Technical Report CS-2000-07 [101] Robison WJ (2010) Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act

Total Page:16

File Type:pdf, Size:1020Kb

Technical Report CS-2000-07 [101] Robison WJ (2010) Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act cHiPSet - Research Work Results Grant Period 1 vi Preface This document is the report of the research work of the cHiPSet members. It surveys the recent develop- ments on infrastructures and middleware for Big Data modelling and simulation. The detailed taxonomy of Big Data systems for life, physical, and socio-economical applications. is also presented. vii Contents 1 Introduction .................................................................. 1 Joanna Ko lodziej, Micha l Marks and Ewa Niewiadomska-Szynkiewicz References . 2 2 Infrastructure for Big Data processing ........................................... 3 George Mastorakis, Rajendra Akerkar, Ciprian Dobre, Silvia Franchini, Irene Kilanioti, Joanna Ko lodziej, Micha l Marks, Constandinos Mavromoustakis, Ewa Niewiadomska-Szynkiewicz, George Angelos Papadopoulos, Magdalena Szmajduch and Salvatore Vitabile 2.1 Introduction to Big Data systems architecture . 3 2.2 Clusters, grids, clouds . 6 2.3 CPU/GPU and FPGA computing . 17 2.4 Mobile computing . 21 2.5 Wireless sensor networks . 37 2.6 Internet of things . 42 References . 52 3 Big Data software platforms .................................................... 61 Milorad Tosic, Valentina Nejkovic and Svetozar Rancic 3.1 Cloud computing software platforms . 61 3.2 Semantic dimensions in Big Data management . 61 References . 69 4 Data analytic and middleware .................................................. 71 Mauro Iacono, Luca Agnello, Albert Comelli, Daniel Grzonka, Joanna Ko lodziej, Salvatore Vitabile and Andrzej Wilczynski´ 4.1 Multi-agent systems . 71 4.2 Middleware for e-Health . 75 4.3 Evaluation of Big Data architectures . 80 References . 84 5 Big Data representation and management ....................................... 93 Viktor Medvedev, Olga Kurasova and Ciprian Dobre 5.1 Solutions for Data Mining and Scientific Visualization . 94 ix x Contents 5.2 Data fusion, aggregation and management . 109 References . 118 6 Resource management and scheduling ........................................... 123 Florin Pop, Magdalena Szmajduch, George Mastorakis, Constandinos Mavromoustakis 6.1 Resource management in data centres . 123 6.2 Scheduling for Big Data systems . 123 7 Energy aware infrastructure for Big Data ........................................ 125 Ioan Salomie, Joanna Kolodziej, Micha l Karpowicz, Piotr Arabas, Magdalena Szmajduch, Marcel Antal, Ewa Niewiadomska-Szynkiewicz, Andrzej Sikora, George Mastorakis, Constandinos Mavromoustakis 7.1 Introduction . 125 7.2 Taxonomy of energy management in modern distributed computing systems . 126 7.3 Energy aware CPU control . 127 7.4 Energy aware schedulers . 130 7.5 Energy aware interconnections. 141 7.6 Offloading techniques for mobile devices . 148 References . 153 8 Big Data security ............................................................. 163 Agnieszka Jak´obik 8.1 Main concepts and definitions . 163 8.2 Big Data security . 164 8.3 Methods and solutions for security assurance BD systems . 166 8.4 Summary . 174 References . 174 Index ............................................................................. 177 List of Contributors Ewa Niewiadomska-Szynkiewicz Institute of Control and Computation Engineering, Warsaw University of Technology, Poland, e-mail: [email protected] Rajendra Akerkar Western Norway Research Institute, Norway, e-mail: [email protected] Luca Agnello Department of Biopathology and Medical Biotechnologies, University of Palermo, Italy, e-mail: [email protected] Marcel Antal Technical University of Cluj-Napoca, Romania, e-mail: [email protected] Piotr Arabas Institute of Control and Computation Engineering, Warsaw University of Technology, Poland, e-mail: [email protected] Albert Comelli Department of Biopathology and Medical Biotechnologies, University of Palermo, Italy, e-mail: [email protected] Ciprian Dobre University Politehnica of Bucharest, Romania, e-mail: [email protected] Silvia Franchini University of Palermo, Italy, e-mail: [email protected] Daniel Grzonka xi xii List of Contributors Institute of Computer Science, Cracow University of Technology, Poland, e-mail: [email protected] Mauro Iacono Seconda Universit`a degli Studi di