This site lets users to execute full-text queries to search Google's C4 Dataset. Our hope is this will help ML practitioners better understand its contents, so that they're aware of the potential biases and issues that may be inherited via it's use.
The dataset is released under the terms of ODC-BY. By using this, you are also bound by the Common Crawl Terms of Use in respect of the content contained in the dataset.
You can read more about the supported query syntax
here
. Each record has two fields, url
and text
, both of
which are searchable. The fields are indexed using the
Standard analyzer,
which means you can't search for punctuation.
-
https://blog.linkedin.com/2012/07/24/intern-hackday-2012-hristo
Editor’s Note: LinkedIn’s 2nd Annual Intern Hackday is on August 3rd, 2012. To get an idea of what goes down at Intern Hackday, check out this recap by Hristo Oskov whose team placed 3rd in our first Intern Hackday last summer. LinkedIn went all out to make sure the hackday was as smooth and as fun as possible. Food was always coming in, even at 3am, and there were enough drinks and snacks to keep everyone caffeinated throughout the night. After hacking all night, each team presented their hacks; 15 teams were picked as finalists and got to present to guest judges Kevin Scott, Omar Hamoui, and James Gosling for a chance to win prizes (Macbook Airs and iPads). I was stunned to find out my team's hack was selected as one of the winners, placing in 3rd, and I felt truly honored when the judges recognized our work. We got to meet James Gosling (the creator of Java!), who suggested that we launch our hack: "[...] some of the most successful companies started off as just a box [...]". A little while later, http://justbeamit.com was live. It was not by chance that the hackday was so awesome: it reflected every bit of LinkedIn's unique culture. I'm ecstatic to be joining LinkedIn full-time in August and to see what happens at the 2012 Intern Hackday, which takes place on August 3rd! I'm super excited to see this year's hacks!
-
http://www.hakubi.us/foundation/2009/04/850-sun-microsystems-is-calling-you-a-bigot/
No, seriously. If you supported marriage and Proposition 8 in California, Sun says you’re a bigot. Sun, through its website spokeslefty James Gosling apparently also despises Mormons. Their position on Jews is unspecified at this time. Bah. Solaris was junk since they rewrote it away from BSD, anyway. So avoiding them is no real loss to me.
-
https://www.computerworlduk.com/it-vendors/oracle-refuses-to-talk-about-free-java-campaign-3240584/
A key Oracle executive declines to comment on the effort driven by Java founder James Gosling. While Java founder James Gosling has campaigned for Oracle to place Java under the jurisdiction of an independent foundation, Oracle is declining to comment at all on the notion. Asked about Gosling's efforts during a press question-and-answer session at the Oracle OpenWorldo, Thomas Kurian, executive vice president of product development, simply declined to comment. Gosling has sought to hold Oracle's feet to the fire on an effort the company supported in 2007 to have the Java Community Process become an independent, vendor-neutral standards organisation. That was before Oracle bought Sun Microsystems, which had jurisdiction over Java at the time. Oracle completed its Sun acquisition in January. Kurian touted Java capabilities and ambitions for mobile devices, stressing there are 31 times more Java-enabled mobile phones shipping every year than Apple iPhone and Google Android combined. "I would not underestimate our capability [of] delivering a new Java platform" in this space, Kurian said. Also, John Fowler, Oracle executive vice president of systems, said the final version of the Solaris 11 Unix OS is due next year. Oracle's Cloud Office collaborative application suite, meanwhile, is nearing a milestone. The suite is for the web and mobile devices. "We're right on the edge of having a preview for it," said Edward Screven, Oracle chief corporate architect.
-
http://blog.igorminar.com/2007/03/docjavasuncom-multilingual-javadoc-and.html
If you are a Java developer, the doc.java.sun.com site is worth checking out. I don't care so much for the translations part of the project, but what is great is that you have access to both JavaDocs as well as the source files of JDK6. James Gosling announced the project in mid October and since then the site matured a lot!
