Skip to main content

Home/ Web 2.0 Tools/ Group items tagged Concern

Rss Feed Group items tagged

chelfyn Baxter

Management and Virtual Decentralised Networks: The Linux Project - 0 views

  • A mechanistic management system is appropriate to stable conditions. It is characterised by:The Organismic form is appropriate to changing conditions. It is characterised by: Hierarchic structure of control, authority and communicationNetwork structure of control A reinforcement of the hierarchic structure by the location of knowledge of actualities exclusively at the top of the hierarchyOmniscience no longer imputed to the head of the concern; knowledge may be located anywhere in the network; the location becoming the centre of authority Vertical interaction between the members of the concern, ie. between superior and subordinateLateral rather than vertical direction of communication through the organisation  A content of communication which consists of information and advice rather than instructions and decisions
    • chelfyn Baxter
       
      This is very similar to many Web 1.0/2.0 analogies
  • Structurehierarchicalnetworked Scopeinternal/closedexternal/open Resource focuscapitalhuman, information Statestabledynamic, changing Directionmanagement commandsself-management Basis of actioncontrolempowerment to act Basis for compensationposition in hierarchycompetency level
  • However, "the Linux movement did not and still does not have a formal hierarchy whereby important tasks can be handled out ... a kind of self-selection takes place instead: anyone who cares enough about a particular program is welcomed to try" [54]. But if his work is not good enough, another hacker will immediately fill the gap. In this way, this 'self-selection' ensures that the work done is of superb quality. Moreover this "decentralisation leads to more efficient allocation of resources (programmers' time and work) because each developer is free to work on any particular program of his choice as his skills, experience and interest best dictate" (Kuwabara, 2000). In contrast, "under centralised mode of software development, people are assigned to tasks out of economic considerations and might end up spending time on a feature that the marketing department has decided is vital to their ad campaign, but that no actual users care about" [55].
  • ...4 more annotations...
  • Industrial AgeInformation Age Focus on measurable outcomesFocus on strategic issues using participation and empowerment Individual accountabilityTeam accountability Clearly differentiated-segmented organisational roles, positions and responsibilitiesMatrix arrangement - flexible positions and responsibilities Hierarchical, linear information flowsMultiple interface, 'boundaryless' information networking Initiatives for improvement emanate from a management eliteInitiatives for improvement emanate from all directions
  • There is only one layer between the community of Linux developers and Linus: the "trusted lieutenants". They are a dozen hackers that have done considerably extended work on a particular part of the kernel to gain Linus' trust. The "trusted lieutenants" are responsible to maintain a part of the Linux Kernel and lots of developers sent their patches (their code) directly to them, instead of Linus. Of course, apart from Linus that has encouraged this to happen, this informal mechanism represents a natural selection by the community since the "trusted lieutenants" are recognised [by the community] as being not owners but simple experts in particular areas [57] and thus, their 'authority' can always be openly challenged. This does not mean that Linus has more influence than they have. Recently, "Alan Cox (one of the "trusted" ones) disagreed with Linus over some obscure technical issue and it looks like the community really does get to judge by backing Alan and making Linus to acknowledge that he made a bad choice" [58].
  • In 1991, Linus Torvalds made a free Unix-like kernel (a core part of the operating system) available on the Internet and invited all hackers interested to participate. Within the next two months, the first version 1.0 of Linux was released. From that point, tens of thousands of developers, dispersed globally and communicating via the Internet, contributed code, so that early in 1993, Linux had grown to be a stable, reliable and very powerful operating system. The Linux kernel is 'copylefted' software, patented under the GNU GPL, and thus, nobody actually owns it. But more significantly, Linux is sheltered by the Open Source (hacker) community. From its very birth, Linux as a project has mobilised an incredible number of developers offering enhancements, modifications/improvements and bug fixes without any financial incentive. Despite the fact that an operating system is supposed to be developed only by a closely-knit team to avoid rising complexity and communication costs of coordination (Brook's Law), Linux is being developed in a massive decentralised mode under no central planning, an amazing feat given that it has not evolved into chaos. Innovation release early and often: Linus put into practice an innovative and paradox model of developing software. Frequent releases and updates (several times in a week) are typical throughout the entire development period of Linux. In this way, Linus kept the community constantly stimulated by the rapid growth of the project and provided an extraordinary effective mechanism of psychologically rewarding his co-developers for their contributions that were implemented in the last version. On top of this, in every released version, there is a file attached which lists all those who have contributed (code). Credit attribution if neglected, is a cardinal sin that will breed bitterness within the community and discourage developers from further contributing to the project. According to conventional software-building wisdom, early versions are by definition buggy and you do not want to wear out the patience of your users. But as far as the Linux development stage is concerned, developers are the users themselves and this is where most innovation is created (Figure 8). "The greatest innovation of Linux is that treating your users as co-developers is your least-hassle route to rapid code improvement and effective debugging" (Raymond, 1998a).
  •  
    It's a great article
Vasanthan Veerasingham

