A Study of the Application of Free and Open Source Software Licensing Ideas to Art and Cultural Production
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Usask Open Textbook Authoring Guide – Ver.1.0
USask Open Textbook Authoring Guide – Ver.1.0 USask Open Textbook Authoring Guide – Ver.1.0 A Guide to Authoring & Adapting Open Textbooks at the University of Saskatchewan Distance Education Unit (DEU), University of Saskatchewan Jordan Epp, M.Ed., Kristine Dreaver-Charles, M.Sc.Ed., Jeanette McKee, M.Ed. Open Press DEU, Usask Saskatoon Copyright:2016 by Distance Education Unit, University of Saskatchewan. This book is an adaptation based on the B.C. Open Textbook Authoring Guide created by BCcampus and licensed with a CC-BY 4.0 license. Changes to the BCcampus Authoring Guide for this University of Saskatchewan adaptation included: Changing the references from BCcampus Open Project to be more relevant to the University of Saskatchewan’s open textbook development. Creation of a new title page and book title. Changing information about Support Services to be University of Saskatchewan specific. Performing a general text edit throughout the guide, added image captions, and updated most images to remove the BCcampus branding. Updating Pressbook platform nomenclature to be consistent with the current version of Pressbooks. Unless otherwise noted, this book is released under a Creative Commons Attribution (CC-BY) 4.0 Unported license. Under the terms of the CC-BY license you can freely share, copy or redistribute the material in any medium or format, or adapt the material by remixing, transforming or modifying this material providing you attribute the Distance Education Unit, University of Saskatchewan and BCcampus. Attribution means you must give appropriate credit to the Distance Education Unit, University of Saskatchewan and BCcampus as the original creator, note the CC-BY license this document has been released under, and indicate if you have made any changes to the content. -
Librologie 8 : Les Petits Cœurs De Tatie Nina
Librologie 8 : Les petits cœurs de tatie Nina Bonjour à vous, courageux public du Framablog ! Avec l’épisode d’aujourd’hui et le prochain, qui concluera cette première partie de saison Librologique, je vous propose d’ébaucher le portrait de deux personnalités importantes du monde Libre, parfois complémentaires, parfois opposées. Contrairement à Linus Torvalds ou Richard Stallman avec qui nous avions ouvert ces chroniques, il ne s’agit pas là de programmeurs ni de techniciens, mais d’auteurs : de ces auteurs qui réfléchissent sur leur propre droit — puisque le droit d’auteur, c’est bien conçu pour… les auteurs, non ? (Comment ça, « rien compris » ?) V. Villenave. Librologie 8 : Les petits cœurs de tatie Nina « En 1988, à l’âge tendre de 20 ans, je quittai ma ville natale de Urbana, Illinois, pour Santa Cruz en Californie, afin d’y poursuivre le rêve naïf de devenir hippie, new-age et ésotérique. Au lieu de quoi je suis devenue illustratrice et cynique. » C’est ainsi que Nina Paley raconte son histoire, de la banlieue de Chicago (Urbana, dont son père a été un maire courageux) à la Californie — le choix de Santa Cruz n’est pas innocent : indissociable des bouleversements sociaux des années 1960-1970, cette ville correspond bien à l’arrière-plan idéologique de la « Nouvelle Gauche » de cette époque, effectivement liée au mouvement hippie, mais également à l’avènement d’une conception nouvelle des sciences humaines (sociologie, psychiatrie alternative,…). Avec toutefois une tournure moins optimiste dans le cas de Paley : par exemple, elle revendique son choix de ne pas faire d’enfants comme un choix militant ; membre revendiquée duMouvement pour l’Extinction Volontaire de l’Espèce Humaine, sa principale préoccupation politique (tout au moins dans la période 1995-2005) semble être la surpopulation humaine. -
Openness in the Music Business– How Record Labels and Artists May Profit from Reducing Control
Table of Contents TECHNISCHE UNIVERSITÄT MÜNCHEN Dr. Theo Schöller-Stiftungslehrstuhl für Technologie- und Innovationsmanagement Openness in the music business– How record labels and artists may profit from reducing control Johannes L. Wechsler Vollständiger Abdruck der von der Fakultät für Wirtschaftswissenschaften der Technischen Universität München zur Erlangung des akademischen Grades eines Doktors der Wirtschaftswissenschaften (Dr. rer. pol.) genehmigten Dissertation. Vorsitzender: Univ.-Prof. Dr. I. Welpe Prüfer der Dissertation: 1. Univ.-Prof. Dr. J. Henkel 2. Univ.