UC Berkeley UC Berkeley Electronic Theses and Dissertations
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Book of Apigee Edge Antipatterns V2.0
The Book of Apigee Edge Antipatterns Avoid common pitfalls, maximize the power of your APIs Version 2.0 Google Cloud Privileged and confidential. apigee 1 Contents Introduction to Antipatterns 3 What is this book about? 4 Why did we write it? 5 Antipattern Context 5 Target Audience 5 Authors 6 Acknowledgements 6 Edge Antipatterns 1. Policy Antipatterns 8 1.1. Use waitForComplete() in JavaScript code 8 1.2. Set Long Expiration time for OAuth Access and Refresh Token 13 1.3. Use Greedy Quantifiers in RegularExpressionProtection policy 16 1.4. Cache Error Responses 19 1.5. Store data greater than 512kb size in Cache 24 1.6. Log data to third party servers using JavaScript policy 27 1.7. Invoke the MessageLogging policy multiple times in an API proxy 29 1.8. Configure a Non Distributed Quota 36 1.9. Re-use a Quota policy 38 1.10. Use the RaiseFault policy under inappropriate conditions 44 1.11. Access multi-value HTTP Headers incorrectly in an API proxy 49 1.12. Use Service Callout policy to invoke a backend service in a No Target API proxy 54 Google Cloud Privileged and confidential. apigee 2 2. Performance Antipatterns 58 2.1. Leave unused NodeJS API Proxies deployed 58 3. Generic Antipatterns 60 3.1. Invoke Management API calls from an API proxy 60 3.2. Invoke a Proxy within Proxy using custom code or as a Target 65 3.3. Manage Edge Resources without using Source Control Management 69 3.4. Define multiple virtual hosts with same host alias and port number 73 3.5. -
Google for Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair
Google For Education National Parks VR Google Expeditions Google Arts & Culture Be Internet Awesome Made with Code CS First Google Science Fair Learn how tools built for teaching and learning, Discover the hidden worlds of our Take a field trip to virtually anywhere (even Explore works of art and stories from around Teach learners the fundamentals of digital Make the connection between coding and Learn the basics of Computer Science using the Create projects that show how Science, like Classroom, G Suite for Education, and National Parks on ranger-guided trips places school buses can’t go) using immersive the world with 360° tours of exhibits in over 70 safety and citizenship so they can be safe, creativity, empowering girls to engage with block-based programming language, Scratch. Technology, Engineering, and Math can be used Chromebooks, can increase engagement through virtual reality. AR and VR technology. different countries. confident explorers of the online world. technology and bring their ideas to life. to impact the world around us. and inspire curiosity. Google for National Google Google Arts Education Parks VR Expeditions & Culture Discover the hidden worlds of Explore works of art and stories Tools built for teaching and learning. Field trips to virtually anywhere. our National Parks. from around the world. Over 80 million teachers and students around the world Take a ranger-guided journey through the glaciers of What if you could journey to the surface of Mars or From The Metropolitan Museum of Art to Nairobi’s communicate and collaborate using Classroom and Alaska’s Kenai Fjords or get up close with active climb to the top of Machu Picchu without ever leaving Kenya National Archives, Google Arts & Culture offers G Suite for Education, while Chromebooks are the most volcanoes in Hawai’i. -
Code Girl Tracey Acosta Santa Clara University
Santa Clara University Scholar Commons Computer Engineering Senior Theses Engineering Senior Theses 6-1-2015 Code girl Tracey Acosta Santa Clara University Amanda Holl Santa Clara University Paige Rogalski Santa Clara University Follow this and additional works at: https://scholarcommons.scu.edu/cseng_senior Part of the Computer Engineering Commons Recommended Citation Acosta, Tracey; Holl, Amanda; and Rogalski, Paige, "Code girl" (2015). Computer Engineering Senior Theses. 