Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An empirical investigation of command-line customization

View through CrossRef
AbstractThe interactive command line, also known as the shell, is a prominent mechanism used extensively by a wide range of software professionals (engineers, system administrators, data scientists, etc.). Shell customizations can therefore provide insight into the tasks they repeatedly perform, how well the standard environment supports those tasks, and ways in which the environment could be productively extended or modified. To characterize the patterns and complexities of command-line customization, we mined the collective knowledge of command-line users by analyzing more than 2.2 million shell alias definitions found on GitHub. Shell aliases allow command-line users to customize their environment by defining arbitrarily complex command substitutions. Using inductive coding methods, we found three types of aliases that each enable a number of customization practices:Shortcuts(fornicknaming commands,abbreviating subcommands, andbookmarking locations),Modifications(forsubstituting commands,overriding defaults,colorizing output, andelevating privilege), andScripts(fortransforming dataandchaining subcommands). We conjecture that identifying common customization practices can point to particular usability issues within command-line programs, and that a deeper understanding of these practices can support researchers and tool developers in designing better user experiences. In addition to our analysis, we provide an extensive reproducibility package in the form of a curated dataset together with well-documented computational notebooks enabling further knowledge discovery and a basis for learning approaches to improve command-line workflows.
Title: An empirical investigation of command-line customization
Description:
AbstractThe interactive command line, also known as the shell, is a prominent mechanism used extensively by a wide range of software professionals (engineers, system administrators, data scientists, etc.
).
Shell customizations can therefore provide insight into the tasks they repeatedly perform, how well the standard environment supports those tasks, and ways in which the environment could be productively extended or modified.
To characterize the patterns and complexities of command-line customization, we mined the collective knowledge of command-line users by analyzing more than 2.
2 million shell alias definitions found on GitHub.
Shell aliases allow command-line users to customize their environment by defining arbitrarily complex command substitutions.
Using inductive coding methods, we found three types of aliases that each enable a number of customization practices:Shortcuts(fornicknaming commands,abbreviating subcommands, andbookmarking locations),Modifications(forsubstituting commands,overriding defaults,colorizing output, andelevating privilege), andScripts(fortransforming dataandchaining subcommands).
We conjecture that identifying common customization practices can point to particular usability issues within command-line programs, and that a deeper understanding of these practices can support researchers and tool developers in designing better user experiences.
In addition to our analysis, we provide an extensive reproducibility package in the form of a curated dataset together with well-documented computational notebooks enabling further knowledge discovery and a basis for learning approaches to improve command-line workflows.

Related Results

Company-customer interaction in mass customization
Company-customer interaction in mass customization
Advances in manufacturing and information technologies have made it possible for firms to satisfy consumers’ increasing demand for unique products. Although, the mass customization...
Combating Information Overload by Means of Information Customization Systems
Combating Information Overload by Means of Information Customization Systems
The evolution of the Internet into the Global Information Infrastructure has led to an explosion in the amount of available information. The result is the “information overload” of...
Development of modular product architecture through information management
Development of modular product architecture through information management
PurposeThe aim of this paper is to investigate the importance of information management in modular product architecture for customized product development.Design/methodology/approa...
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations
Vendor-Agnostic Reconfiguration of Kubernetes Clusters in Cloud Federations
Kubernetes (K8s) defines standardized APIs for container-based cluster orchestration so it becomes possible for application managers to deploy their applications in a unified manne...
OCOM: The United States Needs an Oceanic Command
OCOM: The United States Needs an Oceanic Command
This article argues that the current poor state of the U.S. Navy reflects a larger problem: the lack of a global maritime security portfolio in the United States’ defense schema. I...
Using Social Networking Tools for Teaching the English Directive Speech Act of Command to Undergraduate Arab EFL Learners
Using Social Networking Tools for Teaching the English Directive Speech Act of Command to Undergraduate Arab EFL Learners
This study investigates the effectiveness of using social networking tools for teaching the speech act of command to undergraduate Arab EFL learners. Employing an experimental pre-...
Some Support Vector Regression Machines with Given Empirical Risks Partly
Some Support Vector Regression Machines with Given Empirical Risks Partly
<p>There are often some prior requirements about empirical risk in regression problems. To meet these requirements, this paper firstly proposes two novel support vector regre...
The Dilemma Of Disobedience: An ERP study
The Dilemma Of Disobedience: An ERP study
AbstractThe present experiment aimed at investigating the decision-making and the associated event-related potentials (ERPs) of subordinates under hierarchical pressure. Participan...

Back to Top