Artykuły w czasopismach na temat „ACTIVE SERVER PAGES .NET”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: ACTIVE SERVER PAGES .NET.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „ACTIVE SERVER PAGES .NET”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Chen, Guo Shun, Yan Mei Lv i Ming Fei Xia. "Software Design of Networked Virtual Instrument System". Applied Mechanics and Materials 128-129 (październik 2011): 1334–38. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.1334.

Pełny tekst źródła
Streszczenie:
Based on the functions and performance analysis of networked virtual instrument (NVI) system, this paper design and implementation the software system of a NVI with the .NET platform. And carry out an in-depth analysis of the software system, especially the key techniques including databases, DataSocket and multithreading. The system uses ASP.NET, C# for development server pages, the instrument operation instructions embedded in Web pages using ActiveX techniques. Using VC to development VI server applications, and through DataSocket to transfer testing data. The testing results show that the software system is operating well, the NVI system achieves a convenient user and testing resource management, and making the system more users to share testing equipment to improve efficiency.
Style APA, Harvard, Vancouver, ISO itp.
2

Yerkey, Neil. "Active server pages for dynamic database Web access". Library Hi Tech 19, nr 2 (czerwiec 2001): 133–42. http://dx.doi.org/10.1108/07378830110394277.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ingram, Robert W., i Dale L. Lunsford. "Developing an e-Commerce System Using Active Server Pages". Journal of Information Systems 17, nr 1 (1.03.2003): 135–56. http://dx.doi.org/10.2308/jis.2003.17.1.135.

Pełny tekst źródła
Streszczenie:
This paper describes a case to illustrate analysis, design, and implementation issues involving a multitier e-commerce system. The case is designed for use in advanced accounting systems or systems analysis and design courses. The case involves analysis of a sales order system that will be implemented using a web interface and relational database, conceptual design of the system, and implementation of the system. A variety of tasks are involved in the case, but an instructor can select the tasks of relevance in a particular course.
Style APA, Harvard, Vancouver, ISO itp.
4

Maher, John J. (Jack). "Dynamic Web-Based Business Processing Systems Using Active Server Pages". Review of Business Information Systems (RBIS) 8, nr 1 (1.01.2004): 69–82. http://dx.doi.org/10.19030/rbis.v8i1.4506.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Li, Xiaodong, i John Paul Fullerton. "Create, edit, and manage Web database content using active server pages". Library Hi Tech 20, nr 3 (wrzesień 2002): 285–301. http://dx.doi.org/10.1108/07378830210444487.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Brabban, Philip James, i Paul Kobasa. "Forget ‘static’ ‐ get ‘dynamic’! Using Active Server Pages to manage electronic resources". VINE 31, nr 3 (wrzesień 2001): 27–35. http://dx.doi.org/10.1108/03055720010804122.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Lineberger, R. Daniel. "Analyzing Web Server Statistics". HortScience 31, nr 4 (sierpień 1996): 588f—589. http://dx.doi.org/10.21273/hortsci.31.4.588f.

Pełny tekst źródła
Streszczenie:
The World Wide Web is regarded widely as an invaluable asset to teaching and extension programs. Data supporting this assertion can be gathered actively or passively and can be analyzed to aid decision makers in matters of personnel evaluation and resource allocation. Most Web server software applications keep a log of connections by time, location, and file size transferred. The server logs of Aggie Horticulture, the Web site of the Texas Horticulture program, are analyzed bi-weekly using WebStat 2.3.4 and the number of logins, file size transferred (total and amount per sub-site), and client domain are tabulated. The number of “hits” increased from 15,000 to 120,000 per month (mid-February to mid-March of 1995 and 1996, respectively) over the last year. The logins came from 61 Internet domains representing 56 different countries. The “net” and “com” domains exhibited the greatest increase. “Active” data acquisition through a guest register at one of the sub-sites indicated that only 9% of the visitors registered. However, the data obtained from the active registrants were useful in determining the distribution of users by state and county within Texas.
Style APA, Harvard, Vancouver, ISO itp.
8

Yang, Guang. "The Realization of Math Score Query on the Wireless Internet". Advanced Materials Research 756-759 (wrzesień 2013): 1141–45. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1141.

Pełny tekst źródła
Streszczenie:
Wireless internet is gaining wide spread usage in teaching affairs, especially in score query system development. This paper explores how simple Math score query system can be developed for mobile devices and introduces general framework for designing such score query applications. Using the framework, based on Microsoft database software SQL Server 2000, T-SQL clause is employed to program one stored procedure for Math score query. The framework utilizes mobile phones simulator software, Nokia WAP Toolkit, which interacts with a server-side ASP (Active Server Pages) in conjunction with the associated SQL Server database. The design and implementation of the management information system are discussed in the paper, and test results are presented.
Style APA, Harvard, Vancouver, ISO itp.
9

Barrett, Kristian, Cameron J. Hunt, Lene Lange i Anne S. Meyer. "Conserved unique peptide patterns (CUPP) online platform: peptide-based functional annotation of carbohydrate active enzymes". Nucleic Acids Research 48, W1 (14.05.2020): W110—W115. http://dx.doi.org/10.1093/nar/gkaa375.

Pełny tekst źródła
Streszczenie:
Abstract The CUPP platform includes a web server for functional annotation and sub-grouping of carbohydrate active enzymes (CAZymes) based on a novel peptide-based similarity assessment algorithm, i.e. protein grouping according to Conserved Unique Peptide Patterns (CUPP). This online platform is open to all users and there is no login requirement. The web server allows the user to perform genome-based annotation of carbohydrate active enzymes to CAZy families, CAZy subfamilies, CUPP groups and EC numbers (function) via assessment of peptide-motifs by CUPP. The web server is intended for functional annotation assessment of the CAZy inventory of prokaryotic and eukaryotic organisms from genomic DNA (up to 30MB compressed) or directly from amino acid sequences (up to 10MB compressed). The custom query sequences are assessed using the CUPP annotation algorithm, and the outcome is displayed in interactive summary result pages of CAZymes. The results displayed allow for inspection of members of the individual CUPP groups and include information about experimentally characterized members. The web server and the other resources on the CUPP platform can be accessed from https://cupp.info.
Style APA, Harvard, Vancouver, ISO itp.
10

Ehler, Niels, i Jesper M. Aaslyng. "Real-time Monitoring of Greenhouse Climate Control Using the Internet". HortTechnology 11, nr 4 (styczeń 2001): 639–43. http://dx.doi.org/10.21273/horttech.11.4.639.

Pełny tekst źródła
Streszczenie:
The possibility of constructing an Internet application that would enable greenhouse users to track climate and control parameters from any Internet-connected computer was investigated. By constructing a set of HTML-templates, dynamic information from the control-system databases was integrated in real-time, and was uploaded to a common net-server by automatic generation of web pages using software developed during the project. Good performance, reliability and security were obtained and the technology proved to be an efficient way of supplying a broad range of users not only with climatic data but also with results from ongoing research.
Style APA, Harvard, Vancouver, ISO itp.
11

Ghule, Sayalee. "Log File Data Extraction or Mining". International Journal for Research in Applied Science and Engineering Technology 9, nr VI (30.06.2021): 4802–6. http://dx.doi.org/10.22214/ijraset.2021.35833.

Pełny tekst źródła
Streszczenie:
Log records contain data generally Client Title, IP Address, Time Stamp, Get to Ask, number of Bytes Exchanged, Result Status, URL that Intimated, and Client Chairman. The log records are kept up by the internet servers. By analysing these log records gives a flawless thought to the client. The wide Web may be a solid store of web pages that gives the Net clients piles of information. With the change in the number and complexity of Websites, the degree of the net has gotten to be massively wide. Web Utilization Mining may be a division of web mining that consolidates the application of mining strategies to web server logs in coordination to expel the behaviour of clients. Log records contain basic data around the execution of a framework. This data is frequently utilized for investigating, operational profiling, finding quirks, recognizing security dangers, measuring execution,
Style APA, Harvard, Vancouver, ISO itp.
12

Haris Andri, Rizkhan, i Doni Permana Sitanggang. "Sistem Penunjang Keputusan (SPK) Pemilihan Supplier Terbaik Dengan Metode MOORA". Jurnal Sains Informatika Terapan 2, nr 3 (6.10.2022): 79–84. http://dx.doi.org/10.62357/jsit.v2i3.181.

Pełny tekst źródła
Streszczenie:
In a company that the selection of the right supplier is an important factor in the success of a company. In the cement industry, selecting the right supplier can affect the quality of raw materials and ultimately affect the quality of the final product. Therefore, the Semen Padang company needs to select suppliers carefully and based on clear criteria. The MOORA (Multi-Objective Optimization by Ratio Analysis) method is a decision-making method that can be used to assist the Semen Padang company in choosing the best supplier. This method can be used to select suppliers based on certain criteria and assign a weight value to each criterion. In the MOORA method, this weight value is used to rank each supplier tested By implementing the MOORA method at Semen Padang companies, it is hoped that the company will be able to select suppliers more efficiently and accurately. This method can help companies evaluate supplier selection criteria and choose the supplier that best suits their needs. Thus, it can improve the quality of the final product and help Semen Padang companies achieve their business goals. Software or program, which is a set of instructions that allows hardware to be able to process data. UML is a standard language based on diagrams or drawings that aims to visualize, define and build models. Use Case Diagrams, Class Diagrams, Sequence Diagrams, and Activity Diagrams. PHP is a programming language used to translate program code base into machine code that can be understood by computers by adding HTML. PHP is known as a scripting language, which integrates with HTML tags, is executed on the server, and is used to create dynamic web pages such as Active Server Pages or Java Server Pages. PHP Hypertext Preprocessor is a multifunctional open source script that is very suitable for developing a website.
Style APA, Harvard, Vancouver, ISO itp.
13

Stockburger, David W. "Automated grading of homework assignments and tests in introductory and intermediate statistics courses using active server pages". Behavior Research Methods, Instruments, & Computers 31, nr 2 (czerwiec 1999): 252–62. http://dx.doi.org/10.3758/bf03207717.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
14

Liu, Jin, Gang Ding i Peng Lin. "Design and Implement of Open Laboratory Management System". Applied Mechanics and Materials 373-375 (sierpień 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1661.

Pełny tekst źródła
Streszczenie:
After implementing the open laboratory, students can make self-adjustments to their learning plans and choose different levels of experiments according to their learning degree, which will change the traditional passive learning into active learning. From the management reality of open laboratory, employing ASP NET and SQL Server 2008 to develop an opening laboratory management system which is based on the Web. This system has realized the course scheduling algorithm and efficient management of laboratory and students can reserve laboratory to do experiments according to their own time.
Style APA, Harvard, Vancouver, ISO itp.
15

Murthy, Uday S. "An Analysis of the Effects of Continuous Monitoring Controls on e-Commerce System Performance". Journal of Information Systems 18, nr 2 (1.09.2004): 29–47. http://dx.doi.org/10.2308/jis.2004.18.2.29.

Pełny tekst źródła
Streszczenie:
This research investigates the effects on e-commerce system performance of alternative types of application controls that continually monitor transaction-processing activity. The three categories of controls examined were relatively simple controls involving calculations, more complicated controls requiring database lookups, and the most intensive controls involving the use of aggregate statistical functions. A test e-commerce platform comprising a sales order entry application was programmed using Active Server Pages (ASP) technology. The system, running on a Windows 2000 Server platform with the data in a SQL Server 2000 database, was stress-tested using Microsoft's web Application Stress tool. To gauge the performance of the system under low, medium, and high load conditions, various statistics were gathered including processor utilization, ASP requests per second, SQL Server transactions per second, ASP requests queued, and time to last byte of the main order processing script. Results revealed that calculation controls could easily be accommodated by the e-commerce system, regardless of system load. Lookup controls had a detrimental effect on system performance only when they were heavily used. Aggregate function controls had a dramatic negative impact on system performance. The results of this study are useful for both capacity planning and capacity management and provide support for both internal and external auditors requesting the inclusion of continuous monitoring controls in modern e-commerce systems.
Style APA, Harvard, Vancouver, ISO itp.
16

Tang, Ai Tao, Zhi Qiang Yuan, Fu Sheng Pan i Hai Ding Liu. "A Database Prototype of Magnesium Alloy Based on Internet". Materials Science Forum 546-549 (maj 2007): 451–54. http://dx.doi.org/10.4028/www.scientific.net/msf.546-549.451.

Pełny tekst źródła
Streszczenie:
In order to make full use of magnesium alloy resources under the environment of the network, an integrated magnesium alloy database system prototype has been developed, which consists of five modules, including database utilizing, files management, report printing, data inquiry and system utilities. This system gives more conveniences to user’s work by adopting three-tier architecture and using advanced technologies such as ASP (Active Server Pages). The user who only owns a global browser can conveniently use this database system without pre-installing any other application softwares. This database system prototype is a powerful tool to cut down the cost and time for developing new magnesium alloys.
Style APA, Harvard, Vancouver, ISO itp.
17

Sedel'nikov, Il'ya Andreevich, i Dmitry Stanislavovich Koltygin. "Web application developing methodology for managing robotic complexes". Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2024, nr 1 (9.02.2024): 56–63. http://dx.doi.org/10.24143/2072-9502-2024-1-56-63.

Pełny tekst źródła
Streszczenie:
The purpose of the study is to develop a web application for control systems of robotic complexes (RTK) using the example of RTK with MP-11 robotic manipulators. The structure of the control system includes a controller on the Arduino Mega 2560 Pro Mini board with a loaded low-level program and an upper-level program. A web application has been selected as a software component. This type of application consists of a server and a client part. Data is exchanged between them over the network using the HTTP protocol. The application is built on the Microsoft .NET platform and the ASP .NET WebForms framework. The web server is a computer connected via a USB cable to the controller and currently used for a desktop application. The description of the web pages of the developed web application and its operation, algorithms of functioning, indicating the specifics of execution for this type of program is given. The program provides manual and automatic operation modes, as well as control of not only the RTK, but also its model. This type of management system involves multi-user mode and network transmission, two types of user rights and authentication have been developed to ensure the security of the complex, as well as antivirus protection, network settings for protection against unauthorized access are used. Guest access allows you to control only the robot model, in order to ensure the safety of the equipment. The main advantages of a web application are its cross-platform nature, i.e. the ability to work on any devices and operating systems, as well as the absence of the need for installation.
Style APA, Harvard, Vancouver, ISO itp.
18

Liu, Xiao Kang, i Geng Guo Cheng. "Analysis and Implementation of ASP.Net and PHP Frameworks Based on MVC Architecture". Advanced Materials Research 798-799 (wrzesień 2013): 749–52. http://dx.doi.org/10.4028/www.scientific.net/amr.798-799.749.

