Attacking information overload in software development

Size: px
Start display at page:

Download "Attacking information overload in software development"

Transcription

1 Attacking information overload in software development Gail Murphy University of British Columbia Tasktop Technologies This talk contains copyright pictures obtained under license. The license associated with this talk does not apply to these pictures.

2 sumerian language g clay tablet BC source: Wikipedia

3

4 source: The University of Iowa Libraries

5 source: The University of Iowa Libraries

6 source: The University of Iowa Libraries

7 source: The University of Iowa Libraries

8 14.8 million books (English/Spanish) in print today download 250 items at a time

9

10

11 information explosion information overload indecision repetition

12 from anywhere, anytime, anyone to the right information at the right time, in the right place, in the right way to the right person G. Fischer, Int l Workshop Series on RFID, 2004

13 challenge: weak structure some explicit connections many inferred connections

14 software development: a subset with stronger structure

15 software development: a subset with stronger structure

16

17

18 right information right time right place right way right person

19 group memory episodic memory Hipikat Mylyn

20 group memory: Hipikat across time and space, developers leave a digital trail of information about a project form an implicit group memory from the digital trail enable a developer to query the group memory for pertinent information joint work with Davor Cubranic

21 writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

22 metadata writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

23 heuristic writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

24 information retrieval writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

25 recommending writes Person posts writes works on File revision ii implements >356,000 Message reply to >56,000 about Change/ Bug >69,000 similar to Document similar to documents

26

27 does it work? 20 random bugs from Eclipse ; assess files recommended precision: 0 to 0.56 ; recall: 0 to 1 easy task 75% 25% difficult task 75% 50% 75% of newcomers handled 50% of newcomers met basic special cases correctly compared req. compared to 75% of experts to only 25% of experts

28 right information? right time? right place? right way? right person?

29 right way? current past

30 right way? weak rationale for recommendations significant ifi cognitive i effort to apply information overload cognitive overload

31 episodic memory: Mylyn as a developer works, build a task context that includes a degree-ofinterest (DOI) for each item of information interacted with focus the display of information using a task s context support collaboration through sharing of task contexts joint work with Mik Kersten

32

33 interest

34

35 task (bug) #1 task (bug) #2

36

37 Mechanism Description Applies to Filtering Exclude display of List, tree, graphical elements with DOI views below a threshold Ranking Display elements List views, children sorted by DOI values within tree nodes Decoration Indicate DOI values Any view with foreground or background colour Expansion Expand tree nodes to Any tree view management show elements with certain properties

38 task (bug) #1 task (bug) #2

39

40 does it work? field study with 16 industry participants edit ratio = # edits / # selections 200 percentage change in edit ratio developer ids

41 right information? right time? right place? right way? right person?

42 instead of

43 500,000 programmers are working like this

44 development tasks have emergent structure

45 an anchor for other recommendations run unit tests related to task context + enables easier running of more cases

46 an anchor for other recommendations active search - difficult to scope

47 an anchor for other recommendations Hipikat-like yet to be built!

48 right way? reduces friction encourages flow information overload cognitive overload

49 what about other knowledge workers? interaction relatively agnostic to target

50 knowledge worker field study (early Mylyn) y average average scattering tagging path directory ratio length density

51 Tasktop p( (extend Mylyn yy beyond programming) g)

52 meghan allen meghan allen john anvik john anvik elisa baniassad elisa baniassad wesley coelho wesley coelho davor cubranic davor cubranic briande alwis brian de alwis rob elves rob elves thomas fritz thomas fritz jan hannemann jan hannemann lyndon hiew lyndon hiew reid holmes reid holmes mik kersten mik kersten seonah lee seonah lee shawn minto shawn minto martin robillard martin robillard izzet safer izzetsafer david shepherd david shepherd ducky sherwood ducky sherwood annie ying annie ying trevor young trevor young robert walker robert walker and others! and others!