Advancements Of PHP In Cloud Computing - 0 views

  •  
    Advancements Of PHP In Cloud Computing : Many PHP programmer have shown their concern in cloud computing, as it slackens the web development process. PHP on Cloud is one of the best solutions to take care of all the PHP related applications to migrate on the cloud server.
  •  
    if you want best news like this. Or follow. Your article in here www.killdo.de.gg
Janos Haits

Polarity - Home - 1 views

  •  
    "A feature packed, fast, secure, stable, and a highly customizable web browser that offers the latest web standards. Polarity also comes built in with adblock and Do Not Track for privacy concerns. All these aspects of Polarity help deliver a unique browsing experience which helps you enjoy what the web has to offer."
John Onwuegbu

Chrome Ends Support For Mac OS X 10.5 - 10 views

  •  
    The more reason for the discontinuation of support for the older Mac version hinges on security concerns.
Ehsan Ullah

Increase Website Traffic, Comments, and SEO By Submitting Your Blog To Directories - 0 views

  •  
    When you first start a website or blog, the main concern to make your site popular start is driving traffic to the site.
Giovanni Cerri

HOW TO GET MASSIVE TRAFFIC FROM CRAIGSLIST - 1 views

  •  
    Looking for the best way to drive a massive amount of traffic to my site and my blog, I've recently stumbled upon a very interesting article about Craigslist. I've always been considering it a very primitive website, as far as the design is concerned. However, Craigslist ranks among the 25 most visited sites of the world (Alexa.com traffic rankings, april 2009) and without any doubt it's the most important classified ads platform worldwide. I know that Google Adwords is very effective, other similar advertising programs are good too, but what if we could produce the same amount of traffic (or even more) using Craigslist for free? The idea is creating an appealing advertisement (with a link pointing to our website) and posting it in multiple sections of Craigslist corresponding to the major cities of the world (highly populated cities such as New York, Los Angeles, London, Tokyo, Hong Kong, etc.). This will certainly produce a massive traffic flow. The problem is that if we post the same ad (or similar ads) in multiple cities, all our ads will be detected by Craigslist spiderbots and deleted by the staff. Even if we offer serious products we will be considered spammers, and if we insist, we will be banned .... ..... and this will happen unless we use the method discovered by Steve Mount to avoid being detected by the spiderbots and to avoid being deleted. Follow the link to read more .....
John Onwuegbu

Social Networking And Privacy Concerns - 1 views

  •  
    As Twitter sets to make its vast pool of data available for third parties and its API made accessible to developers, also working on Analytical products for advertisers, what place does users privacy occupy in the present scheme of things?
cecilia marie

Exceptional Online Computer Support Services - 1 views

I was having problems with my computer last week. I have already called a lot of downtown computer shop providers to help me with my concerns but, they just were not able to fix it. So I called On...

online PC repair

started by cecilia marie on 09 Sep 11 no follow-up yet
John Onwuegbu

Special Report: Best Practices for Making BYOD Simple and Secure | Questechie - 7 views

