Cg 2010 M. Cameron Jones. Some Rights Reserved. This Work Is

Total Page:16

File Type:pdf, Size:1020Kb

Cg 2010 M. Cameron Jones. Some Rights Reserved. This Work Is c 2010 M. Cameron Jones. Some rights reserved. This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. REMIX AND REUSE OF SOURCE CODE IN SOFTWARE PRODUCTION BY M. CAMERON JONES DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Library and Information Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2010 Urbana, Illinois Doctoral Committee: Associate Professor J. Stephen Downie, Chair Professor Michael B. Twidale, Director of Research Associate Professor Kyratso (Karrie) G. Karahalios Professor Linda C. Smith ABSTRACT The means of producing information and the infrastructure for disseminating it are constantly changing. The web mobilizes information in electronic formats, making it easier to copy, modify, remix, and redistribute. This has changed how information is produced, distributed, and used. People are not just consuming information; they are actively producing, remixing, and sharing information, using the web as a platform for creativity and production. This is true of software development as well. It is frequently commented by programmers and researchers who study software development, that programmers frequently copy and paste code. Although this practice is widely acknowledged, it is rarely studied directly, or explicitly accounted for in models of software development. However, this attitude is changing as software becomes more ubiquitous, and software development practice shifts away from the formal models of software engineering, towards a post-modernist perspective. This study explores how source code snippets in programming books and on the web are changing software development practice. By examining program source code using clone detection algorithms, this study provides a comprehensive view of code copying across 6,190 PHP-language applications. These data are used to explore the concept of a \remix" method of software production, where software and systems are built out of copied and pasted snippets of code. These findings are contrasted against both traditional models of information production coming from informetrics (e.g., authorship, citation analysis), and models from software engineering (e.g., the Lego Hypothesis). Explanations for observed phenomena are discussed borrowing metaphors from linguistics, which provide a richer explanation of copy-paste programming than offered by the Lego Hypothesis. The focus and findings of this study ultimately point to a pressing demand for further research centered on the notion of software as information. Software and software repositories hold a large amount of information about how it was produced, and how it is used, adapted, and maintained. Software informatics is proposed as an organizing label to study the science of information, practice, and communication around software. It studies the individual, collaborative, and social aspects of software production and use, spanning multiple representations of software from design, to source code, to application. ii For Ari and Jinha iii ACKNOWLEDGMENTS As I sit here making my final revisions, I cannot help but reflect on the many years I spent at the University of Illinois in the Graduate School of Library and Information Science. My advisor, Dr. Michael Twidale, has guided and advised me throughout my studies. He taught my very first GSLIS course when I was an undergraduate, and later encouraged me to pursue my graduate degree. I wish to thank Dr. Twidale for his patience and encouragement over the years, and for challenging me and pushing my research to higher levels. I would also like to thank the rest of my committee, who have been an invaluable resource. My committee chair, Dr. Downie has not only advised my dissertation research, but has also been a great mentor; he has shown me how the metaphorical research sausage gets made. Dr. Smith