FOSDEM 2019 Schedule
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Politics of Roman Memory in the Age of Justinian DISSERTATION Presented in Partial Fulfillment of the Requirements for the D
The Politics of Roman Memory in the Age of Justinian DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Marion Woodrow Kruse, III Graduate Program in Greek and Latin The Ohio State University 2015 Dissertation Committee: Anthony Kaldellis, Advisor; Benjamin Acosta-Hughes; Nathan Rosenstein Copyright by Marion Woodrow Kruse, III 2015 ABSTRACT This dissertation explores the use of Roman historical memory from the late fifth century through the middle of the sixth century AD. The collapse of Roman government in the western Roman empire in the late fifth century inspired a crisis of identity and political messaging in the eastern Roman empire of the same period. I argue that the Romans of the eastern empire, in particular those who lived in Constantinople and worked in or around the imperial administration, responded to the challenge posed by the loss of Rome by rewriting the history of the Roman empire. The new historical narratives that arose during this period were initially concerned with Roman identity and fixated on urban space (in particular the cities of Rome and Constantinople) and Roman mythistory. By the sixth century, however, the debate over Roman history had begun to infuse all levels of Roman political discourse and became a major component of the emperor Justinian’s imperial messaging and propaganda, especially in his Novels. The imperial history proposed by the Novels was aggressivley challenged by other writers of the period, creating a clear historical and political conflict over the role and import of Roman history as a model or justification for Roman politics in the sixth century. -
Hacker Public Radio
hpr0001 :: Introduction to HPR hpr0002 :: Customization the Lost Reason hpr0003 :: Lost Haycon Audio Aired on 2007-12-31 and hosted by StankDawg Aired on 2008-01-01 and hosted by deepgeek Aired on 2008-01-02 and hosted by Morgellon StankDawg and Enigma talk about what HPR is and how someone can contribute deepgeek talks about Customization being the lost reason in switching from Morgellon and others traipse around in the woods geocaching at midnight windows to linux Customization docdroppers article hpr0004 :: Firefox Profiles hpr0005 :: Database 101 Part 1 hpr0006 :: Part 15 Broadcasting Aired on 2008-01-03 and hosted by Peter Aired on 2008-01-06 and hosted by StankDawg as part of the Database 101 series. Aired on 2008-01-08 and hosted by dosman Peter explains how to move firefox profiles from machine to machine 1st part of the Database 101 series with Stankdawg dosman and zach from the packetsniffers talk about Part 15 Broadcasting Part 15 broadcasting resources SSTRAN AMT3000 part 15 transmitter hpr0007 :: Orwell Rolled over in his grave hpr0009 :: This old Hack 4 hpr0008 :: Asus EePC Aired on 2008-01-09 and hosted by deepgeek Aired on 2008-01-10 and hosted by fawkesfyre as part of the This Old Hack series. Aired on 2008-01-10 and hosted by Mubix deepgeek reviews a film Part 4 of the series this old hack Mubix and Redanthrax discuss the EEpc hpr0010 :: The Linux Boot Process Part 1 hpr0011 :: dd_rhelp hpr0012 :: Xen Aired on 2008-01-13 and hosted by Dann as part of the The Linux Boot Process series. -
Software in the Public Interest, Inc. 2011-2012 Annual Report