43. https://scholarcommons.scu.edu/cseng_senior/43 This Thesis is brought to you for free and open access by the Engineering Senior Theses at Scholar Commons. It has been accepted for inclusion in Computer Engineering Senior Theses by an authorized administrator of Scholar Commons. For more information, please contact [email protected]. Code Girl by Tracey Acosta Amanda Holl Paige Rogalski Submitted in partial fulfillment of the requirements for the degrees of Bachelor of Science Computer Science and Engineering Bachelor of Science in Web Design and Engineering School of Engineering Santa Clara University Santa Clara, California June 1, 2015 Code Girl Tracey Acosta Amanda Holl Paige Rogalski Computer Science and Engineering Web Design and Engineering Santa Clara University June 1, 2015 ABSTRACT Despite the growing importance of technology and computing, fewer than 1% of women in college today choose to major in computer science.[1] Educational programs and games created to interest girls in computing, such as Girls Who Code and Made With Code, have been successful in engaging girls with interactive and creative learning environments, but they are too advanced for young girls to benefit from. To address the lack of educational, computer science games designed specifically for young girls, we developed a web-based application called Code Girl for girls age five to eight to customize their own avatar using Blockly, an open-source visual coding editor developed by Google. -
Filling the Shoes the Organization Considers
TODAY ONLINE >> Lariat Letters: Send us responses to articles, columns and editorials at [email protected]. Baylor FRIENDS FOR LIFE pg. 3 LariatWE’RE THERE WHEN YOU CAN’T BE OCTOBER 22, 2015 THURSDAY BAYLORLARIAT.COM BAYLOR BLESSING SUSTAINABILITY Baylor becomes even greener RACHEL LELAND Reporter Baylor proved that it was green in more than one way when the university was recognized by e Association for the Advancement of Sustainability in Higher Education for outstanding performance in sustainability. e Association for the Advancement of Sustainability in Higher Education presented Baylor with the Silver award, the second highest award. Baylor was also recognized as the top performer Dane Chronister | News Editor in the categories of Coordination, DREAM COME TRUE Midway High School sophomore Kade Perry got a chance to not only meet with one of his mascot heroes, but he got to be Planning,and Governance and Bruiser. Perry walked around campus on Wednesday and greeted students with a Sic ‘em and a hug. Diversity and A ordability. Although Baylor had been awarded the Bronze award by e Association for the Advancement of Sustainability in Higher Education in 2012, this was the rst year Baylor quali ed as a top performer in any of the 17 categories Filling the shoes the organization considers. “We’ve never been recognized at this higher level,” said director of sustainability, Smith Getterman. Young man from Midway gets the opportunity of a lifetime Getterman along with the Baylor Student Sustainability Advisory Board were instrumental in gathering the DANE CHRONISTER Panther. epitome of what we are supposed to be,” said data that was to be submitted to e News Editor In his journey in becoming the mascot, Wesley Perry. -
Open Dissertation Draft Revised Final.Pdf
The Pennsylvania State University The Graduate School ICT AND STEM EDUCATION AT THE COLONIAL BORDER: A POSTCOLONIAL COMPUTING PERSPECTIVE OF INDIGENOUS CULTURAL INTEGRATION INTO ICT AND STEM OUTREACH IN BRITISH COLUMBIA A Dissertation in Information Sciences and Technology by Richard Canevez © 2020 Richard Canevez Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy December 2020 ii The dissertation of Richard Canevez was reviewed and approved by the following: Carleen Maitland Associate Professor of Information Sciences and Technology Dissertation Advisor Chair of Committee Daniel Susser Assistant Professor of Information Sciences and Technology and Philosophy Lynette (Kvasny) Yarger Associate Professor of Information Sciences and Technology Craig Campbell Assistant Teaching Professor of Education (Lifelong Learning and Adult Education) Mary Beth Rosson Professor of Information Sciences and Technology Director of Graduate Programs iii ABSTRACT Information and communication technologies (ICTs) have achieved a global reach, particularly in social groups within the ‘Global North,’ such as those within the province of British Columbia (BC), Canada. It has produced the need for a computing workforce, and increasingly, diversity is becoming an integral aspect of that workforce. Today, educational outreach programs with ICT components that are extending education to Indigenous