6,330 research outputs found

    Middleware’s message : the financial technics of codata

    Get PDF
    In this paper, I will argue for the relevance of certain distinctive features of messaging systems, namely those in which data (a) can be sent and received asynchronously, (b) can be sent to multiple simultaneous recipients and (c) is received as a “potentially infinite” flow of unpredictable events. I will describe the social technology of the stock ticker, a telegraphic device introduced at the New York Stock Exchange in the 1860s, with reference to early twentieth century philosophers of synchronous experience (Bergson), simultaneous sign interpretations (Mead and Peirce), and flows of discrete events (Bachelard). Then, I will show how the ticker’s data flows developed into the 1990s-era technologies of message queues and message brokers, which distinguished themselves through their asynchronous implementation of ticker-like message feeds sent between otherwise incompatible computers and terminals. These latter systems’ characteristic “publish/subscribe” communication pattern was one in which conceptually centralized (if logically distributed) flows of messages would be “published,” and for which “subscribers” would be spontaneously notified when events of interest occurred. This paradigm—common to the so-called “message-oriented middleware” systems of the late 1990s—would re-emerge in different asynchronous distributed system contexts over the following decades, from “push media” to Twitter to the Internet of Things

    The Center for the Public Domain: A Short-Lived Venture Philanthropy

    Get PDF
    Case study examines a foundation that was conceived as a "venture philanthropy" that would spend down its assets over a relatively brief time in support of its mission to redefine the open source technology movement as a philosophy and apply it to sectors outside of technology

    Open source software development: some historical perspectives

    Get PDF
    software development, historical

    Is There a Market for Work Group Servers? Evaluating Market Level Demand Elasticities Using Micro and Macro Models

    Get PDF
    This paper contains an empirical analysis demand for "work-group" (or low-end) servers. Servers are at thecentre of many US and EU anti-trust debates, including the Hewlett-Packard/Compaq merger and investigationsinto the activities of Microsoft. One question in these policy decisions is whether a high share of work serversindicates anything about shortrun market power. To investigate price elasticities we use model-level panel dataon transaction prices, sales and characteristics of practically every server in the world. We contrast estimatesfrom the traditional "macro" approaches that aggregate across brands and modern "micro" approaches that usebrand-level information (including both "distance metric" and logit based approaches). We find that the macroapproaches lead to overestimates of consumer price sensitivity. Our preferred micro-based estimates of themarket level elasticity of demand for work group servers are around 0.3 to 0.6 (compared to 1 to 1.3 in themacro estimates). Even at the higher range of the estimates, however, we find that demand elasticities aresufficiently low to imply a distinct "anti-trust" market for work group servers and their operating systems. It isunsurprising that firms with large shares of work group servers have come under some antitrust scrutiny.demand elasticities, network servers, computers, anti-trust

    Spartan Daily, April 2, 1951

    Get PDF
    Volume 39, Issue 110https://scholarworks.sjsu.edu/spartandaily/11531/thumbnail.jp

    Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers

    Full text link
    There is a growing demand for cloud storage services such as Dropbox, Box, Syncplicity and SugarSync. These public cloud storage services can store gigabytes of corporate and personal data in remote data centres around the world, which can then be synchronized to multiple devices. This creates an environment which is potentially conducive to security incidents, data breaches and other malicious activities. The forensic investigation of public cloud environments presents a number of new challenges for the digital forensics community. However, it is anticipated that end-devices such as smartphones, will retain data from these cloud storage services. This research investigates how forensic tools that are currently available to practitioners can be used to provide a practical solution for the problems related to investigating cloud storage environments. The research contribution is threefold. First, the findings from this research support the idea that end-devices which have been used to access cloud storage services can be used to provide a partial view of the evidence stored in the cloud service. Second, the research provides a comparison of the number of files which can be recovered from different versions of cloud storage applications. In doing so, it also supports the idea that amalgamating the files recovered from more than one device can result in the recovery of a more complete dataset. Third, the chapter contributes to the documentation and evidentiary discussion of the artefacts created from specific cloud storage applications and different versions of these applications on iOS and Android smartphones

    Using smartphones as a proxy for forensic evidence contained in cloud storage services

    Get PDF
    Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities. The investigation of these cloud environments presents new challenges for the digital forensics community. It is anticipated that smartphone devices will retain data from these storage services. Hence, this research presents a preliminary investigation into the residual artifacts created on an iOS and Android device that has accessed a cloud storage service. The contribution of this paper is twofold. First, it provides an initial assessment on the extent to which cloud storage data is stored on these client-side devices. This view acts as a proxy for data stored in the cloud. Secondly, it provides documentation on the artifacts that could be useful in a digital forensics investigation of cloud services

    Spartan Daily, April 2, 1951

    Get PDF
    Volume 39, Issue 110https://scholarworks.sjsu.edu/spartandaily/11531/thumbnail.jp

    Modularity in action.GNU/Linux and free/Open source sotfware development model unleashed.

    Get PDF
    Organizational and managerial theories of modularity applied to the design and production of complex artifacts are used to interpret the rise and success of Free/Open Source Software methodologies and practices in software engineeringmodularity; software project management; free/open source software; division of labor; coordination; information hiding
    • …
    corecore