Pełny tekst źródła
Streszczenie:
Information transmission in the network is more and more accepted due to the fast and convenient of the network access. The MVC (Model-View-Controller) could be a very good solution to solve the problems as separating between user interface logic and business logic that developers found. We describe and explore ASP (Active Server Pages), PHP (Hypertext Preprocessor) and robustness analysis method, and we implement MVC architecture in ASP.Net framework and PHP framework respectively. With the comparison between ASP.Net framework and PHP framework, in this study, our findings show that PHP framework is more difficult than ASP.Net framework to implement MVC architecture, and the ASP.Net framework is better than PHP framework under the same environment.
Style APA, Harvard, Vancouver, ISO itp.
19

Davidson, Bryan H. "Database driven, dynamic content delivery: providing and managing access to online resources using Microsoft Access and Active Server Pages". OCLC Systems & Services: International digital library perspectives 17, nr 1 (marzec 2001): 34–42. http://dx.doi.org/10.1108/10650750110383596.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Samiin Tarnomo i Ramadhan Riski. "APLIKASI E-COMMERCE MELALUI TELEPON SELULAR PADA PT. PRIMA MULTI SELULAR SEMARANG". Jurnal Ilmiah Sistem Informasi 1, nr 1 (3.06.2021): 01–13. http://dx.doi.org/10.51903/juisi.v1i1.256.

Pełny tekst źródła
Streszczenie:
Based on the survey conducted by the author at PT. Prima Multi Selular Semarang, the author tries to develop a system by utilizing an existing server in accordance with the required requirements, namely with a web-based ordering data system program with WAP-based ordering, using the ASP programming language: Active Server Pages. This change aims to make it easier for customers to order goods and increase the company's sales volume. In designing this new application, it also carries out several stages of making DFD, ERD and Normalization diagrams to describe data storage and relationships between data, determine tables to create programs and design input outputs. This stage is carried out as a tool to create a WAP-based ordering application program. WAP-based program is expected to be able to help problems related to PT. Prima Multi Selular. The program that is made, of course, still has several weaknesses and shortcomings, this is possible that the author's experience and knowledge in WAP programming problems is still possible. Suggestions and criticisms are very helpful for writers to develop knowledge in this field.
Style APA, Harvard, Vancouver, ISO itp.
21

Meng, Yitong, i Jinlong Fei. "Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature". Security and Communication Networks 2020 (30.11.2020): 1–21. http://dx.doi.org/10.1155/2020/8850472.

Pełny tekst źródła
Streszczenie:
It has been shown that website fingerprinting attacks are capable of destroying the anonymity of the communicator at the traffic level. This enables local attackers to infer the website contents of the encrypted traffic by using packet statistics. Previous researches on hidden service attacks tend to focus on active attacks; therefore, the reliability of attack conditions and validity of test results cannot be fully verified. Hence, it is necessary to reexamine hidden service attacks from the perspective of fingerprinting attacks. In this paper, we propose a novel Website Response Fingerprinting (WRFP) Attack based on response time feature and extremely randomized tree algorithm to analyze the hidden information of the response fingerprint. The objective is to monitor hidden service website pages, service types, and mounted servers. WRFP relies on the hidden service response fingerprinting dataset. In addition to simulated website mirroring, two different mounting modes are taken into account, the same-source server and multisource server. A total of 300,000 page instances within 30,000 domain sites are collected, and we comprehensively evaluate the classification performance of the proposed WRFP. Our results show that the TPR of webpages and server classification remain greater than 93% in the small-scale closed-world performance test, and it is capable of tolerating up to 10% fluctuations in response time. WRFP also provides a higher accuracy and computational efficiency than traditional website fingerprinting classifiers in the challenging open-world performance test. This also indicates the importance of response time feature. Our results also suggest that monitoring website types improves the judgment effect of the classifier on subpages.
Style APA, Harvard, Vancouver, ISO itp.
22

Das, Subhash, Swarndeep Singh, Gurneet Kaur i Sanya Sharma. "Quality of patient-oriented online information on treatment of dementia: A comparative assessment of web pages in English and Hindi language". Indian Journal of Psychiatry 66, nr 4 (kwiecień 2024): 352–59. http://dx.doi.org/10.4103/indianjpsychiatry.indianjpsychiatry_506_23.

Pełny tekst źródła
Streszczenie:
Background: Management of dementia involves a multidisciplinary approach which also requires active participation from family members and caregivers. Thus, having easy access to information about dementia care is pertinent. Internet-based information is an emerging method for the same. Aim: To perform a comparative assessment of patient-oriented online information available on treatment of dementia over web pages in English and Hindi language. Methods: Observational study was conducted online through a general internet search engine (www.google.com). Web pages containing patient-oriented online information on treatment of dementia in English and Hindi were reviewed to assess their content and quality, esthetics, and interactivity. Appropriate descriptive and inferential statistics were conducted using the Statistical Package for the Social Sciences. Results: A total of 70 web pages met the eligibility criteria. Content quality assessed using the DISCERN score was significantly higher for English web pages compared to Hindi web pages (P < 0.01). About 72.4% (21/29) of English and only 9.8% (4/41) of Hindi web pages had a total DISCERN score of 40 or above, indicating good quality. For esthetics, the median score for English pages was significantly higher than for Hindi web pages (P < 0.01). The web pages with Health On Net (HON) certification had significantly better content quality. Conclusion: Our study revealed a scarcity of good quality online information about dementia and its treatment, especially in the Hindi language. English language websites showed better content quality than Hindi websites. HON Code label might be used as an indicator of better content quality for online resources informing on dementia treatment by lay people.
Style APA, Harvard, Vancouver, ISO itp.
23

Zhang, Xue Ying, i Kai Su. "Data Persistence on Physical Function Monitoring System for Athletes". Applied Mechanics and Materials 602-605 (sierpień 2014): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1622.

Pełny tekst źródła
Streszczenie:
You can find out the law of matter and energy metabolism when you are active by means of monitoring the athletes’ physical function, and the law can provide a theoretical basis for the training to achieve scientific training ultimately. Monitoring system can achieve a comprehensive information management for monitorship; data persistence is an important work of building monitoring system, and the paper researches on the NHibernate technology that based on .Net. First, data structure design was conducted based on the SQL Server database management system; then, you can study NHibernate architecture through the graphics; finally, you can carry on persistence design on the "Physiological Indicators" Table according to the persistence steps of NHibernate. Result of this study can be applied to the field of athletic training and has important implications for improving athletic performance, promoting sports development and so on.
Style APA, Harvard, Vancouver, ISO itp.
24

Kumar, Vinay, Sarita Rani, Ram Niwas, O. P. Sheoran i Komal Malik. "Development of Web Based Analysis Tool for Augmented Randomized Complete Block Design (ARCBD)". Journal of Extension Systems 36, nr 2 (2020): 28–32. http://dx.doi.org/10.48165/jes.2020.36206.

Pełny tekst źródła
Streszczenie:
In biological and field experiments, the Augmented Randomized Complete Block Design (ARCBD) is widely used for screening and selection of a large number of germplasm lines/varieties/entries/test treatments with non replicated test treatments and replicated control treatments to estimate the experimental error. A web based online module for analysis of ARCBD was developed using scripting language Active Server Pages (ASP) based on server client architecture. The data have been taken from Federer (1956) and output compared accordingly. The outputs produced by the module are in agreement with the output generated from SAS package. An attempt was made to provide a user friendly interface for entering/pasting the data, characters names, number of observations and number of characters for analysis of augmented randomized complete block design. The module produces different output tables such as check x block table, block effects, control means and control effects, adjusted mean for test genotypes and genotypic effects. It also computes sum of squares in the analysis of variance tables after ignoring/eliminating treatment and eliminating/ignoring blocks for block and treatment effects, respectively. Critical difference table for comparing different mean differences at 5% and 1% level of significance is also given. A complete procedure is also provided in the help file to make a user friendly interface for analysis of the design.
Style APA, Harvard, Vancouver, ISO itp.
25

Prasetyo, Kurniawan, i Suharyanto Suharyanto. "Rancang Bangun Sistem Informasi Koperasi Berbasis Web Pada Koperasi Ikitama Jakarta". Jurnal Teknik Komputer 5, nr 1 (20.02.2019): 119–26. http://dx.doi.org/10.31294/jtk.v5i1.4967.

Pełny tekst źródła
Streszczenie:
PT Indolife Pensiontama is a life insurance and pension fund corporation. IKITAMA Cooperation which is acronym of Indolife Pensiontama Employee Association Cooperation is a cooperation organization that having all permanent and active employees as members, in a routin activity IKITAMA Cooperative management manage daily transactions by manual using Microsoft Excel. If there is a new employee or not employed anymore then the record will be updated manually, and also there is no integration with existing human resource system, and all the data saved in Excel File without detail information. With all these problems so the author purpose to make a design and development of web-based cooperation information system. The design using object analytics oriented method by Unified Modeling Language (UML), C# .Net programming language with Microsoft Visual Studio 2012 as text editor and compiler and Microsoft SQL Server for the Database system. Keywords: Information System, Cooperation, IKITAMA.
Style APA, Harvard, Vancouver, ISO itp.
26

Wang, Quan Deng, i Xi Long Qu. "Design and Implementation of Conference Management System Based on ASP". Applied Mechanics and Materials 34-35 (październik 2010): 1592–95. http://dx.doi.org/10.4028/www.scientific.net/amm.34-35.1592.

Pełny tekst źródła
Streszczenie:
With the rapid development of the Internet and information, communication technology, human society began to enter into the intelligence community with the digital and network platform. With the popularization of computer application in schools, enterprises and other institutions, the meetings of governments, enterprises and institutions has broken the traditional model that the meetings are held in the same place and at the same time, and network meetings is to be popularized with the increasingly fast paces. But regardless of the company or the university, there exists the problems of meeting management. Now the overwhelming majority of the conference management is still in a state of manual, inefficient and prone to error, not manageable, not rule out any untrue phenomenon. Therefore, the internal management, self-improvement of the meeting management can not be ignored. This paper aims to resolve this problem by designing a meeting management website. Conference Management website ASP can be used to design the conference management website, ASP (Active Server Pages) dynamic website is a technology which is introduced by Microsoft Company to replace CGI (Common Gateway Interface)-a common Gateway Interface. By combining the knowledge of ASP HTML language, ASP directives and ActiveX components and Access database, the paper uses the own Web server to create and run a dynamic interactive Website 。The paper aims to realize the work of meeting managing, application, auditing, controlling, minutes of meetings processing through the meeting management website.
Style APA, Harvard, Vancouver, ISO itp.
27

Chen, Xiaowen, i Guanci Yang. "Data Sensing and Processing Tensioning System Based on the Internet of Things". Applied Sciences 9, nr 2 (16.01.2019): 310. http://dx.doi.org/10.3390/app9020310.

Pełny tekst źródła
Streszczenie:
Tensioning is an important process for producing prestressed concrete beams and directly affects bridge performance and driving safety. Active sensing and management of tensioning process data can improve the efficiency of quality monitoring and level of prestressed concrete beams. To realize remote collection and quality monitoring of tensioning process data, a framework for data sensing and processing of tensioning system based on the Internet of Things (IoT) is proposed in this study. Firstly, we investigate the technical framework and techniques of the system and designs a work flow of sensing, transport, and application service layers. The architecture of the tensioning system is presented. Then we propose a data acquisition and preprocessing method for the sensing layer, put forwards the data-pushing mechanism of the transport layer, and designs the function and work flow of the application service layer. After that, .NET platform and Android Studio are used to implement the tensioning system based on Browser/Server (B/S) architecture and mobile terminals. Finally, the case results of the system in seven precast beam fields in the Hubei section of Zhengzhou–Wanzhou high-speed Railway are given, which show that the developed system realizes collection, active pushing, and remote monitoring of tensioning process data.
Style APA, Harvard, Vancouver, ISO itp.
28

Gibadullin, Ruslan Farshatovich. "Thread-safe Control Calls in Enriched Client Applications". Программные системы и вычислительные методы, nr 4 (kwiecień 2022): 1–19. http://dx.doi.org/10.7256/2454-0714.2022.4.39029.

Pełny tekst źródła
Streszczenie:
When the first version of the .NET Framework was released, there was a pattern in enriched client applications that focused on message processing loops, where an embedded queue was used to pass execution units from worker threads. A generalized ISynchronizeInvoke solution was then developed in which the source thread could queue a delegate to the destination thread and, as an optional option, wait for that delegate to complete. After asynchronous page support was introduced into the ASP.NET architecture, the ISynchronizeInvoke pattern did not work because asynchronous ASP.NET pages are not mapped to a single thread. This was the reason for creating an even more generalized solution – SynchronizationContext, which is the subject of the research. The article uses practical examples to show how to update UI elements from worker threads without breaking thread-safety of the user application. Solutions proposed in this aspect are: using Beginlnvoke or Invoke methods to put this delegate into the UI thread message queue; capturing the UI thread synchronization context via the Current property of the SynchronizationContext class; using the deprecated BackgroundWorker class, which provides an implicit capture of the UI thread synchronization context. The peculiarity of implementation of the SynchronizationContext abstract class in ASP.NET platform is not left unnoticed. Practical recommendations on the use of marshalling mechanism on the example of development of multiclient chat with a centralized server are formulated.
Style APA, Harvard, Vancouver, ISO itp.
29

CABEZA, DANIEL, i MANUEL HERMENEGILDO. "Distributed WWW programming using (Ciao-)Prolog and the PiLLoW library". Theory and Practice of Logic Programming 1, nr 3 (maj 2001): 251–82. http://dx.doi.org/10.1017/s147106840100117x.

Pełny tekst źródła
Streszczenie:
We discuss from a practical point of view a number of issues involved in writing distributed Internet and WWW applications using LP/CLP systems. We describe PiLLoW, a public-domain Internet and WWW programming library for LP/CLP systems that we have designed to simplify the process of writing such applications. PiLLoW provides facilities for accessing documents and code on the WWW; parsing, manipulating and generating HTML and XML structured documents and data; producing HTML forms; writing form handlers and CGI-scripts; and processing HTML/XML templates. An important contribution of PiLLoW is to model HTML/XML code (and, thus, the content of WWW pages) as terms. The PiLLoW library has been developed in the context of the Ciao Prolog system, but it has been adapted to a number of popular LP/CLP systems, supporting most of its functionality. We also describe the use of concurrency and a high-level model of client-server interaction, Ciao Prolog's active modules, in the context of WWW programming. We propose a solution for client-side downloading and execution of Prolog code, using generic browsers. Finally, we also provide an overview of related work on the topic.
Style APA, Harvard, Vancouver, ISO itp.
30

Apriyansah, Kms Muhammad, Maryaningsih Maryaningsih i Indra Kanedi. "Application of Fuzzy Mamdani Logic in Determining Teacher Performance To The Learning System at Public High School 6 Bengkulu Middle". Journal of Applied Engineering and Technological Science (JAETS) 4, nr 1 (8.12.2022): 460–68. http://dx.doi.org/10.37385/jaets.v4i1.1254.

Pełny tekst źródła
Streszczenie:
Nowadays, the process of assessing teacher performance at State High School 6 Bengkulu Middle is still manually, namely by filling in the scores on each criterion consisting of 14 competencies, then the values are added together to get the final result of the teacher performance assessment. However, this takes quite a long time, besides that the assessment of teacher performance is only by looking at teachers who are active in various fields in the school. The application of teacher performance in State High School 6 Bengkulu Middle can help provide the results of teacher performance assessment of the learning system in schools through a fuzzy Mamdani logic approach. The application of teacher performance to the learning system at State High School 6 Bengkulu Middle was created using the Visual Basic .Net programming language and SQL Server 2008r2 Database. Based on the black box testing that has been carried out, it was found that the functionality of the teacher performance application to the learning system at State High School 6 Bengkulu Middle went well as expected and was able to analyze teacher assessment data through the Fuzzy Mamdani Method to determine teacher performance against the learning system in schools
Style APA, Harvard, Vancouver, ISO itp.
31

Hanif Md Saad, Mohamad, Rabiah Adawiyah Shahad, Kong Win i Aini Hussain. "ExSIDE: Component Based Object Oriented Expert System’s Integrated Development Environment". JOIV : International Journal on Informatics Visualization 1, nr 3 (10.06.2017): 88. http://dx.doi.org/10.30630/joiv.1.3.27.