-
http://moviescoremedia.com/screamworks/the-hallow-james-gosling/
James Gosling’s Screamfest Award-winning score to The Hallow is the first addition to the ScreamWorks Records catalogue in 2016. Co-written and directed by Corin Hardy, The Hallow is set in the misty woods of Ireland, a spooky and incredibly effective setting that’s a character in its own right. The film tells the tale of a family who move into a remote mill house just to find themselves in a fight for survival with demonic creatures living in the forest. The Hallow collected three awards at the Toronto After Dark Film Festival (including Best Horror Film) and swept five awards at the 2015 Screamfest (including one for Best Original Score). The score to The Hallow is a musical journey that follows the emotional trajectory of our central characters Adam, Claire and their newborn baby” explains composer James Gosling about his approach to the film. It begins with the setting of the tone and place – the uncertainty of unfamiliar Irish shores. The score gradually helps to further fray the nerves as the local villagers make it clear their presence is unwelcome, until finally, and without giving too much away, we are embroiled in a tale of terror and sacrifice, and of love versus evil.” The Screamworks album also features the eerie song ‘The Woods’ performed by Sea Read. Composer James Gosling completed his masters in ‘Music for the Screen’ at the National, Film and Television School in Beaconsfield. After graduating from the NFTS, he went on to assist Rob Lane on projects like the HBO mini-series John Adams, BBC’s flagship fantasy-adventure series Merlin, and it’s successor Atlantis. Currently splitting his time between the UK and France, James is now working on Lego’s recently announced animation series Nexo Knights. MovieScore Media’s previous releases of Rob Lane’s Merlin series include selected cues from Gosling as well.
-
https://patents.justia.com/inventor/james-gosling?page=2
James Gosling has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO). Abstract: A program interpreter for computer programs written in a bytecode language, which uses a restricted set of data type specific bytecodes. The interpreter, prior to executing any bytecode program, executes a bytecode program verifier procedure that verifies the integrity of a specified program by identifying any bytecode instruction that would process data of the wrong type for such a bytecode and any bytecode instruction sequences in the specified program that would cause underflow or overflow of the operand stack. If the program verifier finds any instructions that violate predefined stack usage and data type usage restrictions, execution of the program by the interpreter is prevented. After pre-processing of the program by the verifier, if no program faults were found, the interpreter executes the program without performing operand stack overflow and underflow checks and without performing data type checks on operands stored in operand stack. As a result, program execution speed is greatly improved. Abstract: An intuitive graphical user interface is based upon a geographic map structure, and includes a system for controlling remote external electronic devices. In the defined graphical user interface, each space of the geographic map structure is rendered on a touch screen display as a graphic image of a geographic space. Within each space are colored cartoon-like icons called "objects" which can be selected and manipulated by the user. Certain objects, referred to as portals, transport the user from one space to another space when Selected. Other objects, referred to as buttons, perform associated actions or functions when Selected. The graphical user interface is displayed on a hand-held display device used to control remote devices. Each remote electronic device transmits a user interface program object that defines a graphical user interface to the display device. Abstract: The present invention provides a verifier for use in conjunction with programs utilizing data type specific bytecodes for verifying the proper operation of the executable program prior to actual execution by a host processor. A verifier is provided which includes a virtual stack for temporarily storing stack information which parallels the typical stack operations required during the execution a bytecode program. The verifier also includes a stack snapshot storage structure having a snapshot directory and stack snapshot storage area for storing the state of the virtual stack at various points during program verification so as to assure proper stack manipulations by the source program. A two step source program verification process is provided for in which the source program