COPRAS Reverse Mapping Report

Total Page:16

File Type:pdf, Size:1020Kb

COPRAS Reverse Mapping Report Document FP6 IST Call 1 & 2 Reverse mapping report Milestone M3.9 Deliverable D18 Source WP3, WP4 lead partners Distribution European Commission Document history Version Remarks Date 0.2 First draft 25/08/2005 0.4 Final draft 02/09/2005 1.0 Final version 07/09/2005 1.1 Executive summary added 31/01/2006 Contents 1. Executive summary 3 2.1 Introduction 3 2.1 Organization of this report 3 3. Standards bodies topics 4 3.1 Standards Developing Organizations 4 3.1.1 CEN/ISSS 4 3.1.2 CENELEC 9 3.1.3 ETSI 12 3.2 Forums and consortia 24 3.2.1 Digital Video Broadcasting (DVB) Project 24 3.2.2 European Broadcasting Union 28 3.2.3 European Committee for Banking Standards (ECBS) 29 3.2.4 Ecma International 29 3.2.5 EICTA 32 3.2.6 ERTICO (Intelligent Transport Systems and Services – Europe) 34 3.2.7 Internet Society European Chapters Coordinating Council 34 3.2.8 Liberty Alliance Project 34 3.2.9 Radicchio 35 3.2.10 TM Forum 35 3.2.11 OMG 37 3.2.12 OASIS 38 3.2.13 RosettaNet standard topics 39 3.2.14 W3C standard topics 40 3.2.15 Open Group standards topics 47 3.3 Observers 49 3.3.1 ANEC 49 3.3.2 NORMAPME 49 4 IST project reviews 50 D18 – COPRAS reverse mapping report 4.1 Projects relevant to CEN/ISSS topics 52 4.2 Projects relevant to CENELEC topics 53 4.3 Projects relevant to ETSI (and/or 3GPP) topics 54 4.4 Projects relevant to DVB topics 55 4.5 Projects relevant to Ecma International topics 56 4.6 Projects relevant to ERTICO topics 56 4.7 Projects relevant to OASIS topics 57 4.8 Projects relevant to OMG topics 58 4.9 Projects relevant to RosettaNet topics 60 4.10 Projects relevant to W3C topics 60 4.11 Projects relevant to The Open Group topics 65 5 Conclusions 72 2 D18 – COPRAS reverse mapping report 1. Executive summary This deliverable reflects one of the two recommendations received from the project reviewers dur- ing the first project review held 17 March 2005 and provides a ‘reverse mapping‘ analysis in order to determine the extent to which the IST programme is funding research areas where standards bodies and industry consortia are active. The analysis is based on reviewing publicly available pro- ject information, particularly related to the stated objectives of each project. For the standards bod- ies a similar analysis of public information was performed. Therefore the results indicate common- ality when there is a significant correlation between general issues addressed by standards bodies and projects, rather than when topics on the periphery are concerned. As the approach of identifying topics specifically addressed at this first stage of (available) project information, identified synergies between projects and standards bodies, do not necessarily guaran- tee a project will also be seeking such synergies in future work. Where this was not clear from the summaries and objectives, but potential synergy was suspected, some further project investigations were performed. The analysis is confined to Call 1 and 2 projects within the IST FP6 programme. The first section of this report contains a short overview of relevant topics addressed by standards organisations against which the research was conducted. It should be noted that this report focuses on the ICTSB member organisations and is structured based on the organisation’s status (formal SDOs, Fora and consortia and observers). The second section lists all projects, together with a link to their home page (where available), identifying where work is under way that is addressing the areas where the standards organisations are active. The deliverable also provides conclusions from this analysis, both from a quantitative as well as a qualitative perspective. From a quantitative perspective, the results demonstrated in this deliverable indicate commonality when there is a significant correlation between general issues addressed by standards bodies and projects, and does not so much concern topics on the periphery. The analysis provided in this deliverable focuses on the ICTSB members, meaning it covers the European standardization organizations and their areas of interest. As a general conclusion, it can be stated that the areas of interest of the ICTBS members are quite considerably covered by the research projects. It should also be stated that industry consortia, contrary to the traditional SDOs, are generally more focused on specific topics, which naturally corresponds to the distribution of the issues addressed by the projects, among these consortia. It should however be mentioned that many of the projects in Calls 1 and 2 interface directly with organizations operating on a worldwide level, such as ITU, IETF, IEEE, ISO_IEC, and OSGi. 2. Introduction The purpose of this study is to determine the extent to which the IST programme is funding re- search areas where standards bodies and industry consortia are active. The analysis is based on re- viewing publicly available project information, particularly related to the stated objectives of each project. For the standards bodies a similar analysis of public information was performed. Therefore the re- sults will indicate commonality when there is a significant correlation between general issues ad- dressed by standards bodies and projects, rather than when topics on the periphery are concerned. As the approach of identifying topics specifically addressed at this first stage of (available) project information, identified synergies between projects and standards bodies, do not necessarily guaran- tee a project will also be seeking such synergies in future work. Where this was not clear from the summaries and objectives, but potential synergy was suspected, some further project investigations were performed. The analysis is confined to projects within the IST FP6 programme. 