-Prof. Dr. F. v. Wangenheim Die Dissertation wurde am 09.12.2010 bei der Technischen Universität München eingereicht und durch die Fakultät für Wirtschaftswissenschaften am 11.05.2011 angenommen. i Table of Contents Table of Contents DETAILED TABLE OF CONTENTS .................................................................................................... II LIST OF FIGURES .................................................................................................................................. V LIST OF TABLES ................................................................................................................................. VII LIST OF ABBREVIATIONS..................................................................................................................IX ABSTRACT..............................................................................................................................................XI 1 INTRODUCTION ...................................................................................................................... -
Tuto Documentation Release 0.1.0
Tuto Documentation Release 0.1.0 DevOps people 2020-05-09 09H16 CONTENTS 1 Documentation news 3 1.1 Documentation news 2020........................................3 1.1.1 New features of sphinx.ext.autodoc (typing) in sphinx 2.4.0 (2020-02-09)..........3 1.1.2 Hypermodern Python Chapter 5: Documentation (2020-01-29) by https://twitter.com/cjolowicz/..................................3 1.2 Documentation news 2018........................................4 1.2.1 Pratical sphinx (2018-05-12, pycon2018)...........................4 1.2.2 Markdown Descriptions on PyPI (2018-03-16)........................4 1.2.3 Bringing interactive examples to MDN.............................5 1.3 Documentation news 2017........................................5 1.3.1 Autodoc-style extraction into Sphinx for your JS project...................5 1.4 Documentation news 2016........................................5 1.4.1 La documentation linux utilise sphinx.............................5 2 Documentation Advices 7 2.1 You are what you document (Monday, May 5, 2014)..........................8 2.2 Rédaction technique...........................................8 2.2.1 Libérez vos informations de leurs silos.............................8 2.2.2 Intégrer la documentation aux processus de développement..................8 2.3 13 Things People Hate about Your Open Source Docs.........................9 2.4 Beautiful docs.............................................. 10 2.5 Designing Great API Docs (11 Jan 2012)................................ 10 2.6 Docness................................................. -
Fog Computing: a Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and Analytics Flavio Bonomi, Rodolfo Milito, Preethi Natarajan and Jiang Zhu Abstract Internet of Things (IoT) brings more than an explosive proliferation of endpoints. It is disruptive in several ways. In this chapter we examine those disrup- tions, and propose a hierarchical distributed architecture that extends from the edge of the network to the core nicknamed Fog Computing. In particular, we pay attention to a new dimension that IoT adds to Big Data and Analytics: a massively distributed number of sources at the edge. 1 Introduction The “pay-as-you-go” Cloud Computing model is an efficient alternative to owning and managing private data centers (DCs) for customers facing Web applications and batch processing. Several factors contribute to the economy of scale of mega DCs: higher predictability of massive aggregation, which allows higher utilization with- out degrading performance; convenient location that takes advantage of inexpensive power; and lower OPEX achieved through the deployment of homogeneous compute, storage, and networking components. Cloud computing frees the enterprise and the end user from the specification of many details. This bliss becomes a problem for latency-sensitive applications, which require nodes in the vicinity to meet their delay requirements. An emerging wave of Internet deployments, most notably the Internet of Things (IoTs), requires mobility support and geo-distribution in addition to location awareness and low latency. We argue that a new platform is needed to meet these requirements; a platform we call Fog Computing [1]. We also claim that rather than cannibalizing Cloud Computing, F. Bonomi R. -
Openfog Reference Architecture for Fog Computing