Pełny tekst źródła
Streszczenie:
This paper describes the design and development of a component-based object oriented Expert System's Integrated Development Environment (ExSIDE). It is integrated with (i) a user-friendly manual and automated knowledge acquisition and management tool (ExSIDE_KAMT);(ii) an independent and customizable runtime module (ExSIDE_RTM); (iii) an object-oriented in-process Component Object Model (COM)-based inference engine (ExSIDE_IE); (iv) an object-oriented out-of-process COM-based inference engine (ExSIDE_IESvr); (v) and a PHP based inference engine (ExSIDE_PHP). ExSIDE_RTM can function independently as an Expert System Shell (ESS) and helps user to develop Expert Systems rapidly. ExSIDE_IE and ExSIDE_IES can be integrated with COM-supporting general purpose and scientific application development tools such as variants of C/C++/C#, BASIC (Visual BASIC®, REALbasic®), Java, MATLAB®, LabVIEW®, and Mathematica® to develop more advanced Expert Systems. Finally, ExSIDE_IE and ExSIDE_PHP can be used with Active Server Pages (ASP) and PHP technologies to generate web based Expert Systems. The unique framework of the ExSIDE enables rapid development of Expert Systems' on PC and web for technical and non-technical users. The overall system was developed successfully, and its usability was demonstrated via five unique Expert Systems case studies discussed in this paper.
Style APA, Harvard, Vancouver, ISO itp.
32

Fattah, Ahmad Maulana Malik, Apriade Voutama, Nono Heryana i Nina Sulistiyowati. "Pengembangan Model Machine Learning Regresi sebagai Web Service untuk Prediksi Harga Pembelian Mobil dengan Metode CRISP-DM". JURIKOM (Jurnal Riset Komputer) 9, nr 5 (31.10.2022): 1669. http://dx.doi.org/10.30865/jurikom.v9i5.5021.

Pełny tekst źródła
Streszczenie:
Along with the increasing public demand for car transportation modes, car sales businesses are also increasing. Efforts to exist and be competitive are carried out such as by applying machine learning models to determine the car’s selling price based on its specification. Businesses can also stimulate sales by actively offering customers. The effectiveness of the active and massive offerings can be increased by personalizing the offers provided. This research uses a machine learning-based approach to learn customer profile data to predict the car’s price they would buy. The research was conducted by adopting the CRISP-DM framework and developed using the Google Colaboratory and Azure Machine Learning platforms. The modeling stage developed six regression models, those are linear regression, Lasso, Ridge, Random Forest Regressor, Elastic-net, and Support Vector Regressor (SVR). After the evaluation stage, the Lasso regression model with the performance of R-squared (R2) of 0,99958 and Mean Absolute Error (MAE) of 2.284.865,29 deployed as a web service endpoint so it could be accessed in real-time. The web service required the customer’s “Gender, Age, Annual Salary, Credit Card Debt, and Net Worth” to return a response of the recommended car price range prediction for the customer to buy. In further development, predictions obtained through web services can be implemented in public applications to display personalized car sales offers or pages based on customer profiles
Style APA, Harvard, Vancouver, ISO itp.
33

Clements, Jon M., Winfred P. Cowgill, Lorranine P. Berkett i M. Elena Garcia. "Commercial Apple Production Information on the Internet: The Virtual Orchard and Apple-Crop Listserv". HortScience 33, nr 2 (kwiecień 1998): 204a. http://dx.doi.org/10.21273/hortsci.33.2.0204a.

Pełny tekst źródła
Streszczenie:
The Virtual Orchard (VO) is a World Wide Web (WWW) site dedicated to dissemination of information on sustainable apple production. The VO also provides interactive forums for research and extension projects, including the `Apple-Crop Listserv', dealing with commercial apple production and marketing issues. More specifically, the Virtual Orchard hosts the `New Jersey Fruit Focus' sponsored by Rutgers Cooperative Extension, and the `UVM Apple Orchard', home to the Univ. of Vermont research and Extension `Apple Team'. A search engine provides keyword searching of the VO and other relevant WWW sites. During Jan.—Dec. 1997, the Virtual Orchard welcomed nearly 40,000 unique Internet visitors and served >500,00 requested files. VO WWW pages are served by an Apple Macintosh Workgroup Server located at the Univ. of Vermont. The Uniform Research Locator (URL) of the Virtual Orchard is http://orchard.uvm.edu. The `Apple-Crop Listserv' is an Internet discussion list that provides a forum for information exchange between university researchers, extension agents and specialists, students, commercial apple growers, wholesalers/brokers, retailers, and direct marketers of apples. `Apple-Crop' became active in 1993 and as of Dec. 1997, had >340 subscribers throughout North America and from several foreign countries. To subscribe to `Apple-Crop' or for more information, send e-mail to apple-crop@orchard.uvm.edu; Univ. of Vermont (802) 656-2630; Rutgers Cooperative Extension (908) 788-1339.
Style APA, Harvard, Vancouver, ISO itp.
34

Hoofnagle, Andrew N., David Chou i Michael L. Astion. "Online Database for Documenting Clinical Pathology Resident Education". Clinical Chemistry 53, nr 1 (1.01.2007): 134–37. http://dx.doi.org/10.1373/clinchem.2006.078550.

Pełny tekst źródła
Streszczenie:
Abstract Background: Training of clinical pathologists is evolving and must now address the 6 core competencies described by the Accreditation Council for Graduate Medical Education (ACGME), which include patient care. A substantial portion of the patient care performed by the clinical pathology resident takes place while the resident is on call for the laboratory, a practice that provides the resident with clinical experience and assists the laboratory in providing quality service to clinicians in the hospital and surrounding community. Documenting the educational value of these on-call experiences and providing evidence of competence is difficult for residency directors. An online database of these calls, entered by residents and reviewed by faculty, would provide a mechanism for documenting and improving the education of clinical pathology residents. Methods: With Microsoft Access we developed an online database that uses active server pages and secure sockets layer encryption to document calls to the clinical pathology resident. Using the data collected, we evaluated the efficacy of 3 interventions aimed at improving resident education. Results: The database facilitated the documentation of more than 4 700 calls in the first 21 months it was online, provided archived resident-generated data to assist in serving clients, and demonstrated that 2 interventions aimed at improving resident education were successful. Conclusions: We have developed a secure online database, accessible from any computer with Internet access, that can be used to easily document clinical pathology resident education and competency.
Style APA, Harvard, Vancouver, ISO itp.
35

Savini, L., C. Ippoliti, I. Di Lorenzo i Anna Amaria Conte. "Base de données sur Internet et système d'information géographique pour appuyer Medreonet". Revue d’élevage et de médecine vétérinaire des pays tropicaux 62, nr 2-4 (1.02.2009): 162. http://dx.doi.org/10.19182/remvt.10070.

Pełny tekst źródła
Streszczenie:
The main objective of Medreonet is to share and exchange data, expertise, experiences and information on bluetongue (BT), African horse sickness (AHS) and epizootic haemorrhagic disease (EHD). In this context the web-based database and geographical information system (GIS) application is the most suitable tool to provide a friendly environment that is easy to use by the different actors involved in the project. The web-based database and GIS application has been developed using ESRI software (release 9.0) (ArcIMS, ArcGIS desktop, ArcSDE), Java and Active Server Pages (ASP). Users can access the public web-GIS through a generic Internet browser and the information required (maps and data) are published by ArcIMS using web server technology. ArcSDE and an Oracle relational database management system (release 8i) (RDBMS) are used to store and manage spatial and alphanumerical data. The authorized users can input new information and data on their geographical area of competence directly online, using ASP and a web interface. The accuracy of the data entered into the information system (e.g. missing values, duplicates, incorrect data format, etc.) is guaranteed by automatic check procedures that operate dur­ing the updating of the centralized database. The database was designed to store all the epidemiological data deemed relevant by the experts and all the scientific results, when available, pro­duced during the project. In particular, the data collected cover three main sets of information which are displayed and spread through an interactive, dynamic mapping system: – outbreak distribution, i.e. the geographical distribution of the disease by year and serotype at the regional level in the European Union (EU) and Mediterranean countries for BT, AHS, and EHD, respectively; – serological surveillance results, i.e. geographical distribution of the true and apparent prevalence of infection based on the analyses of BT serological surveillance data; – entomological distribution, i.e. geographical distribution of nine vector species by year and month, number of catch sites, number of catches, vector and maximum number of midges at the regional level in the EU and Mediterranean countries. Medreonet database and GIS application fulfill all the require­ments stipulated in the project; moreover the system is fully scalable and may adapt to future demands.
Style APA, Harvard, Vancouver, ISO itp.
36

Rosas Toro, María Alejandra, Jaime Hesiquio Herrera, Leslie Suzette Velasco Salinas i Juan Manuel Martínez Chávez. "Construyendo una web API con la arquitectura n capas". Multidisciplinas de la Ingeniería 11, nr 18 (19.12.2023): 14–25. http://dx.doi.org/10.29105/mdi.v11i18.274.

Pełny tekst źródła
Streszczenie:
En los procesos que involucran tecnologías digitales y la automatización, las empresas necesitan innovar para obtener sistemas informáticos eficientes y con mejores rendimientos; acorde con esto en la empresa BCD travel se desarrolló el proyecto “CONSTRUYENDO UNA WEB API CON LA ARQUITECTURA N CAPAS”, debido a que la herramienta de acceso a datos Data Service (DS) quedó descontinuada. El objetivo del proyecto era la creación de una Interfaz de Programación de Aplicaciones (API), capaz de mantener la comunicación y transmisión de información a cada uno de los procesos y sistemas que se ejecutan en esta empresa. La construcción de la Web API (Herramienta de servicio de datos con Interfaz de programación de aplicaciones) denominada DSA se basó en una arquitectura de N capas, utilizando la Tecnología Active Server Page (ASP .Net) y el lenguaje de programación C Sharp, aplicando el modelo de programación Object Relational Mapping (ORM) perteneciente al ADO.NET Entity Framework con la finalidad de mapear las estructuras de las Bases de Datos Relacionales y transformar las tablas para simplificar el trabajo de los desarrolladores. Los beneficios que ha tenido la DSA es que es una herramienta multitarea y permite ser utilizada en aplicaciones de escritorio, en sitios Web o en aplicaciones móviles, los tiempos de consulta de datos son más rápidos y se pueden realizar consultas en paralelo sin afectar el rendimiento de la API, un beneficio más de la DSA es que cualquier desarrollador puede darle mantenimiento, agregando o eliminando consultas a las tablas de la Base de Datos de acuerdo a las necesidades de procesamiento que se tengan.
Style APA, Harvard, Vancouver, ISO itp.
37

Dawood, Huda, Jonathan Siddle i Nashwan Dawood. "Integrating IFC and NLP for automating change request validations". Journal of Information Technology in Construction 24 (4.12.2019): 540–52. http://dx.doi.org/10.36680/j.itcon.2019.030.

Pełny tekst źródła
Streszczenie:
The management and the identification of design changes constitute an essential part of the of a design flow within the architecture, engineering and construction (AEC) industry, requiring the formalisation of a multi-disciplinary collaborative information modelling environment. Construction projects generate substantial amount of change information, which needs to be updated continuously throughout the process, from initial feasibility study to the decommissioning of facilities. Complications arise from the information storage in multiple incompatible file formats that can lead to the loss or omission of details. In addition to any unexpected changes, the mismanagement of information is another factor leading to delays and costly errors. In order to mitigate such issues, this paper proposes to integrate the Industry Foundation Classes (IFC) data model and Natural Language Processing (NLP) to validate and visually identify the result of change requests. The system is developed using C# by 1) integrating angular framework with ASP.NET (Active Server Pages) to create a dynamic single web page and 2). Using X-BIM toolkit that supports IFC format to read, create and visualise the BuildingSmart Data Models (aka IFC Models). This approach enables a web-based platform capable of generating reports and visual previews, highlighting the differences between IFC files throughout the design processes. A web-based system prototype allows users to compare subsequent versions of IFC design models in terms of additions, modifications and deletions. The prototype uses NLP to intelligently identify the changes that have been made as it compares newer and older versions of the same model, making this information available to designers and 3D modellers. Prospective work will focus on the application of artificial intelligence (AI) to automate the implementation of changes within the construction models.
Style APA, Harvard, Vancouver, ISO itp.
38

Brulet, Alexandre, Guy Llorca i Laurent Letrilliart. "Medical Wikis Dedicated to Clinical Practice: A Systematic Review". Journal of Medical Internet Research 17, nr 2 (19.02.2015): e48. http://dx.doi.org/10.2196/jmir.3574.

Pełny tekst źródła
Streszczenie:
Background Wikis may give clinician communities the opportunity to build knowledge relevant to their practice. The only previous study reviewing a set of health-related wikis, without specification of purpose or audience, globally showed a poor reliability. Objective Our aim was to review medical wiki websites dedicated to clinical practices. Methods We used Google in ten languages, PubMed, Embase, Lilacs, and Web of Science to identify websites. The review included wiki sites, accessible and operating, having a topic relevant for clinical medicine, targeting physicians or medical students. Wikis were described according to their purposes, platform, management, information framework, contributions, content, and activity. Purposes were classified as “encyclopedic” or “non-encyclopedic”. The information framework quality was assessed based on the Health On the Net (HONcode) principles for collaborative websites, with additional criteria related to users’ transparency and editorial policy. From a sample of five articles per wikis, we assessed the readability using the Flesch test and compared articles according to the wikis’ main purpose. Annual editorial activities were estimated using the Google engine. Results Among 25 wikis included, 11 aimed at building an encyclopedia, five a textbook, three lessons, two oncology protocols, one a single article, and three at reporting clinical cases. Sixteen wikis were specialized with specific themes or disciplines. Fifteen wikis were using MediaWiki software as-is, three were hosted by online wiki farms, and seven were purpose-built. Except for one MediaWiki-based site, only purpose-built platforms managed detailed user disclosures. The owners were ten organizations, six individuals, four private companies, two universities, two scientific societies, and one unknown. Among 21 open communities, 10 required users’ credentials to give editing rights. The median information framework quality score was 6 out of 16 (range 0-15). Beyond this score, only one wiki had standardized peer-reviews. Physicians contributed to 22 wikis, medical learners to nine, and lay persons to four. Among 116 sampled articles, those from encyclopedic wikis had more videos, pictures, and external resources, whereas others had more posology details and better readability. The median creation year was 2007 (1997-2011), the median number of content pages was 620.5 (3-98,039), the median of revisions per article was 17.7 (3.6-180.5) and 0.015 of talk pages per article (0-0.42). Five wikis were particularly active, whereas six were declining. Two wikis have been discontinued after the completion of the study. Conclusions The 25 medical wikis we studied present various limitations in their format, management, and collaborative features. Professional medical wikis may be improved by using clinical cases, developing more detailed transparency and editorial policies, and involving postgraduate and continuing medical education learners.
Style APA, Harvard, Vancouver, ISO itp.
39

Rozhko, Viktor I., Daniil O. Brazhnik i Anna O. Didenko. "Promotion of the Enterprise Brand in Social Networks (SMM)". Business Inform 3, nr 554 (2024): 353–63. http://dx.doi.org/10.32983/2222-4459-2024-3-353-363.

