Attacking information overload in software development
|
|
|
- Clementine Cross
- 10 years ago
- Views:
Transcription
1 Attacking information overload in software development Gail Murphy University of British Columbia Tasktop Technologies This talk contains copyright pictures obtained under license. The license associated with this talk does not apply to these pictures.
2 sumerian language g clay tablet BC source: Wikipedia
3
4 source: The University of Iowa Libraries
5 source: The University of Iowa Libraries
6 source: The University of Iowa Libraries
7 source: The University of Iowa Libraries
8 14.8 million books (English/Spanish) in print today download 250 items at a time
9
10
11 information explosion information overload indecision repetition
12 from anywhere, anytime, anyone to the right information at the right time, in the right place, in the right way to the right person G. Fischer, Int l Workshop Series on RFID, 2004
13 challenge: weak structure some explicit connections many inferred connections
14 software development: a subset with stronger structure
15 software development: a subset with stronger structure
16
17
18 right information right time right place right way right person
19 group memory episodic memory Hipikat Mylyn
20 group memory: Hipikat across time and space, developers leave a digital trail of information about a project form an implicit group memory from the digital trail enable a developer to query the group memory for pertinent information joint work with Davor Cubranic
21 writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents
22 metadata writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents
23 heuristic writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents
24 information retrieval writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents
25 recommending writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents
26
27 does it work? 20 random bugs from Eclipse ; assess files recommended precision: 0 to 0.56 ; recall: 0 to 1 easy task 75% 25% difficult task 75% 50% 75% of newcomers handled 50% of newcomers met basic special cases correctly compared req. compared to 75% of experts to only 25% of experts
28 right information? right time? right place? right way? right person?
29 right way? current past
30 right way? weak rationale for recommendations significant ifi cognitive i effort to apply information overload cognitive overload
31 episodic memory: Mylyn as a developer works, build a task context that includes a degree-ofinterest (DOI) for each item of information interacted with focus the display of information using a task s context support collaboration through sharing of task contexts joint work with Mik Kersten
32
33 interest
34
35 task (bug) #1 task (bug) #2
36
37 Mechanism Description Applies to Filtering Exclude display of List, tree, graphical elements with DOI views below a threshold Ranking Display elements List views, children sorted by DOI values within tree nodes Decoration Indicate DOI values Any view with foreground or background colour Expansion Expand tree nodes to Any tree view management show elements with certain properties
38 task (bug) #1 task (bug) #2
39
40 does it work? field study with 16 industry participants edit ratio = # edits / # selections 200 percentage change in edit ratio developer ids
41 right information? right time? right place? right way? right person?
42 instead of
43 500,000 programmers are working like this
44 development tasks have emergent structure
45 an anchor for other recommendations run unit tests related to task context + enables easier running of more cases
46 an anchor for other recommendations active search - difficult to scope
47 an anchor for other recommendations Hipikat-like yet to be built!
48 right way? reduces friction encourages flow information overload cognitive overload
49 what about other knowledge workers? interaction relatively agnostic to target
50 knowledge worker field study (early Mylyn) y average average scattering tagging path directory ratio length density
51 Tasktop p( (extend Mylyn yy beyond programming) g)
52 meghan allen meghan allen john anvik john anvik elisa baniassad elisa baniassad wesley coelho wesley coelho davor cubranic davor cubranic briande alwis brian de alwis rob elves rob elves thomas fritz thomas fritz jan hannemann jan hannemann lyndon hiew lyndon hiew reid holmes reid holmes mik kersten mik kersten seonah lee seonah lee shawn minto shawn minto martin robillard martin robillard izzet safer izzetsafer david shepherd david shepherd ducky sherwood ducky sherwood annie ying annie ying trevor young trevor young robert walker robert walker and others! and others!
