Filters








5 Hits in 4.7 sec

API design matters

Michi Henning
2007 Queue  
For example, there was no embedded database market to speak of. And there was no data warehouse market.  ...  Many use them anyway, and then are surprised when they get broken into.  ...  Reader prizes for similar examples. My collapsed, self-referential headline to this column, "Alloneword," is now embedded in computer newspeak, and further borrowed for a rock band.  ... 
doi:10.1145/1255421.1255422 fatcat:cjpfqt5y35ejbcmkvc24ig2o3y

The Next Generation Internet: a selection of contributions to the debate

Nadia El-Imam
2021 Zenodo  
To do so, we used a combination of open calls for contributions and targeted interviews to identified thought leaders.  ...  NGI Forward's community journalism program is a tool for engagement of a broader, more diverse community of experts on the themes of the Next Generation Internet.  ...  We will not need one until the next pandemic. Rushing development might lead to the deployment of evil, ineffective or broken solutions.  ... 
doi:10.5281/zenodo.6320727 fatcat:ghuvcxm5pjhlhi6cfn6dpf2aou

Lexical innovation on the internet - neologisms in blogs

Dorota Smyk-Bhattacharjee
2009
Blogs offer unprecedented opportunities for tracing words as they come into the language. For the purpose of this research, a corpus of blogs has been compiled.  ...  It has also offered new opportunities for language research, providing abundant, freely available, linguistic data.  ...  Speech errors may include mistaken word-formation (*self-indulgement for self-indulgence or *theoretize for theorize). Jaeger et al. (1996) used positron emission tomography (PET) in their study.  ... 
doi:10.5167/uzh-163845 fatcat:z3bfu2hqxba3tjbi5kt4pgjsam

An Open Letter to JESA The Sad State of System Administration

Melissa Danforth, Aeleen Frisch, Guy Hembroff, Erik Hjelmås, Scott Orr, Andrew Seely, Niels Sijm, Stephen Smoogen, Steve Vandevender, Charles Wiseman, Erez Zadok, Thomas Limoncelli
2015 The USENIX Journal of Education in System Administration   unpublished
The story, as well as the game itself, is broken into modules, or levels.  ...  They must be able to create applications and self-service portals that relieve them from being in the loop, thus creating applications that empower and enable customers to be self-sufficient.  ...  Both targeted students and teachers who instruct computerrelated courses and found the game overall beneficial and would use it as a learning tool for computer and network security education.  ... 
fatcat:fxez6tsoizhh7lj2zgfsdtacgi

2015 CNAF ANNUAL REPORT INFN-CNAF Annual Report 2015 Editors Luca dell'Agnello Cover Design

Francesco Giacomini, Matteo Tenti, Francesca Address
unpublished
Serra from Advansid srl for useful discussions on SiPM problematics.  ...  We thanks the RAL staff for the help and precious collaboration in the set up of the experiment at RIKEN-RAL port 4. We gratefully recognize the help of T.  ...  with values from your DB • Variables in metric queries and panel titles can be reused • Automatically repeat rows or panels for each selected variable value • Multi tenancy and LDAP integration Puppet  ... 
fatcat:4isjwogxorfwxieomxmdvqwocm