Make your own eBooks

Use our Remix App to mix & match content. In minutes make your own course packs, training bundles, custom travel guides, you name it. Even add your own title & cover.


Slices & Articles Get by the slice or add to your own ebook

Medium 9781855758223

CHAPTER ONE: A strategic aim

Slice ePub May 22, 2014

“The war of absolute enmity knows no bracketing. The constant fulfillment of absolute enmity provides its own meaning and justification”

(Schmitt, 2007)

Problems of definition

The word terror is of Latin origin and the concept refers to the sensation of unmitigated fear and anxiety that is unleashed by sudden confrontation with death. One of the presuppositions of terrorism is that individuals will be prepared to sacrifice their autonomy and independence for the sake of escaping from this fear. Arousing panic is indeed a way of securing the enslavement of another person. Submerging the other in death anxiety is the aim of terrorism, a form of violence directed towards the generation of fear. The object of this violence is to bend the victim to the terrorist’s will.

However, a definition that emphasizes the effect of fear on human beings is not an adequate political description of terrorism. Furthermore, present-day terrorism shows a different face from that of the past, owing to the destructive potential of modern weapons, and because the aims and the political instigators of terrorism are not the same. For this reason, it is difficult to give an unambiguous definition of the phenomenon of terrorism, which, as certain authors (e.g., Twemlow & Sacco, 2002) point out, is in fact influenced by the social and political values of the time.

See more

Medium 9780596527938

Chapter 21. Detecting and Enforcing Coding Standards with Checkstyle**Some of the material in this chapter appeared in it’s first

Slice PDF May 27, 2014


Detecting and Enforcing Coding

Standards with Checkstyle

21.1 Using Checkstyle to Enforce Coding Standards

Checkstyle is an open source tool that enforces coding conventions and best practice rules for Java code. Although it was originally designed to enforce coding standards, it now lets you verify coding best practices as well, in much the same way as PMD

(Chapter 22) and FindBugs (Chapter 23). It works by analyzing Java source code and reporting any breach of standards. It can be integrated into your favorite IDE via a plugin so that developers can immediately see and correct any breaches of the official standards. It can also be used to generate project-wide reports that summarize the breaches found.

Checkstyle comes “out-of-the-box” with the standard Sun conventions, including more than 120 rules and standards, dealing with issues that range from code formatting and naming conventions to Enterprise JavaBean (EJB) best practices and code complexity metrics. Checkstyle supports standards related to the following:

See more

Medium 9781617835544

Welcome to Asia!

Source: Gibbons
Slice PDF May 08, 2014

Medium 9781491947937

4. Management and Monitoring

Slice ePub March 11, 2015

Building and keeping tabs on a big data architecture can be a daunting task. You’ve got a diverse set of software spread out across many machines that might have dramatically different configurations. How can you tell if part of your system is failing, and how do you bring that component back up after you’ve fixed the problem? How can the different parts of your system communicate with on another so they can do big jobs with many moving parts?

Fortunately, the big data ecosystem provides a variety of tools to ease the burden of managing and monitoring your architecture. We’re going to address three primary categories of these tools:

These are tools like Puppet or Chef that can help you manage the configuration of your systems. They do things like change operating system parameters and install software.

While many individual components in your architecture may come with tools to monitor the performance of that specific component, sometimes you need a single dashboard or insight into something that isn’t tied to a specific tool.

See more

Medium 9781782200307

Chapter Ten: The Psychoanalyst between Uncanny Reality and Factual Reality

Slice ePub May 24, 2014


The psychoanalyst between uncanny reality and factual reality

Freud's (1915b) effort to define transference-love ran into a major problem. His declared aim was to help the analyst, faced with intense transference phenomena, to continue to maintain his analytic posture, his self-imposed abstinence and interpretative position. In order to be able to keep his sights on the goals of the analytic process and the ultimate change in the patient, the analyst must not give in to the temptations offered by the transference, be they falling in love or venting his aggression. Freud's attempt to help the analyst maintain his analytic posture under the onslaught of infatuation and eroticised attraction rested on two essential premises: that the patient's love is unreal because it represents a resistance; and again, that the patient's love is unreal because it is a reenacted manifestation of infantile love. Freud thus warned the analyst that the phenomenon created, evolved, and presented to him in the transference is essentially unreal, a creature of the treatment situation, and therefore must not be yielded to or participated in, but needs to be analysed.

See more

See All Slices

0 Items 0.0 Mb
Sub-total $0.00
or drag to add content