A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
API design matters
2007
Queue
For example, there was no embedded database market to speak of. And there was no data warehouse market. ...
Many use them anyway, and then are surprised when they get broken into. ...
Reader prizes for similar examples. My collapsed, self-referential headline to this column, "Alloneword," is now embedded in computer newspeak, and further borrowed for a rock band. ...
doi:10.1145/1255421.1255422
fatcat:cjpfqt5y35ejbcmkvc24ig2o3y
The Next Generation Internet: a selection of contributions to the debate
2021
Zenodo
To do so, we used a combination of open calls for contributions and targeted interviews to identified thought leaders. ...
NGI Forward's community journalism program is a tool for engagement of a broader, more diverse community of experts on the themes of the Next Generation Internet. ...
We will not need one until the next pandemic. Rushing development might lead to the deployment of evil, ineffective or broken solutions. ...
doi:10.5281/zenodo.6320727
fatcat:ghuvcxm5pjhlhi6cfn6dpf2aou
Lexical innovation on the internet - neologisms in blogs
2009
Blogs offer unprecedented opportunities for tracing words as they come into the language. For the purpose of this research, a corpus of blogs has been compiled. ...
It has also offered new opportunities for language research, providing abundant, freely available, linguistic data. ...
Speech errors may include mistaken word-formation (*self-indulgement for self-indulgence or *theoretize for theorize). Jaeger et al. (1996) used positron emission tomography (PET) in their study. ...
doi:10.5167/uzh-163845
fatcat:z3bfu2hqxba3tjbi5kt4pgjsam
An Open Letter to JESA The Sad State of System Administration
2015
The USENIX Journal of Education in System Administration
unpublished
The story, as well as the game itself, is broken into modules, or levels. ...
They must be able to create applications and self-service portals that relieve them from being in the loop, thus creating applications that empower and enable customers to be self-sufficient. ...
Both targeted students and teachers who instruct computerrelated courses and found the game overall beneficial and would use it as a learning tool for computer and network security education. ...
fatcat:fxez6tsoizhh7lj2zgfsdtacgi
2015 CNAF ANNUAL REPORT INFN-CNAF Annual Report 2015 Editors Luca dell'Agnello Cover Design
unpublished
Serra from Advansid srl for useful discussions on SiPM problematics. ...
We thanks the RAL staff for the help and precious collaboration in the set up of the experiment at RIKEN-RAL port 4. We gratefully recognize the help of T. ...
with values from your DB • Variables in metric queries and panel titles can be reused • Automatically repeat rows or panels for each selected variable value • Multi tenancy and LDAP integration
Puppet ...
fatcat:4isjwogxorfwxieomxmdvqwocm