has provided valuable feedback and insights on my research, for which I am eternally grateful. Dr. Karahalios has challenged me to think more deeply about the social aspects of my research, leading to new insights and implications. I could not have completed this dissertation without the support and encouragement of the GSLIS community. I am thankful for the assistance and financial support offered to me by Dean Unsworth and the Graduate School, and for the feedback, support, and friendship I have received from the faculty and my fellow graduate students. My research has provided me with many opportunities; one of them was the opportunity to work with Dr. Elizabeth Churchill in the Internet Experiences group at Yahoo! Research. Dr. Churchill gave me the space and direction to explore new avenues of research which ultimately shaped and refined my understanding of software informatics and code sharing. I am grateful for her friendship, patience, and guidance. My greatest debt of gratitude is owed to my family. My loving wife Dr. Jin Ha Lee and my beautiful daughter Ariana encouraged and believed in me, and their love sustained me through many long days and late nights. Also, my parents and siblings have helped me to keep perspective on my research and my life by challenging me to constantly explain my research and why they should care. Thank you. iv TABLE OF CONTENTS CHAPTER 1 INTRODUCTION . 1 1.1 Recent Trends . .1 1.1.1 Authorship in Software Development . .1 1.1.2 Collaborative Software Development . .2 1.1.3 Software and Information Seeking . .2 1.1.4 Programmer as User . .3 1.1.5 User as Programmer . .3 1.1.6 Innovation in the Use of Software . .3 1.2 Remix in Software Production . .4 1.3 Software Reuse . .8 1.4 Copy-Paste in Software Development . 10 1.5 Software Clones . 12 1.6 Broad Scope of the Research Space . 13 1.7 Information Production Process . 14 1.8 Organization of this Study . 15 1.8.1 Part I: Establishing the Landscape of Software Remix and Reuse . 16 1.8.2 Part II: Testing the Lego Hypothesis . 17 1.9 Research Hypotheses . 19 CHAPTER 2 LITERATURE REVIEW . 21 2.1 Software Informatics . 21 2.1.1 Comparison to Software Engineering . 21 2.1.2 Comparison to Social Informatics . 22 2.1.3 Software as Information . 23 2.2 Software Cloning . 24 2.2.1 Type I Clones . 26 2.2.2 Type II Clones . 27 2.2.3 Type III Clones . 27 2.2.4 Type IV Clones . 27 2.3 Clone Analysis . 28 2.4 Code Copying . 33 2.5 The Lego hypothesis and Postmodernism . 36 2.6 Informetrics . 38 2.7 Summary . 40 CHAPTER 3 RESEARCH METHOD AND PLAN . 41 3.1 Collecting Source Code Data . 41 3.1.1 A Brief Word on the Structure of PHP Source Code . 41 3.1.2 Collecting the PILOT Dataset . 42 3.1.3 Collecting the OPENSOURCE Dataset . 43 3.1.4 Collecting the SNIPPETS Dataset . 46 3.2 Managing Collections . 48 v 3.3 Generalized Clone Detection Procedure . 48 3.3.1 Parameterized String Matching . 50 3.3.2 Measuring Cloning Activity . 53 3.4 Testing the Lego Hypothesis . 54 3.4.1 Estimating the Power-law Exponent . 54 3.4.2 Estimating the Power-law Constant . 55 3.4.3 Determining the Cutoff Value . 55 3.4.4 The Kolmogorov-Smirnov Test . 56 3.5 Summary . 57 CHAPTER 4 PATTERNS OF COPY-PASTE PROGRAMMING . 58 4.1 Pilot Study . 58 4.2 Copied Code in the OPENSOURCE Dataset . 62 4.3 Clones as Copied Code: A First Attempt . 66 4.3.1 File Duplication, Near Duplicates, & Code Inclusion . 69 4.4 Clones as Copied Code: A Second Attempt . 72 4.4.1 Filtering Files . 72 4.5 The Case of the getmicrotime Clones . 77 4.5.1 The getmicrotime Snippet on the Web . 83 4.6 Snippets as Copied Code . 85 4.7 Examples of Likely Copy-Pasted Clones . 87 4.7.1 implode assoc Clone . 87 4.7.2 escape data Clone . 88 4.7.3 Database Connection Clone . 89 4.7.4 Binary to Decimal . 89 4.7.5 GZIP File I/O Clone . 90 4.7.6 Image Resize Clone, with Spanish Translation . 90 4.7.7 Sorting Clone . 93 4.8 Examples of Ambiguous Clones . 93 4.8.1 String Conversion Clone . 93 4.8.2 File I/O Clone ..