Pełny tekst źródła
Streszczenie:
The domestic economy is going through the most difficult period in its history. Martial law has significantly reduced the productivity and overall efficiency of Ukrainian enterprises, which are already in a difficult position after the COVID-19 pandemic. Domestic companies are forced to adapt to modern conditions and look for ways to survive. Effective business management is impossible without constant adaptation to changes in the market. Even before the start of the pandemic, most companies actively used social networks to spread information about the brand and attract new customers; the beginning of the introduction of quarantine measures, the self-isolation regime, forced companies that previously did not use social networks as a tool to promote their business, to review their approach and rethink their strategy. This became necessary in order to adapt to the realities of the time, where access to customers and the market proved to be difficult due to the limitation of physical contact. Some companies that previously ignored social media have been forced to re-establish or create a presence in these networks, as it has become a strategic necessity to stay in touch with their customers and provide appropriate promotional support for their products or services. Thus, the lockdown became a catalyst for the activation of the presence of companies in social networks, which helped them adapt to new conditions and increase their online activity in order to support business. The experience that the companies acquired during the pandemic became one of the foundations of the successful functioning of domestic enterprises during the period of active hostilities. The purpose of the present study is to out-line the theoretical and practical foundations of promoting the company’s brand in social networks (SMM) using modern information marketing tools. An analysis of scientific research by foreign and domestic economists has been carried out. The current position of SMM as a tool for enterprise promotion in the information space is analyzed. The expediency of promoting a business brand in social net-works using the example of an express delivery company is revealed. It is found that the use of social networks as a tool for brand promotion is one of the most attractive and promising ways of developing the marketing activities of enterprises. Promotion of the company’s brand in social networks will con-tribute to increasing the company’s competitiveness, as well as help to develop new sales markets. Al-so, promoting the brand in social networks provides the company with advantages in the form of: minimization of possible negative variables during the pricing process; consolidation of social opinion regarding the individuality and uniqueness of the service provided or the product produced. The article examines the essence of the brand as a grouped reflection of entrepreneurship in the social and informational environment. The need to actively maintain official pages in social networks in order to in-crease the efficiency of the company’s activities is argued. The need to analyze the external conditions of the company’s activity in the process of developing marketing measures has been determined and substantiated. It has been proven that in today’s world, the developed and active presence of an enterprise in the social networks becomes a guarantee of the client-oriented direction of the enterprise. It is substantiated that the activation of the enterprise in social networks allows to raise the general image of the company, and therefore to increase the efficiency of advertising measures for the promotion of a product or service.
Style APA, Harvard, Vancouver, ISO itp.
40

Reich, Rob, Mehran Sahami i Jeremy M. Weinstein. "System Error: Where Big Tech Went Wrong and How We Can Reboot". Perspectives on Science and Christian Faith 74, nr 1 (marzec 2022): 62–64. http://dx.doi.org/10.56315/pscf3-22reich.

Pełny tekst źródła
Streszczenie:
SYSTEM ERROR: Where Big Tech Went Wrong and How We Can Reboot by Rob Reich, Mehran Sahami, and Jeremy M. Weinstein. New York: HarperCollins Publishers, 2021. 352 pages. Hardcover; $27.99. ISBN: 9780063064881. *Remember when digital technology and the internet were our favorite things? When free Facebook accounts connected us with our friends, and the internet facilitated democracy movements overseas, including the Arab Spring? So do the authors of this comprehensive book. "We shifted from a wide-eyed optimism about technology's liberating potential to a dystopian obsession with biased algorithms, surveillance capitalism, and job-displacing robots" (p. 237). *This transition has not escaped the notice of the students and faculty of Stanford University, the elite institution most associated with the rise (and sustainment) of Silicon Valley. The three authors of this book teach a popular course at Stanford on the ethics and politics of technological change, and this book effectively brings their work to the public. Rob Reich is a philosopher who is associated with Stanford's Institute for Human-Centered Artificial Intelligence as well as their Center for Ethics in Society. Mehran Sahami is a computer science professor who was with Google during the startup years. Jeremy Weinstein is a political science professor with experience in government during the Obama administration. *The book is breathtakingly broad, explaining the main technical and business issues concisely but not oversimplifying, and providing the history and philosophy for context. It accomplishes all this in 264 pages, but also provides thirty-six pages of notes and references for those who want to dive deeper into some topics. The most important section is doubtless the last chapter dealing with solutions, which may be politically controversial but are well supported by the remainder of the book. *Modern computer processors have enormous computational power, and a good way to take advantage of that is to do optimization, the subject of the first chapter. Engineers love optimization, but not everything should be done as quickly and cheaply as possible! Optimization requires the choice of some quantifiable metric, but often available metrics do not exactly represent the true goal of an organization. In this case, optimizers will choose a proxy metric which they feel logically or intuitively should be correlated with their goal. The authors describe the problems which result when the wrong proxy is selected, and then excessive optimization drives that measure to the exclusion of other possibly more important factors. For example, social media companies that try to increase user numbers to the exclusion of other factors may experience serious side effects, such as the promotion of toxic content. *After that discussion on the pros and cons of optimization, the book dives into the effects of optimizing money. Venture capitalists (VCs) have been around for years, but recent tech booms have swelled their numbers. The methodology of Objectives and Key Results (OKR), originally developed by Andy Grove of Intel, became popular among the VCs of Silicon Valley, whose client firms, including Google, Twitter, and Uber, adopted it. OKR enabled most of the employees to be evaluated against some metric which management believed captured the essence of their job, so naturally the employees worked hard to optimize this quantity. Again, such a narrow view of the job has led to significant unexpected and sometimes unwanted side effects. *The big tech companies are threatened by legislation designed to mitigate some of the harm they have created. They have hired a great many lobbyists, and even overtly entered the political process where possible. In California, when Assembly Bill 5 reclassified many independent contractors as employees, the affected tech companies struck back with Proposition 22 to overturn the law. An avalanche of very expensive promotion of Proposition 22 resulted in its passage by a large margin. *It is well known that very few politicians have a technical background, and the authors speculate that this probably contributes to the libertarian leaning prominent in the tech industry. The authors go back in history to show how regulation has lagged behind technology and industrial practice. An interesting chapter addresses the philosophical question of whether democracy is up to the task of governing, or whether government by experts, or Plato's "philosopher kings" would be better. *Part II of the book is the longest, addressing the fairness of algorithms, privacy, automation and human job replacement, and free speech. The authors point out some epic algorithm failures, such as Amazon being unable to automate resumé screening to find the best candidates, and Google identifying Black users as gorillas. The big advances in deep learning neural nets result from clever algorithms plus the availability of very large databases, but if you've got a database showing that you've historically hired 95% white men for a position, training an algorithm with that database is hardly going to move you into a future with greater diversity. Even more concerning are proprietary black-box algorithms used in the legal system, such as for probation recommendations. Why not just let humans have the last word, and be advised by the algorithms? The authors remind us that one of the selling points of algorithmic decision making is to remove human bias; returning the humans to power returns that bias as well. *Defining fairness is yet another ethical and philosophical question. The authors give a good overview of privacy, which is protected by law in the European Union by the General Data Protection Regulation. Although there is no such federal law in America, California has passed a similar regulation called the California Consumer Privacy Act. At this point, it's too soon to evaluate the effect of such regulations. *The automation chapter is entitled "Can humans flourish in a world of smart machines?" and it covers many philosophical and ethical issues after providing a valuable summary of the current state of AI. Although machines are able to defeat humans in games like chess, go, and even Jeopardy, more useful abilities such as self-driving cars are not yet to that level. The utopian predictions of AGI (artificial general intelligence, or strong AI), in which the machine can set its own goals in a reasonable facsimile of a human, seem quite far off. But the current state of AI (weak AI) is able to perform many tasks usefully, and automation is already displacing some human labor. The authors discuss the economics, ethics, and psychology of automation, as human flourishing involves more than financial stability. The self-esteem associated with gainful employment is not a trivial thing. The chapter raises many more important issues than can be mentioned here. *The chapter on free speech also casts a wide net. Free speech as we experience it on the internet is vastly different from the free speech of yore, standing on a soap box in the public square. The sheer volume of speech today is incredible, and the power of the social media giants to edit it or ban individuals is also great. Disinformation, misinformation, and harassment are rampant, and polarization is increasing. *Direct incitement of violence, child pornography, and video of terrorist attacks are taken down as soon as the internet publishers are able, but hate speech is more difficult to define and detect. Can AI help? As with most things, AI can detect the easier cases, but it is not effective with the more difficult ones. From a regulatory standpoint, section 230 of the Communications Decency Act of 1996 (CDA 230) immunizes the platforms from legal liability due to the actions of users. Repealing or repairing CDA 230 may be difficult, but the authors make a good case that "it is realistic to think that we can pursue some commonsense reforms" (p. 225). *The final part of the book is relatively short, but addresses the very important question: "Can Democracies Rise to the Challenge?" The authors draw on the history of medicine in the US as an example of government regulation that might be used to reign in the tech giants. Digital technology does not have as long a history as medicine, so few efforts have been made to regulate it. The authors mention the Association for Computing Machinery (ACM) Software Engineering Code of Ethics, but point out that there are no real penalties for violation besides presumably being expelled from the ACM. Efforts to license software engineers have not borne fruit to date. *The authors argue that the path forward requires progress on several fronts. First, discussion of values must take place at the early stages of development of any new technology. Second, professional societies should renew their efforts to increase the professionalism of software engineering, including strengthened codes of ethics. Finally, computer science education should be overhauled to incorporate this material into the training of technologists and aspiring entrepreneurs. *The authors conclude with the recent history of attempts to regulate technology, and the associated political failures, such as the defunding of the congressional Office of Technology Assessment. It will never be easy to regulate powerful political contributors who hold out the prospect of jobs to politicians, but the authors make a persuasive case that it is necessary. China employs a very different authoritarian model of technical governance, which challenges us to show that democracy works better. *This volume is an excellent reference on the very active debate on the activities of the tech giants and their appropriate regulation. It describes many of the most relevant events of the recent past and provides good arguments for some proposed solutions. We need to be thinking and talking about these issues, and this book is a great conversation starter. *Reviewed by Tim Wallace, a retired member of the technical staff at the MIT Lincoln Laboratory, Lexington, MA 02421.
Style APA, Harvard, Vancouver, ISO itp.
41

MR, N. Parasuram, B. Rajan MR, R. Poovarasan MR i S. Yuvara MR. "Smart Scalable and Flexible Low Power Sensor Based Internet Connected Street Satellite System with Embedded Web Server". International Journal of Web Technology 7, nr 1 (11.06.2018). http://dx.doi.org/10.20894/ijwt.104.007.001.005.

Pełny tekst źródła
Streszczenie:
The purpose of project is innovative street lighting system that runs associate in net server to present sensible electronic administrations to people living within the town however the vitality effective lighting administration and alternative disaster managing system. This intense lighting system is often dead in urban areas, roads, grounds, stops and don scene. The exceptional parts of the project are described below. The microcontroller runs an internet server that sends data to the client aspect application. Any instrument with a web program, as an example, mobile phone or PC/Laptop are often utilised to screen the data maintain. The client part is verified with a 1 of a user name and secret password before aiming to conversational idea. The net server is accountable of serving the web site pages, overhauling the client and for maintaining the TCP/IP association till the user closes the session. Web site pages are designed with hypertext mark-up language non-standard speech. The device utilizes the LwIP open supply TCP/IP convention stack for its net availableness.
Style APA, Harvard, Vancouver, ISO itp.
42

Coutinho, Fiona C., Caroline Merriam Eastman, Christopher B. Hare i Robert F. Skinder. "Integrating Digital Resources into a Traditional University Research Library". Issues in Science and Technology Librarianship, nr 23 (20.08.1999). http://dx.doi.org/10.29173/istl1473.

Pełny tekst źródła
Streszczenie:
We describe the ongoing Electronic Library Project at the University of South Carolina. The goal of this project is the integration of digital resources within a traditional university research library. The first step was the development of an Electronic Science Library (ESL), followed by an Electronic Academic Library (EAL) which includes non-science subjects. We discuss the structure of these libraries and comment on our experiences with their implementation and use. The prototype implementation used static web pages, a technology which we knew would not scale up well. This implementation is being replaced by a database system using SQL Server and Active Server Pages. Future plans are briefly discussed.
Style APA, Harvard, Vancouver, ISO itp.
43

Lin Kam, Kui, i Yuan Wen Hau. "PLATFORM INDEPENDENT WEB-BASED TELECARDIOLOGY FOR CONNECTED HEART CARE". Jurnal Teknologi 78, nr 7-5 (26.07.2016). http://dx.doi.org/10.11113/jt.v78.9458.

Pełny tekst źródła
Streszczenie:
Most of the commercial telecardiology systems are platform-dependent and operating system (OS)-dependent. This causes inconvenience to medical officer for retrieving data from database and hence reduce the work efficiency. In this paper, a platform-independent and OS-independent web-based telecardiology system, named VirtualDave System, is proposed based on client-server model and developed in Hypertext Markup Language 5 (HTML5), Active Server Pages (ASP) scripting and C# languages. This system allows users to log on and access the patient medical data from any technology devices that equipped with web browser and internet access. Besides, it also allows targeted users to communicate and get remote medical consultation without long distance traveling and long-time queuing. Verification result shows that this proposed system could be executed in any platform regardless the OS. This web-based telecardiology could significantly help to improve the health care services especially in rural area.
Style APA, Harvard, Vancouver, ISO itp.
44

Hoşgönül, Buğra, i Hasan Önder. "Sudoku Deneme Deseninin Tarımsal Araştırmalarda Kullanımı". Black Sea Journal of Engineering and Science, 13.06.2024. http://dx.doi.org/10.34248/bsengineering.1465849.

Pełny tekst źródła
Streszczenie:
İki yönlü heterojenliğin bulunduğu durumlarda çift yönlü bloklama işlemi olan Latin Kare deneme deseni yaygın olarak kullanılmaktadır. Denemede ikiden fazla heterojenlik bulunduğu durumlarda Latin Kare deneme desenine alternatif olarak geliştirilen Sudoku deneme deseni kullanılmaktadır. Bu sayede deneme hatasının en aza indirilmesi sağlanabilmektedir. Bu çalışmada, Tip I, Tip II, Tip III ve Tip IV Sudoku deneme desenlerine ait çözümler verilmiştir. Sudoku deneme desenleri için çözüm yapılabilmesi amacıyla Web tabanlı bir yazılım geliştirilmiştir. Yazılımın geliştirilmesinde ASP (Active Server Pages) yazılım dili kullanılmıştır. Sudoku deneme desenlerinin pek çok faktör ve heterojenlik kaynağının denemelerde etkili olduğu özellikle tarım gibi alanlarda çalışan bilim insanlarına faydalı olacağı düşünülmektedir.
Style APA, Harvard, Vancouver, ISO itp.
45

"Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)". 2013 1, nr 2013 (30.08.2020): 75–87. http://dx.doi.org/10.47277/ijcncs/1(3)2.