2.1 Organisation of this report The first section of this report contains a short overview of relevant topics addressed by standards organisations against which the research was conducted. It should be noted that this report focuses 3 D18 – COPRAS reverse mapping report on the ICTSB member organisations and is structured based on the organisation’s status (formal Standards Developing Organizations (SDOs), industry fora and consortia, and observers). The second section lists all projects, together with a link to their home page (where available), identified where work is under way that is addressing the areas where the standards organisations are active. The standards organisations are: 1) SDOs: i) European Committee for Standardisation (CEN) ii) European Committee for Electrotechnical Standardisation (CENELEC) iii) European Telecommunications Standards Institute (ETSI). 2) Fora and consortia: i) Digital Video Broadcasting (DVB) Project ii) European Broadcasting Union (EBU) iii) European Committee for Banking Standards (ECBS) iv) Standardizing Information and Communication Systems (Ecma International) v) European Industry Association (EICTA) vi) Intelligent Transport Systems – Europe (ERTICO) vii) Internet Society (ISOC-ECC) viii) Liberty Alliance ix) Global Initiative for Wireless E-Commerce (Radicchio) x) TeleManagement Forum (formely the NMF) xi) The Object Management Group (OMG) xii) Organization For The Advancement Of Structured Information Standards (Oasis) xiii) RosettaNet xiv) The World Wide Web Consortium (W3C) xv) The Open Group 3) Observers: i) European Association for the Co-ordination of Consumer Representation in Stan- dardization (ANEC) ii) The European Office of Crafts, Trades and SMEs for Standardisation (Normapme). 3. Standards bodies topics 3.1 Standards Developing Organizations (SDOs) 3.1.1 CEN / ISSS CEN, the European Committee for Standardization, as a member of the ICTSB, has established CEN/ISSS (Information Society Standardization System) to provide market players with a compre- hensive and integrated range of standardization-oriented services and products, in order to contrib- ute to the success of the Information Society in Europe. Created by CEN to meet market demand in Europe for a middle way between formal and informal standardization, CEN/ISSS offers an alter- native that is closer to the workings of the commercial environment. It draws on the best of both worlds, bridging the gap between the rapid process of informal specification and the security of- fered by the formal open consensus of traditional standardization. ISSS is a system - it contains all the elements required to facilitate industry requirements for ad- vancement of effective standardization-oriented solutions in the ICT sector, from traditional stan- dardization tasks through to rapid preparation of specifications and other technical work, develop- ment of informative material, public presentation of work and market testing of alternative solu- tions. Activities take place in several different forums including workshops, focus groups and tradi- tional technical committees; principal topics include: CEN/ISSS Workshops: • Applying Technologies: 4 D18 – COPRAS reverse mapping report • J-XFS Workshop: The specifications produced by the J/XFS Workshop provide an API for Java applications which need to access financial devices, which is hardware independent and, by using 100% pure Java, also operating system independent. The J/XFS Workshop gathers suppliers (among others the J/XFS Forum members), service providers as well as banks and other financial service companies. • XFS Workshop: The XFS Workshop is a continuation of the Banking Solution Ven- dors Council (BSVC) workshop and maintains a technical commitment to the Win 32 API. However, the XFS Workshop has extended the franchise of multi vendor software by encouraging the participation of both banks and vendors to take part in the delibera- tions of the creation of an industry standard. This move towards opening the participa- tion beyond the BSVC's original membership has been very successful with a current membership level of more than 20 companies. The fundamental aims of the XFS Workshop are to promote a clear and unambiguous specification for both service pro- viders and application developers. This has been achieved to date by sub groups work- ing electronically and quarterly meetings • Meta-Data (Dublin Core) Workshop: Information discovery is what Dublin Core metadata "data about data" are all about.