is initially loaded into the verifier and a first pass source program evaluation is performed. Abstract: A class loader downloads objects and object viewers from remote computer nodes, and invokes locally stored object viewers to view objects. When a user selects an object to view, a conventional downloading of the referenced object is initiated. The class loader, however, utilizes data type information received at the beginning of the object downloading process to determine if a viewer for the referenced object is available on the user's workstation. If an appropriate view is not locally available, the class loader automatically locates an appropriate viewer on the server from which the object is being downloaded, or from any other appropriate server known to the user's workstation. The class loader downloads the located viewer and then invokes a program verification procedure to verify the integrity of the downloaded viewer before the viewer is executed. Abstract: A method and apparatus for displaying user selectable advertising information or other user selectable informational images on a host computer. In a preferred embodiment, a user accessing the World Wide Web via a browser application is concurrently displayed user selectable advertising information on a predefined portion of the host computer screen. In this embodiment, an advertising application is executed concurrently with the browser application. The advertising application is an object oriented program that includes a data structure for storing methods and data pointers. The methods define the creation of the dedicated portion of the user screen display for displaying the advertising information, methods for selecting the particular information to be displayed, as well as methods for accessing additional information related to the displayed advertisement images. Abstract: A method and apparatus for operating a local server computer of a client-server network includes a technique to receive a request from a client computer of the client-server network. A determination is made whether the request requires dynamically generated information from a servlet object of the client-server network. If so, a specified servlet object corresponding to the request may be uploaded from a remote server computer of the client-server network. The specified servlet object is then executed to obtain dynamically generated information corresponding to the request. Abstract: A program compiler identifies each symbol in a source program that references another program. For each identified symbol, the compiler determines whether the symbol is a reference to a remotely located file or to a locally stored file. If the identified symbol is a reference to a remotely located file, it constructs a file location identifier, such as a URL, for the identified symbol, performs a file location identifier based fetch of the remotely locate file, and ads at least a portion of the fetched file to a set of program code to be compiled if the fetch is successfully performed. If the identified symbol is a reference to a locally stored file, it performs a file fetch for the locally stored file, adding at least a portion of the fetched file to the set of program code to be compiled if the file fetch is successfully performed. If the fetch is unsuccessful, compilation of the source program is aborted. Abstract: A hybrid compiler-interpreter comprising a compiler for "compiing" source program code, and an interpreter for interpreting the "compiled" code, is provided to a computer system. The compiler comprises a code generator that generates code in intermediate form with data references made on a symbolic basis. The interpreter comprises a main interpretation routine, and two data reference handling routines, a dynamic field reference routine for handling symbolic references, and a static field reference routine for handling numeric references. The dynamic field reference routine, when invoked, resolves a symbolic reference and rewrites the symbolic reference into a numeric reference. After rewriting, the dynamic field reference routine returns to the main interpretation routine without advancing program execution to the next instruction thereby allowing the rewritten instruction with numeric reference to be reexecuted.
-
https://www.technicalseek.com/java-programs/
Java Programming is an object oriented programming language. Java programming is improvement in the art of programming. Java is simple and powerful object oriented language which has taken most of the features from c++ programming. Java programming is introduced by James gosling from sun Micro systems in 1991. The first version of java is introduced in 1995. Lets see JAVA practice programs.
