddy Boreddy Entitled IRC CHANNEL DATA ANALYSIS USING APACHE SOLR For the degree of Master of Science Is approved by the final examining committee: Dr. Marcus Rogers Chair Dr. John Springer Dr. Eric Matson To the best of my knowledge and as understood by the student in the Thesis/Dissertation Agreement, Publication Delay, and Certification Disclaimer (Graduate School Form 32), this thesis/dissertation adheres to the provisions of Purdue University’s “Policy of Integrity in Research” and the use of copyright material. Approved by Major Professor(s): Dr. Marcus Rogers Approved by: Dr. Jeffery L Whitten 3/13/2015 Head of the Departmental Graduate Program Date IRC CHANNEL DATA ANALYSIS USING APACHE SOLR A Thesis Submitted to the Faculty of Purdue University by Nikhil Reddy Boreddy In Partial Fulfillment of the Requirements for the Degree of Master of Science May 2015 Purdue University West Lafayette, Indiana ii To my parents Bhaskar and Fatima: for pushing me to get my Masters before I join the corporate world! To my committee chair Dr.
    [Show full text]
  • PDF Completo, 1700K
    Caracterizac¸ao˜ de um Processo de Software para Projetos de Software Livre Christian Robottom Reis [email protected] Orientac¸ao:˜ Profa. Dra. Renata Pontin de Mattos Fortes [email protected] Dissertac¸ao˜ apresentada ao Instituto de Cienciasˆ Matematicas´ e de Computac¸ao˜ da Universidade de Sao˜ Paulo para a obtenc¸ao˜ do t´ıtulo de Mestre em Cienciasˆ da Computac¸ao˜ e Matematica´ Computacional. Sao˜ Carlos, Sao˜ Paulo Fevereiro de 2003 ii Resumo Software Livre e´ software fornecido com codigo´ fonte, e que pode ser livremente usado, modifica- do e redistribu´ıdo. Projetos de Software Livre sao˜ organizac¸oes˜ virtuais formadas por indiv´ıduos que trabalham juntos no desenvolvimento de um software livre espec´ıfico. Estes indiv´ıduos trabalham geo- graficamente dispersos, utilizando ferramentas simples para coordenar e comunicar seu trabalho atraves´ da Internet. Este trabalho analisa esses projetos do ponto de vista de seu processo de software; em outras pala- vras, analisa as atividades que realizam para produzir, gerenciar e garantir a qualidade do seu software. Na parte inicial do trabalho e´ feita uma extensa revisao˜ bibliografica,´ comentando os principais traba- lhos na area,´ e sao˜ detalhadas as caracter´ısticas principais dos projetos de software livre. O conteudo´ principal deste trabalho resulta de dois anos de participac¸ao˜ ativa na comunidade, e de um levantamento realizado atraves´ de questionario,´ detalhando mais de quinhentos projetos diferentes. Sao˜ apresenta- das treze hipoteses´ experimentais, e os resultados do questionario´ sao˜ discutidos no contexto destas hipoteses.´ Dos projetos avaliados nesse levantamento, algumas caracter´ısticas comuns foram avaliadas. As equipes da grande maioria dos projetos sao˜ pequenas, tendo menos de cinco participantes.
    [Show full text]
  • Limnoria Documentation Version 0.83.4.1+Limnoria
    Limnoria Documentation Version 0.83.4.1+limnoria The Limnoria/Gribble/Supybot contributors oct. 11, 2018 Table des matières 1 The Supybot user guide 3 1.1 Installing Limnoria on GNU/Linux and UNIX (FreeBSD, macOS, . )................3 1.2 Installing Limnoria on Windows.....................................6 1.3 Getting Started with Supybot......................................8 1.4 Configuration............................................... 13 1.5 Identifying the bot to services...................................... 15 1.6 Capacités................................................. 19 1.7 Security in Limnoria........................................... 22 1.8 Frequently Asked Questions....................................... 23 1.9 Using the HTTP server.......................................... 28 1.10 Restarting the bot automatically..................................... 29 2 Developing plugins for Limnoria 33 2.1 Generic documentation.......................................... 33 2.2 Specific documentation......................................... 62 2.3 Library reference............................................. 74 3 Contributing to Limnoria 87 3.1 Contributing to Limnoria as a developer................................. 87 3.2 Translating Limnoria........................................... 88 4 Indexes et tableaux 91 Index des modules Python 93 i ii Limnoria Documentation, Version 0.83.4.1+limnoria Sommaire : Table des matières 1 Limnoria Documentation, Version 0.83.4.1+limnoria 2 Table des matières CHAPITRE 1 The Supybot user guide 1.1 Installing Limnoria on GNU/Linux and UNIX (FreeBSD, macOS, ...) This is the « easy to follow » guide to installing Limnoria. The installation documentation provided with the supybot distribution is really quite good already, but since people keep coming to IRC, asking a repeating pattern of questions, we thought it would be a good idea to expand it a bit to make it a little more of a « foolproof guide ». This guide is for non-Windows operating systems. If you want to install on Windows, check out the Windows install guide.
    [Show full text]