126,602 research outputs found

    Programming Persistent Memory

    Get PDF
    Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times—a huge leap forward in byte-addressable capacity compared with current DRAM offerings. This revolutionary new technology gives applications significant performance and capacity improvements over existing technologies. It requires a new way of thinking and developing, which makes this highly disruptive to the IT/computing industry. The full spectrum of industry sectors that will benefit from this technology include, but are not limited to, in-memory and traditional databases, AI, analytics, HPC, virtualization, and big data. Programming Persistent Memory describes the technology and why it is exciting the industry. It covers the operating system and hardware requirements as well as how to create development environments using emulated or real persistent memory hardware. The book explains fundamental concepts; provides an introduction to persistent memory programming APIs for C, C++, JavaScript, and other languages; discusses RMDA with persistent memory; reviews security features; and presents many examples. Source code and examples that you can run on your own systems are included. What You’ll Learn Understand what persistent memory is, what it does, and the value it brings to the industry Become familiar with the operating system and hardware requirements to use persistent memory Know the fundamentals of persistent memory programming: why it is different from current programming methods, and what developers need to keep in mind when programming for persistence Look at persistent memory application development by example using the Persistent Memory Development Kit (PMDK) Design and optimize data structures for persistent memory Study how real-world applications are modified to leverage persistent memory Utilize the tools available for persistent memory programming, application performance profiling, and debugging Who This Book Is For C, C++, Java, and Python developers, but will also be useful to software, cloud, and hardware architects across a broad spectrum of sectors, including cloud service providers, independent software vendors, high performance compute, artificial intelligence, data analytics, big data, etc

    Childhood Reflections of Adult Male Incarcerated Child Sexual Abusers.

    Get PDF
    Child sexual abuse has existed since earliest recorded history. It is believed that one in three females and one in five males are sexually abused before their 18th birthday, and many researchers believe this is a gross underestimation of the problem. Child sexual abuse has been studied extensively from the perspective of the victim. Child sexual abusers have been studied over the last few decades but with inconsistent definitions and methods applied among studies. This qualitative study explored the childhood reflections of 8 incarcerated child sexual abusers in a southern Appalachian prison. One-on-one in-depth interviews were conducted at the prison with the 8 male participants. After multiple readings of the transcripts, analysis was completed and the stories emerged. The investigator used van Manen\u27s descriptive-interpretive process. This process involved guided existential reflections based on spatiality, corporeality, temporality, and relationality. The existentials were used as an aid to understand how incarcerated adult male child sexual abusers experienced childhood. Questions were asked using the existentials in order to better understand childhood experiences in this underserved and often forgotten population. Data were managed using NVivo qualitative data analysis software. Textural themes were organized into essential structural themes which were abstracted into the essential categorical themes of failure to root, what you see is what you learn, these are the moments of your life, and stupid is as stupid does. All participants demonstrated failure to root as evidenced by their inability to recall their childhood homes or their play life during childhood. Results indicated that participants developed a sense of self resulting from external perceptions which left them with a disembodied concept of self. A disembodied concept of self was demonstrated through the experiences of both failure to root and what you see is what you learn. These are the moments of your life is the abstraction of the participants\u27 method of coping with the abuses they suffered from different family members. The resulting personal view of lived body is represented by the abstraction of stupid is as stupid does. Results are discussed and related to nursing practice, education, and research

    A Principled Methodology: A Dozen Principles of Software Effort Estimation

    Get PDF
    Software effort estimation (SEE) is the activity of estimating the total effort required to complete a software project. Correctly estimating the effort required for a software project is of vital importance for the competitiveness of the organizations. Both under- and over-estimation leads to undesirable consequences for the organizations. Under-estimation may result in overruns in budget and schedule, which in return may cause the cancellation of projects; thereby, wasting the entire effort spent until that point. Over-estimation may cause promising projects not to be funded; hence, harming the organizational competitiveness.;Due to the significant role of SEE for software organizations, there is a considerable research effort invested in SEE. Thanks to the accumulation of decades of prior research, today we are able to identify the core issues and search for the right principles to tackle pressing questions. For example, regardless of decades of work, we still lack concrete answers to important questions such as: What is the best SEE method? The introduced estimation methods make use of local data, however not all the companies have their own data, so: How can we handle the lack of local data? Common SEE methods take size attributes for granted, yet size attributes are costly and the practitioners place very little trust in them. Hence, we ask: How can we avoid the use of size attributes? Collection of data, particularly dependent variable information (i.e. effort values) is costly: How can find an essential subset of the SEE data sets? Finally, studies make use of sampling methods to justify a new method\u27s performance on SEE data sets. Yet, trade-off among different variants is ignored: How should we choose sampling methods for SEE experiments? ;This thesis is a rigorous investigation towards identification and tackling of the pressing issues in SEE. Our findings rely on extensive experimentation performed with a large corpus of estimation techniques on a large set of public and proprietary data sets. We summarize our findings and industrial experience in the form of 12 principles: 1) Know your domain 2) Let the Experts Talk 3) Suspect your data 4) Data Collection is Cyclic 5) Use a Ranking Stability Indicator 6) Assemble Superior Methods 7) Weighting Analogies is Over-elaboration 8) Use Easy-path Design 9) Use Relevancy Filtering 10) Use Outlier Pruning 11) Combine Outlier and Synonym Pruning 12) Be Aware of Sampling Method Trade-off

    JISC Preservation of Web Resources (PoWR) Handbook

    Get PDF
    Handbook of Web Preservation produced by the JISC-PoWR project which ran from April to November 2008. The handbook specifically addresses digital preservation issues that are relevant to the UK HE/FE web management community”. The project was undertaken jointly by UKOLN at the University of Bath and ULCC Digital Archives department

    Analysis and Observations from the First Amazon Picking Challenge

    Full text link
    This paper presents a overview of the inaugural Amazon Picking Challenge along with a summary of a survey conducted among the 26 participating teams. The challenge goal was to design an autonomous robot to pick items from a warehouse shelf. This task is currently performed by human workers, and there is hope that robots can someday help increase efficiency and throughput while lowering cost. We report on a 28-question survey posed to the teams to learn about each team's background, mechanism design, perception apparatus, planning and control approach. We identify trends in this data, correlate it with each team's success in the competition, and discuss observations and lessons learned based on survey results and the authors' personal experiences during the challenge

    Ethical Visions of Copyright Law

    Get PDF

    The Use of Firewalls in an Academic Environment

    No full text

    XBRL:The Views of Stakeholders

    Get PDF

    Complete LibTech 2013 Print Program

    Get PDF
    PDF of the complete print program from the 2013 Library Technology Conferenc
    corecore