-
https://patents.justia.com/inventor/james-gosling?page=3
Abstract: Source code to be protected, a software application writer's private key, along with an application writer's license provided to the first computer. The application writer's license includes identifying information such as the application writer's name as well as the application writer's public key. A compiler program executed by the first computer compiles the source code into binary code, and computes a message digest for the binary code. The first computer then encrypts the message digest using the application writer's private key, such that the encrypted message digest is defined as a digital "signature" of the application writer. A software passport is then generated which includes the application writer's digital signature, the application writer's license and the binary code. The software passport is then distributed to a user using any number of software distribution models known in the industry. Abstract: Full-motion animation video is displayed in a computer system through use of sprite objects. The sprite objects define the images on the output display, and the locations of the sprite objects are changed to create the animation. The computer system includes three areas of physical memory assigned the status of a front buffer, a back buffer, and a cache buffer. The front buffer stores a frame currently displayed on the output display. The cache buffer is utilized to store a subset of the sprite objects so that all sprite objects need not be rendered for each frame of animation. The contents of the cache buffer are copied to the back buffer during display of the front buffer. To display a subsequent frame, the front and back buffers are switched. A cache buffer permits display of full-motion animation by minimizing use of processor and computer resources. Abstract: A digital wiring configuration comprises a switch control allowing a user to select a function to control a corresponding electrical device. A control unit couples electrical power to the electrical devices through power outlets. The control unit allows an operator to dynamically configure the switch controls to operate electrical devices at specified power outlets. Upon selection of a function on the switch control, the switch control transmits both a switch state, indicative of the function selected, and a switch identification that uniquely identifies that switch control. The control unit receives the switch state and the switch identification and generates a device identification uniquely identifying the power outlet corresponding to the control switch. The control unit transmits the device identification and the switch state to the power outlets. The corresponding power outlet is selected through the device identification and executes the function in accordance with the switch state. Abstract: A hybrid compiler-interpreter comprising a compiler for "compiling" source program code, and an interpreter for interpreting the "compiled" code, is provided to a computer system. The compiler comprises a code generator that generates code in intermediate form with data references made on a symbolic basis. The interpreter comprises a main interpretation routine, and two data reference handling routines, a dynamic field reference routine for handling symbolic references, and a static field reference routine for handling numeric references. The dynamic field reference routine, when invoked, resolves a symbolic reference and rewrites the symbolic reference into a numeric reference. After rewriting, the dynamic field reference routine returns to the main interpretation routine without advancing program execution to the next instruction, thereby allowing the rewritten instruction with numeric reference to be reexecuted. Abstract: In the image generation method and apparatus of the present invention, an image generation apparatus is provided in which a digital halftone cell of threshold values is generated and broken down into a plurality of tiles determined from the locations of the four corners of the halftone cell. The tiles when put together form a bounding box around the halftone cell. These tiles are arranged into a threshold array of threshold values wherein the width of the array is equal to the number of threshold values in a sequence of threshold values across a row of contiguous tiles and the height of the array is equal to the greatest common denominator of the x axis increment and y axis increment between vertices of the halftone cell.The threshold array is stored in memory for subsequent reference during the halftoning process. Abstract: A computer system comprising a display memory, a window indentification memory, logic circuitry for ascertaining that information to be stored at each position of the display memory is in the correct window by comparing the window number in the window identification memory with the window number of information to be sent to the display memory, and a window identification look-up table activated by window identification signals for providing an output to select the number of bits of color information to be output from the display memory to provide color information for an output device.
-
http://lists.w3.org/Archives/Public/ietf-http-wg-old/1995MayAug/0083.html
> shouldn't do it the same way. > > * The first byte in file is byte number 1. > Blech. I'd rather it were 0. No biggie. Base 0 is fine for bytes but would be problematic for other ranges. > > multiple values are encoded in the FORM request). > reference syntax in HTML. > Save everybody a little grief. Next message: James Gosling: "Re: Byte ranges -- formal spec proposal"
-
http://gotocon.com/aarhus-2010/speaker/James+Gosling
James Gosling is known as the father of the Java programming language, and since 1984 Gosling has been with Sun Microsystems. He created the original design of Java and implemented its original compiler and virtual machine. For this achievement he was elected to the United States National Academy of Engineering. He has also made major contributions to several other software systems, such as NeWS and Gosling Emacs. He cowrote the "bundle" program, a utility thoroughly detailed in Brian Kernighan and Rob Pike's book The Unix Programming Environment. Software Passion: I'm an omnivore. Tools and Science are extra tasty. Presentation: Tweet"Datamining the brains of mechanical engineers or 130MPH where??" I've been helping build the software for an autonomous racecar. The really interesting bits are peering into the brains of scientists and mechanical engineers. Time is a totally different concept than is typically in computer science. Somehow, we've become too discrete.