Skip to main content

Home/ Web 2.0 Tools/ Group items tagged coding

Rss Feed Group items tagged

Janos Haits

Kl1p.com | Your online Notepad - 17 views

  •  
    Sharing text or code over internet now made easier and faster than ever before. Kl1p is an online notepad which allows you to store any type of text whether plain or rich or even programming codes. Copy and paste texts between computers without any limitation.
chelfyn Baxter

Management and Virtual Decentralised Networks: The Linux Project - 0 views

  • A mechanistic management system is appropriate to stable conditions. It is characterised by:The Organismic form is appropriate to changing conditions. It is characterised by: Hierarchic structure of control, authority and communicationNetwork structure of control A reinforcement of the hierarchic structure by the location of knowledge of actualities exclusively at the top of the hierarchyOmniscience no longer imputed to the head of the concern; knowledge may be located anywhere in the network; the location becoming the centre of authority Vertical interaction between the members of the concern, ie. between superior and subordinateLateral rather than vertical direction of communication through the organisation  A content of communication which consists of information and advice rather than instructions and decisions
    • chelfyn Baxter
       
      This is very similar to many Web 1.0/2.0 analogies
  • Structurehierarchicalnetworked Scopeinternal/closedexternal/open Resource focuscapitalhuman, information Statestabledynamic, changing Directionmanagement commandsself-management Basis of actioncontrolempowerment to act Basis for compensationposition in hierarchycompetency level
  • However, "the Linux movement did not and still does not have a formal hierarchy whereby important tasks can be handled out ... a kind of self-selection takes place instead: anyone who cares enough about a particular program is welcomed to try" [54]. But if his work is not good enough, another hacker will immediately fill the gap. In this way, this 'self-selection' ensures that the work done is of superb quality. Moreover this "decentralisation leads to more efficient allocation of resources (programmers' time and work) because each developer is free to work on any particular program of his choice as his skills, experience and interest best dictate" (Kuwabara, 2000). In contrast, "under centralised mode of software development, people are assigned to tasks out of economic considerations and might end up spending time on a feature that the marketing department has decided is vital to their ad campaign, but that no actual users care about" [55].
  • ...4 more annotations...
  • Industrial AgeInformation Age Focus on measurable outcomesFocus on strategic issues using participation and empowerment Individual accountabilityTeam accountability Clearly differentiated-segmented organisational roles, positions and responsibilitiesMatrix arrangement - flexible positions and responsibilities Hierarchical, linear information flowsMultiple interface, 'boundaryless' information networking Initiatives for improvement emanate from a management eliteInitiatives for improvement emanate from all directions
  • There is only one layer between the community of Linux developers and Linus: the "trusted lieutenants". They are a dozen hackers that have done considerably extended work on a particular part of the kernel to gain Linus' trust. The "trusted lieutenants" are responsible to maintain a part of the Linux Kernel and lots of developers sent their patches (their code) directly to them, instead of Linus. Of course, apart from Linus that has encouraged this to happen, this informal mechanism represents a natural selection by the community since the "trusted lieutenants" are recognised [by the community] as being not owners but simple experts in particular areas [57] and thus, their 'authority' can always be openly challenged. This does not mean that Linus has more influence than they have. Recently, "Alan Cox (one of the "trusted" ones) disagreed with Linus over some obscure technical issue and it looks like the community really does get to judge by backing Alan and making Linus to acknowledge that he made a bad choice" [58].
  • In 1991, Linus Torvalds made a free Unix-like kernel (a core part of the operating system) available on the Internet and invited all hackers interested to participate. Within the next two months, the first version 1.0 of Linux was released. From that point, tens of thousands of developers, dispersed globally and communicating via the Internet, contributed code, so that early in 1993, Linux had grown to be a stable, reliable and very powerful operating system. The Linux kernel is 'copylefted' software, patented under the GNU GPL, and thus, nobody actually owns it. But more significantly, Linux is sheltered by the Open Source (hacker) community. From its very birth, Linux as a project has mobilised an incredible number of developers offering enhancements, modifications/improvements and bug fixes without any financial incentive. Despite the fact that an operating system is supposed to be developed only by a closely-knit team to avoid rising complexity and communication costs of coordination (Brook's Law), Linux is being developed in a massive decentralised mode under no central planning, an amazing feat given that it has not evolved into chaos. Innovation release early and often: Linus put into practice an innovative and paradox model of developing software. Frequent releases and updates (several times in a week) are typical throughout the entire development period of Linux. In this way, Linus kept the community constantly stimulated by the rapid growth of the project and provided an extraordinary effective mechanism of psychologically rewarding his co-developers for their contributions that were implemented in the last version. On top of this, in every released version, there is a file attached which lists all those who have contributed (code). Credit attribution if neglected, is a cardinal sin that will breed bitterness within the community and discourage developers from further contributing to the project. According to conventional software-building wisdom, early versions are by definition buggy and you do not want to wear out the patience of your users. But as far as the Linux development stage is concerned, developers are the users themselves and this is where most innovation is created (Figure 8). "The greatest innovation of Linux is that treating your users as co-developers is your least-hassle route to rapid code improvement and effective debugging" (Raymond, 1998a).
  •  
    It's a great article
my mashable

Disable YouTube's related videos With a Simple Hack Code - 0 views

  •  
    Disable YouTube's related videos With a Simple Hack Code - YouTube added the feature "related videos" wayback in 2007. Iam sure every YouTube user come across with this feature. Once the video completes playing, will displays a list of related videos..." />
Janos Haits

Learn to code | Codecademy - 17 views

  •  
    Codecademy is the easiest way to learn how to code. It's interactive, fun, and you can do it with your friends.
Kellen Harkins