53 so information information information information information i Information information

54 overload leads to indecision repetition memory-model inspired attacks Hipikat and Mylyn

55 recommendations can be about less and not just about more murphy

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Best Practices for Java Projects Horst Rechner

Best Practices for Java Projects Horst Rechner Best Practices for Java Projects Horst Rechner Abstract: The combination of automated builds with module and integration tests and centralized bug and work tracking using a combination of Eclipse, Mylyn,

More information

Database Design Patterns. Winter 2006-2007 Lecture 24

Database Design Patterns. Winter 2006-2007 Lecture 24 Database Design Patterns Winter 2006-2007 Lecture 24 Trees and Hierarchies Many schemas need to represent trees or hierarchies of some sort Common way of representing trees: An adjacency list model Each

More information

What is Visualization? Information Visualization An Overview. Information Visualization. Definitions

What is Visualization? Information Visualization An Overview. Information Visualization. Definitions What is Visualization? Information Visualization An Overview Jonathan I. Maletic, Ph.D. Computer Science Kent State University Visualize/Visualization: To form a mental image or vision of [some

More information

Managing explicit knowledge using SharePoint in a collaborative environment: ICIMOD s experience

Managing explicit knowledge using SharePoint in a collaborative environment: ICIMOD s experience Managing explicit knowledge using SharePoint in a collaborative environment: ICIMOD s experience I Abstract Sushil Pandey, Deependra Tandukar, Saisab Pradhan Integrated Knowledge Management, ICIMOD {spandey,dtandukar,spradhan}@icimod.org

More information

CS 2112 Spring 2014. 0 Instructions. Assignment 3 Data Structures and Web Filtering. 0.1 Grading. 0.2 Partners. 0.3 Restrictions

CS 2112 Spring 2014. 0 Instructions. Assignment 3 Data Structures and Web Filtering. 0.1 Grading. 0.2 Partners. 0.3 Restrictions CS 2112 Spring 2014 Assignment 3 Data Structures and Web Filtering Due: March 4, 2014 11:59 PM Implementing spam blacklists and web filters requires matching candidate domain names and URLs very rapidly

More information

Monitoring Replication

Monitoring Replication Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package

More information

How To Fix A Snare Server On A Linux Server On An Ubuntu 4.5.2 (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking

How To Fix A Snare Server On A Linux Server On An Ubuntu 4.5.2 (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking Snare System Version 6.3.5 Release Notes is pleased to announce the release of Snare Server Version 6.3.5. Snare Server Version 6.3.5 Bug Fixes: The Agent configuration retrieval functionality within the

More information

Learning and cognitive effects of acquired brain injury caused by meningitis or septicaemia

Learning and cognitive effects of acquired brain injury caused by meningitis or septicaemia Learning and cognitive effects of acquired brain injury caused by meningitis or septicaemia Meningitis and septicaemia can be a cause of acquired brain injury (ABI). This is an injury to the brain that

More information

Bitrix Site Manager 4.1. User Guide

Bitrix Site Manager 4.1. User Guide Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing

More information

The Hadoop Distributed File System

The Hadoop Distributed File System The Hadoop Distributed File System The Hadoop Distributed File System, Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler, Yahoo, 2010 Agenda Topic 1: Introduction Topic 2: Architecture

More information

Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. Objectives

Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. Objectives Exploring Microsoft Access 2010 by Robert Grauer, Keith Mast, Mary Anne Poatsy Chapter 1 Introduction to Access Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall. 1 Objectives Navigate

More information

Semantic Search in Portals using Ontologies

Semantic Search in Portals using Ontologies Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br

More information

A methodology for measuring software development productivity using Eclipse IDE

A methodology for measuring software development productivity using Eclipse IDE Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 2. pp. 255 262 doi: 10.14794/ICAI.9.2014.2.255 A methodology for measuring software

More information

Snare System Version 6.3.3 Release Notes

Snare System Version 6.3.3 Release Notes Snare System Version 6.3.3 Release Notes is pleased to announce the release of Snare Server Version 6.3.3. Snare Server Version 6.3.3 Bug Fixes: Implemented enhanced memory management features within the

More information

CC414 Database Management Systems

CC414 Database Management Systems CC44 Database Management Systems Prof. Dr. Amani A. Saad Course Info See contents on Course Home page. Lecture: 2 hrs Sunday 2:30-2:0 Lab: 2 hrs Tut: 2 hrs» TAs: Eng. Omar Shalash Eng. Ihab Zaghlool 2

More information

Snare System Version 6.3.4 Release Notes

Snare System Version 6.3.4 Release Notes Snare System Version 6.3.4 Release Notes is pleased to announce the release of Snare Server Version 6.3.4. Snare Server Version 6.3.4 New Features The behaviour of the Snare Server reflector has been modified