Software in the Public Interest, Inc. 2011-2012 Annual Report 1st July 2012 To the membership, board and friends of Software in the Public Interest, Inc: As mandated by Article 8 of the SPI Bylaws, I respectfully submit this annual report on the activities of Software in the Public Interest, Inc. and extend my thanks to all of those who contributed to the mission of SPI in the past year. { Jonathan McDowell, SPI Secretary 1 Contents 1 President's Welcome3 2 Committee Reports4 2.1 Membership Committee.......................4 2.1.1 Statistics...........................4 3 Board Report5 3.1 Board Members............................5 3.2 Board Changes............................6 3.3 Elections................................6 4 Treasurer's Report7 4.1 Income Statement..........................7 4.2 Balance Sheet.............................9 5 Member Project Reports 11 5.1 New Associated Projects....................... 11 5.1.1 Drizzle............................. 11 5.1.2 Arch Linux.......................... 11 5.1.3 FreedomBox......................... 11 5.1.4 Fluxbox............................ 12 5.1.5 Haskell.org.......................... 12 5.1.6 FFmpeg............................ 12 A About SPI 13 2 Chapter 1 President's Welcome { Bdale Garbee, SPI President 3 Chapter 2 Committee Reports 2.1 Membership Committee The membership committee was extended to cover the entire board. 2.1.1 Statistics At the time of writing (July 10th) the current membership status is: NC Applicants Pending Email Approval 94 NC Members 485 Contrib Membership Applications 11 Contrib Members 489 Application Managers 9 On 1st July 2011 we had 445 contributing and 436 non-contributing members. On 1st July 2011 there were 481 contributing members and 452 non-contributing members. -
Praktikum Iz Softverskih Alata U Elektronici 2020/2021
PRAKTIKUM IZ SOFTVERSKIH ALATA U ELEKTRONICI 2020/2021 Predrag Pejović 16.01.2021, 10:00 © 2021 Predrag Pejović, This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Linkovi na primere: OS 1: http://tnt.etf.bg.ac.rs/~oe4sae/softwareinstall.sh OS 2: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-3-2020.zip LATEX 1: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-4-2020.zip LATEX 2: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-5-2020.zip LATEX 3: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-6-2020.zip LATEX 4: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-7-2020.zip Python 1: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-9-2020.py Python 2: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-10-2020.zip Python 3: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-11-2020.zip GNU Octave: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-12-2020.zip SageMath: http://tnt.etf.bg.ac.rs/~oe4sae/primeri-13-2020.zip Alternativni linkovi na primere: OS 1: http://peja.freedombox.rocks/PSAE/softwareinstall.sh OS 2: http://peja.freedombox.rocks/PSAE/primeri-3-2020.zip LATEX 1: http://peja.freedombox.rocks/PSAE/primeri-4-2020.zip LATEX 2: http://peja.freedombox.rocks/PSAE/primeri-5-2020.zip LATEX 3: http://peja.freedombox.rocks/PSAE/primeri-6-2020.zip LATEX 4: http://peja.freedombox.rocks/PSAE/primeri-7-2020.zip Python 1: http://peja.freedombox.rocks/PSAE/primeri-9-2020.py Python 2: http://peja.freedombox.rocks/PSAE/primeri-10-2020.zip Python 3: http://peja.freedombox.rocks/PSAE/primeri-11-2020.zip GNU Octave: http://peja.freedombox.rocks/PSAE/primeri-12-2020.zip SageMath: http://peja.freedombox.rocks/PSAE/primeri-13-2020.zip PRAKTIKUM IZ SOFTVERSKIH ALATA U ELEKTRONICI 2020 PRAKTIKUM IZ SOFTVERSKIH ALATA U ELEKTRONICI 2020 c Predrag Pejović, Lica (i ostali podaci o predmetu): Lica, dopuna, odakle ja u ovome? I dr Predrag Pejović, red. -
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites. -
Bibliography of Erik Wilde
dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992. -
Accordion: Better Memory Organization for LSM Key-Value Stores
