scholarly journals It Takes a Community

Queue ◽  
2021 ◽  
Vol 19 (5) ◽  
pp. 115-136
Author(s):  
Reynold Xin ◽  
Wes McKinney ◽  
Alan Gates ◽  
Chris McCubbin
Keyword(s):  

Of the many challenges faced by open-source developers, among the most daunting are some that other programmers scarcely ever think about. Building a successful open-source community depends on many different elements, some of which are familiar to any developer. Just as important are the skills to recruit, to inspire, to mentor, to manage, and to mediate disputes. But what exactly does it take to pull all that off?

Author(s):  
Conal Twomey ◽  
John A. Johnson

Abstract. Most copyrighted personality inventories facilitate norm-referencing through illustrative tables, yet their application to the many fields relevant to personality measurement is constrained by the need for stakeholders to possess the requisite financial resources to access them. Using an IPIP-NEO-300 dataset from Johnson’s IPIP-NEO data repository, we created open-source norm tables for different age groups (14–17 years; 18–25 years; and 30+ years) within a combined standardization sample from the United Kingdom (UK) and Ireland ( N = 18,591). The newly created tables are freely available online ( https://osf.io/tbmh5 ), and there is no need to ask for permission to modify them. We provide general instructions that can be used to create open-source personality trait norms for other countries, settings, and age groups, as well as gender-specific norms. There is great potential for these norms to be used in various settings and their open-source freedoms may encourage future collaborations and investigations.


2021 ◽  
Vol 21 (2) ◽  
pp. 259-278
Author(s):  
Melissa Finn ◽  
Eid Mohamed ◽  
Bessma Momani

When transnationally constructed art forms, such as the works of diasporic cultural productions of Arabs in the West, are made available in open-source on a digital archive, this supports the transnational flow or exchange of citizenship-enhancing ideas, skill-sets, technologies, tools, capacities, and practices. In this theoretical investigation, we explore imagined outcomes when new audiences can engage with diasporic cultural productions of Arabs. Digital archiving of ethnically diverse cultural productions can expand civility, solidarity, and common ground among people; these latter behaviors are the ideational foundations of agency-based claims of transnational citizenship. Such cultural productions help to reconfigure the questions, opportunities, and nature of political and social agency in ways that empower diaspora communities and expand their abilities to make citizenship claims in multiple societies. This is what the Internet enables despite its tendency towards parochialism in globalized pockets. Moreover, we highlight the possibilities of open-source digital archiving—with a focus on literature, poetry, biographies, and letters—for agency-based claims of citizenship and the many caveats that require further attention and consideration.


Author(s):  
Marco Kuhrmann ◽  
Georg Kalus ◽  
Gerhard Chroust

Software development projects are complex. The more complex a project is, the higher are the requirements related to the software development process. The implementation of a process is a great challenge. This, in part, has to do with human factors (acceptance, etc.) as the benefits of a formal development process might not be obvious immediately and it may take a while until the process becomes the lifeblood of a team. A crucial step towards implementing, enacting and enforcing a process is to provide tool support for the many activities the process asks for. Tool support is necessary to guarantee efficiency in the project, to do the housekeeping and to minimize the “overhead” of the process. This chapter describes challenges and options for supporting process models by tools. Furthermore it describes concrete samples and shows how tool chains can be created with commercial tools as well as with open source tools.


2014 ◽  
Vol 31 (10) ◽  
pp. 6-9
Author(s):  
Alix Norton

Purpose – This aim of this report is to summarize how Google Sites can be used as an open-source, intuitive, and robust solution for designing an intranet system for a unique library department. Michigan Publishing is a department within the University of Michigan (U-M) campus library system that also includes a revenue-based operation as the U-M Press. The need for a central documentation system has become apparent to organize and streamline policies and procedures in this unique library department. Google Sites was chosen as a solution to compile departmental documentation and serve as a collaborative space for the many units within Michigan Publishing. Design/methodology/approach – One librarian and one graduate student intern worked on this project for 5-10 hours a week over the course of three months. Michigan Publishing managers created an inventory showing all existing informational resources in the department, and were then interviewed about these resources. An initial “landing page” was created for this Google-based site, and more comprehensive content has since been migrated from existing informational resources to this central site. Findings – A specific Google Sites Staff Intranet for Michigan Publishing has been an integral solution for providing a one-stop, central area for current internal resources. It also fosters a sense of departmental identity and community, since there are many separate units within the department, each with a different focus and place within the larger library system. This site provides an online forum for collaboration, communication and policy codification. Originality/value – This report summarizes how Google Sites can be used as an open-source, intuitive, and robust solution for designing an intranet system for a unique library department.