Recommended publications
  • I Want My Mythtv
    I want my MythTV Tim Fenn [email protected] What are DVRs? ● Digital Video Recorders - digital devices used to schedule/record television programs ● typically include features like fast forward, rewind, pause recorded and ªliveº TV ● standalone service - e.g. TiVo, Replay TV ● integrated service ± e.g. Comcast How does MythTV compare? ● Free and open source ● for users, by users ● Runs under Linux and (frontend only) MacOSX ● SQL backbone ● client/server architecture (think: one box for inputs/recording, any other number of boxes for viewing) ● nobody cares what you do with it or how you use it (10 capture cards? Sure! Can I control my lights and ceiling fans using the same box? OK! Watch/burn/rip DVDs? DeCSS, hah!) ● Con: requires know-how of hardware and (primarily Linux) software So what is MythTV capable of? Example screenshots... Example screenshots... Example screenshots... Example screenshots... Example screenshots... Example screenshots... Required Hardware (backend) ● TV capture card: – Hauppauge PVR cards (150/250/350/500) are very popular (encoding done in hardware) ($70-200)1 ● well supported in linux (Chris Kennedy, Tyler Trafford, John Harvey et al. and some actual vendor support on register settings)2 – older bttv (bt848/bt878) chipsets (WinTV-Go, etc, etc...) – Plextor ConvertX PX-TV402U (USB 2.0 device) ● fully open sourced SDK (and gave free stuff to Isaac Richards)3 1. http://www.hauppauge.com 2. http://www.ivtv.tv 3. http://www.plextor.com/english/support/LinuxSDK.htm Required Hardware (backend) ● currently supported HDTV cards require encoding in software (computationally demanding, requires a P4 and ~9gig/hr of media) – very tricky for several reasons: OTA/QAM/resolution/DVB vs.
    [Show full text]
  • Examples of the Electronic Health Record (EHR)
    Examples of the Electronic Health Record (EHR) What is Biomedical & Health Informatics? William Hersh Copyright 2020 Oregon Health & Science University Examples of the EHR • Using the Veterans Health Information Systems and Technology Architecture (VistA) • Why VistA? – State-of-the-art EHR that has transformed healthcare in the Veteran’s Health Administration (VHA) (Perlin, 2006; Byrne, 2010) – Not that pretty, but has all of the modern features of the EHR, e.g., clinical decision support (CDS), computerized provider order entry (CPOE), etc. – Distributed under open-source model, unlike most other vendors who do not even allow screen shots to be shown outside their customers’ institutions • Fascinating story (Allen, 2017), but VistA now being phased out in favor of Cerner EHR adopted by Department of Defense (VA, 2017) – https://www.ehrm.va.gov/ WhatIs5 2 1 Some details about VistA • Server written in M (formerly called MUMPS), accessed via command-line interface – Runs in commercial Intersystems Cache (on many platforms) or open-source GT.M (Linux only) • Client (called CPRS) written in Delphi and providers graphical user interface – Only runs on Windows (just about all versions) WhatIs5 3 Logging on to CPRS, the front end to VistA WhatIs5 4 2 Choosing a patient WhatIs5 5 Cover sheet – overview WhatIs5 6 3 Drilling down to details of a problem WhatIs5 7 Details of an allergy WhatIs5 8 4 Viewing vital signs over time WhatIs5 9 More details on problems WhatIs5 10 5 List of active orders WhatIs5 11 Viewing the patient’s notes WhatIs5 12
    [Show full text]
  • Sovremenny PHP.Pdf
    Modern РНР New eaturesF and Good Practices Josh Lockhart Beijing • Cambridge • Farnham • Kбln • Sebastopol • Tokyo O'REILLY" Современный РНР Новые возможности и передовой опыт Джош Локхарт Москва, 2016 УДК 004. 738.5:004.438РНР ББК 32.973.4 Л73 Л73 Джош Локхарт Современный РНР. Новые возможности и передовой оныт / пер. с англ. Рагимов Р. Н - М.: ДМК Пресс, 2016 . - 304 с.: ил. ISBN 978-5-97060-184-6 Из книги вы узнаете, как РНР превратился в зрелый пол1юфу11кци­ ональный объектно-ориентированный язык, с пространствами имен и постоянно растущей коллекцией библиотек компонентов. Автор демонстрирует новые возможности языка на практике. Вы узнаете о передовых методах проектирования и конструирования приложений, работы с базами данных, обеспечения безопасности, тестирования, от­ ладки и развертьшания. Если вы уже знакомы с языком РНР и желаете расширить свои з11а- 1шя