Recommended publications
  • The Roots of Middle-Earth: William Morris's Influence Upon J. R. R. Tolkien
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 12-2007 The Roots of Middle-Earth: William Morris's Influence upon J. R. R. Tolkien Kelvin Lee Massey University of Tennessee - Knoxville Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Literature in English, British Isles Commons Recommended Citation Massey, Kelvin Lee, "The Roots of Middle-Earth: William Morris's Influence upon J. R. R. olkien.T " PhD diss., University of Tennessee, 2007. https://trace.tennessee.edu/utk_graddiss/238 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Kelvin Lee Massey entitled "The Roots of Middle-Earth: William Morris's Influence upon J. R. R. olkien.T " I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in English. David F. Goslee, Major Professor We have read this dissertation and recommend its acceptance: Thomas Heffernan, Michael Lofaro, Robert Bast Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) To the Graduate Council: I am submitting herewith a dissertation written by Kelvin Lee Massey entitled “The Roots of Middle-earth: William Morris’s Influence upon J.
    [Show full text]
  • Github Essentials.Pdf
    [ 1 ] GitHub Essentials Unleash the power of collaborative workflow development using GitHub, one step at a time Achilleas Pipinellis BIRMINGHAM - MUMBAI GitHub Essentials Copyright © 2015 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: September 2015 Production reference: 1280915 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78355-371-6 www.packtpub.com Credits Author Copy Editor Achilleas Pipinellis Trishya Hajare Reviewer Project Coordinator Umesh Ram Sharma Shweta H Birwatkar Commissioning Editor Proofreader Dipika Gaonkar Safis Editng Acquisition Editor Indexer Nikhil Karkal Hemangini Bari Content Development Editor Production Coordinator Sumeet Sawant Nitesh Thakur Technical Editor Cover Work Saurabh Malhotra Nitesh Thakur About the Author Achilleas Pipinellis is an open source enthusiast and tries to get involved in as many projects as possible.
    [Show full text]
  • GOLLUM Generation 1.0 Simulation Tool for Electron, Thermal and User Manual
    A next- GOLLUM generation 1.0 simulation tool for electron, thermal and User Manual spin transport. June 2014 GOLLUM Authors Steven Bailey Lancaster University Jaime Ferrer Universidad de Oviedo Victor García-Suárez Universidad de Oviedo Colin J. Lambert Lancaster University Hatef Sadeghi Lancaster University GOLLUM Team Laith Algharagholy Lancaster University Iain Grace Lancaster University Kaitlin Guillemot Lancaster University David Z. Manrique Lancaster University Laszlo Oroszlani Eötovos University Rubén Rodríguez-Ferradás Universidad de Oviedo David Visontai Lancaster University The current version of this package is GOLLUM 1.0 released in June 2014. It is freely distributed under the terms of GOLLUM Academic License Version 1.0 to be found on http://www.physics.lancs.ac.uk/gollum 1 1 CONTENTS 1 Contents ......................................................................................................................................................... 0 2 Introduction ................................................................................................................................................... 3 2.1 Updates and new functionality. ............................................................................................................ 3 2.2 The Advisory Board: .............................................................................................................................. 3 2.3 Citing GOLLUM .....................................................................................................................................
