837,862 research outputs found

    Version Control Is for Your Data Too

    Get PDF
    Programmers regularly use distributed version control systems (DVCS) such as Git to facilitate collaborative software development. The primary purpose of a DVCS is to maintain integrity of source code in the presence of concurrent, possibly conflicting edits from collaborators. In addition to safely merging concurrent non-conflicting edits, a DVCS extensively tracks source code provenance to help programmers contextualize and resolve conflicts. Provenance also facilitates debugging by letting programmers see diffs between versions and quickly find those edits that introduced the offending conflict (e.g., via git blame). In this paper, we posit that analogous workflows to collaborative software development also arise in distributed software execution; we argue that the characteristics that make a DVCS an ideal fit for the former also make it an ideal fit for the latter. Building on this observation, we propose a distributed programming model, called carmot that views distributed shared state as an entity evolving in time, manifested as a sequence of persistent versions, and relies on an explicitly defined merge semantics to reconcile concurrent conflicting versions. We show examples demonstrating how carmot simplifies distributed programming, while also enabling novel workflows integral to modern applications such as blockchains. We also describe a prototype implementation of carmot that we use to evaluate its practicality

    The Risky Business of Binge Drinking Among College Students: Using Risk Models for PSAs and Anti-Drinking Campaigns

    Get PDF
    To assist creators of public service announcements and anti-drinking campaigns, this study provides an in-depth examination of the risks of binge drinking from the perspective of college students. Using current risk models for guidance, key elements from the qualitative data in the study are addressed, including perceived risks and their severity, vulnerability to risks, self-efficacy, response efficacy, benefits from ritual functions, and other costs or benefits based on students\u27 attitudes and beliefs. An integrated risk perception model is introduced. Student participants enumerated extensive risks; however, they generally felt invulnerable to the consequences. Most adopted a management style of “taking chances” when binge drinking because they perceived a built-in safety net in the college environment. Three ritual functions and various attitudes and beliefs help explain why a cost and benefit analysis favors binge drinking. Recommendations are given

    Ten Quick Tips for Using a Raspberry Pi

    Full text link
    Much of biology (and, indeed, all of science) is becoming increasingly computational. We tend to think of this in regards to algorithmic approaches and software tools, as well as increased computing power. There has also been a shift towards slicker, packaged solutions--which mirrors everyday life, from smart phones to smart homes. As a result, it's all too easy to be detached from the fundamental elements that power these changes, and to see solutions as "black boxes". The major goal of this piece is to use the example of the Raspberry Pi--a small, general-purpose computer--as the central component in a highly developed ecosystem that brings together elements like external hardware, sensors and controllers, state-of-the-art programming practices, and basic electronics and physics, all in an approachable and useful way. External devices and inputs are easily connected to the Pi, and it can, in turn, control attached devices very simply. So whether you want to use it to manage laboratory equipment, sample the environment, teach bioinformatics, control your home security or make a model lunar lander, it's all built from the same basic principles. To quote Richard Feynman, "What I cannot create, I do not understand".Comment: 12 pages, 2 figure

    Narrative Analysis of Sexual Etiquette in Teenage Magazines

    Get PDF
    Expanding on existing research on women\u27s magazines, this essay examines the sexual etiquette developed in advice columns in magazines popular among teenage women. Over a span of 20 years, the advice has changed very little. Serving the rhetorical function of field guides and training manuals, teen magazines limit women\u27s sociality and sexuality within narrowly defined heterosexual norms and practices. The rhetoric of sexual etiquette encourages young women to be sex objects and teachers of interpersonal communication rather than lovers, friends, and partners. Young women are being taught to subordinate self for others and to be contained
    corecore