35,211 research outputs found

    A history and future of Web APIs

    Get PDF

    Programming patterns and development guidelines for Semantic Sensor Grids (SemSorGrid4Env)

    No full text
    The web of Linked Data holds great potential for the creation of semantic applications that can combine self-describing structured data from many sources including sensor networks. Such applications build upon the success of an earlier generation of 'rapidly developed' applications that utilised RESTful APIs. This deliverable details experience, best practice, and design patterns for developing high-level web-based APIs in support of semantic web applications and mashups for sensor grids. Its main contributions are a proposal for combining Linked Data with RESTful application development summarised through a set of design principles; and the application of these design principles to Semantic Sensor Grids through the development of a High-Level API for Observations. These are supported by implementations of the High-Level API for Observations in software, and example semantic mashups that utilise the API

    Artefacts and Errors: Acknowledging Issues of Representation in the Digital: Imaging of Ancient Texts

    Get PDF
    It is assumed, in palaeography, papyrology and epigraphy, that a certain amount of uncertainty is inherent in the reading of damaged and abraded texts. Yet we have not really grappled with the fact that, nowadays, as many scholars tend to deal with digital images of texts, rather than handling the texts themselves, the procedures for creating digital images of texts can insert further uncertainty into the representation of the text created. Technical distortions can lead to the unintentional introduction of ‘artefacts’ into images, which can have an effect on the resulting representation. If we cannot trust our digital surrogates of texts, can we trust the readings from them? How do scholars acknowledge the quality of digitised images of texts? Furthermore, this leads us to the type of discussions of representation that have been present in Classical texts since Plato: digitisation can be considered as an alternative form of representation, bringing to the modern debate of the use of digital technology in Classics the familiar theories of mimesis (imitation) and ekphrasis (description): the conversion of visual evidence into explicit descriptions of that information, stored in computer files in distinct linguistic terms, with all the difficulties of conversion understood in the ekphratic process. The community has not yet considered what becoming dependent on digital texts means for the field, both in practical and theoretical terms. Issues of quality, copying, representation, and substance should be part of our dialogue when we consult digital surrogates of documentary material, yet we are just constructing understandings of what it means to rely on virtual representations of artefacts. It is necessary to relate our understandings of uncertainty in palaeography and epigraphy to our understanding of the mechanics of visualization employed by digital imaging techniques, if we are to fully understand the impact that these will have

    Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study

    Full text link
    Passwords are still a mainstay of various security systems, as well as the cause of many usability issues. For end-users, many of these issues have been studied extensively, highlighting problems and informing design decisions for better policies and motivating research into alternatives. However, end-users are not the only ones who have usability problems with passwords! Developers who are tasked with writing the code by which passwords are stored must do so securely. Yet history has shown that this complex task often fails due to human error with catastrophic results. While an end-user who selects a bad password can have dire consequences, the consequences of a developer who forgets to hash and salt a password database can lead to far larger problems. In this paper we present a first qualitative usability study with 20 computer science students to discover how developers deal with password storage and to inform research into aiding developers in the creation of secure password systems
    • 

    corecore