Pełny tekst źródła
Streszczenie:
As business activities are becoming increasing globally and as numerous firms expand their operations into overseas markets, there is need for human resource management (HRM) to ensure that they hire and keep good employees. From ages, firms/organizations have been having great problems in getting the right professionals into appropriate jobs and training. This research focuses at exploiting information technology in order to overcome these problems. The system, which is a network of inter–related processes, collects data from applicants through a web-based interface and matches with appropriate jobs. This prevents the frustration and some other problems inherent in the manual method of job recruitment, which is the traditional unstructured interview and knowledge based method for matching applicants to jobs. The proposed system is a neural network web-based human resource management system model running on Internet Information (IIS) server with capabilities for Active Server Page (ASP) and Microsoft Access; while Hypertext Markup Language (HTML) are used for authoring web pages. Finally, the system can run on the minimum Pentium machines with Windows XP operating system
Style APA, Harvard, Vancouver, ISO itp.
46

Votinov, Maksim Valer'evich. "THE FEATURES OF BUILDING WEB APPLICATIONS OF DATA SUPPORT OF AUTOMATIC CONTROL SYSTEMS". Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics, 25.07.2017, 40–47. http://dx.doi.org/10.24143/2072-9502-2017-3-40-47.

Pełny tekst źródła
Streszczenie:
The article focuses on development telecommunication functions providing remote control of technological processes, their visualizing, and executive mechanisms of different processing facilities (e.g. executive mechanisms of a small-size dryer created in Murmansk State Technical University in order to smoke and dry fish). The solution of the problem became possible due to the web application developed according to ASP (Active Server Pages) technology and used on top the web-server controlled by IIS (Internet Information Services), Microsoft. The advantage of the web-application is that it allows logging onto the automated control system irrespective of a small-size dryer location (i.e. working place is mobile), and technological process control is possible from any mobile platforms and operational systems. Due to using MS SQL Server Express it became possible to organize nonstop data exchange between automatic system of the small dryer and the end user (simultaneous work of several users is possible). The article presents the scheme of the user and web-application interface. Class of the project safety (III) has been determined, as well as corresponding basic protection measures, which provide implementing the user identification and authentication systems, antivirus and network intrusion systems. Project costs proved to be lower than the cost of software TRACE MODE Data Center (35.000 rubles instead of 58.000 rubles), which is found a truly sustainable solutions to realize a remote access to the automation facility. A growing number of users doesn’t affect the final cost of the project.
Style APA, Harvard, Vancouver, ISO itp.
47

Kuntsman, Adi. "“Error: No Such Entry”". M/C Journal 10, nr 5 (1.10.2007). http://dx.doi.org/10.5204/mcj.2707.

Pełny tekst źródła
Streszczenie:
“Error: no such entry.” “The thread specified does not exist.” These messages appeared every now and then in my cyberethnography – a study of Russian-Israeli queer immigrants and their online social spaces. Anthropological research in cyberspace invites us to rethink the notion of “the field” and the very practice of ethnographic observation. In negotiating my own position as an anthropologist of online sociality, I was particularly inspired by Radhika Gajjala’s notion of “cyberethnography” as an epistemological and methodological practice of examining the relations between self and other, voice and voicelessness, belonging, exclusion, and silencing as they are mediated through information-communication technologies (“Interrupted” 183). The main cyberethnographic site of my research was the queer immigrants’ Website with its news, essays, and photo galleries, as well as the vibrant discussions that took place on the Website’s bulletin board. “The Forum,” as it was known among the participants, was visited daily by dozens, among them newbies, passers-by, and regulars. My study, dedicated to questions of home-making, violence, and belonging, was following the publications that appeared on the Website, as well as the daily discussions on the Forum. Both the publications and the discussions were archived since the Website’s creation in 2001 and throughout my fieldwork that took place in 2003-04. My participant observations of the discussions “in real time” were complemented by archival research, where one would expect to discover an anthropologist’s wildest dreams: the fully-documented everyday life of a community, a word-by-word account of what was said, when, and to whom. Or so I hoped. The “error” messages that appeared when I clicked on some of the links in the archive, or the absence of a thread I knew was there before, raised the question of erasure and deletion, of empty spaces that marked that which used to be, but which had ceased to exist. The “error” messages, in other words, disrupted my cyberethnography through what can be best described as haunting. “Haunting,” writes Avery Gordon in her Ghostly Matters, “describes how that which appears to be not there is often a seething presence, acting on and often meddling with taken-for-granted realities” (8). This essay looks into the seething presence of erasures in online archives. What is the role, I will ask, of online archives in the life of a cybercommunity? How and when are the archives preserved, and by whom? What are the relations between archives, erasure, and home-making in cyberspace? *** Many online communities based on mailing lists, newsgroups, or bulletin boards keep archives of their discussions – archives that at times go on for years. Sometimes they are accessible only to members of lists or communities that created them; other times they are open to all. Archived discussions can act as a form of collective history and as marks of belonging (or exclusion). As the records of everyday conversations remain on the Web, they provide a unique glance into the life of an online collective for a visitor or a newcomer. For those who participated in the discussions browsing through archives can bring nostalgic feelings: memories – pleasurable and/or painful – of times shared with others; memories of themselves in the past. Turning to archived discussions was not an infrequent act in the cybercommunity I studied. While there is no way to establish how many participants looked into how many archives, and how often they did so, there is a clear indicator that the archives were visited and reflected on. For one, old threads were sometimes “revived”: technically, a discussion thread is never closed unless the administrator decides to “freeze” it. If the thread is not “frozen,” anyone can go to an old discussion and post there; a new posting would automatically move an archived thread to the list of “recent”/“currently active” ones. As all the postings have times and dates, the reappearance of threads from months ago among the “recent discussions” indicates the use of archives. In addition to such “revivals,” every now and then someone would open a new discussion thread, posting a link to an old discussion and expressing thoughts about it. Sometimes it was a reflection on the Forum itself, or on the changes that took place there; many veteran participants wrote about the archived discussion in a sentimental fashion, remembering “the old days.” Other times it was a reflection on a participant’s life trajectory: looking at one’s old postings, a person would reflect on how s/he changed and sometimes on how the Website and its bulletin board changed his/her life. Looking at old discussions can be seen as performances of belonging: the repetitive reference to the archives constitutes the Forum as home with a multilayered past one can dwell on. Turning to the archives emphasises the importance of preservation, of keeping cyberwords as an object of collective possession and affective attachment. It links the individual and the collective: looking at old threads one can reflect on “how I used to be” and “how the Forum used to be.” Visiting the archives, then, constitutes the Website as simultaneously a site where belonging is performed, and an object of possession that can belong to a collective (Fortier). But the archives preserved on the Forum were never a complete documentation of the discussions. Many postings were edited immediately after appearance or later. In the first two and a half years of the Website’s existence any registered participant, as long as his/her nickname was not banned from the Forum, could browse through his/her messages and edit them. One day in 2003 one person decided to “commit virtual suicide” (as he and others called it). He went through all the postings and, since there was no option for deleting them all at once, he manually erased them one by one. Many participants were shocked to discover his acts, mourning him as well as the archives he damaged. The threads in which he had once taken part still carried signs of his presence: when participants edit their postings, all they can do is delete the text, leaving an empty space in the thread’s framework (only the administrator can modify the framework of a thread and delete text boxes). But the text box with name and date of each posting is still there. “The old discussions don’t make sense now,” a forum participant lamented, “because parts of the arguments are missing.” Following this “suicide” the Website’s administrator decided that from that point on participants could only edit their last posting but could not make any retrospective changes to the archives. Both the participants’ mourning of the mutilated threads and administrator’s decision suggest that there is a desire to preserve the archives as collective possession belonging to all and not to be tampered with by individuals. But the many conflicts between the administrator and some participants on what could be posted and what should be censored reveal that another form of ownership/ possession was at stake. “The Website is private property and I can do anything I like,” the administrator often wrote in response to those who questioned his erasure of other people’s postings, or his own rude and aggressive behaviour towards participants. Thus he broke the very rules of netiquette he had established – the Website’s terms of use prohibit personal attacks and aggressive language. Possession-as-belonging here was figured as simultaneously subjected to a collective “code of practice” and as arbitrary, dependant on one person’s changes of mind. Those who were particularly active in challenging the administrator (for example, by stating that although the Website is indeed privately owned, the interactions on the Forum belong to all; or by pointing out to the administrator that he was contradicting his own rules) were banned from the site or threatened with exclusion, and the threads where the banning was announced were sometimes deleted. Following the Forum’s rules, the administrator was censoring messages of an offensive nature, for example, commercial advertisements or links to pornographic Websites, as well as some personal attacks between participants. But among the threads doomed for erasure were also postings of a political nature, in particular those expressing radical left-wing views and opposing the tone of political loyalty dominating the site (while attacks on those participants who expressed the radical views were tolerated and even encouraged by the administrator). *** The archives that remain on the site, then, are not a full documentation of everyday narratives and conversations but the result of selection and regulation of both individual participants and – predominantly – the administrator. These archives are caught between several contradictory approaches to the Forum. One is embedded within the capitalist notion of payment as conferring ownership: I paid for the domain, says the administrator, therefore I own everything that takes place there. Another, manifested in the possibility of editing one’s postings, views cyberspeech as belonging first and foremost to the speaker who can modify and erase them as s/he pleases. The third defines the discussions that take place on the Forum as collective property that cannot be ruled by a single individual, precisely because it is the result of collective interaction. But while the second and the third approaches are shared by most participants, it is the idea of private ownership that seemed to dominate and facilitate most of the erasures. Erasure and modification performed by the administrator were not limited to censorship of particular topics, postings, or threads. The archive of the Forum as a whole was occasionally “cleared.” According to the administrator, the limited space on the site required “clearance” of the oldest threads to make room for new ones. Decisions about such clearances were not shared with anyone, nor were the participants notified about it in advance. One day parts of the archive simply disappeared, as I discovered during my fieldwork. When I began daily observations on the Website in December 2003, I looked at the archives page and saw that the General Forum section of the Forum went back for about a year and a half, and the Lesbian Forum section for about a year. I then decided to follow the discussions as they emerged and unfolded for 5-6 months, saving only the most interesting threads in my field diary, and to download all the archived threads later, for future detailed analysis. But to my great surprise, in May 2004 I discovered that while the General Forum still dated back to September 2002, the oldest thread on the Lesbian Forum was dated December 2003! All earlier threads were removed without any notice to Forum participants; and, as I learned later, no record of the threads was kept on- or offline. These examples of erasure and “clearance” demonstrate the complexity of ownership on the site: a mixture of legal and capitalist power intertwined with social hierarchies that determine which discussions and whose words are (more) valuable (The administrator has noted repeatedly that the discussions on the Lesbian Forum are “just chatter.” Ironically, both the differences in style between the General Forum and the Lesbian Forum and the administrator’s account of them resemble the (stereo)typical heterosexual gendering of talk). And while the effects and the results of erasure are compound, they undoubtly point to the complexity – and fragility! – of “home” in cyberspace and to the constant presence of violence in its constitution. During my fieldwork I felt the strange disparity between the narratives of the Website as a homey space (expressed both in the site’s official description and in some participants’ account of their experiences), and the frequent acts of erasure – not only of particular participants but more broadly of large parts of its archives. All too often, the neat picture of the “community archive” where one can nostalgically dwell on the collective past was disrupted by the “error” message. Error: no such entry. The thread specified does not exist. It was not only the incompleteness of archives that indicated fights and erasures. As I gradually learned throughout my fieldwork, the history of the Website itself was based on internal conflicts, omitted contributions, and constantly modified stories of origins. For example, the story of the Website’s establishment, as it was published in the About Us section of the site and reprinted in celebratory texts of the first anniversaries, presents the site as created by “three fathers.” The three were F, the administrator, M. who wrote, edited, and translated most of the material, and the third person whose name was never mentioned. When I asked about him on the site and later in interviews with both M. and F., they repeatedly and steadily ignored the question, and changed the subject of conversation. But the third “father” was not the only one whose name was omitted. In fact, the original Website was created by three women and another man. M. and F. joined later, and soon afterwards F., who had acted as the administrator during my fieldwork, took over the material and moved the site to another domain. Not only were the original creators erased from the site’s history; they were gradually ostracised from the new Website. When I interviewed two of the women, I mentioned the narrative of the site as a “child of three fathers.” “More like an adopted child,” chuckled one of them with bitterness, and told me the story of the original Website. Moved by their memories, the two took me to the computer. They went to the Internet Archive’s “WayBack Machine” Website – a mega-archive of sorts, an online server that keeps traces of old Web pages. One of the women managed to recover several pages of the old Website; sad and nostalgic, she shared with me the few precious traces of what was once her and her friends’ creation. But those, too, were haunted pages – most of the hyperlinks there generated “error” messages instead of actual articles or discussion threads. Error: no such entry. The thread specified does not exist. After a few years of working closely together on their “child,” M. and F. drifted apart, too. The hostility between the two intensified. Old materials (mostly written, translated, or edited by M. over a 3 year period) were moved into an archive by F. the administrator. They were made accessible through a small link hidden at the bottom of the homepage. One day they disappeared completely. Shortly afterwards, in September 2006, the Website celebrated its fifth anniversary. For this occasion the administrator wrote “the history of the Website,” where he presented it as his enterprise, noting in passing two other contributors whose involvement was short and marginal. Their names were not mentioned, but the two were described in a defaming and scornful way. *** So where do the “error” messages take us? What do they tell us about homes and communities in cyberspace? In her elaboration on cybercommunities, Radhika Gajjala notes that: Cyberspace provides a very apt site for the production of shifting yet fetishised frozen homes (shifting as more and more people get online and participate, frozen as their narratives remain on Websites and list archives through time in a timeless floating fashion) (“Interrupted”, 178). Gajjala’s notion of shifting yet fetishised and frozen homes is a useful term for capturing the nature of communication on the Forum throughout the 5 years of its existence. It was indeed a shifting home: many people came and participated, leaving parts of themselves in the archives; others were expelled and banned, leaving empty spaces and traces of erasure in the form of “error” messages. The presence of those erased or “cleared” was no longer registered in words – an ultimate sign of existence in the text-based online communication. And yet, they were there as ghosts, living through the traces left behind and the “seething presence” of haunting (Gordon 8). The Forum was a fetishised home, too, as the negotiation of ownership and the use of old threads demonstrate. However, Gajjala’s vision of archives suggests their wholeness, as if every word and every discussion is “frozen” in its entirety. The idea of fetishised homes does gesture to the complex and complicated reading of the archives; but what is left unproblematic are the archives themselves. Being attentive to the troubled, incomplete, and haunted archives invites a more careful and critical reading of cyberhomes – as Gajjala herself demonstrates in her discussion of online silences – and of the interrelation of violence and belonging in it (CyberSelves 2, 5). Constituted in cyberspace, the archives are embedded in the particular nature of online sociality, with its fantasy of timeless and floating traces, as well as with its brutality of deletion. Cyberwords do remain on archives and servers, sometimes for years; they can become ghosts of people who died or of collectives that no longer exist. But these ghosts, in turn, are haunted by the words and Webpages that never made it into the archives – words that were said but then deleted. And of course, cyberwords as fetishised and frozen homes are also haunted by what was never said in the first place, by silences that are as constitutive of homes as the words. References Fortier, Anne-Marie. “Community, Belonging and Intimate Ethnicity.” Modern Italy 1.1 (2006): 63-77. Gajjala, Radhika. “An Interrupted Postcolonial/Feminist Cyberethnography: Complicity and Resistance in the ‘Cyberfield’.” Feminist Media Studies 2.2 (2002): 177-193. Gajjala, Radhika. Cyber Selves: Feminist Ethnographies of South-Asian Women. Oxford: Alta Mira Press, 2004. Gordon, Avery. Ghostly Matters: Haunting and the Sociological Imagination. Minneapolis and London: U of Minneapolis P, 1997. Citation reference for this article MLA Style Kuntsman, Adi. "“Error: No Such Entry”: Haunted Ethnographies of Online Archives." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0711/05-kuntsman.php>. APA Style Kuntsman, A. (Oct. 2007) "“Error: No Such Entry”: Haunted Ethnographies of Online Archives," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0711/05-kuntsman.php>.
Style APA, Harvard, Vancouver, ISO itp.
48

Farmanbar, Mina, i Per Kolstrup. "Publishing with Open Journal Systems (OJS): the engaged university and library support at the University of Stavanger". Septentrio Conference Series, nr 4 (22.09.2020). http://dx.doi.org/10.7557/5.5604.