    [Show full text]
  • Required Materials
    REQUIRED MATERIALS Table of Contents 3D Modeling 4 Allied Health Assistant 1a: Introduction 4 Access 5 Advertising and Sales Promotion 5 Agriscience 2: Sustaining Human Life 5 American Sign Language 1a: Introduction 6 American Sign Language 1b: Learning to Sign 6 American Sign Language 2a: Communicating 7 American Sign Language 2b: Advancing Communication Skills 7 Anatomy and Physiology 1a: Introduction 7 Anatomy and Physiology 1b: Discovering Form and Function 8 Animation 8 Business Information Management 1a: Introduction 9 Coding 1a: Introduction to Programming 9 Coding 1b: Programming 9 Cosmetology 2: The Business of Skin and Nails 10 Cosmetology 2: The Business of Skin and Nails 11 Cosmetology 3a: Introduction to Hair Skills 12 Cosmetology 3b: Waving, Coloring & Advancing Hair Skills 12 Culinary Arts 1a: Introduction 13 Culinary Arts 1b: Exploring Careers in Culinary Arts 14 Culinary Arts 2: Baking, Pastry, and More! 15 Cybersecurity 1a: Foundations 16 Cybersecurity 1b: Defense Against Threats 17 Inspiring Students. Empowering Educators. www.edynamiclearning.com | 1.877.585.2029 | [email protected] Digital Media Fundamentals 1a: Introduction 18 Digital Photography 1a: Introduction 18 Digital Photography 1b: Creating Images with Impact! 19 Digital Photography 2: Discovering Your Creative Potential 19 Entrepreneurship: Starting Your Business 19 Fashion and Interior Design 20 Forestry and Natural Resources 20 Game Design 1a: Introduction 21 Game Design 1b: Building a Game 22 Health Science 1: The Whole Individual 22 Health Science:
    [Show full text]
  • Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters
    Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters Sean Heelan Tom Melham Daniel Kroening [email protected] [email protected] [email protected] University of Oxford University of Oxford University of Oxford ABSTRACT within the capabilities of existing AEG systems [4, 13]. However, We present the first approach to automatic exploit generation for by considering stronger protection mechanisms, different classes of heap overflows in interpreters. It is also the first approach toexploit target software, or different vulnerability classes, one finds a large generation in any class of program that integrates a solution for set of open problems to be explored. automatic heap layout manipulation. At the core of the approach In this work, we focus on automatic exploit generation for heap- is a novel method for discovering exploit primitives—inputs to based buffer overflows in language interpreters. From a security the target program that result in a sensitive operation, such as a point of view, interpreters are a lucrative target because they are function call or a memory write, utilizing attacker-injected data. To ubiquitous, and usually themselves written in languages that are produce an exploit primitive from a heap overflow vulnerability, one prone to memory safety vulnerabilities. From an AEG research has to discover a target data structure to corrupt, ensure an instance point of view they are interesting as they represent a different of that data structure is adjacent to the source of the overflow on the class of program from that which has previously been considered.
    [Show full text]
  • Mdn 0212Dg.Pdf
    Simply Stunning. Today’s users expect beautiful apps in every part of their lives, from work to home. Now, with +L],_WYLZZ[VVSZ`V\JHUHWWS`ZVWOPZ[PJH[LK[OLTLZHUKPUJVYWVYH[LLSLNHU[6MÄJLPUZWPYLK controls into your designs. DXv2 delivers the tools you need to inspire and be inspired. +V^USVHK[OLKH`MYLL[YPHS[VL_WLYPLUJL[OLUL_[NLULYH[PVUVMKL]LSVWLY productivity tools at www.DevExpress.com Untitled-14 1 12/9/11 4:18 PM THE MICROSOFT JOURNAL FOR DEVELOPERS FEBRUARY 2012 VOL 27 NO 2 Asynchronous Programming in C++ Using PPL COLUMNS Artur Laksberg ......................................................................... 22 DATA POINTS A Few of My Favorite Building a Massively Scalable Platform Things … in the Entity Framework 4.2 DbContext for Consumer Devices on Windows Azure Julie Lerman, page 6 Bruno Terkaly and Ricardo Villalobos ......................................... 28 FORECAST: CLOUDY Features and Foibles of ASP.NET MVC Model Binding Windows Azure Jess Chadwick .......................................................................... 36 Deployment Domains Joseph Fultz, page 12 Practical Cross-Browser HTML5 Audio and Video TEST RUN John Dyer ................................................................................ 46 Ant Colony Optimization James McCaffrey, page 70 Get Your Windows Phone Applications THE WORKING in the Marketplace Faster PROGRAMMER Cheryl Simmons ....................................................................... 54 Talk to Me: Voice and SMS in the Cloud What’s New in Windows Workfl ow Foundation 4.5 Ted Neward,
    [Show full text]