communities in BC are charting a new direction in crossing the cultural barrier in education by tailoring their curricula to distinct Indigenous cultures, commonly within broader science, technology, engineering, and mathematics (STEM) initiatives. These efforts require examination, as they integrate Indigenous cultural material and guidance into what has been a largely Euro-Western-centric domain of education. Postcolonial computing theory provides a lens through which this integration can be investigated, connecting technological development and education disciplines within the parallel goals of cross-cultural, cross-colonial humanitarian development. -
Decolonizing Education with Anishinaabe Arcs: Generative STEM As a Path to Indigenous Futurity
Education Tech Research Dev (2020) 68:1569–1593 https://doi.org/10.1007/s11423-019-09728-6 CULTURAL AND REGIONAL PERSPECTIVES Decolonizing education with Anishinaabe arcs: generative STEM as a path to indigenous futurity Ron Eglash1 · Michael Lachney2 · William Babbitt3 · Audrey Bennett4 · Martin Reinhardt5 · James Davis3 Published online: 19 December 2019 © Association for Educational Communications and Technology 2019 Abstract This paper introduces a generative framework in which translations of Indigenous knowl- edge systems can expand student agency in science, technology, engineering, and math- ematics (STEM). Students move from computer simulations to physical renderings, to repurposing STEM innovation and discovery in the service of Indigenous community development. We begin with the math and computing ideas in traditional Anishinaabe arcs; describe their translation into software and physical rendering techniques, and fnally their workshop implementation with a mix of Native and non-Native students. Quantitative and qualitative analyses of pre-survey and post-survey data indicate increases in students’ understanding of Indigenous knowledge, their creative ability to utilize it in moving from algorithmic to physical designs, and their visions for new hybrid forms of Indigenous futu- rity. We use these fndings to argue that culture-based education needs to shift from a vin- dicationist mode of admiring ancient achievements, to one that highlights students’ agency in a generative relationship with cultural knowledge. Keywords STEM education · Native American · Indigenous knowledge · Educational technology · Design agency Introduction While culturally responsive education has been a promising trend, it is also a tricky path to navigate. Take, for example, ethnomathematics, which endeavors to “translate” between Indigenous math concepts and their Western equivalents. -
The Identification and Division of Steve Jobs
AN ABSTRACT OF THE THESIS OF Scott M. Anderson for the degree of Master of Arts in Interdisciplinary Studies in Speech Communication, Speech Communication, and English presented on May 17, 2012. Title: The Identification and Division of Steve Jobs Abstract approved: Mark P. Moore On April 1, 1976, Steve Jobs and Steve Wozniak entered into a partnership agreement to found Apple Computer. In the decade that followed, Apple experienced remarkable growth and success, as Jobs catapulted Apple to the Fortune 500 list of top‐flight companies faster than any other company in history. Under direction of Jobs, Apple, an idea that started in a garage, transformed into a major force in the computer industry of the 1980s. Though Jobs’ leadership undoubtedly influenced Apple’s success during this time, in 1995, he was forced to resign, when conflicts mounted at the executive level. Using Kenneth Burke’s theory of identification and the dramatistic process, this thesis examines Jobs’ discourse through a series of interviews and textual artifacts. First, I provide a framework for Jobs’ acceptance and rejection of the social order at Apple, and then consider the ways in which Jobs identified with employee and consumer audiences on the basis of division. Analysis shows that Jobs identified with individual empowerment, but valued separation and exclusivity. Jobs’ preference to create identification through division, therefore, established the foundation for new identifications to emerge. The findings of this study suggest that division has significant implications for creating unity. ©Copyright by Scott M. Anderson May 17, 2012 All Rights Reserved The Identification and Division of Steve Jobs by Scott M. -