Pełny tekst źródła
Streszczenie:
Increasing the role of libraries in academic journal publishing activities and journal hosting has become an important subject in the library world in the past few years. The purpose of this study is to present the role of the libraries at University of Stavanger (UiS) in the context of library-as-publisher. Within this category, open access (OA) journal publishing has been a popular service offered by libraries, rapidly attracting researchers' attention. The University Libraries at University of Stavanger (UiS) have a long history of promoting and supporting open access initiatives. The Libraries have established and continue to build, host and maintain an operative open access institutional repository (UiS Brage) for scientific works in full text. From 2018, UiS libraries started using a journal management system to facilitate the open access scholarly publishing and therefore support transferring and updating of established the existing journals and the lunching of new ones. The Open Journal Systems (OJS) from Public Knowledge Project (PKP) is used which is the most common journal management system being discussed frequently in literature. Currently, the UiS Libraries repository host four active open access journals, with some others under development. All these journals reside within the same OJS implementation with the same design and layout on top, however, at the individual journal level there are also options for some customization. UiS libraries initially support all the steps of the journal creation and development process but train the editors and the subsequent users to engage in some part of the process. The library IT-Engineer and Information Technology Department (IT) manage OJS server, maintain the OJS database and software, and performs the layout and design customization and development and initial technical configuration for the new journals. From the viewpoint of IT, there is a need for several technical skills such as web design skills to customize the style sheets and web layout, graphic design skills to produce banners, logos and cover pages whereas the editorial workflow process may require skills on copy-editing and proofreading of articles. OJS is a template-based platform but when it comes to front-end design, it has its limitation. There are certain limitations which make it difficult to get to the details of the article. For instance, when an article comes with a long abstract or number of references, the web-page becomes unfriendly. Another challenge is when PKP launches a new OJS update. Some features cannot be migrated, and you may lose them. Furthermore, users may find it hard to adapt to the new version. The biggest challenge to the OJS is the learning curve. There are some faculty members who have had some frustrations with the software. While it is a free and open source platform, the time, technical skills and programming abilities are still associated with the costs. In this poster we provide you with the challenges and lessons learned so far by the libraries at Stavanger University.
Style APA, Harvard, Vancouver, ISO itp.
49

Singley, Blake. "A Cookbook of Her Own". M/C Journal 16, nr 3 (22.06.2013). http://dx.doi.org/10.5204/mcj.639.

Pełny tekst źródła
Streszczenie:
Introduction The recipe is more than just a list of ingredients and the instructions on how to prepare a particular dish. Recipes also are, as Janet Floyd and Laurel Foster argue, a form of narrative that tells a myriad of stories, “of family sagas and community, of historical and cultural moments and also of personal histories and narratives of self” (Floyd and Forster 2). Among the most intimate and personal sources of recipes are manuscript cookbooks. These typically contained original handwritten recipes created by the author as well as those shared by family and friends; some recipes were copied from published cookbooks or clipped out of newspapers and magazines. However, these books are more than a mere collection of recipes and domestic instructions, they also paint a unique and vivid picture of the life of their authors. These manuscript cookbooks were a common sight in many Australian colonial kitchens, yet they are a rarely examined and rich archival source that provides a valuable insight into foodways, material culture, and the lives and social relationships of the women who created them. This article will examine the manuscript cookbook created by Phillis Clark in the Darling Downs during the 1860s. Through a close examination of Clark’s manuscript cookbook, this article will explore colonial domestic habits and the cultural context in which they were formed. It will also highlight the historical value of manuscript cookbooks as social texts that chronicle daily life, both inside and outside the kitchen, in colonial Australia. A Colonial Woman Phillis Clark was born in Tasmania in 1836. She was the daughter of Charles Seal, the pioneer of the whaling industry in that state. In 1858 she married Charles George Clark, the eldest son of a well-known Tasmanian family. Both the Seal and Clark families were at the centre of social and political life in Tasmania. In 1861, the couple moved to Talgai, twenty two kilometres north-west of Warwick in the Darling Downs region of Queensland. Here, Charles Clark established himself as a storekeeper and became a partner in the Ellinthorp Steam Flour Mills, the first successful flour mill in Queensland (Waterson 3). He also represented Warwick in the Queensland Legislative assembly between 1871 and 1873. Clark’s brother, George Clark, also settled in the area together with his wife and family. In 1868, both families set up home in adjoining properties known as East Talgai and West Talgai. This joint property, with its well manicured gardens, English trees, and fruit orchard, has been described as a small oasis “in an empty, brown and dusty summer landscape” (Waterson, Squatter 19). The Manuscript Sometime during this period Clark began to compile her very own manuscript cookbook. The front of Clark’s manuscript is dated 1866, yet there is ample evidence to suggest that she began work on this manuscript some years earlier. Clark was scrupulous in acknowledging the sources of her recipes, a habit common to many manuscript cookbook authors (Newlyn 35). She also initialled her own creations, firstly with P.S., for her maiden name Phillis Seal, and later P.S.C. for Phillis Seal Clark, her married name. By 1866 Clarke had been married for eight years so it can be assumed that she commenced her manuscript some time before 1858. A number of the recipes that appear in the manuscript appear to be credited to people living in Tasmania. Furthermore, a number of the newspaper clippings found in her manuscript can be dated to before 1866, including one for 1861. The manuscript itself is a hard bound and lined notebook, sturdy enough to withstand the rigours of daily use in the kitchen. The majority of recipes are handwritten but there are also a number of recipes clipped from newspapers interspaced within the manuscript. The handwritten recipes are in a neat copperplate style and all appear to be written in the same hand. The recipes are not found in distinct sections, although there are some small clusters of particular types of recipes, highlighting the fact that they were added to the manuscript over a period of time. At the front of the manuscript there is a detailed index noting the page number on which each recipe is to be found. The recipes themselves follow the standard conventions of the period. The Sources The sources from which Clark gathered some of the recipes in her manuscript indicate the variety of texts that were available to her. There are a number of newspaper clippings pasted in the pages of her manuscript for a range of both recipes for foods as well as the so-called domestic remedies (medicines) and receipts for household products. Amongst the food recipes there are to be found instructions in the making of cream cheese in the Irish manner and a recipe for stewed shoulder of mutton as well as two different methods for preparing kangaroo. While it is impossible to fully know what newspapers all these clippings have been taken from, at least one of them came from the Darling Downs Gazette and General Advertiser and it is likely that some of them might also have come from a number of the local Warwick papers (one which was founded by her brother-in-law George Clark) that were in publication during Clark’s residence in the area. Clark also utilised a number of published cookbooks as sources for some of the recipes in her own manuscripts. Like most Australians until the last few decades of the nineteenth century, Clark would have mainly resorted to the British cookbooks that were available. The two most commonly acknowledged cookbooks in her manuscript were Enquire Within Upon Everything and Eliza Acton’s. Enquire Within Upon Everything was an immensely popular general household guide amassing eighty-nine editions in a little over forty years in print. It contained information on a plethora of subjects (over three thousand individual entries) including such topics as etiquette, first aid, domestic hints, and recipes. It first appeared on the British market in 1856, under the editorship of Robert Kemp Philp, and became available in Australia in the same year. Booksellers in the Darling Downs advertised copies of the book for the price of three shillings and six pence. Eliza Acton, for her part, was one of Britain’s leading cookbook authors. Her books were widely available throughout the colonies with copies advertised for sale by J. Walch and Sons booksellers in Hobart (‘Advertising’ 1). Extracts from her cookbook Modern Cookery for Private Families began to appear in Australian newspapers only months after it first was published in Britain in 1845 (‘Bullion’ 4). Although Modern Cookery did not provide any recipes directly catering for Australian conditions, its simple and straightforward approach to cookery made it an invaluable resource in the colonial kitchen. Such was the popularity and reputation of Acton’s work that in the preface to Australia’s first cookbook, The English and Australian Cookery Book, the author, Tasmanian born Edward Abbott, stated that he hoped that his cook book would posses “all the advantages of Mrs. Acton’s work” (Abbott vi). The range of printed sources contained within Clark’s manuscript indicate that women in colonial households were far from isolated from the culinary trends occurring in other parts of Australia and the wider British empire. The Recipes Like many Australian women of her class and generation, Phillis Clark reproduced the predominant British food culture in her kitchen. The great majority of recipes contained in her manuscript are for typically English dishes, particularly those for sweet dishes such as biscuits, cakes, and puddings. Plum pudding, trifle, and custard pudding are all featured in her book. As well, many of the savoury dishes such as curry, roast beef, and Yorkshire pudding similarly reflect the British palate. In There is No Taste like Home: The Food of Empire, Adele Wessell argues that the maintenance of British food habits in Australia was a device to reaffirm “cultural and historical bonds and sustain a shared sense of British identity” (811). However, as in many other rural kitchens, native ingredients also found a place. Her manuscript included a number of recipes for the preparation of kangaroo and detailed instructions for the butchering of the animal. Clark’s recipe for “Jugged Hare or Kangaroo” bares a close resemblance to the one that appears in Edward Abbott’s cookbook. Clark’s father and Abbott were from the same, small social milieu in colonial Hobart and were both active in the same political causes. This raises the intriguing possibility that Phillis also knew Abbott and came into contact with some of his culinary ideas. Australians consumed all manners of native ingredients, not only as a matter of necessity but also as a matter of choice. The inclusion of freshly killed native game in Clark’s kitchen would have served to alleviate the monotony of the salted beef and mutton that were common staples during this period. The distinct Australian flavour that began to appear in manuscript cookbooks like Clark’s would later be replicated in their printed counterparts. Australian cookbooks published in the last decades of the nineteenth century demonstrate the importance of native ingredients in colonial kitchens (Singley 37). The Darling Downs region had been a popular destination for German migrants from the 1850s and Clark’s manuscript contained a number of recipes for German dishes. This included one for the traditional German Christmas cake Lebkuchen as well as for various German puddings and biscuits. Clark also included an elaborate recipe for making ham or bacon in the traditional Westphalian fashion. This was a laborious process that involved vigorously rubbing salt, sugar, and beer into the leg of ham every day for a fortnight after which it is then hung to dry for a couple of days and then smoked. Katie Hume, a fellow Darling Downs resident and a close friend of the extended Clark family described feeling like a “gute verstandige Hausfrau” (a good sensible housewife) after salting 112 pounds of pork she had purchased from a neighbour (152). While, unlike their counterparts in the Barossa valley in South Australia, the Germans who lived in the Darling Downs area did not leave a significant mark on the local culinary landscape, the inclusion of German recipes in Clark’s manuscript indicates that there was not only some cross-cultural transmission of culinary knowledge, but also some willingness to go beyond traditional British fare. Many, more mundane recipes also populate Clark’s manuscript. “Toad in a Hole”, “Mutton Pie” and “Stewed Sirloin” all merit an entry. Yet, even with such simple dishes, Clark demonstrated a keen eye for detail. This is attested by her method for the preparation of a simple dish of roasted pumpkin: “Cut into slices 1 inch thick and about 5 inches long, have ready a baking dish with boiling fat—lay the slices in it so that the fat will cover them and bake for 20 minutes (by fat I mean good dripping) Half an hour will not bake them too much. They ought to be brown” (Clark 13). Whilst Clark’s manuscript is not indicative of the foodways of all classes across Queensland society, it does provide some insight as to what was consumed at the table of a well-heeled rural household. As the wife of a prominent businessman and a local dignitary, Phillis Clark would have also undoubtedly been called upon to play the role of hostess and to entertain her husband’s commercial and political acquaintances. Her manuscript also reflects the overwhelmingly British nature of colonial Australian foodways despite the intrusion of some foreign dishes. As Anne Murcott argues, the preparation and consumption of food provides a way through which individuals can express the more abstract significance of cultural values and social systems (204). The Clark household also showed some interest in producing a broad range of products in the home. There are, for example, a number of recipes for beverages including those for non-alcoholic ginger beers and flavoured cordials. They were also far from abstemious, with recipes for wine, mead, and ale included in the manuscript. This last recipe was given to her by her brother Alfred who, according to Clark, “understands brewing and therefore I think it can be depended upon” (Clark 43). Clark also bottled her own fruit, made a wide range of jams, including grape and mock melon, as well as making her own butter, confectionery, and vinegar. The production of goods like these within the home indicates the level of self-reliance in many colonial households, particularly those finding themselves far from the convenience of shops and markets. Many culinary historians argue that there exists a significant time lag between the initial appearance and consumption of a particular dish in a society and its subsequent appearance in the pages of a cookbook. This time lag can be between forty and 150 years long (Mennell 44; Mason 23). However, manuscript cookbooks reflect the immediacy of eating practices. The very personal nature of manuscript cookbooks would suggest that the recipes included within their pages were ones that the author intended to use in her own kitchen. Moreover, from the reciprocal nature of recipe sharing that is evident from these types of cookbooks it can be concluded that the recipes in Clark’s manuscript were ones that, at least in her own social milieu, were in common usage. In her manuscript Clark clearly noted those recipes which she especially liked or otherwise found useful. Many recipes throughout the manuscript have been marked as “proved” indicating that Clark had used and tested them at some stage. A number of them have also been favourably annotated as being “delicious”, “very nice”, “the best”, and “very good”. Amongst the number of recipes for “Soda Cake” that feature in the manuscript Clarke clearly indicates that “Number 1 is the best”. However, she was not averse to commenting on recipes and altering them to suit her taste. In a recipe for “A nice light Cake”, for example, Clark noted that the addition of a “little peel and currants is an improvement” (89). This form of marginal intrusion was a common practice amongst many women and it can even be seen in the margins of many published cookbooks (Theophano 186). These annotations, according to Sandra Sherman, are not transgressive, since the manuscripts are not authored “by” anyone (Sherman 121). In fact, annotations personalise the recipe and confirm the compiler’s confidence in it (Sherman 121). Not Just Food: ‘Domestic Receipts’ As noted above, Clark’s manuscript contained more than just recipes for food and drink. Many of them are “Domestic Receipts” that reflect the complex nature of running a household in rural Australia. Some of Clark’s domestic receipts are in the form of newspaper clippings and are general instructions for the manufacture of simple household products such as a “ready to use glue” and a home-made tooth powder. Others are handwritten and copied from other domestic advice books or were given to Clark by family and friends. A recipe for manufacturing “blacking for stoves”, essential in the maintenance of cast iron stoves, was, for example, culled from Enquire Within Upon Everything. Here, with some authorial intrusion, Clark includes her own list of measured ingredients to prepare the mixture. An intriguing method for the “artificial preparation of ice” involving the use of ammonium nitrate and bicarbonate of soda was given to Clark by Mrs. McKeachie, the wife of Charles Clark’s business partner. Clark also showed an interest in beekeeping and in raising turkeys, with instructions for both these tasks included in her manuscript. The wide range of miscellaneous receipts featured in Clark’s book highlights the breadth of activities that were carried out in many homes in rural Australia. A hint of Clark’s artistic side is also in evidence, with detailed instructions on how to create delicate fern impressions on paper also included in her book. As with many other women in colonial Australia, Clark was expected to take on the role of caregiver when members of her family fell ill or were injured. Her manuscript included a number of recipes for “domestic remedies”, another common trope in books of this kind as well as in their printed counterparts. These remedies included recipes for a cough mixture composed of linseed, liquorice, and water and a liniment to treat rheumatism which was made by mixing rape seed oil and turpentine with a hefty dose of laudanum. Clark used olive oil in a number of medical recipes to treat burns and scalds. As well, treatments for diphtheria, cholera, and diarrhoea feature prominently in her manuscript. The Darling Downs had been subject to a number of outbreaks of dysentery and cholera during Clark’s residency in the area (Waterson, Squatter 71). For “a pain in the chest” Clark recommended the following: “a piece of brown paper spread with tallow and placed on the chest” (69).The inclusion of these domestic remedies and Clark’s obvious concerns for her family’s health is particularly poignant given her personal history. Her family was plagued by misfortune and illness and she lost three of her ten children in a six-year period including two within just months of each other. Clark herself would die during childbirth in 1874. Sharing and Caring The word “recipe” has its origins in the Latin recipere meaning to “receive”. In order to receive there has to be, by implication, someone doing the giving. A recipe signifies an exchange and a connection between individuals. The sharing of recipes was a common activity for many women in nineteenth century Australia. Wilhelmina Rawson, Queensland’s first published cookbook author, was keenly aware of the manner in which women shared recipes and culinary knowledge. This act of reciprocity, she argued, not only helped to ease the isolation of bush living but also allowed each individual to be “benefited by the cleverness of the whole number” (14). For many, food often has a deeply private and personal component, being prepared and consumed within the realm of the home. However, food is also a communal experience and is openly shared through rituals, feasts, the contexts in which it is bought and sold, and, most importantly, reciprocal exchange. In her manuscript, Clark acknowledged a number of different individuals as the source for the recipes she included within its pages. The convention of acknowledging the sources of recipes in manuscript cookbooks functions as a way to assert the recipe’s authority and to ensure that they are proven (Sherman 122). This act of acknowledgement also locates Clark within a social network of women who not only shared recipes but also, one can imagine, many of the vicissitudes of domestic life in a remote rural setting. In her study of women’s manuscript cookbooks, entitled Eat My Words: Reading Women’s Lives Through the Cookbooks They Wrote, Janet Theophano describes these texts as “the maps of the social and cultural life they inhabited” (13). This circulation of recipes allowed women to share their knowledge, skills, and creativity. Those who received and used these recipes not only engaged in a conversation with the writer of these recipes but also formed a connection with a broader community that allowed them to learn more about themselves and the world. Conclusion The manuscript cookbook created by Phillis Clark is a fascinating prism through which to explore domestic life in colonial Australia. The recipes contained in Clark’s manuscript reflect the eating habits of her own family and those of a particular social class in Queensland. They not only demonstrate the tenacity of British foodways in Australia but also show the degree of culinary adventurism that existed in some homes. The personal, almost autobiographical nature of manuscript cookbooks also provides an intimate view in the life of its creator. In the splattered pages of Phillis Clark’s book we can read the many travails, joys, and tragedies of her life. References Abbott, Edward. The English and Australian Cookery Book: Cookery for the Many, as Well as for the Upper Ten Thousand. London: Sampson Low, Son, and Marston, 1864. ‘Advertising’. Launceston Examiner 9 Mar. 1858: 1. ‘Boullion, The Common Soup of France’. The Sydney Morning Herald 22 Aug. 1845: 4. Clark, Phillis. “Manuscript Cookbook”. 1863 Floyd, Janet, and Laurel Forster. “The Recipe in Its Cultural Content.” The Recipe Reader: Narratives, Contexts, Traditions. Ed. Janet Floyd and Laurel Forster. Aldershot, Hants, England: Ashgate. 2003. Hume, Anna Kate. Katie Hume on the Darling Downs, a Colonial Marriage: Letters of a Colonial Lady, 1866-1871. Ed. Nancy Bonnin. Toowoomba: DDIP, 1985. Mason, Laura. Food Culture in Great Britain. Greenwood, 2004. Mennell, Stephen. All Manners of Food: Eating and Taste in England and France from the Middle Ages to the Present. Oxford, UK: B. Blackwell, 1985. Murcott, Anne. “The Cultural Significance of Food and Eating”. Proceedings of the Nutrition Society 41.02 (1982): 203–10. Newlyn, Andrea K. “Redefining ‘Rudimentary’ Narrative: Women’s Nineteenth Century Manuscript Cookbooks”. The Recipe Reader: Narratives, Contexts, Traditions. Ed. Janet Floyd and Laurel Forster. Aldershot, Hants, England: Ashgate, 2003. Rawson, Wilhelmina. Australian Enquiry Book of Household and General Information: A Practical Guide for the Cottage, Villa and Bush Home. Melbourne: Pater and Knapton, 1894. Sherman, S. “‘The Whole Art and Mystery of Cooking’: What Cookbooks Taught Readers in the Eighteenth Century”. Eighteenth-Century Life 28.1 (2004): 115–35. Singley, Blake. “‘Hardly Anything Fit for Man to Eat’: Food and Colonialism in Australia.” History Australia 9.3 (2012): 27–42. Theophano, Janet. Eat My Words: Reading Women’s Lives Through the Cookbooks They Wrote. New York, N.Y: Palgrave, 2002. Waterson, D. B. “A Darling Downs Quartet”. Queensland Heritage 1.7 (1967): 3–14. Waterson, D. B. Squatter, Selector and Storekeeper: A History of the Darling Downs, 1859-93. Sydney: Sydney UP, 1968. Wessell, Adele. “There’s No Taste Like Home: The Food of Empire”. Exploring the British World: Identity, Cultural Production, Institutions. Ed. Kate Darian-Smith and Patricia Grimshaw. Melbourne: RMIT, 2004.
Style APA, Harvard, Vancouver, ISO itp.
50