53 so information information information information information i Information information
54 overload leads to indecision repetition memory-model inspired attacks Hipikat and Mylyn
55 recommendations can be about less and not just about more murphy
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
Best Practices for Java Projects Horst Rechner
Best Practices for Java Projects Horst Rechner Abstract: The combination of automated builds with module and integration tests and centralized bug and work tracking using a combination of Eclipse, Mylyn,
Database Design Patterns. Winter 2006-2007 Lecture 24
Database Design Patterns Winter 2006-2007 Lecture 24 Trees and Hierarchies Many schemas need to represent trees or hierarchies of some sort Common way of representing trees: An adjacency list model Each
What is Visualization? Information Visualization An Overview. Information Visualization. Definitions
What is Visualization? Information Visualization An Overview Jonathan I. Maletic, Ph.D. Computer Science Kent State University Visualize/Visualization: To form a mental image or vision of [some
Managing explicit knowledge using SharePoint in a collaborative environment: ICIMOD s experience
Managing explicit knowledge using SharePoint in a collaborative environment: ICIMOD s experience I Abstract Sushil Pandey, Deependra Tandukar, Saisab Pradhan Integrated Knowledge Management, ICIMOD {spandey,dtandukar,spradhan}@icimod.org
CS 2112 Spring 2014. 0 Instructions. Assignment 3 Data Structures and Web Filtering. 0.1 Grading. 0.2 Partners. 0.3 Restrictions
CS 2112 Spring 2014 Assignment 3 Data Structures and Web Filtering Due: March 4, 2014 11:59 PM Implementing spam blacklists and web filters requires matching candidate domain names and URLs very rapidly
Monitoring Replication
Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package
How To Fix A Snare Server On A Linux Server On An Ubuntu 4.5.2 (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking
Snare System Version 6.3.5 Release Notes is pleased to announce the release of Snare Server Version 6.3.5. Snare Server Version 6.3.5 Bug Fixes: The Agent configuration retrieval functionality within the
Learning and cognitive effects of acquired brain injury caused by meningitis or septicaemia
Learning and cognitive effects of acquired brain injury caused by meningitis or septicaemia Meningitis and septicaemia can be a cause of acquired brain injury (ABI). This is an injury to the brain that
Bitrix Site Manager 4.1. User Guide
Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing
The Hadoop Distributed File System
The Hadoop Distributed File System The Hadoop Distributed File System, Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler, Yahoo, 2010 Agenda Topic 1: Introduction Topic 2: Architecture
Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. Objectives
Exploring Microsoft Access 2010 by Robert Grauer, Keith Mast, Mary Anne Poatsy Chapter 1 Introduction to Access Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. 1 Objectives Navigate
Semantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
A methodology for measuring software development productivity using Eclipse IDE
Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 2. pp. 255 262 doi: 10.14794/ICAI.9.2014.2.255 A methodology for measuring software
Snare System Version 6.3.3 Release Notes
Snare System Version 6.3.3 Release Notes is pleased to announce the release of Snare Server Version 6.3.3. Snare Server Version 6.3.3 Bug Fixes: Implemented enhanced memory management features within the
CC414 Database Management Systems
CC44 Database Management Systems Prof. Dr. Amani A. Saad Course Info See contents on Course Home page. Lecture: 2 hrs Sunday 2:30-2:0 Lab: 2 hrs Tut: 2 hrs» TAs: Eng. Omar Shalash Eng. Ihab Zaghlool 2
Snare System Version 6.3.4 Release Notes
Snare System Version 6.3.4 Release Notes is pleased to announce the release of Snare Server Version 6.3.4. Snare Server Version 6.3.4 New Features The behaviour of the Snare Server reflector has been modified
Android Application Development - Exam Sample
Android Application Development - Exam Sample 1 Which of these is not recommended in the Android Developer's Guide as a method of creating an individual View? a Create by extending the android.view.view
Field Audit Trail Implementation Guide
Field Audit Trail Implementation Guide Salesforce, Spring 16 @salesforcedocs Last updated: January 19, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages. Nicki Dell Spring 2014
CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages Nicki Dell Spring 2014 What is a Programming Language? A set of symbols and associated tools that translate (if necessary) collections
Bayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
Learn about OverDrive APIs and how they can benefit search, discovery and reporting services at your library. Contact: training@overdrive.
v.10012010 v.10042013 v.11012010 OverDrive, Inc. 2010 2013 Page 1 1 OverDrive APIs Learn about OverDrive APIs and how they can benefit search, discovery and reporting services at your library. Contact:
Do Onboarding Programs Work?