OpenFog Reference Architecture for Fog Computing Produced by the OpenFog Consortium Architecture Working Group www.OpenFogConsortium.org February 2017 1 OPFRA001.020817 © OpenFog Consortium. All rights reserved. Use of this Document Copyright © 2017 OpenFog Consortium. All rights reserved. Published in the USA. Published February 2017. This is an OpenFog Consortium document and is to be used in accordance with the terms and conditions set forth below. The information contained in this document is subject to change without notice. The information in this publication was developed under the OpenFog Consortium Intellectual Property Rights policy and is provided as is. OpenFog Consortium makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of fitness for a particular purpose. This document contains content that is protected by copyright. Copying or distributing the content from this document without permission is prohibited. OpenFog Consortium and the OpenFog Consortium logo are registered trademarks of OpenFog Consortium in the United States and other countries. All other trademarks used herein are the property of their respective owners. Acknowledgements The OpenFog Reference Architecture is the product of the OpenFog Architecture Workgroup, co-chaired by Charles Byers (Cisco) and Robert Swanson (Intel). It represents the collaborative work of the global membership of the OpenFog Consortium. We wish to thank these organizations for contributing -
Librologie 8 : Les Petits Cœurs De Tatie Nina
Librologie 8 : Les petits cœurs de tatie Nina Bonjour à vous, courageux public du Framablog ! Avec l’épisode d’aujourd’hui et le prochain, qui concluera cette première partie de saison Librologique, je vous propose d’ébaucher le portrait de deux personnalités importantes du monde Libre, parfois complémentaires, parfois opposées. Contrairement à Linus Torvalds ou Richard Stallman avec qui nous avions ouvert ces chroniques, il ne s’agit pas là de programmeurs ni de techniciens, mais d’auteurs : de ces auteurs qui réfléchissent sur leur propre droit — puisque le droit d’auteur, c’est bien conçu pour… les auteurs, non ? (Comment ça, « rien compris » ?) V. Villenave. Librologie 8 : Les petits cœurs de tatie Nina « En 1988, à l’âge tendre de 20 ans, je quittai ma ville natale de Urbana, Illinois, pour Santa Cruz en Californie, afin d’y poursuivre le rêve naïf de devenir hippie, new-age et ésotérique. Au lieu de quoi je suis devenue illustratrice et cynique. » C’est ainsi que Nina Paley raconte son histoire, de la banlieue de Chicago (Urbana, dont son père a été un maire courageux) à la Californie — le choix de Santa Cruz n’est pas innocent : indissociable des bouleversements sociaux des années 1960-1970, cette ville correspond bien à l’arrière-plan idéologique de la « Nouvelle Gauche » de cette époque, effectivement liée au mouvement hippie, mais également à l’avènement d’une conception nouvelle des sciences humaines (sociologie, psychiatrie alternative,…). Avec toutefois une tournure moins optimiste dans le cas de Paley : par exemple, elle revendique son choix de ne pas faire d’enfants comme un choix militant ; membre revendiquée duMouvement pour l’Extinction Volontaire de l’Espèce Humaine, sa principale préoccupation politique (tout au moins dans la période 1995-2005) semble être la surpopulation humaine. -
Report to the President: MIT and the Prosecution of Aaron Swartz
Report to the President MIT and the Prosecution of Aaron Swartz Review Panel Harold Abelson Peter A. Diamond Andrew Grosso Douglas W. Pfeiffer (support) July 26, 2013 © Copyright 2013, Massachusetts Institute of Technology This worK is licensed under a Creative Commons Attribution 3.0 Unported License. PRESIDENT REIF’S CHARGE TO HAL ABELSON | iii L. Rafael Reif, President 77 Massachusetts Avenue, Building 3-208 Cambridge, MA 02139-4307 U.S.A. Phone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
HHS Lesson 8: Forensics
LESSON 8 DIGITAL FORENSICS AND COUNTER FORENSICS Lesson 8: Forensics WARNING The Hacker Highschool Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical injury. Some additional dangers may also exist where there is not enough research on possible effects of emanations from particular technologies. Students using these lessons should be supervised yet encouraged to learn, try, and do. However ISECOM cannot accept responsibility for how any information herein is abused. The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool Project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license, including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the HHS web page at http://www.hackerhighschool.org/licensing.html. The Hacker Highschool Project is an open community effort and if you find value in this project, we ask that you support us through the purchase of a license, a donation, or sponsorship. 2 Lesson 8: Forensics Table of -
Hackerspaces