Author(s):  
K. Krechmer

The greater the degree of digital convergence, the higher the potential for monopoly behavior. Open systems minimize the possibility of monopoly behavior. But what are open systems? This paper explores the different meanings and criteria suggested by the term open systems and the many ways openness is viewed. It specifically discusses open systems, open architectures, Open Source, open interfaces and open standards to better understand each. Identifying and agreeing upon what constitutes openness is an important step to avoid any disadvantages of digital convergence.


Author(s):  
Mark R. Allyn ◽  
Ram B. Misra

The motivational drivers of open source software developers have been researched by various investigators since about 2000. This work shows that developers are motivated by different extrinsic and intrinsic drivers, among them community aspirations, reciprocity and fairness, creative impulses, and monetary and career ambitions. There has been some work done in studying whether the profile of developer motivations is constant across open source projects or is sensitive to project organizational design. Among the many factors that could influence the mix of motives of OS developers is the license under which the work is performed. Licenses range in openness between those such as the GNU GPL that severely restrict the freedom of developers to mingle their OS code with proprietary code to those such as BSD licenses which allow programmers much greater latitude in integrating open source code with proprietary code. In addition to formal rules, meritocracies emerge to reward effort and performance, and also to direct, coordinate, and control other participants. The authors discuss these variables and how they may be related to motivations.


Author(s):  
Michael A. Goedeker

New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence. One of the many disturbing consequences of this is that we are faced with attackers that are versed in stealth, deception, planting false information, and increased training in newer attack technologies that classical tools can no longer reliably find. In addition, advanced attack and deception skills now use OSINT (open source intelligence) data collection tactics that have moved entire attack chains into the espionage and surveillance realm.


Author(s):  
Jeffrey Pomerantz ◽  
Robin Peek

Open source. Open access. Open society. Open knowledge. Open government. Even open food. The word “open” has been applied to a wide variety of words to create new terms, some of which make sense, and some not so much. This essay disambiguates the many meanings of the word “open” as it is used in a wide range of contexts.


2021 ◽  
Vol 143 (1) ◽  
pp. 30-31
Author(s):  
Thomas Costabile

Abstract The editors of Mechanical Engineering magazine recognize technologists who developed a robot that can sterilize hospital rooms, a filter that can kill microbes in HVAC systems, an autonomous droid that delivers food, a lobby kiosk that can check for masks and fevers, and an open-source design for a face shield that anyone can 3D print. These are just a few of the many ways engineers responded to the COVID-19 pandemic.


Author(s):  
Shweta Sondarva ◽  
Dr. Priyanka Sharma ◽  
Prof. Dharti Dholariya

This paper describes OSINT Tools and Approaches to find out sensitive information of any organization's Web Application or network. The paper contains the steps for gathering information and how to secure the web application, organization or network. There are many automated and paid tools available for vulnerability finding and penetration testing. In this paper we are performing recon with the help of OSINT to gather information and give the solution, before an attacker uses this vulnerability and exploits it. Nowadays lot many vulnerabilities are on the web application. I already learned the many cases in the security programs, where a Sensitive data leakage was happening on many reputed websites. So I will start to find out a web-application in which such types of information’s are disclosed, the Problem was that if we find out such information leaking like credentials, Token, API key we can easily get authorization to admins/users account. I found a lot many well-known websites where we can easily use this sensitive data. To perform such kind of attack you just need to perform reconnaissance with the help of various open source tools available on internet.


Sign in / Sign up

Export Citation Format

Share Document