Wark, McKenzie. "Toywars". M/C Journal 6, nr 3 (1.06.2003). http://dx.doi.org/10.5204/mcj.2179.

Pełny tekst źródła
Streszczenie:
I first came across etoy in Linz, Austria in 1995. They turned up at Ars Electronica with their shaved heads, in their matching orange bomber jackets. They were not invited. The next year they would not have to crash the party. In 1996 they were awarded Arts Electronica’s prestigious Golden Nica for web art, and were on their way to fame and bitterness – the just rewards for their art of self-regard. As founding member Agent.ZAI says: “All of us were extremely greedy – for excitement, for drugs, for success.” (Wishart & Boschler: 16) The etoy story starts on the fringes of the squatters’ movement in Zurich. Disenchanted with the hard left rhetorics that permeate the movement in the 1980s, a small group look for another way of existing within a commodified world, without the fantasy of an ‘outside’ from which to critique it. What Antonio Negri and friends call the ‘real subsumption’ of life under the rule of commodification is something etoy grasps intuitively. The group would draw on a number of sources: David Bowie, the Sex Pistols, the Manchester rave scene, European Amiga art, rumors of the historic avant gardes from Dada to Fluxus. They came together in 1994, at a meeting in the Swiss resort town of Weggis on Lake Lucerne. While the staging of the founding meeting looks like a rerun of the origins of the Situationist International, the wording of the invitation might suggest the founding of a pop music boy band: “fun, money and the new world?” One of the – many – stories about the origins of the name Dada has it being chosen at random from a bilingual dictionary. The name etoy, in an update on that procedure, was spat out by a computer program designed to make four letter words at random. Ironically, both Dada and etoy, so casually chosen, would inspire furious struggles over the ownership of these chancey 4-bit words. The group decided to make money by servicing the growing rave scene. Being based in Vienna and Zurich, the group needed a way to communicate, and chose to use the internet. This was a far from obvious thing to do in 1994. Connections were slow and unreliable. Sometimes it was easier to tape a hard drive full of clubland graphics to the underside of a seat on the express train from Zurich to Vienna and simply email instructions to meet the train and retrieve it. The web was a primitive instrument in 1995 when etoy built its first website. They launched it with a party called etoy.FASTLANE, an optimistic title when the web was anything but. Coco, a transsexual model and tabloid sensation, sang a Japanese song while suspended in the air. She brought media interest, and was anointed etoy’s lifestyle angel. As Wishart and Bochsler write, “it was as if the Seven Dwarfs had discovered their Snow White.” (Wishart & Boschler: 33) The launch didn’t lead to much in the way of a music deal or television exposure. The old media were not so keen to validate the etoy dream of lifting themselves into fame and fortune by their bootstraps. And so etoy decided to be stars of the new media. The slogan was suitably revised: “etoy: the pop star is the pilot is the coder is the designer is the architect is the manager is the system is etoy.” (Wishart & Boschler: 34) The etoy boys were more than net.artists, they were artists of the brand. The brand was achieving a new prominence in the mid-90s. (Klein: 35) This was a time when capitalism was hollowing itself out in the overdeveloped world, shedding parts of its manufacturing base. Control of the circuits of commodification would rest less on the ownership of the means of production and more on maintaining a monopoly on the flows of information. The leading edge of the ruling class was becoming self-consciously vectoral. It controlled the flow of information about what to produce – the details of design, the underlying patents. It controlled the flows of information about what is produced – the brands and logos, the slogans and images. The capitalist class is supplanted by a vectoral class, controlling the commodity circuit through the vectors of information. (Wark) The genius of etoy was to grasp the aesthetic dimension of this new stage of commodification. The etoy boys styled themselves not so much as a parody of corporate branding and management groupthink, but as logical extension of it. They adopted matching uniforms and called themselves agents. In the dada-punk-hiphop tradition, they launched themselves on the world as brand new, self-created, self-named subjects: Agents Zai, Brainhard, Gramazio, Kubli, Esposto, Udatny and Goldstein. The etoy.com website was registered in 1995 with Network Solutions for a $100 fee. The homepage for this etoy.TANKSYSTEM was designed like a flow chart. As Gramazio says: “We wanted to create an environment with surreal content, to build a parallel world and put the content of this world into tanks.” (Wishart & Boschler: 51) One tank was a cybermotel, with Coco the first guest. Another tank showed you your IP number, with a big-brother eye looking on. A supermarket tank offered sunglasses and laughing gas for sale, but which may or may not be delivered. The underground tank included hardcore photos of a sensationalist kind. A picture of the Federal Building in Oklamoma City after the bombing was captioned in deadpan post-situ style “such work needs a lot of training.” (Wishart & Boschler: 52) The etoy agents were by now thoroughly invested in the etoy brand and the constellation of images they had built around it, on their website. Their slogan became “etoy: leaving reality behind.” (Wishart & Boschler: 53) They were not the first artists fascinated by commodification. It was Warhol who said “good art is good business.”(Warhol ) But etoy reversed the equation: good business is good art. And good business, in this vectoral age, is in its most desirable form an essentially conceptual matter of creating a brand at the center of a constellation of signifiers. Late in 1995, etoy held another group meeting, at the Zurich youth center Dynamo. The problem was that while they had build a hardcore website, nobody was visiting it. Agents Gooldstein and Udatny thought that there might be a way of using the new search engines to steer visitors to the site. Zai and Brainhard helped secure a place at the Vienna Academy of Applied Arts where Udatny could use the computer lab to implement this idea. Udatny’s first step was to create a program that would go out and gather email addresses from the web. These addresses would form the lists for the early examples of art-spam that etoy would perpetrate. Udatny’s second idea was a bit more interesting. He worked out how to get the etoy.TANKSYSTEM page listed in search engines. Most search engines ranked pages by the frequency of the search term in the pages it had indexed, so etoy.TANKSYSTEM would contain pages of selected keywords. Porn sites were also discovering this method of creating free publicity. The difference was that etoy chose a very carefully curated list of 350 search terms, including: art, bondage, cyberspace, Doom, Elvis, Fidel, genx, heroin, internet, jungle and Kant. Users of search engines who searched for these terms would find dummy pages listed prominently in their search results that directed them, unsuspectingly, to etoy.com. They called this project Digital Hijack. To give the project a slightly political aura, the pages the user was directed to contained an appeal for the release of convicted hacker Kevin Mitnick. This was the project that won them a Golden Nica statuette at Ars Electronica in 1996, which Gramazio allegedly lost the same night playing roulette. It would also, briefly, require that they explain themselves to the police. Digital Hijack also led to the first splits in the group, under the intense pressure of organizing it on a notionally collective basis, but with the zealous Agent Zai acting as de facto leader. When Udatny was expelled, Zai and Brainhard even repossessed his Toshiba laptop, bought with etoy funds. As Udatny recalls, “It was the lowest point in my life ever. There was nothing left; I could not rely on etoy any more. I did not even have clothes, apart from the etoy uniform.” (Wishart & Boschler: 104) Here the etoy story repeats a common theme from the history of the avant gardes as forms of collective subjectivity. After Digital Hijack, etoy went into a bit of a slump. It’s something of a problem for a group so dependent on recognition from the other of the media, that without a buzz around them, etoy would tend to collapse in on itself like a fading supernova. Zai spend the early part of 1997 working up a series of management documents, in which he appeared as the group’s managing director. Zai employed the current management theory rhetoric of employee ‘empowerment’ while centralizing control. Like any other corporate-Trotskyite, his line was that “We have to get used to reworking the company structure constantly.” (Wishart & Boschler: 132) The plan was for each member of etoy to register the etoy trademark in a different territory, linking identity to information via ownership. As Zai wrote “If another company uses our name in a grand way, I’ll probably shoot myself. And that would not be cool.” (Wishart & Boschler:: 132) As it turned out, another company was interested – the company that would become eToys.com. Zai received an email offering “a reasonable sum” for the etoy.com domain name. Zai was not amused. “Damned Americans, they think they can take our hunting grounds for a handful of glass pearls….”. (Wishart & Boschler: 133) On an invitation from Suzy Meszoly of C3, the etoy boys traveled to Budapest to work on “protected by etoy”, a work exploring internet security. They spent most of their time – and C3’s grant money – producing a glossy corporate brochure. The folder sported a blurb from Bjork: “etoy: immature priests from another world” – which was of course completely fabricated. When Artothek, the official art collection of the Austrian Chancellor, approached etoy wanting to buy work, the group had to confront the problem of how to actually turn their brand into a product. The idea was always that the brand was the product, but this doesn’t quite resolve the question of how to produce the kind of unique artifacts that the art world requires. Certainly the old Conceptual Art strategy of selling ‘documentation’ would not do. The solution was as brilliant as it was simple – to sell etoy shares. The ‘works’ would be ‘share certificates’ – unique objects, whose only value, on the face of it, would be that they referred back to the value of the brand. The inspiration, according to Wishart & Boschsler, was David Bowie, ‘the man who sold the world’, who had announced the first rock and roll bond on the London financial markets, backed by future earnings of his back catalogue and publishing rights. Gramazio would end up presenting Chancellor Viktor Klima with the first ‘shares’ at a press conference. “It was a great start for the project”, he said, “A real hack.” (Wishart & Boschler: 142) For this vectoral age, etoy would create the perfect vectoral art. Zai and Brainhard took off next for Pasadena, where they got the idea of reverse-engineering the online etoy.TANKSYSTEM by building an actual tank in an orange shipping container, which would become etoy.TANK 17. This premiered at the San Francisco gallery Blasthaus in June 1998. Instant stars in the small world of San Francisco art, the group began once again to disintegrate. Brainhard and Esposito resigned. Back in Europe in late 1998, Zai was preparing to graduate from the Vienna Academy of Applied Arts. His final project would recapitulate the life and death of etoy. It would exist from here on only as an online archive, a digital mausoleum. As Kubli says “there was no possibility to earn our living with etoy.” (Wishart & Boschler: 192) Zai emailed eToys.com and asked them if them if they would like to place a banner ad on etoy.com, to redirect any errant web traffic. Lawyers for eToys.com offered etoy $30,000 for the etoy.com domain name, which the remaining members of etoy – Zai, Gramazio, Kubli – refused. The offer went up to $100,000, which they also refused. Through their lawyer Peter Wild they demanded $750,000. In September 1999, while etoy were making a business presentation as their contribution to Ars Electronica, eToys.com lodged a complaint against etoy in the Los Angeles Superior Court. The company hired Bruce Wessel, of the heavyweight LA law firm Irell & Manella, who specialized in trademark, copyright and other intellectual property litigation. The complaint Wessel drafted alleged that etoy had infringed and diluted the eToys trademark, were practicing unfair competition and had committed “intentional interference with prospective economic damage.” (Wishart & Boschler: 199) Wessel demanded an injunction that would oblige etoy to cease using its trademark and take down its etoy.com website. The complaint also sought to prevent etoy from selling shares, and demanded punitive damages. Displaying the aggressive lawyering for which he was so handsomely paid, Wessel invoked the California Unfair Competition Act, which was meant to protect citizens from fraudulent business scams. Meant as a piece of consumer protection legislation, its sweeping scope made it available for inventive suits such as Wessel’s against etoy. Wessel was able to use pretty much everything from the archive etoy built against it. As Wishart and Bochsler write, “The court papers were like a delicately curated catalogue of its practices.” (Wishart & Boschler: 199) And indeed, legal documents in copyright and trademark cases may be the most perfect literature of the vectoral age. The Unfair Competition claim was probably aimed at getting the suit heard in a Californian rather than a Federal court in which intellectual property issues were less frequently litigated. The central aim of the eToys suit was the trademark infringement, but on that head their claims were not all that strong. According to the 1946 Lanham Act, similar trademarks do not infringe upon each other