TouchDevelop - 22 views

  •  
    Create apps everywhere! TouchDevelop is a programming environment that runs on your mobile devices. TouchDevelop runs on iPad, iPhone, Android, PC, Mac, Windows Phone.
  • ...1 more comment...
  •  
    if you want best news like this. Or follow. Your article in here www.killdo.de.gg
  •  
    Website to help you create apps for iPad, iPhone, Android, PC, Mac and Windows Phone! Teaches basic coding too.
  •  
    Website to help you create apps for iPad, iPhone, Android, PC, Mac and Windows Phone! Teaches basic coding too.
writerjack777

Download mcafee with activation code | mcafee download - 0 views

  •  
    In the process of download McAfee with the activation code, it may take several minutes. So, what you have to do is to be calm and patient until the process gets completed. First and foremost, requisite to install McAfee retail card activation is the possession of that retail card.
web4study

Pulse Code Modulation (PCM) - 0 views

  •  
    The most common technique to change an analog signal to digital data (digitization) is called pulse code modulation (PCM). A PCM encoder has three processes, as shown in Figure 4.21. 1.
Aline Ohannessian

Free Wordpress Theme Generator No Coding Required! | Design Marketing Advertising Free ... - 35 views

  •  
    Create your very own wordpress theme without touching code! with the awesome free wordpress theme generator :o)
mrexamples

Python Online Compiler (interpreter / Editor) - 0 views

  •  
    Python online compiler lets you write, share, and compile Python code online - It's the quickest and easiest Python's online compiler for almost all versions. It is not dependent on any installation on your device, so there is no compatibility issue when you run your Python code. It saves you time and money over installing software and buying licenses for incompatible tools.
anonymous

BAZAAR SMS | SMS Provider in Patna | Bulk SMS Provider in Patna | Promotional SMS Provi... - 0 views

  •  
    We Deal With Missed Call,Bulk SMS,Transactional SMS,Promotional SMS,Voice SMS,ivr Solution,Short Code,Long Code,Toll Free Service Provider Company in Patna,Bihar
Helen Baxter

Google AJAX Search API - Wizards - 0 views

  • Google AJAX Search API Wizards Here are some easy ways to enhance your site with Google search without writing any code. The wizards allow you to easily implement some of our most popular solutions based on the AJAX Search API. All you need to do is customize how you want the solution to appear, tell us where you want the solution to run, and confirm that you accept our terms and conditions. The wizards will write all the code for you to copy and paste.
webartist

Design Feeds - 0 views

  •  
    A collection of design related articles, resources, comments and inspiration. Designfeeds.com.au provides easy to use and up to date information on anything design. From design inspiration to CSS and coding techniques, Designfeeds.com.au refreshes every 10 minutes and grabs new articles from a growing resource of respected websites.
Eloise Pasteur

Into the Blogosphere: Rhetoric, Community, and Culture of Weblogs: Women and Children L... - 0 views

    • Eloise Pasteur
       
      This article is interesting but makes really strong claims based on some tiny samples. They could only find ~350 active blogs for their sample and they used 16 news stories about blogging to base their conclusions about how the whole of the world sees blogging. Please!
  • Males and females are distributed unequally across the age categories, as shown in Figure 1 (for the earlier sample) and Figure 2 (for the later sample). That is, there are more female than male “teens,” and more male than female “adults.” Participation by gender is equal only in the “emerging adult” category in the later sample.
  • Age was coded into two categories for the earlier sample (adult and teen, operationalized as less than 20 years of age). For the later sample, we added an “emerging adult” category for authors between the ages of 20 and 25 (cf. Arnett, 2000), based on our impression after coding the first sample that many “adult” blog authors were in their early 20's
  • ...3 more annotations...
  • The results of the analysis of gender and age indicators reveal that the numbers of males and females, and of adults and teens, are roughly equal, especially in the later sub-sample.
  • There is also a skewed distribution of the gender and age of blog authors in relation to blog type. In a recent study, Herring, Scheidt, Bonus and Wright (2004) found evidence of three basic types of weblogs: the content of filters is external to the blogger (links to world events, online happenings, etc.), while the content of personal journals is internal (the blogger's thoughts and internal workings), and k(nowledge)-logs are repositories of information and observations with a typically technological focus. In the present study, we coded each blog in the sample as journal, filter, k-log, or mixed (a combination of two or all of the first three types).
  • Are weblogs inherently “democratizing,” in the sense of giving voice to diverse populations of users? The empirical findings reported for gender and age at the beginning of this essay suggest that they are. Yet public commentators on weblogs, including many bloggers themselves, collude in reproducing gender and age-based hierarchy in the blogosphere, demonstrating once again that even an open access technology—and high hopes for its use—cannot guarantee socially equitable outcomes in a society that continues to embrace hierarchical values.
  •  
    Discussion about blogging, and representing blogs in the modern media.
Thieme Hennis

Wufoo - HTML Form Builder - Free Contact Forms & Online Surveys - 0 views

  •  
    "Our HTML form builder helps you create contact forms, online surveys, and invitations so you can collect the data, registrations and online payments you need without writing a single line of code."
  •  
    Wufoo strives to be the easiest way to collect information over the Internet. Our HTML form builder helps you create contact forms, online surveys, and invitations so you can collect the data, registrations and online payments you need without writing a single line of code.
shravan mishra

DreamHost Discount Coupon - $50 - 0 views

  •  
    dreamhost promo code
Janos Haits

QRnote.com/ - 14 views

  •  
    QRnote is a web service where you can create your own mobile web site connected with QR code, which you can place anywhere - printed in real world, or saved on your website. Your QRnote could contain any content such as text, images, contact (vCard), event (vCalendar), or embedded discussion. The final QRnote is optimized for mobile devices.
« First ‹ Previous 41 - 60 of 267 Next › Last »
Showing 20 items per page