Results 61 to 70 of about 233,719 (314)
Hacking in the university: contesting the valorisation of academic labour [PDF]
In this article I argue for a different way of understanding the emergence of hacker culture. In doing so, I outline an account of ‘the university’ as an institution that provided the material and subsequent intellectual conditions that early hackers ...
Winn, Joss
core +2 more sources
Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley +1 more source
Thinking with the Animal-Hacker
In the depths of the Cumbria hills a dairy cow changes its route to stare deep into the camera lens of the ‘Environmental Virtual Observatory’ (EVO) (www.evo-uk.org).
Helen Pritchard
doaj +1 more source
In this research, a paradigm of parameter estimation method for pneumatic soft hand control is proposed. The method includes the following: 1) sampling harmonic damping waves, 2) applying pseudo‐rigid body modeling and the logarithmic decrement method, and 3) deriving position and force control.
Haiyun Zhang +4 more
wiley +1 more source
Child’s Information Security in Digital Space of the Russian Federation
Our time is the time of rapid technological development. The Internet is becoming available to everyone, and it is expanding its influence in various fields.
S. S. Dubov +2 more
doaj +1 more source
The article looks into the problematic issue of forming/developing teaching staff’s cyber security skills (a case study of the teachers from the National University of Defence of Ukraine named after Ivan Cherniakhovskyi).
Владислав Юрійович Кива +2 more
doaj +1 more source
"Why does it happen like this?". Consulting with users and providers prior to an evaluation of services for children with life-limiting conditions and their families [PDF]
Background: Children with life-limiting conditions and their families have complex needs. Evaluations must consider their views and perspectives to ensure care is relevant, appropriate and acceptable.
Hacking, Suzanne, Hunt, Anne
core
The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is ...
J. Wicherts +5 more
semanticscholar +1 more source
According to eMarketer researchers, the total number of smartphones in active use on the planet exceeded the 2 billion unit in 2016 and amounted up to 2.16 billion against 1.9 billion in 2015 and 1.6 billion devices in 2014.
Mamienko, Sergey +2 more
core
Non-defensible middle ground for experimental realism: Why we are justified to believe in colored quarks [PDF]
Experimental realism aims at striking a middle ground between scientific realism and anti-realism, between the success of experimental physics it would explain and the realism about scientific theories it would supplant. This middle ground reinstates the
Massimi, M
core +1 more source