d WP4 | CASE STUDY Report: Hackerspaces Theme [ssh.2013.3.2-1][Social Innovation- Empowering People, changing societies] Project Full Title: “Transformative Social Innovation Theory project” Grant Agreement n. 613169 This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 613169 Suggested citation: Sabine Hielscher, Adrian Smith, Mariano Fressoli (2015) WP4 Case Study Report: Hackerspaces, Report For the TRANSIT FP7 Project, SPRU, University oF Sussex, Brighton. Acknowledgements: We wish to thank everyone in the Hackerspace scene who helped us with our research, whether through interviews, welcoming us to Hackerspaces and events, or putting us in touch with others. We also thank our colleagues in the TRANSIT project, at SPRU, at UNQ and Fundación Cenit For their help and encouragement with the research. Finally, we thank the European Commission and their FP7 research programme For Funding the TRANSIT project. Date: 14 January 2015 Authors: Sabine Hielscher, Adrian Smith, Mariano Fressoli Contact person: Adrian Smith Table of contents 1 Introduction to Hackerspaces 2 Methodology 2.1 Researcher relations to the case 2.2 Methods 3 Analysis of transnational network(ing) 3.1 Transnational networking: Hackerspaces 3.2 Aspects of ‘innovation’ and ‘change’ of the transnational network(ing) 3.3 Aspects of empowerment and disempowerment of the transnational network(ing) 3.4 Other issues about the transnational networking 4 Local initiative -
The Song Remains … the Same? Three Case Studies of Issues of Digital Preservation in Second Life Performance Practices
The Song Remains … The Same? Three Case Studies of Issues of Digital Preservation in Second Life Performance Practices Dennis Moser I. Conceptual Differences Across Disciplines: Needs & Approaches The practice of documentation of performances such as music, theater, and dance and performance art is an integral part of the cultural record. As such, it is subject to change and evolution over time, as well as the vagaries of natural catastrophe, social disorder, or any of the myriad disrupters of human history. The application of the practice of documentation varies according to the discipline utilizing it; indeed, even its efficacy varies from culture to culture and from discipline to discipline. Couple this with our movement deeper and deeper into the use of digital technology for the manifestation of culture and we must grapple with new solutions for capturing and conveying the essentials of these acts of expression. The emergence of performance and installation art in the 20th century gave rise to a field of critical theory somewhat at odds with other approaches of documentation, couched as it was in the visual arts. While aspects of theater and dance have influenced this critical theory, the performance practice considerations of music have not played as much a role in defining it. Indeed, considerable discussion has been generated, over understanding just what comprises “documentation”, whether photography is ‘documentary’ or ‘theatrical’, or if it is a ‘conceptual medium for documentation’ (Taylor, 2009). This reflects a concern for the “visual” aspect of “performance” art as opposed to the temporal aspects so inherent in both music and dance. -
Kali Linux Penetration Testing Bible
Telegram Channel : @IRFaraExam Table of Contents Cover Title Page Introduction What Does This Book Cover? Companion Download Files How to Contact the Publisher How to Contact the Author CHAPTER 1: Mastering the Terminal Window Kali Linux File System Managing Users and Groups in Kali Files and Folders Management in Kali Linux Remote Connections in Kali Kali Linux System Management Networking in Kali Linux Summary CHAPTER 2: Bash Scripting Basic Bash Scripting Printing to the Screen in Bash Variables Script Parameters User Input Functions Conditions and Loops Summary CHAPTER 3: Network Hosts Scanning Basics of Networking Network Scanning DNS Enumeration Telegram Channel : @IRFaraExam Summary CHAPTER 4: Internet Information Gathering Passive Footprinting and Reconnaissance Summary CHAPTER 5: Social Engineering Attacks Spear Phishing Attacks Payloads and Listeners Social Engineering with the USB Rubber Ducky Summary CHAPTER 6: Advanced Enumeration Phase Transfer Protocols E‐mail Protocols Database Protocols CI/CD Protocols Web Protocols 80/443 Graphical Remoting Protocols File Sharing Protocols Summary CHAPTER 7: Exploitation Phase Vulnerabilities Assessment Services Exploitation Summary CHAPTER 8: Web Application Vulnerabilities Web Application Vulnerabilities Summary CHAPTER 9: Web Penetration Testing and Secure Software Development Lifecycle Web Enumeration and Exploitation Secure Software Development Lifecycle Summary CHAPTER 10: Linux Privilege Escalation Telegram Channel : @IRFaraExam Introduction to Kernel Exploits and Missing Configurations