if there they are for different kinds of business or in different geographical areas. The Act also says that the right to own a trademark depends on its use. So while etoy had not registered their trademark and eToys had, etoy were actually up and running before eToys, and could base their trademark claim on this fact. The eToys case rested on a somewhat selective reading of the facts. Wessel claimed that etoy was not using its trademark in the US when eToys was registered in 1997. Wessel did not dispute the fact that etoy existed in Europe prior to that time. He asserted that owning the etoy.com domain name was not sufficient to establish a right to the trademark. If the intention of the suit was to bully etoy into giving in, it had quite the opposite effect. It pissed them off. “They felt again like the teenage punks they had once been”, as Wishart & Bochsler put it. Their art imploded in on itself for lack of attention, but called upon by another, it flourished. Wessel and eToys.com unintentionally triggered a dialectic that worked in quite the opposite way to what they intended. The more pressure they put on etoy, the more valued – and valuable – they felt etoy to be. Conceptual business, like conceptual art, is about nothing but the management of signs within the constraints of given institutional forms of market. That this conflict was about nothing made it a conflict about everything. It was a perfectly vectoral struggle. Zai and Gramazio flew to the US to fire up enthusiasm for their cause. They asked Wolfgang Staehle of The Thing to register the domain toywar.com, as a space for anti-eToys activities at some remove from etoy.com, and as a safe haven should eToys prevail with their injunction in having etoy.com taken down. The etoy defense was handled by Marcia Ballard in New York and Robert Freimuth in Los Angeles. In their defense, they argued that etoy had existed since 1994, had registered its globally accessible domain in 1995, and won an international art prize in 1996. To counter a claim by eToys that they had a prior trademark claim because they had bought a trademark from another company that went back to 1990, Ballard and Freimuth argued that this particular trademark only applied to the importation of toys from the previous owner’s New York base and thus had no relevance. They capped their argument by charging that eToys had not shown that its customers were really confused by the existence of etoy. With Christmas looming, eToys wanted a quick settlement, so they offered Zurich-based etoy lawyer Peter Wild $160,000 in shares and cash for the etoy domain. Kubli was prepared to negotiate, but Zai and Gramazio wanted to gamble – and raise the stakes. As Zai recalls: “We did not want to be just the victims; that would have been cheap. We wanted to be giants too.” (Wishart & Boschler: 207) They refused the offer. The case was heard in November 1999 before Judge Rafeedie in the Federal Court. Freimuth, for etoy, argued that federal Court was the right place for what was essentially a trademark matter. Robert Kleiger, for eToys, countered that it should stay where it was because of the claims under the California Unfair Competition act. Judge Rafeedie took little time in agreeing with the eToys lawyer. Wessel’s strategy paid off and eToys won the first skirmish. The first round of a quite different kind of conflict opened when etoy sent out their first ‘toywar’ mass mailing, drawing the attention of the net.art, activism and theory crowd to these events. This drew a report from Felix Stalder in Telepolis: “Fences are going up everywhere, molding what once seemed infinite space into an overcrowded and tightly controlled strip mall.” (Stalder ) The positive feedback from the net only emboldened etoy. For the Los Angeles court, lawyers for etoy filed papers arguing that the sale of ‘shares’ in etoy was not really a stock offering. “The etoy.com website is not about commerce per se, it is about artist and social protest”, they argued. (Wishart & Boschler: 209) They were obliged, in other words, to assert a difference that the art itself had intended to blur in order to escape eToy’s claims under the Unfair Competition Act. Moreover, etoy argued that there was no evidence of a victim. Nobody was claiming to have been fooled by etoy into buying something under false pretences. Ironically enough, art would turn out in hindsight to be a more straightforward transaction here, involving less simulation or dissimulation, than investing in a dot.com. Perhaps we have reached the age when art makes more, not less, claim than business to the rhetorical figure of ‘reality’. Having defended what appeared to be the vulnerable point under the Unfair Competition law, etoy went on the attack. It was the failure of eToys to do a proper search for other trademarks that created the problem in the first place. Meanwhile, in Federal Court, lawyers for etoy launched a counter-suit that reversed the claims against them made by eToys on the trademark question. While the suits and counter suits flew, eToys.com upped their offer to settle to a package of cash and shares worth $400,000. This rather puzzled the etoy lawyers. Those choosing to sue don’t usually try at the same time to settle. Lawyer Peter Wild advised his clients to take the money, but the parallel tactics of eToys.com only encouraged them to dig in their heels. “We felt that this was a tremendous final project for etoy”, says Gramazio. As Zai says, “eToys was our ideal enemy – we were its worst enemy.” (Wishart & Boschler: 210) Zai reported the offer to the net in another mass mail. Most people advised them to take the money, including Doug Rushkoff and Heath Bunting. Paul Garrin counseled fighting on. The etoy agents offered to settle for $750,000. The case came to court in late November 1999 before Judge Shook. The Judge accepted the plausibility of the eToys version of the facts on the trademark issue, which included the purchase of a registered trademark from another company that went back to 1990. He issued an injunction on their behalf, and added in his statement that he was worried about “the great danger of children being exposed to profane and hardcore pornographic issues on the computer.” (Wishart & Boschler: 222) The injunction was all eToys needed to get Network Solutions to shut down the etoy.com domain. Zai sent out a press release in early December, which percolated through Slashdot, rhizome, nettime (Staehle) and many other networks, and catalyzed the net community into action. A debate of sorts started on investor websites such as fool.com. The eToys stock price started to slide, and etoy ‘warriors’ felt free to take the credit for it. The story made the New York Times on 9th December, Washington Post on the 10th, Wired News on the 11th. Network Solutions finally removed the etoy.com domain on the 10th December. Zai responded with a press release: “this is robbery of digital territory, American imperialism, corporate destruction and bulldozing in the way of the 19th century.” (Wishart & Boschler: 237) RTMark set up a campaign fund for toywar, managed by Survival Research Laboratories’ Mark Pauline. The RTMark press release promised a “new internet ‘game’ designed to destroy eToys.com.” (Wishart & Boschler: 239) The RTMark press release grabbed the attention of the Associated Press newswire. The eToys.com share price actually rose on December 13th. Goldman Sachs’ e-commerce analyst Anthony Noto argued that the previous declines in the Etoys share price made it a good buy. Goldman Sachs was the lead underwriter of the eToys IPO. Noto’s writings may have been nothing more than the usual ‘IPOetry’ of the time, but the crash of the internet bubble was some months away yet. The RTMark campaign was called ‘The Twelve Days of Christmas’. It used the Floodnet technique that Ricardo Dominguez used in support of the Zapatistas. As Dominguez said, “this hysterical power-play perfectly demonstrates the intensions of the new net elite; to turn the World Wide Web into their own private home-shopping network.” (Wishart & Boschler: 242) The Floodnet attack may have slowed the eToys.com server down a bit, but it was robust and didn’t crash. Ironically, it ran on open source software. Dominguez claims that the ‘Twelve Days’ campaign, which relied on individuals manually launching Floodnet from their own computers, was not designed to destroy the eToys site, but to make a protest felt. “We had a single-bullet script that could have taken down eToys – a tactical nuke, if you will. But we felt this script did not represent the presence of a global group of people gathered to bear witness to a wrong.” (Wishart & Boschler: 245) While the eToys engineers did what they could to keep the site going, eToys also approached universities and businesses whose systems were being used to host Floodnet attacks. The Thing, which hosted Dominguez’s eToys Floodnet site was taken offline by The Thing’s ISP, Verio. After taking down the Floodnet scripts, The Thing was back up, restoring service to the 200 odd websites that The Thing hosted besides the offending Floodnet site. About 200 people gathered on December 20th at a demonstration against eToys outside the Museum of Modern Art. Among the crowd were Santas bearing signs that said ‘Coal for eToys’. The rally, inside the Museum, was led by the Reverend Billy of the Church of Stop Shopping: “We are drowning in a sea of identical details”, he said. (Wishart & Boschler: 249-250) Meanwhile etoy worked on the Toywar Platform, an online agitpop theater spectacle, in which participants could act as soldiers in the toywar. This would take some time to complete – ironically the dispute threatened to end before this last etoy artwork was ready, giving etoy further incentives to keep the dispute alive. The etoy agents had a new lawyer, Chris Truax, who was attracted to the case by the publicity it was generating. Through Truax, etoy offered to sell the etoy domain and trademark for $3.7 million. This may sound like an insane sum, but to put it in perspective, the business.com site changed hands for $7.5 million around this time. On December 29th, Wessel signaled that eToys was prepared to compromise. The problem was, the Toywar Platform was not quite ready, so etoy did what it could to drag out the negotiations. The site went live just before the scheduled court hearings, January 10th 2000. “TOYWAR.com is a place where all servers and all involved people melt and build a living system. In our eyes it is the best way to express and document what’s going on at the moment: people start to about new ways to fight for their ideas, their lifestyle, contemporary culture and power relations.” (Wishart & Boschler: 263) Meanwhile, in a California courtroom, Truax demanded that Network Solutions restore the etoy domain, that eToys pay the etoy legal expenses, and that the case be dropped without prejudice. No settlement was reached. Negotiations dragged on for another two weeks, with the etoy agents’ attention somewhat divided between two horizons – art and law. The dispute was settled on 25th January. Both parties dismissed their complaints without prejudice. The eToys company would pay the etoy artists $40,000 for legal costs, and contact Network Solutions to reinstate the etoy domain. “It was a pleasure doing business with one of the biggest e-commerce giants in the world” ran the etoy press release. (Wishart & Boschler: 265) That would make a charming end to the story. But what goes around comes around. Brainhard, still pissed off with Zai after leaving the group in San Francisco, filed for the etoy trademark in Austria. After that the internal etoy wranglings just gets boring. But it was fun while it lasted. What etoy grasped intuitively was the nexus between the internet as a cultural space and the transformation of the commodity economy in a yet-more abstract direction – its becoming-vectoral. They zeroed in on the heart of the new era of conceptual business – the brand. As Wittgenstein says of language, what gives words meaning is other words, so too for brands. What gives brands meaning is other brands. There is a syntax for brands as there is for words. What etoy discovered is how to insert a new brand into that syntax. The place of eToys as a brand depended on their business competition with other brands – with Toys ‘R’ Us, for example. For etoy, the syntax they discovered for relating their brand to another one was a legal opposition. What made etoy interesting was their lack of moral posturing. Their abandonment of leftist rhetorics opened them up to exploring the territory where media and business meet, but it also made them vulnerable to being consumed by the very dialectic that created the possibility of staging etoy in the first place. By abandoning obsolete political strategies, they discovered a media tactic, which collapsed for want of a new strategy, for the new vectoral terrain on which we find ourselves. Works Cited Negri, Antonio. Time for Revolution. Continuum, London, 2003. Warhol, Andy. From A to B and Back Again. Picador, New York, 1984. Stalder, Felix. ‘Fences in Cyberspace: Recent events in the battle over domain names’. 19 Jun 2003. <http://felix.openflows.org/html/fences.php>. Wark, McKenzie. ‘A Hacker Manifesto [version 4.0]’ 19 Jun 2003. http://subsol.c3.hu/subsol_2/contributors0/warktext.html. Klein, Naomi. No Logo. Harper Collins, London, 2000. Wishart, Adam & Regula Bochsler. Leaving Reality Behind: etoy vs eToys.com & Other Battles to Control Cyberspace Ecco Books, 2003. Staehle, Wolfgang. ‘<nettime> etoy.com shut down by US court.’ 19 Jun 2003. http://amsterdam.nettime.org/Lists-Archives/nettime-l-9912/msg00005.html Links http://amsterdam.nettime.org/Lists-Archives/nettime-l-9912/msg00005.htm http://felix.openflows.org/html/fences.html http://subsol.c3.hu/subsol_2/contributors0/warktext.html Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Wark, McKenzie. "Toywars" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0306/02-toywars.php>. APA Style Wark, M. (2003, Jun 19). Toywars. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0306/02-toywars.php>
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii