85 Chapters
  Title Author Publisher Format Buy Remix
Medium 9780874217506

Chapter 4 - The Forward as Folklore: Studying E-Mailed Humor

Trevor J. Blank Utah State University Press ePub


Folklore in the Age of Electronic Reproduction: Text and Context

On Sunday afternoon, 12 February 2006, I checked the New York Times website, as has been my custom since 9/11, to see if anything horrendous had happened since the morning papers arrived on my doorstep. The breaking news was that Vice President Dick Cheney had accidentally shot a quail-hunting buddy in Texas (Kornblut 2006).

The timing of the story was remarkable for me personally. The day before the shooting I had asked a friend to help me collect topical folklore, which I refer to as newslore (Frank 2004), by asking his friends to send me any e-mailed items they received. That Sunday morning, I had made the same request of readers of my column in the local newspaper (Frank 2006). By the end of that week I had hauled in forty-six jokes: thirteen Bush jokes, nine Cheney jokes, six Enron jokes, three Bill and/ or Hillary Clinton jokes, and fifteen miscellaneous jokes, half of which I would consider newslore (see the appendix at the end of this chapter for a sampling).

See All Chapters
Medium 9780874217506

Chapter 8 - Public Folklore in Cyberspace

Trevor J. Blank Utah State University Press ePub


In 1985 I was working with the Kentucky Center for the Arts in Louisville as a fieldworker for the Kentucky Folk Project. The project was funded by a grant from the National Endowment for the Arts, and it consisted of a twelve-county survey of folk arts in north-central Kentucky. Four months of fieldwork resulted in presentations at the center’s festival, the Kentucky Folklife Celebration. Additional activities included a traveling exhibit entitled “Patterns between the Rivers: Tradition in North-Central Kentucky.” During the course of the project, fieldworkers documented a range of Kentucky folk arts, including blues music, quilt-making, old-time fiddling, johnboat building, tobacco twisting, weaving, woodcarving, beekeeping, and dozens of other forms of expressive culture. The project provided me with many firsts: the opportunity to work as a public folklorist, assist with a folklife festival, and see photographs that I had taken featured in an exhibit (Feintuch 1988, 1). It also was my first exposure to the use of computers in public programming. I open with this example to illustrate several of the activities of public folklorists, as well as to foreground some of the salient issues involved in using computers in public presentations of folklife.

See All Chapters
Medium 9781939902016

Chapter 2: Test Driven Development

Casey Foster, Aidan Feldman, David Tonge, Phil Freo and Tim Branyen Bleeding Edge Press ePub

Imagine you are in charge of building an airplane. Would you simply create all of the various airplane parts, put them together, and then hope that the plane flies? Of course not! You'd set up strict testing requirements and quality assurance guidelines for each part individually as well as the integration of the parts. Think about software in the same way: each part must be tested, both separately, and together, to know if it works properly.

Most people start out by testing their code manually. This approach usually means writing some JavaScript, loading it into the browser, and manually trying out the feature to see if it runs without error and does what you expect. If it works, you're happy and move on. If it doesn't then you keep trying new things until it does.

The problem with this typical manual testing approach is that a feature that works properly today may accidentally break when you add or change more code later. Often times you may break something that you didn't even know was related to what you were working on. The larger an application gets, the more things can go wrong, and it becomes increasingly difficult to manually test all of the parts of your application.

See All Chapters
Medium 9780795317217

Chapter 12. Caution!

Matthew Murdoch and Treion Muller FranklinCovey RosettaBooks, LLC ePub

Making the move online can be challenging. But with the right resources, tools, and rules, you will be the spark that ignites your virtual training. We have provided a few action plans from the book that will help you in the transition from live to virtual training.

See All Chapters
Medium 9781939902009

Chapter 8. Filters

Christopher Hiller Bleeding Edge Press ePub

What's a filter?  At its most basic it's a function that takes multiple inputs and gives you one output.  Typically a filter outputs primitives, less typically arrays, and rarely objects.  I suppose they could output functions too (as an exercise to the reader, please ascertain that use case).  They're a way to execute logic against a model or models that only the view cares about.  For instance, you may be working with a number as an integer in the controller, but when it hits the view, it needs to be displayed formatted (like 9,000).  This of course is nothing the controller should be concerned with, and for this, you would use a filter (the built-in number filter, to be precise).