More information

Android Application Development - Exam Sample

Android Application Development - Exam Sample Android Application Development - Exam Sample 1 Which of these is not recommended in the Android Developer's Guide as a method of creating an individual View? a Create by extending the android.view.view

More information

Field Audit Trail Implementation Guide

Field Audit Trail Implementation Guide Field Audit Trail Implementation Guide Salesforce, Spring 16 @salesforcedocs Last updated: January 19, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages. Nicki Dell Spring 2014

CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages. Nicki Dell Spring 2014 CSE 373: Data Structure & Algorithms Lecture 25: Programming Languages Nicki Dell Spring 2014 What is a Programming Language? A set of symbols and associated tools that translate (if necessary) collections

More information

Bayesian Spam Filtering

Bayesian Spam Filtering Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating

More information

Learn about OverDrive APIs and how they can benefit search, discovery and reporting services at your library. Contact: training@overdrive.

Learn about OverDrive APIs and how they can benefit search, discovery and reporting services at your library. Contact: training@overdrive. v.10012010 v.10042013 v.11012010 OverDrive, Inc. 2010 2013 Page 1 1 OverDrive APIs Learn about OverDrive APIs and how they can benefit search, discovery and reporting services at your library. Contact:

More information

Do Onboarding Programs Work?

Do Onboarding Programs Work? Do Onboarding Programs Work? Adriaan Labuschagne and Reid Holmes School of Computer Science University of Waterloo Waterloo, ON, Canada alabusch,[email protected] Abstract Open source software systems

More information

Editors Comparison (NetBeans IDE, Eclipse, IntelliJ IDEA)

Editors Comparison (NetBeans IDE, Eclipse, IntelliJ IDEA) České vysoké učení technické v Praze Fakulta elektrotechnická Návrh Uživatelského Rozhraní X36NUR Editors Comparison (NetBeans IDE, Eclipse, ) May 5, 2008 Goal and purpose of test Purpose of this test

More information

What s in a Name? Or, How to Manage your Digital Assets

What s in a Name? Or, How to Manage your Digital Assets What s in a Name? Or, How to Manage your Digital Assets It all started with a simple question How do you tag your pictures to make sorting through them and finding a particular image easier? It was a question

More information

Snare System Version 6.3.6 Release Notes

Snare System Version 6.3.6 Release Notes Snare System Version 6.3.6 Release Notes is pleased to announce the release of Snare Server Version 6.3.6. Snare Server Version 6.3.6 New Features Added objective and user documentation to the email header,

More information

Assisting bug Triage in Large Open Source Projects Using Approximate String Matching

Assisting bug Triage in Large Open Source Projects Using Approximate String Matching Assisting bug Triage in Large Open Source Projects Using Approximate String Matching Amir H. Moin and Günter Neumann Language Technology (LT) Lab. German Research Center for Artificial Intelligence (DFKI)

More information

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Peer-to-Peer Networks 02: Napster & Gnutella. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Peer-to-Peer Networks 02: Napster & Gnutella Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg Napster Shawn (Napster) Fanning - published 1999 his beta

More information

Personal Cloud. Support Guide for Mac Computers. Storing and sharing your content 2

Personal Cloud. Support Guide for Mac Computers. Storing and sharing your content 2 Personal Cloud Support Guide for Mac Computers Storing and sharing your content 2 Getting started 2 How to use the application 2 Managing your content 2 Adding content manually 3 Renaming files 3 Moving

More information

The Basics of Graphical Models

The Basics of Graphical Models The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures

More information

Quick Start. Creating a Scoring Application. RStat. Based on a Decision Tree Model

Quick Start. Creating a Scoring Application. RStat. Based on a Decision Tree Model Creating a Scoring Application Based on a Decision Tree Model This Quick Start guides you through creating a credit-scoring application in eight easy steps. Quick Start Century Corp., an electronics retailer,

More information

Rational Developer for IBM i (RDi) Introduction to RDi

Rational Developer for IBM i (RDi) Introduction to RDi IBM Software Group Rational Developer for IBM i (RDi) Introduction to RDi Featuring: Creating a connection, setting up the library list, working with objects using Remote Systems Explorer. Last Update:

More information

Configuring CitectSCADA SNMP projects with MIB2CIT. A reference for CitectSCADA Customers

