skip to main content


Search for: All records

Creators/Authors contains: "Davidson, Drew"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Millions of individuals in the United States without a computer or broadband at their residence must rely on public libraries for their Internet access. Drawing on a rich data set of interviews and participant observation at three public libraries, we explore how individuals navigate these complex settings and how they profoundly shape their digital lives and experiences, one we characterize as digital home-lessness. In this article, we identify three themes that characterize the relationship between library computer use and digital home-lessness: lifeline encompasses the diverse set of activities that require computer and broadband access; negotiating access focuses on usability, privacy, and security disadvantages among these users; and risky business concentrates on the multiplicities of insecure Internet and computing practices exacerbated by low technological capital. Our findings push forward literature on the digital divide by illuminating how the experience of digital home-lessness limits social inclusion and reproduces socioeconomic inequality. 
    more » « less
  2. Park N., Sun K. (Ed.)
  3. Application containers, such as those provided by Docker, have recently gained popularity as a solution for agile and seamless software deployment. These light-weight virtualization environments run applications that are packed together with their resources and configuration information, and thus can be deployed across various software platforms. Unfortunately, the ease with which containers can be created is oftentimes a double-edged sword, encouraging the packaging of logically distinct applications, and the inclusion of significant amount of unnecessary components, within a single container. These practices needlessly increase the container size - sometimes by orders of magnitude. They also decrease the overall security, as each included component - necessary or not - may bring in security issues of its own, and there is no isolation between multiple applications packaged within the same container image. We propose algorithms and a tool called Cimplifier, which address these concerns: given a container and simple user-defined constraints, our tool partitions it into simpler containers, which (i) are isolated from each other, only communicating as necessary, and (ii) only include enough resources to perform their functionality. Our evaluation on real-world containers demonstrates that Cimplifier preserves the original functionality, leads to reduction in image size of up to 95%, and processes even large containers in under thirty seconds. 
    more » « less