о нем, то эта книга для вас! УДК 004.738.5:004.438РНР ББК 32.973.4 Original Ei1glisl1 language edition puЬlisl1ed Ьу O'Reilly Media, Iпс., 1005 Gravenstein Нighway North, SeЬastopol, СА 95472. Copyright © 2015 O'Reilly Metlia, Inc. Russiaп-laпguage editioп copyright © 2015 Ьу DMK Press. All rights reserved. Все права защищеflЫ. Любая часть этой книги не может быть воспроиз­ ведена в какой бы то ни было форме и какими бы то ни было средствами без nнсьмеююrо разрешения владельцев авторских прав. Материал, изложенный в данной кннrе, м1юrокрапю проверен. Но, по­ скольку вероятность технических ошибок осе рао1ю существует, издательство не может rара1пировать абсолютную точность и правильность приводимых соеде1шй. В связи с этим издательство не несет ответственности за возможные ошибки, связанные с использованием книги. ISBN 978-1-49190-501-2 (анrл.) Copyright © 2015Josh Lockhart ISBN 978-5-97060-184-6 (рус.) © Оформление, перевод на русский язык, ДМК Пресс, 2016 Лорел посвящается ----"···· ОrЯАВЯЕНИЕ Об авторе .......................................................
    [Show full text]
  • Bitrix Site Manager
    Bitrix Site Manager Recommendations on configuring web systems for proper operation with Bitrix Site Manager Contents Contents..........................................................................................................................2 Introduction......................................................................................................................3 Configuring the Apache web server.................................................................................3 Reduction of memory consumed by the web server................................................................4 Creation of two-level configuration: Front-end plus Back-end.................................................4 Additional recommendations for the two-level configuration....................................................5 Configuring PHP..............................................................................................................7 Customizing the MySQL database..................................................................................8 Customizing the Oracle database..................................................................................10 Conclusions...................................................................................................................11 2 Introduction This document is intended for use by technicians and system administrators. The current document contains recommendations on how to customize the server software settings. These operations are executed by the Bitrix experts for
    [Show full text]
  • Download Wineskin Wrapper
    Download wineskin wrapper click here to download Wineskin Winery Wrapper Wine Xquartz X11 Mac OS X Macintosh free do-it-yourself porting microsoft windows programs run game games gaming.​Downloads · ​Wineskin · ​Manual · ​Wineskin on OS X El Capitan. Manually Installed Item Downloads. If you'd like versions of Engines, Wrappers, etc you can install to Wineskin Winery manually instead of using its built in. If you want to actually install things to create wrappers for yourself or others. Wineskin wrappers are created in Wineskin Winery. Download the latest version of. Wineskin is a free, open source utility that ports Windows programs to OS X so you Step One: Download Wineskin and Update the Wrapper. Download Wineskin www.doorway.ru Version zip Features. Make Mac OS X ports/wrappers for Windows™ software; Integrated Wine. Wineskin Winery for Mac: Free Download - Make Wine wrappers to run Windows software on Mac OS X. Download the latest versions of the best Mac apps at. Simply download and extract the Wrapper –> download the rFactor Demo The engine isn't changed, only a new Icon and an update Wineskin version. Manage and download Engines, or even custom build engines from Wine source code. Get Master Wrapper updates Create Wineskin wrappers Wineskin is a. Once the the installers finish downloading, it will create your wrapper. By default, it is stored in Applications > Wineskin > [your wrapper]. Then it. Before you even make the wrapper you'll need to pick a game you want to port to the goto this website to download wineskin Winery for Mac. To sum up: Download the game.
