The coffee-shop model
نویسندگان
چکیده
منابع مشابه
A Study on the Cultural Factors Among Ahwaz Coffee-Shop Youth
The purpose of this study is a recognition of cultural effective factors(cultural capital, leisure time , religious attitude) on life style among Ahwazs coffee-shop youth. The study population included people aged between (15-35) residents in Ahwaz city and the sample size of the research is 400 persons. The method of this study is documentary for conceptual framework and a survey for cultural...
متن کاملThe Utility Coprocessor: Massively Parallel Computation from the Coffee Shop
UCop, the “utility coprocessor,” is middleware that makes it cheap and easy to achieve dramatic speedups of parallelizable, CPU-bound desktop applications using utility computing clusters in the cloud. To make UCop performant, we introduced techniques to overcome the low available bandwidth and high latency typical of the networks that separate users’ desktops from a utility computing service. ...
متن کاملYour Coffee Shop Doesn't Use Two-Phase Commit
Y ou know you're a geek when going to the coffee shop gets you thinking about interaction patterns between loosely coupled systems. This happened to me on a recent trip to Japan. One of the more familiar sights in Tokyo is the numerous Starbucks coffee shops, especially around Shinjuku and Roppongi. While waiting for my " Hotto Cocoa, " I started thinking about how a coffee shop processes custo...
متن کاملTinkering in the Model Shop
As a child, I loved building and playing with scale models of all kinds: planes, trains, and automobiles. These replicas taught me about aspects of their real counterparts and sparked many questions about their design—providing a great way to fully understand objects or processes by building them up and breaking them down. The same basic idea can apply to designing scientific visualizations, an...
متن کاملThe Cubicle vs. The Coffee Shop: Behavioral Modes in Enterprise End-Users
Traditionally, user traffic profiling is performed by analyzing traffic traces collected on behalf of the user at aggregation points located in the middle of the network. However, the modern enterprise network has a highly mobile population that frequently moves in and out of its physical perimeter. Thus an in-the-network monitor is unlikely to capture full user activity traces when users move ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: British Journal of General Practice
سال: 2016
ISSN: 0960-1643,1478-5242
DOI: 10.3399/bjgp16x684589