Configuring CitectSCADA SNMP projects with MIB2CIT. A reference for CitectSCADA Customers Configuring CitectSCADA SNMP projects with MIB2CIT A reference for CitectSCADA Customers [email protected] Revision 1.00 Created 28-12-2009 Document revision history Please update this table whenever

More information

JMETER - MONITOR TEST PLAN

JMETER - MONITOR TEST PLAN http://www.tutorialspoint.com JMETER - MONITOR TEST PLAN Copyright tutorialspoint.com In this chapter, we will discuss how to create a Test Plan using JMeter to monitor webservers. The uses of monitor

More information

Analysing log files. Yue Mao ([email protected]) Supervisor: Dr Hussein Suleman, Kyle Williams, Gina Paihama. University of Cape Town

Analysing log files. Yue Mao (mxxyue002@uct.ac.za) Supervisor: Dr Hussein Suleman, Kyle Williams, Gina Paihama. University of Cape Town Analysing log files Yue Mao ([email protected]) Supervisor: Dr Hussein Suleman, Kyle Williams, Gina Paihama University of Cape Town ABSTRACT A digital repository stores a collection of digital objects

More information

SuperViz: An Interactive Visualization of Super-Peer P2P Network

SuperViz: An Interactive Visualization of Super-Peer P2P Network SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu [email protected] Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes

More information

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0 Contents 1 Introduction 3 1.1 Purpose..............................

More information

Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type.

Three types of messages: A, B, C. Assume A is the oldest type, and C is the most recent type. Chronological Sampling for Email Filtering Ching-Lung Fu 2, Daniel Silver 1, and James Blustein 2 1 Acadia University, Wolfville, Nova Scotia, Canada 2 Dalhousie University, Halifax, Nova Scotia, Canada

More information

Interaction and Visualization Techniques for Programming

Interaction and Visualization Techniques for Programming Interaction and Visualization Techniques for Programming Mikkel Rønne Jakobsen Dept. of Computing, University of Copenhagen Copenhagen, Denmark [email protected] Abstract. Programmers spend much of their

More information

JustClust User Manual

JustClust User Manual JustClust User Manual Contents 1. Installing JustClust 2. Running JustClust 3. Basic Usage of JustClust 3.1. Creating a Network 3.2. Clustering a Network 3.3. Applying a Layout 3.4. Saving and Loading

More information

PTC Integrity Eclipse and IBM Rational Development Platform Guide

PTC Integrity Eclipse and IBM Rational Development Platform Guide PTC Integrity Eclipse and IBM Rational Development Platform Guide The PTC Integrity integration with Eclipse Platform and the IBM Rational Software Development Platform series allows you to access Integrity

More information

SEO AND CONTENT MANAGEMENT SYSTEM

SEO AND CONTENT MANAGEMENT SYSTEM International Journal of Electronics and Computer Science Engineering 953 Available Online at www.ijecse.org ISSN- 2277-1956 SEO AND CONTENT MANAGEMENT SYSTEM Savan K. Patel 1, Jigna B.Prajapati 2, Ravi.S.Patel

More information

Best Available Integration of Outlook and SharePoint

Best Available Integration of Outlook and SharePoint Interested in using Microsoft SharePoint to store, find and share your Microsoft Outlook messages? Finding that the out-of-the-box integration of Outlook and SharePoint is awkward to use? WISDOM Message

More information

Using the Eclipse Data Tools Platform with SQL Anywhere 10. A whitepaper from Sybase ianywhere

Using the Eclipse Data Tools Platform with SQL Anywhere 10. A whitepaper from Sybase ianywhere Using the Eclipse Data Tools Platform with SQL Anywhere 10 A whitepaper from Sybase ianywhere CONTENTS Introduction 3 Requirements 3 Before you begin 3 Downloading the Data Tools Platform 3 Starting the

More information

HelpSystems Web Server User Guide

HelpSystems Web Server User Guide HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot

More information

Processing and data collection of program structures in open source repositories

Processing and data collection of program structures in open source repositories 1 Processing and data collection of program structures in open source repositories JEAN PETRIĆ, TIHANA GALINAC GRBAC AND MARIO DUBRAVAC, University of Rijeka Software structure analysis with help of network

More information

1 Organization of Operating Systems

1 Organization of Operating Systems COMP 730 (242) Class Notes Section 10: Organization of Operating Systems 1 Organization of Operating Systems We have studied in detail the organization of Xinu. Naturally, this organization is far from