Disneyization in Shangri-La
Disneyization in Shangri-La Maaike Baks, 1447742 MA Politics, Economy and Society of Asia, supervisor: Prof. dr. S.R. Landsberger Faculty of Humanities, Leiden University 2015 – 2017 Table of Contents Abstract 3 Introduction 4 Paradise found 5 Shangri-La, paradise turned theme park? 8 Research Question and Framework 10 The Shangri-La narrative and tourist’s perceptions 11 The postmodernity of Shangri-La and theme parks 11 Authenticity in Shangri-La 12 Western and Chinese tourists’ expectations 14 Chinese theme parks 16 Chinese state and Ethnic minorities 17 Features of a Chinese theme park: Yunnan Ethnic Folk Village 18 Theming 20 Shangri-La themes: the exotic, the sacred and the ethnic 20 Western tourists’ perceptions 22 Hybrid Consumption 25 Merchandising 27 Performative labor 39 Ethnic dancing in Shangri-La and YEFV 30 Conclusion 32 References 34 2 Abstract In 2001, the Chinese government officially recognized Zhongdian County in Yunnan Province as Shangri-La, which is a fictional concept that signifies paradise introduced by the British author James Hilton (1933). Ever since the region has been renamed, some visitors have started to express that Shangri-La County has transformed into a theme park and has lost its authenticity. The current essay explored, by using Bryman’s (2004) theory of Disneyization as a framework, whether it can be said that the name change into Shangri-La has changed the region into a theme park. The resources of this research were scholarly literature, travel blogs and TripAdvisor reviews about Shangri-La. Of the four principles mentioned in Disneyization, that all describe a trend common to a theme park, the principles of theming, hybrid consumption and merchandising were all found to be take place in the Shangri-La region. -
321444 1 En Bookbackmatter 533..564
Index 1 Abdominal aortic aneurysm, 123 10,000 Year Clock, 126 Abraham, 55, 92, 122 127.0.0.1, 100 Abrahamic religion, 53, 71, 73 Abundance, 483 2 Academy award, 80, 94 2001: A Space Odyssey, 154, 493 Academy of Philadelphia, 30 2004 Vital Progress Summit, 482 Accelerated Math, 385 2008 U.S. Presidential Election, 257 Access point, 306 2011 Egyptian revolution, 35 ACE. See artificial conversational entity 2011 State of the Union Address, 4 Acquired immune deficiency syndrome, 135, 2012 Black Hat security conference, 27 156 2012 U.S. Presidential Election, 257 Acxiom, 244 2014 Lok Sabha election, 256 Adam, 57, 121, 122 2016 Google I/O, 13, 155 Adams, Douglas, 95, 169 2016 State of the Union, 28 Adam Smith Institute, 493 2045 Initiative, 167 ADD. See Attention-Deficit Disorder 24 (TV Series), 66 Ad extension, 230 2M Companies, 118 Ad group, 219 Adiabatic quantum optimization, 170 3 Adichie, Chimamanda Ngozi, 21 3D bioprinting, 152 Adobe, 30 3M Cloud Library, 327 Adonis, 84 Adultery, 85, 89 4 Advanced Research Projects Agency Network, 401K, 57 38 42, 169 Advice to a Young Tradesman, 128 42-line Bible, 169 Adwaita, 131 AdWords campaign, 214 6 Affordable Care Act, 140 68th Street School, 358 Afghan Peace Volunteers, 22 Africa, 20 9 AGI. See Artificial General Intelligence 9/11 terrorist attacks, 69 Aging, 153 Aging disease, 118 A Aging process, 131 Aalborg University, 89 Agora (film), 65 Aaron Diamond AIDS Research Center, 135 Agriculture, 402 AbbVie, 118 Ahmad, Wasil, 66 ABC 20/20, 79 AI. See artificial intelligence © Springer Science+Business Media New York 2016 533 N. -
Fombandrazana Vezo: Ethnic Identity and Subsistence
FOMBANDRAZANA VEZO: ETHNIC IDENTITY AND SUBSISTENCE STRATEGIES AMONG COASTAL FISHERS OF WESTERN MADAGASCAR by EARL FURMAN SANDERS (Under the Direction of THEODORE GRAGSON) ABSTRACT The complex dynamic among coastal peoples of western Madagascar involves spread of cultural elements due to extensive seasonal migrations, tribes and ethnic groups merging into progressively broader ethnic groups, distinctions based on interethnic and intra-ethnic boundaries, and lumping of peoples with remotely similar subsistence patterns which has perpetuated ethnonym vagaries. This study analyzes the cultural bases of the Vezo, a group of marine fishers inhabiting the west coast of Madagascar, with the intent of presenting a clearer image of what is entailed within the ethnonym, Vezo, both with respect to subsistence strategies and cultural identity. Three broad areas of