Napoli, Italy, e-mail: [email protected] Agnieszka Jak´obik Institute of Computer Science, Cracow University of Technology, Poland, e-mail: [email protected] Micha l Karpowicz Research and Academic Computer Network, Warsaw, Poland, e-mail: [email protected] Irene Kilanioti Department of Computer Science, University of Cyprus, Nicosia, Cyprus, e-mail: [email protected] Joanna Ko lodziej Institute of Computer Science, Cracow University of Technology, Poland, e-mail: [email protected] Olga Kurasova Vilnius University, Institute of Mathematics and Informatics, Lithuania, e-mail: [email protected] Micha l Marks Research and Academic Computer Network, Warsaw, Poland, e-mail: [email protected] George Mastorakis Technological Educational Institute of Crete, Greece, e-mail: [email protected] Constandinos Mavromoustakis Department of Computer Science, University of Nicosia, Cyprus, e-mail: [email protected] Viktor Medvedev Vilnius University, Institute of Mathematics and Informatics, Lithuania, e-mail: [email protected] Valentina Nejkovic University of Nis, Faculty of Electronic Engineering, Department of Computer Science, Laboratory of Intelligent Information Systems, Serbia, e-mail: [email protected] George Angelos Papadopoulos List of Contributors xiii Department of Computer Science, University of Cyprus, Nicosia, Cyprus, e-mail: [email protected] Svetozar Rancic University of Nis, Faculty of Science and Mathematics, Department for Computer Science, Serbia, e-mail: [email protected] Ioan Salomie Technical University of Cluj-Napoca, Romania, e-mail: [email protected] Andrzej Sikora Research and Academic Computer Network, Warsaw, Poland, e-mail: [email protected] Magdalena Szmajduch Institute of Computer Science, Cracow University of Technology, Poland, e-mail: [email protected] Milorad Tosic University of Nis, Faculty of Electronic Engineering, Department of Computer Science, Laboratory of Intelligent Information Systems, Serbia, e-mail: [email protected] Salvatore Vitabile University of Palermo, Italy, e-mail: [email protected] Andrzej Wilczynski´ Institute of Computer Science, Cracow University of Technology, Poland, e-mail: [email protected] Chapter 1 Introduction Joanna Ko lodziej, Micha l Marks and Ewa Niewiadomska-Szynkiewicz Distributed computing paradigm endeavors to tie together the power of large number of resources which are distributed across a network. Each user has its own requirements and needs which is being shared among the network through proper communication channel [2]. There are three major reasons for using distributed computing paradigm. Such networks are necessary for generating the data that are required for the execution of tasks on remote resources. Second, most of the parallel applications have multiple processes that run concurrently on many nodes communicating over a high-speed interconnect. The use of high performance distributed systems for parallel applications is beneficial as compared to a single Central Processing Unit (CPU) machine for practical reasons. The ability of services distributed in a wide network is low-cost and makes the whole system scalable and adapted to achieve the desired level of the performance efficiency. Third, the reliability of the distributed system is higher than a monolithic single processor machine. A single failure of one network node in a distributed environment does not stop the whole process as compared to a single CPU resource. Some techniques for achieving reliability on a distributed environment are check pointing and replica- tion. Scalability, reliability, information sharing, and information exchange from remote sources are the main motivations for the users of distributed systems [1]. Distributed High Performance Computing (HPC) systems will drive progress in high energy physics, chemistry and material science, shape aeronautics, automotive and energy industries, they will also sup- port world-wide efforts to solve emerging problems of climate change, economy regulation and medicines development. Indeed, HPC systems are viewed as strategic resources for Europe’s future. Nonetheless, implementing such systems faces different new technological challenges, the major ones including reduc- tion of energy and power consumption. Modelling and simulation offer suitable abstractions to manage the complexity of analysing Big Data in various scientific and engineering domains. This document describes survey of the state-of-the-art