More information

D1.1 Service Discovery system: Load balancing mechanisms

D1.1 Service Discovery system: Load balancing mechanisms D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction

More information

Intellicus Cluster and Load Balancing- Linux. Version: 7.3

Intellicus Cluster and Load Balancing- Linux. Version: 7.3 Intellicus Cluster and Load Balancing- Linux Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be

More information

A1.1.1.11.1.1.2 1.1.1.3S B

A1.1.1.11.1.1.2 1.1.1.3S B CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security

More information

Microsoft Windows SharePoint

Microsoft Windows SharePoint Microsoft Windows SharePoint SharePoint Basics Introduction What is Microsoft SharePoint? SharePoint is a tool to connect people and information. It provides a central site for sharing information with

More information

An Empirical Study on Recommendations of Similar Bugs

An Empirical Study on Recommendations of Similar Bugs An Empirical Study on Recommendations of Similar Bugs Henrique Rocha, Marco Tulio Valente, Humberto Marques-Neto, and Gail C. Murphy Federal University of Minas Gerais, Brazil Pontifical Catholic University

More information

Social Relationship Analysis with Data Mining

Social Relationship Analysis with Data Mining Social Relationship Analysis with Data Mining John C. Hancock Microsoft Corporation www.johnchancock.net November 2005 Abstract: The data mining algorithms in Microsoft SQL Server 2005 can be used as a

More information

EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS

EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS EVALUATING METRICS AT CLASS AND METHOD LEVEL FOR JAVA PROGRAMS USING KNOWLEDGE BASED SYSTEMS Umamaheswari E. 1, N. Bhalaji 2 and D. K. Ghosh 3 1 SCSE, VIT Chennai Campus, Chennai, India 2 SSN College of

More information

Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,

Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application

More information

RFID Based 3D Indoor Navigation System Integrated with Smart Phones

RFID Based 3D Indoor Navigation System Integrated with Smart Phones RFID Based 3D Indoor Navigation System Integrated with Smart Phones Y. Ortakci*, E. Demiral*, I. R. Karas* * Karabuk University, Computer Engineering Department, Demir Celik Kampusu, 78050, Karabuk, Turkey

More information

RhoMobile Suite. Develop applications for the next generation of business mobility

RhoMobile Suite. Develop applications for the next generation of business mobility RhoMobile Suite Develop applications for the next generation of business mobility With the Motorola Solutions RhoMobile Suite application development platform, you ll never have to write more than one

More information

Efficient Bug Triaging Using Text Mining

Efficient Bug Triaging Using Text Mining 2185 Efficient Bug Triaging Using Text Mining Mamdouh Alenezi and Kenneth Magel Department of Computer Science, North Dakota State University Fargo, ND 58108, USA Email: {mamdouh.alenezi, kenneth.magel}@ndsu.edu

More information

WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief

WOS Cloud. ddn.com. Personal Storage for the Enterprise. DDN Solution Brief DDN Solution Brief Personal Storage for the Enterprise WOS Cloud Secure, Shared Drop-in File Access for Enterprise Users, Anytime and Anywhere 2011 DataDirect Networks. All Rights Reserved DDN WOS Cloud

More information

IT Service Level Management 2.1 User s Guide SAS

IT Service Level Management 2.1 User s Guide SAS IT Service Level Management 2.1 User s Guide SAS The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS IT Service Level Management 2.1: User s Guide. Cary, NC:

More information

Asset Track Getting Started Guide. An Introduction to Asset Track

Asset Track Getting Started Guide. An Introduction to Asset Track Asset Track Getting Started Guide An Introduction to Asset Track Contents Introducing Asset Track... 3 Overview... 3 A Quick Start... 6 Quick Start Option 1... 6 Getting to Configuration... 7 Changing

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

GMC Inspire Cloud Services

GMC Inspire Cloud Services GMC Inspire Cloud Services Version 9.0 CLASSIFICATION: PUBLIC GMC Software AG 2013 GMC Software AG. All rights reserved. http://www.gmc.net/documentation GMC Inspire Cloud Services Product version 9.0

More information

AIMMS User s Guide - Advanced Data Management

AIMMS User s Guide - Advanced Data Management AIMMS User s Guide - Advanced Data Management This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com or order your hardcopy