Let's add a filter to our blog application. Here's something trivial that you can do with CSS, but if you don't want to for some reason, you can use a filter:

Now if we have something in the view that needs capitalizing, just write {{something|capitalize}}; problem solved. You'll notice that we evaluate the truthiness of s and its stringness; if we're passed an empty string or a non-string we'll just do nothing and return what we were passed. I like this pattern of writing filters, but others may disagree.

See All Chapters
Medium 9780596008680

SIP Methods and Responses

Theodore Wallingford O'Reilly Media PDF

Appendix A


SIP Methods and Responses

Table A-1 shows SIP methods.

Table A-1. Methods


A SIP device is being invited to participate in a call.


Confirms that the client has received a final response to an INVITE request.


Terminates a SIP call. Can be sent by any party involved.


Cancels any pending call but does not terminate a call that has already been connected.


Queries the capabilities of servers without requesting to establish a call.


Registers an IP with a SIP registrar.


Insures reliability of provisional 1xx responses if a UAS offers them.


Updates a previously made offer for a not-yet-established session.


Initiates a call transfer by telling the recipient (specified by URI) to contact a third party using the contact information provided in the request.


Subscribes to be notified of an event occurrence; for example a user presence update.


Used to notify that an event has occurred.


A method signifying the payload is an instant message.

See All Chapters
Medium 9780795304699

Chapter 2 - Move With the Speed of Trust

Stephen R. Covey, Robert Whitman and Breck England FranklinCovey RosettaBooks, LLC ePub

“Widespread distrust in a society…imposes a kind of tax on all forms of economic activity, a tax that high-trust societies do not have to pay.”
Francis Fukuyama, Economist

“In the mountains,” trust makes all the difference.

Great Ormond Street Hospital in London has earned a reputation 150 years in the making at the forefront of children’s services in all aspects of care, especially critical surgeries.

But at one point some years ago, seven infants died in quick succession following heart surgery. The surgical teams involved were devastated. Clearly, something was wrong somewhere. Not only was the crisis causing the public to lose confidence in them, they were also losing confidence in themselves.

A great deal of researching—and soul-searching—went into the investigation of these failures. Soon they learned that the most dangerous time in the surgical procedure wasn’t in the operation or the intensive-care unit, but in the journey between the two. According to Dr. Martin Elliott, “You have to disconnect the baby from a lot of kit, put it onto a trolley, move it down a corridor, reconnect to another bunch of kit, and transfer a lot of knowledge about the baby from one tired team to a new, fresh team.”

See All Chapters
Medium 9780795317217

Chapter 1. The Learning Explosion

Matthew Murdoch and Treion Muller FranklinCovey RosettaBooks, LLC ePub

Making the move online can be challenging. But with the right resources, tools, and rules, you will be the spark that ignites your virtual training. We have provided a few action plans from the book that will help you in the transition from live to virtual training.

See All Chapters
Medium 9780596008680

Asterisk Manager Socket API Syntax

Theodore Wallingford O'Reilly Media PDF

Appendix C


Asterisk Manager Socket API Syntax

AbsoluteTimeout Channel Timeout

Sets an absolute timeout in seconds for the specified channel. The call will be ended after the time has elapsed. The following example limits the call on the current channel to 10 minutes:

Action: AbsoluteTimeout

Channel: SIP/201

Timeout: 600

ChangeMonitor Channel File

Equivalent of ChangeMonitor( ).

Action: ChangeMonitor

Channel: Zap/1-1

File: Zap1-1-incsound

Command command

Execute the specified dial-plan command. The command must include all arguments necessary for it to work.

GetVar Channel Variable

Gets a variable from the specified channel.

Hangup Channel

Hangs up specified channel. Equivalent to SoftHangup( ).


Lists IAX peers. Equivalent of IAX2 show peers CLI command.


Lists available Manager API commands.


Closes the connection to the Manager.

MailboxCount Mailbox

Gets the message count for the specified mailbox.

MailboxStatus Mailbox

Gets the message-waiting indication for the specified mailbox.

See All Chapters
Medium 9781936111343

Manifesto Principle 5 : Humanize the Screen

Matt Murdoch Treion Muller FranklinCovey Publishing ePub

We’ve tolerated and nurtured the webinar as it is for years. We’ve made some real advances and done some very cool things. But we still have a long way to go. We don’t believe that webinars can continue to evolve incrementally, like some single-celled amoeba waiting another million years to get closer to the edge of the ooze and start growing some legs. And so we’re declaring war on bad webinars, and we want you to join us. We want you to join us in committing to KEEP doing the things that work and STOP doing the things that don’t work, that never worked…THAT NEVER WILL WORK.