    [Show full text]
  • Kumpulan Tutorial AJAX – PHP
    Kumpulan Tutorial AJAX – PHP Table of Contents 1. Tips Optimasi skrip PHP()..........................................................................................................................4 2. Pengenalan Codeigniter............................................................................................................................6 3. Belajar jQuery mudah...............................................................................................................................9 4. Coding Best Practise................................................................................................................................14 5. Create, Update dan Delete Data Master Dengan Ajax.........................................................................17 6. Tips Merancang User Interface Form Pencarian Data..........................................................................24 7. Membuat Menu Tree Dengan PHP dan JQuery....................................................................................28 8. Skrip/Hal yang sering dibuat/digunakan oleh web-developer()..........................................................31 9. Belajar Ajax dengan prototype.js...........................................................................................................32 10. Submit Form Dengan Ajax Menggunakan jQuery.................................................................................34 11. AJAX – Asynchronous JavaScript And XML (PART 1) ............................................................................36
    [Show full text]
  • I Know What You Streamed Last Night: on the Security and Privacy of Streaming
    Digital Investigation xxx (2018) 1e12 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin DFRWS 2018 Europe d Proceedings of the Fifth Annual DFRWS Europe I know what you streamed last night: On the security and privacy of streaming * Alexios Nikas a, Efthimios Alepis b, Constantinos Patsakis b, a University College London, Gower Street, WC1E 6BT, London, UK b Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou Str, 18534 Piraeus, Greece article info abstract Article history: Streaming media are currently conquering traditional multimedia by means of services like Netflix, Received 3 January 2018 Amazon Prime and Hulu which provide to millions of users worldwide with paid subscriptions in order Received in revised form to watch the desired content on-demand. Simultaneously, numerous applications and services infringing 15 February 2018 this content by sharing it for free have emerged. The latter has given ground to a new market based on Accepted 12 March 2018 illegal downloads which monetizes from ads and custom hardware, often aggregating peers to maximize Available online xxx multimedia content sharing. Regardless of the ethical and legal issues involved, the users of such streaming services are millions and they are severely exposed to various threats, mainly due to poor Keywords: fi Security hardware and software con gurations. Recent attacks have also shown that they may, in turn, endanger Privacy others as well. This work details these threats and presents new attacks on these systems as well as Streaming forensic evidence that can be collected in specific cases. Malware © 2018 Elsevier Ltd. All rights reserved.
    [Show full text]
  • Wordpress Bible, I Immediately Offered Him a Hand in Editing
    Companion Web Site • Provides code files for all examples in the book Companion Web Site Companion Aaron Brazell Install WordPress and go beyond WordPress Technical editing by Mark Jaquith, Web Site a lead WordPress core developer blogging Visit www.wiley.com/go/wordpressbible WordPress is so flexible that developers are now tapping for all of the author’s example files from the book. it to create robust applications for content, contact, and ® e-mail management. Whether you’re a casual blogger Aaron Brazell or programming pro, this comprehensive guide covers is a leading WordPress and social media consultant, with clients WordPress from the basics through advanced application ranging from enterprise software WordPress development. Learn how to use custom plugins and companies to small- and medium- sized businesses. He has worked on themes, retrieve data, maintain security, use social media, large-scale WordPress installations and modify your blog without changing any core code. from both a technical/scaling perspective to complex deliveries You’ll even get to know the ecosystem of products that involving extreme leveraging of the surrounds this popular, open-source tool. software plugin API. He maintains a large business and technology • Enhance your blog’s findability in the search engines and beyond blog in the Washington D.C. area, Technosailor.com. • Discover hooks and leverage the WordPress event-driven programming interface Mark Jaquith • Create WordPress widgets in only a few minutes is one of the lead WordPress core developers and an independent Web • Explore alternate uses of WordPress services consultant. He has consulted • Enhance your blog with WordPress MU for major clients through his company, Covered Web Services, and is the • Ensure your plugins maintain future compatibility author of several popular WordPress Install, secure, and plugins, including Subscribe to ® • Create highly customizable and dynamic themes using template tags Comments and Page Links To.