  • Playing with Gollum: Uncovering the Cultural Life and Transnational Travels of a Complex Character
    Scope: An Online Journal of Film and Television Studies Issue 19 February 2011 Playing with Gollum: Uncovering the Cultural Life and Transnational Travels of a Complex Character Martin Barker, Aberystwyth University, UK Introduction It dawned on me that the world had changed dramatically since we had all started work on the films in 1999, and that everyone's perceptions about Gollum were changing as the years went by. (Serkis , 2003, 1) This quotation from the opening of Andy Serkis' account of his "life as Gollum" addresses something of potential importance. In this essay, I explore the processes whereby a fictional character – in this case, of a very distinctive kind – enters into wider cultural processes. What qualities are picked upon, and how are they utilised? To what uses is this "character" put in different cultural contexts? And what trajectories of attention can be discerned, from before a film's appearance to beyond its main public life? The figure of "Gollum" is a fascinating one, not least because of his vivid embodiment in the Lord of the Rings (Peter Jackson, 2001-2003) film trilogy. Rightly celebrated for its marriage of still- evolving digital technologies with the acting of Andy Serkis [1], Gollum himself raises a number of issues. Two curious moments, to introduce and illustrate my interests. 1. In 2004, in the British Medical Journal, a lecturer and five medical students published the results of a peculiar case they had been "studying": a 587 year-old creature suffering from paranoid delusions about a "Ring." Providing a forensic pseudo-diagnosis, the authors describe his unkempt appearance, his peculiar passivity associated also with spitefulness and deep delusions; they conclude that, although it might be tempting to judge him schizophrenic, in fact the creature "fulfils seven of the nine criteria for schizoid personality disorder" (Bashir et al., 2004: 1436).
    [Show full text]
  • 3D Video Game Creation in C
    3D VIDEO GAME CREATION IN C# by JESSIE SLAMKA A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF BACHELOR OF SCIENCE HONOURS in The Irving K. Barber School of Arts and Sciences (Honours Computer Science Major Computer Science) The University of British Columbia (Okanagan) April 2011 © Jessie Slamka, 2011 1 | Page ABSTRACT 3D game development requires the use of various tools for the different stages, from conception, design, modelling, animating, coding, and testing. The focus of this project was to learn how to code in C# specifically for game development with freeware programs and class libraries. The three tools that were explored in the most detail were Blender, Microsoft’s XNA in conjunction with Visual C# 2008 Express, and Unity, while touching briefly on Ox and a couple other physics engines that are offered under GNU licences as well as a couple image editors. Challenges primarily lay in figuring out how to adapt previous knowledge of similar programs to the new software and in simulating the physics on the player‐controlled character, particularly in terms of projecting motion onto trees. 2 | Page TABLE OF CONTENTS ABSTRACT .......................................................................................................................................................... 2 ILLUSTRATION INDEX ......................................................................................................................................... 4 1 INTRODUCTION .........................................................................................................................................
    [Show full text]
  • Erlang/OTP System Documentation Copyright © 1997-2021 Ericsson AB
    Erlang/OTP System Documentation Copyright © 1997-2021 Ericsson AB. All Rights Reserved. Erlang/OTP System Documentation 12.1 September 21, 2021 Copyright © 1997-2021 Ericsson AB. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. Ericsson AB. All Rights Reserved.. September 21, 2021 1.1 Deprecations 1 General Information 1.1 Deprecations 1.1.1 Introduction This document lists all deprecated functionality in Erlang/OTP. For more information regarding the strategy regarding deprecations see the documentation of Support, Compatibility, Deprecations, and Removal. 1.1.2 OTP 24 Erlang Distribution Without Large Node Container Support Communication over the Erlang distribution without support for large node container data types (version 4) is as of OTP 24 deprecated and is scheduled for removal in OTP 26. That is, as of OTP 26, support for large node container data types will become mandatory. Old Link Protocol The old link protocol used when communicating over the Erlang distribution is as of OTP 24 deprecated and support for it is scheduled for removal in OTP 26. As of OTP 26, the new link protocol will become mandatory.