Accordion: Better Memory Organization for LSM Key-Value Stores Edward Bortnikov Anastasia Braginsky Eshcar Hillel Yahoo Research Yahoo Research Yahoo Research [email protected] [email protected] [email protected] Idit Keidar Gali Sheffi Technion and Yahoo Research Yahoo Research [email protected] gsheffi@oath.com ABSTRACT of applications for which they are used continuously in- Log-structured merge (LSM) stores have emerged as the tech- creases. A small sample of recently published use cases in- nology of choice for building scalable write-intensive key- cludes massive-scale online analytics (Airbnb/ Airstream [2], value storage systems. An LSM store replaces random I/O Yahoo/Flurry [7]), product search and recommendation (Al- with sequential I/O by accumulating large batches of writes ibaba [13]), graph storage (Facebook/Dragon [5], Pinter- in a memory store prior to flushing them to log-structured est/Zen [19]), and many more. disk storage; the latter is continuously re-organized in the The leading approach for implementing write-intensive background through a compaction process for efficiency of key-value storage is log-structured merge (LSM) stores [31]. reads. Though inherent to the LSM design, frequent com- This technology is ubiquitously used by popular key-value pactions are a major pain point because they slow down storage platforms [9, 14, 16, 22,4,1, 10, 11]. The premise data store operations, primarily writes, and also increase for using LSM stores is the major disk access bottleneck, disk wear. Another performance bottleneck in today's state- exhibited even with today's SSD hardware [14, 33, 34]. -
North Korea Purloins Russian Technology to Add Teeth to Its Military Caliber
NEW DELHI TIMES R.N.I. No 53449/91 DL-SW-01/4124/17-19 (Monday/Tuesday same week) (Published Every Monday) New Delhi Page 16 Rs. 7.00 22 - 28 July 2019 Vol - 29 No. 25 Email : [email protected] Founder : Dr. Govind Narain Srivastava ISSN -2349-1221 Modi irradiates Christian victims of loopholed Defence Muslim oppression Procurement rot in Thailand With the world at large progressing with positive The country code of 66 on the incoming call speed and the concept of globalization seeing was unfamiliar, as was the number. its frutation with the spread of co-operative Usually I ignore such calls as they invariably and collaborative networks worldwide; among are threats from the worldwide network of the civic, economic and political spheres, the my fans or duct-cleaning companies worried defence sector of any nation in the modern about the air I breathe. But on that day, I took era becomes the top-priority... a chance. The other option... By Dr. Ankit Srivastava Page 3 By Tarek Fatah Page 2 North Korea purloins Russian technology to add teeth to its Military Caliber By NDT Special Bureau Page 2 Babies growing up with animals, Belief aids to climb the ladder Iran and its prospects for build stronger immune system of Success Democracy I meet so many mothers who won’t let their children walk All of us are on a daily struggle to be successful so as to be More than 80 million Iranians at home or living across the barefoot in the house or the park, won’t let them touch able to establish ourselves in society. -
Protokolle Im Fediverse
Protokolle im Fediverse Jens Lechtenbörger Oktober 2018 1 Einleitung Wie bereits diskutiert setzen Dezentralisierung und Föderation gemeinsame Standards voraus. Während das Fediverse als Federated Universe im engeren Sinne Funktionalitäten von Social Media basierend auf freier Software und föderierten Servern umfasst, gehören im weiteren Sinne auch andere Formen von Kommunikation dazu. Zu Protokollen, die mir besonders vielversprechend erscheinen, geben die folgenden Abschnitte weitere Informationen bzw. führen zu externen Quellen. 2 ActivityPub Als prominenter Vertreter von Fediverse-Protokollen im engeren Sinne wurde im Januar 2018 ActivityPub vom World Wide Web Consortium (W3C) stan- dardisiert. Der Implementation Report dokumentiert den Stand der Umset- zung von ActivityPub durch diverse Anwendungen. Lesen Sie die ActivityPub-Spezikation so weit, dass Sie folgende Fragen beantworten können: Was sind Actors, Objects und Activities? Welche Rollen spielen Inbox und Outbox für die Kommunikation? 