Joanna Kolodziej Institute of Computer Science, Cracow University of Technology, Poland, e-mail: [email protected] Micha lMarks Research and Academic Computer Network, Warsaw, Poland, e-mail: [email protected] Ewa Niewiadomska-Szynkiewicz Institute of Control and Computation Engineering, Warsaw University of Technology, Polande-mail: [email protected]. edu.pl 1 2 Joanna Ko lodziej, Micha l Marks and Ewa Niewiadomska-Szynkiewicz of infrastructures and middleware for Big Data modelling and simulation. Furthermore, it provides the comprehensive full taxonomy of Big Data systems for life, physical, and socio-economical applications. The attention is focused on the following topics: • Big Data infrastructure (clouds & grids, GPU, FPGA, IoT, WSN, mobile computing), • Big
Recommended publications
  • Lo Hemos Olvidado Todo
    PERSPECTIVAS nº39 marzo/abril 2007 DEL MUNDO DE LA COMUNICACIÓN sumario Lo hemos olvidado todo HUBO UN TIEMPO EN EL QUE POR ENCIMA DE LAS DIFERENCIAS IDEO- LÓGICAS, LOS PERIODISTAS ESPAÑOLES COMPARTÍAN UN PACTO NO EX- Lo hemos olvidado todo PLÍCITO ACERCA DEL TRATAMIENTO INFORMATIVO DE LOS ACTOS TE- pág.1 RRORISTAS. LAS BASES ERAN UN ESCRUPULOSO RESPETO A LAS VÍCTI- MAS, INFORMAR SIN ENTORPECER LA INVESTIGACIÓN Y NO HACER EL JUEGO A LOS TERRORISTAS. Concentración y pluralismo informativo La prioridad era respetar la digni- sar de las peticiones de las asocia- en Europa dad de las víctimas y sus familiares. ciones de víctimas de no emitirlas. Lo secundario, pero no por ello me- Un episodio lamentable de intromi- pág.2 nos importante, conciliar el derecho sión gratuita en una circunstancia a la información con el deber de no tan íntima como es la muerte o el do- entorpecer la investigación policial. lor. La metamorfosis de un buscador Por último, evitar a toda costa cual- en un metamedio quier tentación de instrumentalizar la La democracia se sostiene en la plu- información con fines partidistas. Du- ralidad de opiniones que, llevada al pág.4 rante décadas los medios respetaron campo de la comunicación, se ha en mayor o menor medida estas re- de concretar en la independencia y glas de juego y las aplicaron a los autonomía de los profesionales de la Perspectivas del numerosos atentados que ETA ha co- información, la ausencia de presio- cine polaco reciente metido en nuestro país. Sin embar- nes exteriores y el rigor informativo, basado en el contraste de las noti- pág.6 go, toda la madurez alcanzada por los informadores en la cobertura de cias.
    [Show full text]
  • Operationalizing Design Fiction with Anticipatory Ethnography
    1 – We will add this chapter heading, 2 line spaces after Operationalizing Design Fiction with Anticipatory Ethnography HighWire Centre for Doctoral Training, Lancaster University (UK) JOSEPH LINDLEY DHRUV SHARMA ROBERT POTTS Transmuting the entanglement of situations, contexts, artifacts and people, designers mediate the relationship between ‘what could be’ and ‘what is’. All design, then, has an implicit relationship with the future. Latency will always exist as part of this relationship, between the inception of a design concept, development and delivery of that concept, and the manifestation of that concept’s potential impact on the world. As we move further into the heart of the Digital Revolution these periods of latency decrease, whilst the breadth and depth of potential impacts increase. Always an arm’s length away, but with a velocity and mass greater than at any point in history, the momentum of the future today is greater than ever before. This paper describes the practicalities of operationalizing design fiction, using anticipatory ethnography, in order to illuminate and explore the implications of plausible near futures and in doing so allowing designers and their designs to match the velocity of the future before critical impacts occur. By harnessing designers' speculation can we make the future’s ‘what is’ better than simply ‘what could be’? The universe of possible worlds is constantly expanding and diversifying thanks to the incessant world-constructing activity of human minds and hands. Literary fiction is probably the most active experimental laboratory of the world-constructing enterprise (Lubomír 1998). BACKGROUND Anticipatory ethnography looks at design fiction artifacts (cf. Bleecker 2009; Lindley 2015), and applies ethnographic techniques to them in order to produce actionable insights (Lindley, Sharma, and Potts 2014).
    [Show full text]
  • Beyond Assessment: Recognizing Achievement in a Networked World Downes, Stephen
    NRC Publications Archive Archives des publications du CNRC Beyond assessment: recognizing achievement in a networked world Downes, Stephen NRC Publications Archive Record / Notice des Archives des publications du CNRC : https://nrc-publications.canada.ca/eng/view/object/?id=ac803139-7450-4ab7-acd8-be85a13ffb16 https://publications-cnrc.canada.ca/fra/voir/objet/?id=ac803139-7450-4ab7-acd8-be85a13ffb16 Access and use of this website and the material on it are subject to the Terms and Conditions set forth at https://nrc-publications.canada.ca/eng/copyright READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THIS WEBSITE. L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site https://publications-cnrc.canada.ca/fra/droits LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE WEB. Questions? Contact the NRC Publications Archive team at [email protected]. If you wish to email the authors directly, please see the first page of the publication for their contact information. Vous avez des questions? Nous pouvons vous aider. Pour communiquer directement avec un auteur, consultez la première page de la revue dans laquelle son article a été publié afin de trouver ses coordonnées. Si vous n’arrivez pas à les repérer, communiquez avec nous à [email protected]. Beyond Assessment: Recognizing Achievement in a Networked World For ePIC 2014 (11th July, Greenwich) Stephen Downes What does it take to be a Dean at MIT? "Ms. Jones had received the institute’s highest honor for administrators, the M.I.T. Excellence Award for Leading Change.“ But no degree.
    [Show full text]
  • Regulating Adwords: Consumer Protection in a Market Where the Commodity Is Speech
    CANNON (final) 2/7/2009 12:22:41 PM REGULATING ADWORDS: CONSUMER PROTECTION IN A MARKET WHERE THE COMMODITY IS SPEECH Alex W. Cannon∗ All current forms of activity tend towards advertising and most exhaust themselves therein. Not necessarily advertising itself, the kind that is produced as such—but the form of advertising, that of a simplified operational mode, vaguely seductive [and] vaguely consensual.1 I. INTRODUCTION We should be elated, we should be concerned, yet we should not be surprised. Google2 can read our minds, tell us what we want to purchase, assist us in fulfilling our most personal and closely guarded desires, further our businesses, update us on current events, make decisions for us, educate us, and keep us healthy. Some consumers “can’t think of anything [they] don’t search for.”3 The aforemen- tioned sentiments resonate throughout an eight-minute Internet flash video made for the Museum of Media History entitled EPIC: 2014, which predicts that Google will merge with Amazon.com, TiVo, Blogger, and various social networking tools to create the “Google ∗ J.D. Candidate, 2009, Seton Hall University School of Law. B.F.A., 2003, Web- ster University. The author wishes to thank Professor Frank Pasquale for his invalu- able assistance; his parents for their continued love and support; and his friends in New York, New Jersey, and Atlanta. Finally, the author wishes to thank Larry Page and Sergey Brin for their nonpareil research assistance. 1 JEAN BAUDRILLARD, Absolute Advertising, Ground-Zero Advertising, in SIMULACRA AND SIMULATION 87, 87 (Shelia Faria Glaser trans., Univ.
    [Show full text]
  • Asterisk Revisited: Debating a Right of Reply on Search Results
    Brooklyn Law School BrooklynWorks Faculty Scholarship 2008 Asterisk Revisited: Debating a Right of Reply on Search Results Frank Pasquale Follow this and additional works at: https://brooklynworks.brooklaw.edu/faculty Part of the Internet Law Commons, and the Science and Technology Law Commons FRANK PASQUALE* Asterisk Revisited: Debating a Right of Reply on Search Results I. INTRODUCTION WHAT DO WE WORRY ABOUT WHEN WE WORRY ABOUT GOOGLE? Will the company combine the worst aspects of Microsoft, ChoicePoint, WalMart, Experian, and News Corporation?' Or will its "Don't Be Evil" slogan and unique ownership struc- ture assure some accountability to the public?2 Some of the most creative minds in cyberlaw, science fiction, and cultural studies have addressed those questions.3 Some have envisioned Google-driven dystopiasi In Cory Doctorow's story Scroogled, the Department of Homeland Security out- sources so much surveillance to Google that the company becomes a new J. Edgar . Associate Professor of Law, Seton Hall Law School. I wish to thank James Grimmelmann for his comments on a draft of this Essay. I certainly have not been able to respond to all of his comments, but thank him for the kind of open-minded conversation that right-of-reply at its best facilitates. 1. Google has a uniquely dominant place in the universe of search engines and for that reason will be the primary focus of this Essay. It is aiming to combine social networking, software, database, media, and retail capabilities in an unprecedented way. At the time of this writing (November 2007), its market capitalization made it the fifth largest company in the United States, and few companies are unafraid of its potential to restructure their markets.
    [Show full text]
  • Access, Fairness, and Accountability in the Law of Search Oren Bracha
    Cornell Law Review Volume 93 Article 11 Issue 6 September 2008 Federal Search Commission - Access, Fairness, and Accountability in the Law of Search Oren Bracha Frank Pasquale Follow this and additional works at: http://scholarship.law.cornell.edu/clr Part of the Law Commons Recommended Citation Oren Bracha and Frank Pasquale, Federal Search Commission - Access, Fairness, and Accountability in the Law of Search, 93 Cornell L. Rev. 1149 (2008) Available at: http://scholarship.law.cornell.edu/clr/vol93/iss6/11 This Article is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Law Review by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. FEDERAL SEARCH COMMISSION? ACCESS, FAIRNESS, AND ACCOUNTABILITY IN THE LAW OF SEARCH Oren Bracha & Frank Pasqualet Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this Article, we make the case for some regulation of the ability of search engines to ma- nipulate and structure their results. We demonstrate that the First Amend- ment, properly understood, does not prohibit such regulation. Nor will such intervention inevitably lead to the disclosure of important trade secrets. After setting forth normativefoundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalizedsearch may constrain abusive companies to some extent, they have little chance of check- ing untoward behavior by the oligopolists who now dominate the search mar- ket.
    [Show full text]
  • Alice E. Marwick [email protected] |
    Marwick 1 Alice E. Marwick [email protected] | http://www.tiara.org ACADEMIC APPOINTMENTS University of North Carolina, Chapel Hill 2017 – Assistant Professor, Department of Communication Faculty Affiliate, UNC Center for Media Law and Policy Data and Society Research Institute, New York, NY 2016 – 2016-2017 Fellow; Faculty Advisor, Media Manipulation Initiative Fordham University, Bronx, NY 2014 – 2016 Director, McGannon Center for Communication Research Fordham University, Bronx, NY 2012 – 2016 Assistant Professor, Department of Communication and Media Studies Academic Affiliate, Center on Law & Information Policy, Fordham University School of Law Microsoft Research New England, Cambridge, MA 2010 – 2012 Postdoctoral Researcher, Social Media Collective Supervisor: Dr. danah boyd EDUCATION PhD New York University, New York, NY 2005 – 2010 Media, Culture, and Communication Dissertation: “Status Update: Celebrity, Publicity and Self-Branding in Web 2.0” Committee: Dr. Marita Sturken (chair), Dr. Helen Nissenbaum, Dr. Gabriella Coleman Readers: Dr. Fred Turner, Dr. danah boyd MA University of Washington, Seattle, WA 2003 - 2005 Communication Thesis: “Selling Your Self: Identity Online in the Age of a Commodified Internet” Committee: Dr. David Silver (chair), Dr. Beth Kolko, Dr. Crispin Thurlow BA Wellesley College, Wellesley, MA 1994 - 1998 Political Science and Women’s Studies (cum laude) RESEARCH INTERESTS Social media, privacy and surveillance, celebrity and consumer culture, information policy, gender and technology, technology industries, far-right internet subcultures, youth and technology Marwick 2 BOOKS Marwick, A. (under contract). Hidden: Networked Privacy and Those Left Out (working title). New Haven: Yale University Press. Marwick, A. (2013). Status Update: Celebrity, Publicity and Branding in the Social Media Age. New Haven: Yale University Press.
    [Show full text]
  • Surveillance and Privacy in the Implementation of Google Apps For
    EER0010.1177/1474904116654917European Educational Research JournalLindh and Nolin 654917research-article2016 General submission European Educational Research Journal 1 –20 Information We Collect: © The Author(s) 2016 Reprints and permissions: Surveillance and Privacy sagepub.co.uk/journalsPermissions.nav DOI: 10.1177/1474904116654917 in the Implementation of eerj.sagepub.com Google Apps for Education Maria Lindh The Swedish School of Library and Information Science, University of Borås, Sweden Jan Nolin The Swedish School of Library and Information Science, University of Borås, Sweden Abstract The aim of this study is to show how Google’s business model is concealed within Google Apps for Education (GAFE) as well as how such a bundle is perceived within one educational organisation, consisting of approximately 30 schools. The study consists of two parts: 1) a rhetorical analysis of Google policy documents and 2) an interview study in a Swedish educational organisation. By making an implicit demarcation between the two concepts (your) ‘data’ and (collected) ‘information’ Google can disguise the presence of a business model for online marketing and, at the same time, simulate the practices and ethics of a free public service institution. This makes it problematic for Swedish schools to implement Google Apps for Education, bearing in mind Google’s surveillance practices for making profits on pupil’s algorithmic identities. From a front end viewpoint of Google Apps for Education, the advantages of the services are evident to the users, and emerge in the study, whereas back end strategies are relatively hidden. Keywords Cloud computing, algorithmic identities, Google Apps for Education (GAFE), privacy, surveillance economy Introduction This study focuses on digital surveillance in relation to public cloud services in Swedish schools.
    [Show full text]
  • Messing with the Magic PART TWO - the Google Story
    Table of Contents Title Page Copyright Page Dedication PREFACE PART ONE - Different Planets CHAPTER ONE - Messing with the Magic PART TWO - The Google Story CHAPTER TWO - Starting in a Garage CHAPTER THREE - Buzz but Few Dollars CHAPTER FOUR - Prepping the Google Rocket CHAPTER FIVE - Innocence or Arrogance? CHAPTER SIX - Google Goes Public CHAPTER SEVEN - The New Evil Empire? PART THREE - Google Versus the Bears CHAPTER EIGHT - Chasing the Fox CHAPTER NINE - War on Multiple Fronts CHAPTER TEN - Waking the Government Bear CHAPTER ELEVEN - Google Enters Adolescence CHAPTER TWELVE - Is "Old" Media Drowning? CHAPTER THIRTEEN - Compete or Collaborate? CHAPTER FOURTEEN - Happy Birthday PART FOUR - Googled CHAPTER FIFTEEN - Googled CHAPTER SIXTEEN - Where Is the Wave Taking Old Media? CHAPTER SEVENTEEN - Where Is the Wave Taking Google? Acknowledgements NOTES INDEX ALSO BY KEN AULETTA Media Man: Ted Turner's Improbable Empire Backstory: Inside the Business of News World War 3.0: Microsoft and Its Enemies The Higbwaymen: Warriors of the Information Superhighway Three Blind Mice: How the TV Networks Lost Their Way Greed and Glory on Wall Street: The Fall of the House of Lehman The Art of Corporate Success: The Story of Schlumberger The Underclass Hard Feelings The Streets Were Paved with Gold THE PENGUIN PRESS Published by the Penguin Group Penguin Group (USA) Inc., 375 Hudson Street, New York, New York 10014, U.S.A. Penguin Group (Canada), 90 Eglinton Avenue East, Suite 700, Toronto, Ontario, Canada M4P 2Y3 (a division of Pearson Penguin Canada Inc.). Penguin Books Ltd, 80 Strand, London WC2R ORL, England. Penguin Ireland, 25 St. Stephen's Green, Dublin 2, Ireland (a division of Penguin Books Ltd).
    [Show full text]
  • Administrator Guide, Dragon Medical Practice Edition Version 2.0, L-3659
    Dragon Medical Practice Edition 2 Administrator Guide 1 Dragon Medical Practice Edition 2 Administrator Guide Copyright 2013. Dragon Medical Practice Edition 2. This material may not include some last-minute technical changes and/or revisions to the software. Changes are periodically made to the information provided here. Future versions of this material will incorporate these changes. No part of this manual or software may be reproduced in any form or by any means, including, without limitation, electronic or mechanical, such as photocopying or recording, or by any information storage and retrieval systems, without the express written consent of Nuance Communications, Inc. Specifications are subject to change without notice. Copyright © 2002-2013 Nuance Communications, Inc. All rights reserved. Nuance, ScanSoft, the Nuance logo, the Dragon logo, Dragon, DragonBar, NaturallySpeaking, NaturallyMobile, RealSpeak, Nothing But Speech (NBS), Natural Language Technology, Select-and-Say, MouseGrid, and Vocabulary Editor are registered trademarks or trademarks of Nuance Communications, Inc. in the United States or other countries. All other names and trade- marks referenced herein are trademarks of Nuance Communications or their respective owners. Designations used by third- party manufacturers and sellers to distinguish their products may be claimed as trademarks by those third-parties. Adobe and Acrobat are registered trademarks of Adobe Systems Incorporated. AMD is a trademark of Advanced Micro Devices, Inc. America Online is a registered trademark of America Online, Inc., a division of AOL Time Warner. Corel and WordPerfect are registered trademarks of Corel Corporation. iPAQ is a registered trademark of the Hewlett-Packard Company. Lotus and Lotus Notes are registered trademarks of Lotus Development Corporation.
    [Show full text]
  • A Study of Emerging Opportunities for Digital Print Production of User-Generated Content Javier Rodriguez-Borlado Martinez
    Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 10-1-2008 A study of emerging opportunities for digital print production of user-generated content Javier Rodriguez-Borlado Martinez Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Martinez, Javier Rodriguez-Borlado, "A study of emerging opportunities for digital print production of user-generated content" (2008). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. A Study of Emerging Opportunities for Digital Print Production of User-Generated Content by Javier Rodríguez-Borlado Martínez A Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Print Media in the College of Imaging Arts and Sciences of the Rochester Institute of Technology October 2008 Primary Thesis Advisor: Professor Frank Cost Secondary Thesis Advisor: Professor J. Fernando Naveda Table of Content Abstract ……………………………………………………………………….…..……. v Chapter 1 – Introduction and Statement of the Problem …………….…………….1 Statement of the Problem ……………………………………….…………….1 Background …………………………………………………………………… 3 Present Significance ………………………………………………………….. 4 Reasons for Interest in the Study ……………………………………..…….. 5 Chapter 2 - Literature Review .. ………………………………………………..……. 7 “The Perfect Storm” . …………………………………………………………..7 One by One, Customer by Customer, Item by Item . ……………………….8 The Web Evolution …………………………………………………..………..10 Web 1.0: Information Provider ………………………………………10 Web 2.0: User-Created Content ………………………..……..…… 12 Web 2.5: Social Networking ………………………………………… 12 The Printing Evolution ………………………………………………………. 15 Access to Information ……………………………………………………….
    [Show full text]
  • When Chaos Rules, Only the Fittest Survive: the Impact of Disruptive Technologies on Organizational Survival
    FEATURE When Chaos Rules, Only the Fittest Survive: The Impact of Disruptive Technologies on Organizational Survival By Deepak Sarup, CISA, FCA But if variations useful to any organic being ever do Some 70 years later, another major shift is taking place in occur, assuredly individuals thus characterized will have the movie business. DVD sales and rental revenues have the best chance of being preserved in the struggle for overtaken the box office revenue from cinema tickets by more life. This principle of preservation, or the survival of the than two times in the US. Yet most studios today still conceive fittest, I have called Natural Selection. new productions with a strong bias on the return from box —Charles Darwin, The Origin of Species (1859) office proceeds, as they have little or no knowledge of the preferences of the end consumer with respect to DVD tastes ailing around the Galapagos Islands on board the and the even newer video-on-demand channel. The latter, H.M.S. Beagle in the early 1830s, Charles Darwin was though small, is growing rapidly and may soon overtake both S “much struck with certain facts in the distribution of the the box office and DVD revenues. Not surprisingly, a major organic beings inhabiting South America.”1 Mulling over these shakeout is likely in the near future, and the studios that are facts led him to formulate and publish, some 25 years later, the unable to adapt to the new delivery technologies will probably new and hugely controversial, at least for that time, theory of face the same end as the weaker species so laboriously evolution.
    [Show full text]