Do Onboarding Programs Work? Adriaan Labuschagne and Reid Holmes School of Computer Science University of Waterloo Waterloo, ON, Canada alabusch,[email protected] Abstract Open source software systems
Editors Comparison (NetBeans IDE, Eclipse, IntelliJ IDEA)
České vysoké učení technické v Praze Fakulta elektrotechnická Návrh Uživatelského Rozhraní X36NUR Editors Comparison (NetBeans IDE, Eclipse, ) May 5, 2008 Goal and purpose of test Purpose of this test
What s in a Name? Or, How to Manage your Digital Assets
What s in a Name? Or, How to Manage your Digital Assets It all started with a simple question How do you tag your pictures to make sorting through them and finding a particular image easier? It was a question
Snare System Version 6.3.6 Release Notes
Snare System Version 6.3.6 Release Notes is pleased to announce the release of Snare Server Version 6.3.6. Snare Server Version 6.3.6 New Features Added objective and user documentation to the email header,
Assisting bug Triage in Large Open Source Projects Using Approximate String Matching
Assisting bug Triage in Large Open Source Projects Using Approximate String Matching Amir H. Moin and Günter Neumann Language Technology (LT) Lab. German Research Center for Artificial Intelligence (DFKI)
Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta
Personal Cloud. Support Guide for Mac Computers. Storing and sharing your content 2
Personal Cloud Support Guide for Mac Computers Storing and sharing your content 2 Getting started 2 How to use the application 2 Managing your content 2 Adding content manually 3 Renaming files 3 Moving
The Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
Quick Start. Creating a Scoring Application. RStat. Based on a Decision Tree Model
Creating a Scoring Application Based on a Decision Tree Model This Quick Start guides you through creating a credit-scoring application in eight easy steps. Quick Start Century Corp., an electronics retailer,
Rational Developer for IBM i (RDi) Introduction to RDi
IBM Software Group Rational Developer for IBM i (RDi) Introduction to RDi Featuring: Creating a connection, setting up the library list, working with objects using Remote Systems Explorer. Last Update:
Configuring CitectSCADA SNMP projects with MIB2CIT. A reference for CitectSCADA Customers
Configuring CitectSCADA SNMP projects with MIB2CIT A reference for CitectSCADA Customers [email protected] Revision 1.00 Created 28-12-2009 Document revision history Please update this table whenever
JMETER - MONITOR TEST PLAN
http://www.tutorialspoint.com JMETER - MONITOR TEST PLAN Copyright tutorialspoint.com In this chapter, we will discuss how to create a Test Plan using JMeter to monitor webservers. The uses of monitor
Analysing log files. Yue Mao ([email protected]) Supervisor: Dr Hussein Suleman, Kyle Williams, Gina Paihama. University of Cape Town
Analysing log files Yue Mao ([email protected]) Supervisor: Dr Hussein Suleman, Kyle Williams, Gina Paihama University of Cape Town ABSTRACT A digital repository stores a collection of digital objects
SuperViz: An Interactive Visualization of Super-Peer P2P Network
SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu [email protected] Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks
System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................
Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type.