See All Chapters
Medium 9780795317217

Chapter 11. The Rule of Sustained Orbit

Matthew Murdoch and Treion Muller FranklinCovey RosettaBooks, LLC ePub

Making the move online can be challenging. But with the right resources, tools, and rules, you will be the spark that ignites your virtual training. We have provided a few action plans from the book that will help you in the transition from live to virtual training.

See All Chapters
Medium 9781626567429

One The New Gold Rush

Moatti, SC Berrett-Koehler Publishers ePub

TL;DR Too Long; Didn’t Read

People spend more time on their mobile products than on their computers, so businesses are adjusting their strategy to focus more on mobile.

In addition, entrepreneurs are creating new types of businesses: the sharing economy.

This shift is much bigger than technology or marketing; it’s about company culture.

What guides the success of all mobile products—past, present, and future—is the Mobile Formula. It has three rules: the Body Rule, the Spirit Rule, and the Mind Rule.

Imagine for a moment that your phone bill is as high as your rent or mortgage. Would you be able to afford it? Would you cancel your smartphone plan? Would you move to a smaller and cheaper home so you could continue to pay for your phone?

In 2015, the Boston Consulting Group (BCG) published the results of a global survey showing that an average person puts an implied value of up to $6,000 on their smartphone, or more accurately on the apps that run on smartphones.8 In developing countries like China and India, this represents 40 percent of average income.

See All Chapters
Medium 9781939902016

Chapter 6: Collections

Casey Foster, Aidan Feldman, David Tonge, Phil Freo and Tim Branyen Bleeding Edge Press ePub

More often than not your client-side application will be dealing with sets of data rather than single items of data, for example: users, pages, products, documents, etc. We have looked at how Backbone represents individual items of data as Models. In this chapter we will look at how to work with multiple items of data through Backbone Collections.

From the Backbone Documentation: "Collections are ordered sets of models." Using Collections you can easily sort and manipulate your data without fetching it afresh each time from the server. Take for example an application for managing the users of a blogging system. You may want to be able to see which users have authored the most articles, which users have written the most comments, or who the newest users are. In a traditional server-based application, each time you wanted a different view of the data you would have to load a new page from the server. This is not very fast, and not really necessary as the data hasn't changed, just the order in which it is displayed. If the application were built with Backbone, then there would be a collection of user models. Sorting the users would be a simple case of calling:

See All Chapters
Medium 9781939902016

Chapter 5: Models

Casey Foster, Aidan Feldman, David Tonge, Phil Freo and Tim Branyen Bleeding Edge Press ePub

Backbone's documentation clearly and succinctly explains what Models are:

"Models are the heart of any JavaScript application, containing the interactive data as well as a large part of the logic surrounding it: conversions, validations, computed properties, and access control. You extend Backbone.Model with your domain-specific methods, and Model provides a basic set of functionality for managing changes."

Before we look in more detail at how Backbone Models work, it's important to understand why they are needed. Backbone follows the MV* architecture of separating your data (models) from how it is displayed and interacted with (views). While you could build a small JavaScript application without following any architecture, it is likely that it would be brittle and hard to maintain. There are many great resources on the MVC / MV* architecture available online, and you may well have used an MVC framework on the server, e.g. Ruby on Rails, Zend Framework, MVC ASP.Net, etc. 

The key principle to take from this is that your data and its relevant logic should be separated from your views--how you display that data to the user.

See All Chapters
Medium 9780596008680

VoIP Readiness

Theodore Wallingford O'Reilly Media PDF

Chapter 8


VoIP Readiness

Let’s face it: VoIP isn’t exactly new, but IP telephony’s readiness for enterprise consumption is a fairly recent development. When it first appeared on the Internet scene, VoIP offered the ability for people to make free long-distance calls over the

Internet. In fact, products like Internet Phone came with substantial buzz about how they let in-laws with Microsoft Windows have half-duplex speakerphone conversations through their PCs over the Net.

Lack of interoperability, poor quality of service, and a drop in traditional long-distance calling rates ultimately killed the first generation of consumer VoIP software.

The short-lived voice-over-Internet craze of the late 1990s died. VoIP is still what historians might call a disruptive technology—it is changing the status quo—but as it becomes more standardized, quality-driven, and accepted, it also becomes a more sustaining technology, just as the PSTN has been for decades. In this regard, VoIP has proven much more valuable in the enterprise than in the home.

See All Chapters

Load more