    [Show full text]
  • Ztex-Ezusb-Fx2-Firmware-Kitztex-Bmp 0. Sdcc-Libraries 0. Sdcc 0
    libkst2math2 libhugs-base-bundled libmono-security2.0-cil liboce-modeling-dev 0. libclass-c3-perl nkf python-peak.util 0. 0.0. 0. 0. 0. libkst2core2 0. libgcrypt11 libtasn1-3 kvirc-modules 0. python-lazr.uri live-boot-initramfs-tools 0. 4.59363957597 0. 0. hugs 0. gir1.2-cogl-1.0 0. cl-alexandria 0. python-syfi 0.12619888945 libmono-posix2.0-cil liboce-foundation-dev libmodule-runtime-perl libalgorithm-c3-perl 0. 0. 0. cmigemo 0. python-peak.rules 0. 0. 0.373989624804 clinica-common 0. ttf-unifont 0. libaa1-dev libggi2-dev libgii1-dev libgnutls26 kvirc kvirc-data libkst2widgets2 libsmokekhtml3 2.12765957447 gcj-4.6-jre-lib 0. 0. 0. 0. librasqal3 0. 0. 0. kget gnome-mime-data 0. 4.98485613327 0. 0. paw gnustep-back-common 0. 0. 0. 0. 0. 0. 0. 0. 0. python-lazr.restfulclient kfreebsd-headers-8.2-1 0.138818778395 live-boot 0.230414746544 0. clinica gir1.2-clutter-1.0 multiarch-support sugar-presence-service-0.90 0. 0. 1.04166666667 0. sendmail-cf libmro-compat-perl cmigemo-common libexo-helpers libexo-1-0 libexo-common python-turbojson 0.3340757238312.56124721604 libgpg-error0 libp11-kit0 libhugs-haskell98-bundled libkvilib4 libmono-system2.0-cil liboce-ocaf-lite-dev ecj-gcj libecj-java-gcj 0. 0. 0. 5. 5. 0. 0. 0. 0. 0. 0. 0. 0. python-swiginac sfc cl-babel cl-cffi 0.688073394495 libmodule-implementation-perl gnustep-base-runtime 0. 0. 0. kxterm 0. 0. 0. unifont jfbterm 1.06382978723 libc6 libraptor2-0 libmhash2 0. 0. 0. 0.00316766448098 0.447928331467 libgnomevfs2-0 node-contextify node-jquery 0.
    [Show full text]
  • Customer Relationship Management Software February 2019
    CUSTOMER RELATIONSHIP MANAGEMENT SOFTWARE FEBRUARY 2019 Powered by Methodology CONTENTS 3 Introduction 5 Defining CRM Software 6 FrontRunners (Small Vendors) 8 FrontRunners (Enterprise Vendors) 10 Runners Up 24 Methodology Basics 2 INTRODUCTION his FrontRunners analysis graphic had a minimum qualifying Tis a data-driven assessment score of 4.01 for Usability and 4.11 identifying products in the Customer for User Recommended, while Relationship Management (CRM) the Small Vendor graphic had a software market that offer the minimum qualifying score of 4.31 best capability and value for small for Usability and 4.31 for User businesses. For a given market, Recommended. products are evaluated and given a score for Usability (x-axis) and To be considered for the CRM User Recommended (y-axis). FrontRunners, a product needed FrontRunners then plots 10-15 a minimum of 20 user reviews products each on a Small Vendor published within 18 months of the and an Enterprise Vendor graphic, evaluation period. Products needed based on vendor business size, per a minimum user rating score of category. 3.0 for both Usability and User Recommended in both the Small In the CRM FrontRunners and Enterprise graphics. infographic, the Enterprise Vendor 3 INTRODUCTION The minimum score cutoff to be included in the FrontRunners graphic varies by category, depending on the range of scores in each category. No product with a score less than 3.0 in either dimension is included in any FrontRunners graphic. For products included, the Usability and User Recommended scores determine their positions on the FrontRunners graphic. 4 DEFINING CRM SOFTWARE ustomer Relationship Software Advice’s FrontRunners CManagement (CRM) software is focused on the North American helps organizations manage CRM market.