  •  
    The idea was initially rejected due to security concerns but more and more companies are now looking to incorporate BYOD policies, as it empower workers to choose the best device to get their work done.
John Onwuegbu

Gmail AI: What's Privacy concerns about Smart Reply? | Questechie - 3 views

  •  
    As always, skeptics have already started to question the level of users' privacy exposed in the background processing involved in Gmail Smart Reply.
Chris Voks

A NEW VERSION IMPROVEMENTS FOR QUICKBOOKS ENTERPRISE DESKTOP SUPPORT | edocr - 0 views

  •  
    Call QuickBooks Support Phone Number USA for technical support on all QuickBooks Accounts Software issues. Get instant resolution for all technical issues by QuickBooks expert concerns via phone. QuickBooks technical team well skilled and trained professionals which is provide instant solutions of your QuickBooks errors support. Call at +1-800-518-1838 toll-free number.
Chris Voks

Robert Pattinson: Synchronize Outlook & QuickBooks Payroll/Accounting Software - 0 views

  •  
    QuickBooks is a US-based enterprise which performs multitasking services. QuickBooks is fine for small and medium measurement organization. QuickBooks help deals in accounts, payroll, etc. and provides all aid to users if any doubt or bother in QuickBooks software. QuickBooks guide presents consumer to remedy QuickBooks problems. QuickBooks Support Phone Number provide all aid concerning QuickBooks Payroll, accounting, consignment payment, on line trouble etc. QuickBooks Payroll Support Number +1-800-518-1838 provide to help customers, for QuickBooks issues.
kaitlynadam

Website Designing Lahore | Website Development Company Pakistan - 0 views

  •  
    Website Development is the major concern for any kind of businesses, organizations, industries for their online existence to boost their businesses and to update with their clients for their new products information. Ad concepts is here to guide clients for best Website Development & Web Designing in Lahore Pakistan. It is very difficult to search a Website Development Company in Lahore Pakistan for those who are going to start their businesses online. In this competitive market Website Development clients Lahore are finding best Website Development Services ideas and to promote their business online searching best SEO Services Companies. They want to publish and promote their business under a best search engine optimization company's surrounding. You should hand over your projects only those companies who have their presence on local address and provide their clients a professional website design.
lanasmith001

A Comprehensive Guide to VPN Protocols and Which One is Right for You - 0 views

  •  
    Layout your requirements and concerns; the risk model is also included there. Once you have a clear idea, ask the VPN service provider to launch the suitable protocol. Another thing you need to be concerned about is the budget. Is it convenient and aligning the offered services and accessibilities for a definite duration?
Janos Haits

meta.ai - 10 views

  •  
    "meta is a Wi-Fi-based automation system enabling device control from the web."
  •  
    that's good but I think, it still needs some improvement concerning today's mobile based web...any ways great work ..
Helen Baxter