Chronological Sampling for Email Filtering Ching-Lung Fu 2, Daniel Silver 1, and James Blustein 2 1 Acadia University, Wolfville, Nova Scotia, Canada 2 Dalhousie University, Halifax, Nova Scotia, Canada
Interaction and Visualization Techniques for Programming
Interaction and Visualization Techniques for Programming Mikkel Rønne Jakobsen Dept. of Computing, University of Copenhagen Copenhagen, Denmark [email protected] Abstract. Programmers spend much of their
JustClust User Manual
JustClust User Manual Contents 1. Installing JustClust 2. Running JustClust 3. Basic Usage of JustClust 3.1. Creating a Network 3.2. Clustering a Network 3.3. Applying a Layout 3.4. Saving and Loading
PTC Integrity Eclipse and IBM Rational Development Platform Guide
PTC Integrity Eclipse and IBM Rational Development Platform Guide The PTC Integrity integration with Eclipse Platform and the IBM Rational Software Development Platform series allows you to access Integrity
SEO AND CONTENT MANAGEMENT SYSTEM
International Journal of Electronics and Computer Science Engineering 953 Available Online at www.ijecse.org ISSN- 2277-1956 SEO AND CONTENT MANAGEMENT SYSTEM Savan K. Patel 1, Jigna B.Prajapati 2, Ravi.S.Patel
Best Available Integration of Outlook and SharePoint
Interested in using Microsoft SharePoint to store, find and share your Microsoft Outlook messages? Finding that the out-of-the-box integration of Outlook and SharePoint is awkward to use? WISDOM Message
Using the Eclipse Data Tools Platform with SQL Anywhere 10. A whitepaper from Sybase ianywhere
Using the Eclipse Data Tools Platform with SQL Anywhere 10 A whitepaper from Sybase ianywhere CONTENTS Introduction 3 Requirements 3 Before you begin 3 Downloading the Data Tools Platform 3 Starting the
HelpSystems Web Server User Guide
HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot
Processing and data collection of program structures in open source repositories
1 Processing and data collection of program structures in open source repositories JEAN PETRIĆ, TIHANA GALINAC GRBAC AND MARIO DUBRAVAC, University of Rijeka Software structure analysis with help of network
1 Organization of Operating Systems
COMP 730 (242) Class Notes Section 10: Organization of Operating Systems 1 Organization of Operating Systems We have studied in detail the organization of Xinu. Naturally, this organization is far from
D1.1 Service Discovery system: Load balancing mechanisms
D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction
Intellicus Cluster and Load Balancing- Linux. Version: 7.3
Intellicus Cluster and Load Balancing- Linux Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
Microsoft Windows SharePoint
Microsoft Windows SharePoint SharePoint Basics Introduction What is Microsoft SharePoint? SharePoint is a tool to connect people and information. It provides a central site for sharing information with
An Empirical Study on Recommendations of Similar Bugs
An Empirical Study on Recommendations of Similar Bugs Henrique Rocha, Marco Tulio Valente, Humberto Marques-Neto, and Gail C. Murphy Federal University of Minas Gerais, Brazil Pontifical Catholic University
Social Relationship Analysis with Data Mining
Social Relationship Analysis with Data Mining John C. Hancock Microsoft Corporation www.johnchancock.net November 2005 Abstract: The data mining algorithms in Microsoft SQL Server 2005 can be used as a
EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS
EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS Umamaheswari E. 1, N. Bhalaji 2 and D. K. Ghosh 3 1 SCSE, VIT Chennai Campus, Chennai, India 2 SSN College of
Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,
Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application
RFID Based 3D Indoor Navigation System Integrated with Smart Phones
RFID Based 3D Indoor Navigation System Integrated with Smart Phones Y. Ortakci*, E. Demiral*, I. R. Karas* * Karabuk University, Computer Engineering Department, Demir Celik Kampusu, 78050, Karabuk, Turkey
RhoMobile Suite. Develop applications for the next generation of business mobility
RhoMobile Suite Develop applications for the next generation of business mobility With the Motorola Solutions RhoMobile Suite application development platform, you ll never have to write more than one
Efficient Bug Triaging Using Text Mining
2185 Efficient Bug Triaging Using Text Mining Mamdouh Alenezi and Kenneth Magel Department of Computer Science, North Dakota State University Fargo, ND 58108, USA Email: {mamdouh.alenezi, kenneth.magel}@ndsu.edu
WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief
DDN Solution Brief Personal Storage for the Enterprise WOS Cloud Secure, Shared Drop-in File Access for Enterprise Users, Anytime and Anywhere 2011 DataDirect Networks. All Rights Reserved DDN WOS Cloud
IT Service Level Management 2.1 User s Guide SAS
IT Service Level Management 2.1 User s Guide SAS The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS IT Service Level Management 2.1: User s Guide. Cary, NC:
Asset Track Getting Started Guide. An Introduction to Asset Track
Asset Track Getting Started Guide An Introduction to Asset Track Contents Introducing Asset Track... 3 Overview... 3 A Quick Start... 6 Quick Start Option 1... 6 Getting to Configuration... 7 Changing
Avaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
GMC Inspire Cloud Services
GMC Inspire Cloud Services Version 9.0 CLASSIFICATION: PUBLIC GMC Software AG 2013 GMC Software AG. All rights reserved. http://www.gmc.net/documentation GMC Inspire Cloud Services Product version 9.0
AIMMS User s Guide - Advanced Data Management
AIMMS User s Guide - Advanced Data Management This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com or order your hardcopy
CiteSeer x in the Cloud
Published in the 2nd USENIX Workshop on Hot Topics in Cloud Computing 2010 CiteSeer x in the Cloud Pradeep B. Teregowda Pennsylvania State University C. Lee Giles Pennsylvania State University Bhuvan Urgaonkar
Foglight. Dashboard Support Guide
Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
Data storage Tree indexes
Data storage Tree indexes Rasmus Pagh February 7 lecture 1 Access paths For many database queries and updates, only a small fraction of the data needs to be accessed. Extreme examples are looking or updating
Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search
Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search Orland Hoeber and Hanze Liu Department of Computer Science, Memorial University St. John s, NL, Canada A1B 3X5
The Value of Taxonomy Management Research Results
Taxonomy Strategies November 28, 2012 Copyright 2012 Taxonomy Strategies. All rights reserved. The Value of Taxonomy Management Research Results Joseph A Busch, Principal What does taxonomy do for search?
SPSS 12 Data Analysis Basics Linda E. Lucek, Ed.D. [email protected] 815-753-9516
SPSS 12 Data Analysis Basics Linda E. Lucek, Ed.D. [email protected] 815-753-9516 Technical Advisory Group Customer Support Services Northern Illinois University 120 Swen Parson Hall DeKalb, IL 60115 SPSS
ACCESSING WEB ARCHIVES
ACCESSING WEB ARCHIVES There are two collections of archived websites available via Explore the British Library: The Legal Deposit UK Web Archive, archived through legal deposit regulations introduced
University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task
University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task Graham McDonald, Romain Deveaud, Richard McCreadie, Timothy Gollins, Craig Macdonald and Iadh Ounis School
Developer Dashboards: The Need For Qualitative Analytics
Developer Dashboards: The Need For Qualitative Analytics Olga Baysal, Reid Holmes, and Michael W. Godfrey David R. Cheriton School of Computer Science University of Waterloo, Canada {obaysal, rtholmes,
How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (
GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
A Comparison of Dictionary Implementations
A Comparison of Dictionary Implementations Mark P Neyer April 10, 2009 1 Introduction A common problem in computer science is the representation of a mapping between two sets. A mapping f : A B is a function
General Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4
Frequently Asked Questions to be posted at: /faqs/ Table of Contents General Product Questions... 3 Q. What is the Bell Personal Vault Vault?...4 Q. What is Bell Personal Vault Backup Manager?...4 Q. What
MOOCviz 2.0: A Collaborative MOOC Analytics Visualization Platform
MOOCviz 2.0: A Collaborative MOOC Analytics Visualization Platform Preston Thompson Kalyan Veeramachaneni Any Scale Learning for All Computer Science and Artificial Intelligence Laboratory Massachusetts
How to Design and Create Your Own Custom Ext Rep
Combinatorial Block Designs 2009-04-15 Outline Project Intro External Representation Design Database System Deployment System Overview Conclusions 1. Since the project is a specific application in Combinatorial
Release 2.1 of SAS Add-In for Microsoft Office Bringing Microsoft PowerPoint into the Mix ABSTRACT INTRODUCTION Data Access
Release 2.1 of SAS Add-In for Microsoft Office Bringing Microsoft PowerPoint into the Mix Jennifer Clegg, SAS Institute Inc., Cary, NC Eric Hill, SAS Institute Inc., Cary, NC ABSTRACT Release 2.1 of SAS
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