    [Show full text]
  • Current Issues in Qualitative Data Analysis Software (QDAS): a User and Developer Perspective
    The Qualitative Report Volume 23 Number 13 Article 5 3-6-2018 Current Issues in Qualitative Data Analysis Software (QDAS): A User and Developer Perspective Jeanine C. Evers Erasmus University of Rotterdam, [email protected] Follow this and additional works at: https://nsuworks.nova.edu/tqr Part of the Law Commons, Quantitative, Qualitative, Comparative, and Historical Methodologies Commons, and the Social Statistics Commons Recommended APA Citation Evers, J. C. (2018). Current Issues in Qualitative Data Analysis Software (QDAS): A User and Developer Perspective. The Qualitative Report, 23(13), 61-73. https://doi.org/10.46743/2160-3715/2018.3205 This Article is brought to you for free and open access by the The Qualitative Report at NSUWorks. It has been accepted for inclusion in The Qualitative Report by an authorized administrator of NSUWorks. For more information, please contact [email protected]. Current Issues in Qualitative Data Analysis Software (QDAS): A User and Developer Perspective Abstract This paper describes recent issues and developments in Qualitative Data Analysis Software (QDAS) as presented in the opening plenary at the KWALON 2016 conference. From a user perspective, it reflects current features and functionality, including the use of artificial intelligence and machine learning; implications of the cloud; user friendliness; the role of digital archives; and the development of a common exchange format. This user perspective is complemented with the views of software developers who took part in the “Rotterdam Exchange Format Initiative,” an outcome of the conference. Keywords Qualitative Data Analysis Software, QDAS, Artificial Intelligence, Machine Learning, TLA AS.ti, Cassandre, Dedoose, f4analyse, MAXQDA, NVivo, QDA Miner, Quirkos, Transana, Exchange format, Interoperability, Qualitative Data Analysis, Learning Curve QDAS, Textual Data Mining, Cloud services.
    [Show full text]
  • Dotproject 1.0
    Ulasan CD | Klinik | Ulasan | Linux Ready | Utama | Bisnis | Feature | Tutorial SOFTWARE Hasil Tes dan Ulasan Software dotProject 1.0 WEB-BASED PROJECT MANAGEMENT Sifat: Free Software Lisensi: dotProject License Pengembang: tim dotProject Situs web: http://www.dotproject.net erencanaan tentunya merupakan hal yang penting bagi suatu P perusahaan. Perusahaan yang memiliki rencana kerja yang baik tentu akan menghasilkan lebih daripada perusahaan yang rencana kerjanya berantakan. Apalagi jika dibandingkan dengan perusahaan yang dotProject. rencananya tidak jelas. Banyak tool yang bisa digunakan untuk platform sistem operasi. Instalasinya dapat style sesuai selera. Ketika style baru membantu kita dalam merencanakan dan dilakukan dengan mudah dengan mengedit diaplikasikan, Anda akan merasa seperti mengatur proyek. Sebut saja tool hebat dan satu atau dua file php. Namun, untuk menggunakan aplikasi lain. Namun, fasilitas populer di Microsoft Windows seperti menjalankan dotProject, terlebih dahulu ini bukannya tidak memiliki kekurangan. Microsoft Project. Atau ada pula MrProject Anda harus memiliki Apache, PHP dan Penggunaan CSS yang terkadang tidak teliti di Linux. Semua tool tersebut dapat MySQL yang bekerja dengan baik. Untuk membuat berbagai komponen form HTML digunakan untuk membantu kita dalam saat ini, instalasi ketiganya dapat dilakukan menjadi terlihat aneh—kalau tidak terlalu membuat perencanaan dan manajemen dengan relatif mudah, apalagi jika Anda besar, maka terlalu kecil sehingga banyak proyek yang lebih baik. menggunakan distro-distro
    [Show full text]