Enterprise Web 2.0 :: Web 2.0 Re-examined: Part 2 - What is Web 2.0? - 1 views

  • What Is Web 2.0? Web 2.0 is the next evolution of the web that has a new usage paradigm as well as a new technology paradigm. The former is characterized by “architecture of participation” and the latter is characterized by “architecture of partition”. The “Consumer-centric” View Causes Confusion There is no doubt that the “web 2.0” phenomenon is ignited by the success of consumer websites like MySpace, YouTube and Flickr.  From these consumer website, analysts established “social networking” via the network effect as a key feature of web 2.0. Though it is possible that enterprise oriented social computing applications may emerge to address specific enterprise concerns, it is not clear how social networking can change enterprise IT on a more fundamental level. Analysts further characterized “Architecture of Participation” as another key element of web 2.0, as evident from YouTube and Flickr. Similarly it is unclear whether/how “architecture of participation” would impact enterprise IT mission. Enterprise IT’s mission is simple: to enable and facilitate the interaction and integration of IT systems and people. There is no doubt that web 2.0 applications like blogs and wikis based on “architecture of participation” can be useful to enterprises, but is there anything beyond blogs and wikis? The key technology behind most consumer web 2.0 websites, Ajax, is not new. The popular “mashup” concept sounds new but in reality is based on what has been built into the browser for many years. The “consumer-centric” perspective limits how we look at the technology aspect of web 2.0 and leads to the conclusion that web 2.0 involves no technology advancement. Further, “architecture of participation”, “social networking” and “harness the collective intelligence” are all usage patterns. They do not relate to technology. In fact, they can be supported well on web 1.0 technologies; reinforcing the common belief that web 2.0 has no technology foundation but rather a buzzword created by marketers.  The Differences between Web 1.0 and Web 2.0 Tim O’Reilly observed the differences between web 1.0 and web 2.0 from a consumer perspective in his original essay: Web 1.0   Web 2.0 DoubleClick --> Google AdSense Ofoto --> Flickr Akamai --> BitTorrent mp3.com --> Napster Britannica Online --> Wikipedia personal websites --> blogging evite --> upcoming.org and EVDB domain name speculation --> search engine optimization page views --> cost per click screen scraping --> web services publishing --> participation content management systems --> wikis directories (taxonomy) --> tagging ("folksonomy") stickiness --> syndicationFrom Consumer Web 1.0 to Consumer Web 2.0    From an enterprise perspective, web 2.0 introduces a very different set of changes:  Web 1.0   Web 2.0 Browser --> Application Client Container HTML --> Declarative application markup HTTP(pull, unreliable) --> Push, pub/sub, reliable Application Server --> Mashup Server Appilcation Integration --> Enterprise Mashup/SOA Press release --> Corporate blogs Packaged software --> On demand/Saas Close source --> Open source Top down (dictatorship) --> Bottom up (democracy) Superbowl Ad/TV --> Google AdFrom Enterprise Web 1.0 to Enterprise Web 2.0 The Two Pillars: Consumer Web 2.0 and Enterprise Web 2.0 Web 2.0 has two pillars: consumer web 2.0 and enterprise web 2.0. These two do overlap, in particular, in the area of social computing. Consumer web 2.0 and enterprise web 2.0 have different characteristics, as shown below: Consumer Web 1.0   Enterprise Web 2.0 Architecture of Participation Architecture of Partition Social networking On Demand computing/SaaS Harness collective intelligence Enterprise social computing HTML Mashup Enterprise mashup Rich User Experience Rich User Experience The Web As Platform The Web As PlatformKey Characteristics of Consumer Web 2.0 and Enterprise Web 2.0 The technology paradigm shifts with web 2.0 brings tremendous, tangible and measurable ROI to corporate IT. Further, the new possibilities enabled by web 2.0 such as social computing are bringing corporate IT to new horizons.
Clif Mims

Making the Shift Happen - 0 views

  • shift from the “computer class” mindset to an “integrated” technology program
  • very similar problems, very similar history
  • very similar ideas
  • ...4 more annotations...
  • same fears, concerns and questions
  • why isn’t there a common process or framework to work through
  • why isn’t there a common understanding of what needs to be done to move forward?
  • why aren’t more teachers arriving at schools with some background in this model of teaching and learning
ruhul122

Older Gambling - Why Older persons Love Gambling More In comparison with Anything Else! - 1 views

In this US gambling has turn into a widespread task. Research have been displaying a regular increase in the number of individuals who are becoming hooked on to gambling each year. There are usual...

started by ruhul122 on 16 Nov 19 no follow-up yet
 Prime Legal Translation Services

Danish Legal Translation Services in JLT, Dubai, UAE - 1 views

  •  
    Companies that offer translation services in Dubai: A lot of companies across the region offer translation services in Dubai too. In fact, Dubai has become one of the most sought-after outsourcing destinations in the world. Companies in Dubai offer document translation services that include interpretation of legal documents such as contracts, travel documents, birth certificates, divorce papers, divorce decrees, property deeds, financial documents, and even the marital status of the individual concerned. Not only this, but companies in Dubai offer interpretation services of some Muslim holy texts (such as the Quran), which can be very helpful in establishing Muslim faith and customs in the country.
1 - 20 of 22 Next ›
Showing 20 items per page