More information

CiteSeer x in the Cloud

CiteSeer x in the Cloud Published in the 2nd USENIX Workshop on Hot Topics in Cloud Computing 2010 CiteSeer x in the Cloud Pradeep B. Teregowda Pennsylvania State University C. Lee Giles Pennsylvania State University Bhuvan Urgaonkar

More information

Foglight. Dashboard Support Guide

Foglight. Dashboard Support Guide Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Data storage Tree indexes

Data storage Tree indexes Data storage Tree indexes Rasmus Pagh February 7 lecture 1 Access paths For many database queries and updates, only a small fraction of the data needs to be accessed. Extreme examples are looking or updating

More information

Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search

Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search Orland Hoeber and Hanze Liu Department of Computer Science, Memorial University St. John s, NL, Canada A1B 3X5

More information

The Value of Taxonomy Management Research Results

The Value of Taxonomy Management Research Results Taxonomy Strategies November 28, 2012 Copyright 2012 Taxonomy Strategies. All rights reserved. The Value of Taxonomy Management Research Results Joseph A Busch, Principal What does taxonomy do for search?

More information

SPSS 12 Data Analysis Basics Linda E. Lucek, Ed.D. [email protected] 815-753-9516

SPSS 12 Data Analysis Basics Linda E. Lucek, Ed.D. LindaL@niu.edu 815-753-9516 SPSS 12 Data Analysis Basics Linda E. Lucek, Ed.D. [email protected] 815-753-9516 Technical Advisory Group Customer Support Services Northern Illinois University 120 Swen Parson Hall DeKalb, IL 60115 SPSS

More information

ACCESSING WEB ARCHIVES

ACCESSING WEB ARCHIVES ACCESSING WEB ARCHIVES There are two collections of archived websites available via Explore the British Library: The Legal Deposit UK Web Archive, archived through legal deposit regulations introduced

More information

University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task

University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task University of Glasgow Terrier Team / Project Abacá at RepLab 2014: Reputation Dimensions Task Graham McDonald, Romain Deveaud, Richard McCreadie, Timothy Gollins, Craig Macdonald and Iadh Ounis School

More information

Developer Dashboards: The Need For Qualitative Analytics

Developer Dashboards: The Need For Qualitative Analytics Developer Dashboards: The Need For Qualitative Analytics Olga Baysal, Reid Holmes, and Michael W. Godfrey David R. Cheriton School of Computer Science University of Waterloo, Canada {obaysal, rtholmes,

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

A Comparison of Dictionary Implementations

A Comparison of Dictionary Implementations A Comparison of Dictionary Implementations Mark P Neyer April 10, 2009 1 Introduction A common problem in computer science is the representation of a mapping between two sets. A mapping f : A B is a function

More information

General Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4

General Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4 Frequently Asked Questions to be posted at: /faqs/ Table of Contents General Product Questions... 3 Q. What is the Bell Personal Vault Vault?...4 Q. What is Bell Personal Vault Backup Manager?...4 Q. What

More information

MOOCviz 2.0: A Collaborative MOOC Analytics Visualization Platform

MOOCviz 2.0: A Collaborative MOOC Analytics Visualization Platform MOOCviz 2.0: A Collaborative MOOC Analytics Visualization Platform Preston Thompson Kalyan Veeramachaneni Any Scale Learning for All Computer Science and Artificial Intelligence Laboratory Massachusetts

More information

How to Design and Create Your Own Custom Ext Rep

How to Design and Create Your Own Custom Ext Rep Combinatorial Block Designs 2009-04-15 Outline Project Intro External Representation Design Database System Deployment System Overview Conclusions 1. Since the project is a specific application in Combinatorial

More information

Release 2.1 of SAS Add-In for Microsoft Office Bringing Microsoft PowerPoint into the Mix ABSTRACT INTRODUCTION Data Access

Release 2.1 of SAS Add-In for Microsoft Office Bringing Microsoft PowerPoint into the Mix ABSTRACT INTRODUCTION Data Access Release 2.1 of SAS Add-In for Microsoft Office Bringing Microsoft PowerPoint into the Mix Jennifer Clegg, SAS Institute Inc., Cary, NC Eric Hill, SAS Institute Inc., Cary, NC ABSTRACT Release 2.1 of SAS

More information

Columbia University Web Security Standards and Practices. Objective and Scope

Columbia University Web Security Standards and Practices. Objective and Scope Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements

More information