3 XMPP Das klassische Beispiel föderierter Internet-Dienste ist die E-Mail für asyn- chrone Kommunikation (auch für Gruppenkommunikation, mit Anhängen aller Art). Für synchrone Echtzeit-Chats bietet das Extensible Messaging and Pres- ence Protocol (XMPP) einen auf dem Austausch von XML-Nachrichten basierenden oenen Standard, der aus dem um die Jahrtausendwende en- twickelten Jabber hervorgegangen ist. Heute wird XMPP nicht nur in 1 Messengern genutzt, sondern auch als Middleware im Internet der Dinge. XMPP-Server bilden analog zu E-Mail-Servern eine Föderation, so dass Be- nutzer unterschiedlicher, dezentral administrierter Server miteinander kom- munizieren können. Die Kommunikation setzt sogenannte Jabber IDs (JIDs) voraus, die zunächst wie E-Mail-Adressen aussehen ([email protected]), aber darüber hinaus auch Client-Anwendungen auf unterschiedlichen Geräten identi- zieren können ([email protected]/work-pc). -
Guile-Gnome-Gstreamer.Pdf
Guile-GNOME: GStreamer version 0.9.92, updated 10 November 2007 Wim Taymans many others This manual is for (gnome gstreamer) (version 0.9.92, updated 10 November 2007) Copyright 2000-2007 Wim Taymans and others Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation. i Short Contents 1 Overview :::::::::::::::::::::::::::::::::::::::::::: 1 2 GstBin :::::::::::::::::::::::::::::::::::::::::::::: 2 3 GstBuffer:::::::::::::::::::::::::::::::::::::::::::: 8 4 GstBus::::::::::::::::::::::::::::::::::::::::::::: 13 5 GstCaps:::::::::::::::::::::::::::::::::::::::::::: 18 6 GstChildProxy :::::::::::::::::::::::::::::::::::::: 24 7 GstClock ::::::::::::::::::::::::::::::::::::::::::: 26 8 gstconfig ::::::::::::::::::::::::::::::::::::::::::: 33 9 GstElementFactory ::::::::::::::::::::::::::::::::::: 34 10 GstElement ::::::::::::::::::::::::::::::::::::::::: 37 11 GstGError :::::::::::::::::::::::::::::::::::::::::: 53 12 GstEvent ::::::::::::::::::::::::::::::::::::::::::: 55 13 GstFilter ::::::::::::::::::::::::::::::::::::::::::: 63 14 GstFormat :::::::::::::::::::::::::::::::::::::::::: 64 15 GstGhostPad:::::::::::::::::::::::::::::::::::::::: 66 16 GstImplementsInterface ::::::::::::::::::::::::::::::: 68 17 GstIndexFactory ::::::::::::::::::::::::::::::::::::: 69 18 GstIndex ::::::::::::::::::::::::::::::::::::::::::: 70 19 GstInfo :::::::::::::::::::::::::::::::::::::::::::: 74 20 GstIterator ::::::::::::::::::::::::::::::::::::::::: -
Oracle® Secure Global Desktop Platform Support and Release Notes for Release 5.2
Oracle® Secure Global Desktop Platform Support and Release Notes for Release 5.2 April 2015 E51729-03 Oracle Legal Notices Copyright © 2015, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. -
Gstreamer & Rust
GStreamer & Rust Fast, safe and productive multimedia software FOSDEM 2018 – Rust devroom 4 February, Brussels Sebastian Dröge < [email protected] > Introduction Who? What? + What is GStreamer? https://gstreamer.freedesktop.org for more details GStreamer Pipeline-based, cross-platform multimedia framework Media Pipelines Philosophy Toolbox for higher-level multimedia processing Batteries included … … and usable from many languages But not … Media player or playback library Codec and protocol library Transcoding tool Streaming server … can be used to build all that! GStreamer ❤ Rust Why Rust? Memory-safety, fearless concurrency & modern language and tooling Why Rust? No runtime, no GC & zero-cost abstractions Why Rust? Ownership model maps perfectly to GStreamer's Using GStreamer from Rust Applications Safe, idiomatic bindings to the GStreamer C API https://github.com/sdroege/gstreamer- rs Examples: gstreamer-rs/examples Tutorials: gstreamer-rs/tutorials Plugins Safe, plain Rust infrastructure for writing plugins https://github.com/sdroege/gst-plugin- rs Contains various examples Tutorials being written right now The Future Write more Rust & write less C more plugins (rust-av!), more useful applications This is where you can get involved! We're not going to rewrite GStreamer (yet) It's the perfect time for writing your next GStreamer application or plugin in Rust Rust experience so far Don't be afraid of unsafe code if needed … … but wrap in safe abstractions Don't be afraid of other people's code Adding dependencies is easy, and