    [Show full text]
  • Lon Garber's Excellent Adventure
    Battling gastrointestinal stromal tumor Personalized medicine: is it LLIFEIFE RRAFTAFT myth or reality? GGROUPROUP Executive Director’s report focuses on better treatment In memory of Doug Horst, Michael Lerner, Eric Pontes, William Clyde January/ Turner, Dan Butt, Richard Bodden, Ann Kremer, Ron McLelland, John Vol 14, No. 1 February 2013 Aloise, Nely Jaques, George Logan, Bob Book & Maura Cesarini options for GISTers LRG Research Team members publish By Norman Scherzer LRG Executive Director results of imatinib combination study or my after treatment withdrawal.” The study Execu- By Pete Knox tive Di- LRG Special Projects Coordinator looked to compare each drug separately, as well as both drugs in combination to rector’s Freport, I usually rs. Jonathan Fletcher, of see which approach was most effective. The study design was as follows: 136 highlight the many Brigham & Women’s Hos- accomplishments pital, Harvard University nude mice (mice with a compromised immune system) had human GIST tu- of the Life Raft and Maria Debiec-Rychter, Group. Some of Dof the Catholic University in Leuven, mors introduced into their systems (a SCHERZER which include: Belgium, members of the LRG Research total of six GIST xenograft models were used). They were then divided into four Launching a Team were part of a recently published GIST Day of Learning program in study that looked at the effectiveness of different groups and had their tumors assessed after four weeks: Miami, which is being expanded in GDC-0941, a PI3K inhibitor when used 2013 in combination with imatinib (Gleevec). 1. Control (no treatment) 2. GDC-0941 only Using our GIST Collaborative Tis- The study, published in Clinical Cancer sue Bank to help physicians in Latin Research (see http://clincancerres.
    [Show full text]
  • Open-Source Python Software in Super-Resolution Fluorescence Microscopy: from Instrument Control to Quantitative Data Analysis
    Open-source python software in super-resolution fluorescence microscopy: from instrument control to quantitative data analysis Federico M. Barabas1,2,3, Luciano A. Masullo1,2, 3, Andreas Bodén3, Fernando D. Stefani1,2, Ilaria Testa3 1 Centro de Investigaciones en Bionanociencias (CIBION), Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET), Godoy Cruz 2390, C1425FQD, Buenos Aires, Argentina. 2 Departamento de Física, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellón 1 Ciudad Universitaria, C1428EHA, Buenos Aires, Argentina. 3 Department of Applied Physics and Science for Life Laboratory, KTH Royal Institute of Technology, 100 44 Stockholm, Sweden We present Tempesta and Gollum, two software for super-resolution fluorescence microscopy experiments coded in Python. Tempesta is an integral control software for optical microscopes. Gollum is an analysis software to automatically detect and quantify periodic structures in super-resolved images, which was implemented to study the actin/spectrin membrane structure in hippocampal neurons. These software are a practical and reliable alternative to commercial frameworks for experiment control and analysis, with the additional advantages of being free, open-source, more flexible, and supported by a large developer community. Tempesta[1] is a modular software to control microscopy experiments. It includes several key features for single-molecule localization such as large dataset handling, a focus stabilization module, two-color view and routines for background subtraction (specific for single-molecule data) and for the precise (nanometric) spatial overlap of multicolor acquisitions. New releases include support for the sequential triggering of illumination lasers and confocal scanning imaging. It is in constant development with inputs from its users at different setups and laboratories.
    [Show full text]
  • Github Business Model Analysis ELU 605: Écologie Du Logiciel
    GitHub Business Model Analysis ELU 605: Écologie du Logiciel Fred Gonsalves, Jie Song June 17, 2018 1 Introduction The purpose of this paper is to serve as a continuation of our previous study on the intellectual property of GitHub, the largest web-based code sharing platform in the world. Since the writing of the previous paper, GitHub has officially been purchased by Microsoft for $7.5 billion [1] and this paper will seek to understand the business model that made GitHub attractive enough of a venture for such a sale to happen. As a quick introduction, let us discuss who GitHub is. Table 1 below gives us some of the latest statistics concerning GitHub. GitHub was founded in 2007 by three partners - Chris Wanstrath, Tom Preston-Werner, and P. J. Hyett. It was written in Ruby and was the first code sharing plat- form to provide distributed version control (using Git), as opposed to a centralized version control system being offered by major competitors at the time SourceForge, GoogleCode, and CodePlex. This meant that developers could clone an entire instance of a project and merge modifications much easier than ever before. GitHub’s popularity grew exponentially fast as evidenced by Fig- ure1. In addition to using Git, GitHub is also popular today for a number of other services it provides that are discussed in the following section. Number of users (2017) 24 million Number of total organizations (2017) 1.5 million Number of active repositories (since Sep, 2016) 13 million Number of total monthly visitors (2015) 32 million Table 1: GitHub in numbers [2].
    [Show full text]