inquiry, ethnohistory, ecological niche as understood from the Eltonian definition, and geographical scope inform the field research. Access to these areas leans heavily on oral histories, which in turn is greatly facilitated by intensive participant observation and work in the native language. The analysis shows that the Vezo constitute a distinct ethnic group composed of diverse named patrilineal descent groups. This ethnic group is defined by common origins and a shared sense of common history, which along with the origins of the taboos are maintained within their oral histories. Within the ethnonym, Vezo, there are subsistence as well as other cultural distinctions, most notably the taboos. These distinctions are the bases of the ethnic boundaries separating those who belong to the Vezo cultural group and others who are referred to as Vezo (Vezom-potake and Vezo-loatse) due to geographical disposition. -
Bittium Tough Mobile User Manual
Bittium Tough Mobile Quick Start Guide Device at a glance 1 Power key / status indicator LED / emer- gency key 2 Earpiece and auxiliary microphone 3 Headset and protective cover 4 Front camera 5 Back camera 6 Loudspeakers 7 Flash LED 8 Volume key 9 Programmable key 10 Battery cover 11 Battery charging connectors 12 USB 3.0 port and protective cover 13 Main microphones 14 Noise cancellation microphone 2 Bittium Tough Mobile Quick Start Guide 1 2 3 4 6 5 7 8 9 10 13 12 13 11 11 14 Bittium Tough Mobile Quick Start Guide 3 The ambient light sensor and proximity sensor are located next to the camera on the front of Tough Mobile. The micro USB 3.0 port is located on the bottom of Tough Mobile. Please read this quick guide carefully before using the device. Bittium Tough Mobile is water and dust resistant (IP67). In order to maintain the water and dust resistance the battery cover, the USB connector cover and the headset cover must be properly closed and un- damaged. Intentional dropping and underwater immersion of Bittium Tough Mobile should be avoided. Bittium Tough Mobile is not designed for underwater use or use for example in shower. Purposeful use of the device in these environments will result in a void of the warranty. For more info on Bittium Tough Mobile Ingress Protection see www.bittium.com/BittiumToughMobile. Box contents Bittium Tough Mobile sales package contains the following items: • Battery • Charger, with US, UK and EU adapters • Micro USB cable • 3.5 mm Headset • Quick Start Guide • Plastic wedge for opening battery cover Box contents and the appearance of the accessories may vary. -
Public Response to RFI on AI
White House Office of Science and Technology Policy Request for Information on the Future of Artificial Intelligence Public Responses September 1, 2016 Respondent 1 Chris Nicholson, Skymind Inc. This submission will address topics 1, 2, 4 and 10 in the OSTP’s RFI: • the legal and governance implications of AI • the use of AI for public good • the social and economic implications of AI • the role of “market-shaping” approaches Governance, anomaly detection and urban systems The fundamental task in the governance of urban systems is to keep them running; that is, to maintain the fluid movement of people, goods, vehicles and information throughout the system, without which it ceases to function. Breakdowns in the functioning of these systems and their constituent parts are therefore of great interest, whether it be their energy, transport, security or information infrastructures. Those breakdowns may result from deteriorations in the physical plant, sudden and unanticipated overloads, natural disasters or adversarial behavior. In many cases, municipal governments possess historical data about those breakdowns and the events that precede them, in the form of activity and sensor logs, video, and internal or public communications. Where they don’t possess such data already, it can be gathered. Such datasets are a tremendous help when applying learning algorithms to predict breakdowns and system failures. With enough lead time, those predictions make pre- emptive action possible, action that would cost cities much less than recovery efforts in the wake of a disaster. Our choice is between an ounce of prevention or a pound of cure. Even in cases where we don’t have data covering past breakdowns, algorithms exist to identify anomalies in the data we begin gathering now.