Appendix 1 - 5 Appendix 1 - Questionnaire for Colleges

Total Page:16

File Type:pdf, Size:1020Kb

Appendix 1 - 5 Appendix 1 - Questionnaire for Colleges Appendix 1 - 5 Appendix 1 - Questionnaire for Colleges Declaration: I, Rajeev Ghode, persuing my Ph.D. in Department of Communication Studies, Pune University. Title of Ph.D. Research is "To study potential and challenges in the use and adoption of ICT in Higher Education"For this research purpose, I want to collect quantitative data from all the professors of colleges which are affiliated to Pune University. I ensure that all the data collected will be used only for the Ph.D. research and secrecy of the data will be maintained. I appreciate you for spending your valuable time to fill this questionnaire. Thanking You <•;. Prof. Rajeev Ghode Questionnaire Name of the College Address/City 1 Arts Science and Commerce College 1 Arts Science and Commerce College with Computer Science Type of College 1 Commerce and BBA Q B.Ed. College 1 1 Law Institutional ICT Infrastructure Sr. ICT Infrastructure Yes No Provision in near No. future 1. Multimedia /Conference Hall 2. Computer Lab 3. Internet Connectivity in Campus 4. Digital Library 5. Website 6. Organization e-mail Server 7. Blog Appendix - I Sr. ICT Infrastructure Yes No Provision in near No. future 8. Presence on SNS 9. Online Admission System 10. Online/Offline Examination Application 11. Biometric Attendance 12. Student Management System 13. Professional membership for online journals Department-wise ICT Infrastructure Sr. ICT Infrastructure Yes No Provision in near No. future 1. Do you have separate Desktops for faculties in every department? 2. Do you have separate Laptops for every department? 3. Does every department have LCD Projector? 4. Does every department have printer? 5. Does every department have scanner? 6. Do all computers/laptops have Antivirus loaded? 7. Do every department computers are connected with computer Network? 8. Do ail computers/Laptops have internet access? 9. Do all computers/laptops/printer/scanner are maintained properly? 10. Do all laptops/desktops have License OS and software? 11. Do you have separate Desktops for all faculties in every department? Appendix - I Appendix 2 - Questionnaire for Teacliers Declaration: I, Rajeev Ghode, persuing my Ph.D. in Department of Communication Studies, Pune University. Title of Ph.D. Research is "To study potential and challenges in the use and adoption of ICT in Higher Education"For this research purpose, I want to collect quantitative data from all the professors of colleges which are affiliated to Pune University. I ensure that all the data collected will be used only for the Ph.D. research and secrecy of the data will be maintained. I appreciate you for spending your valuable time to fill this questionnaire. Thanking You v Prof. Rajeev Ghode Questionnaire Name Gender [^ Male 1^ Female Institution Q Post Graduate | | M.Phil Highest Educational Qualification I I Registered for M.Phil [j Registered for Ph.D n Ph.D. n Post Ph.D. I I Languages I I Social Science I I Commerce and BBA Department I I Science I I Computer Science I I Education I I Law Designation I I Professor | | Asso. Professor [ | Asst. Professor Appendix - 2 Total Years of Teaching 1^ Less than 5 years | | 5 to 10 years Experience I I 10 to 15 years | | More than 15 years Industrial/Professional Q Less than 5 years | [ 5 to 10 years Experience I I More than 15 years Ql. Please (V/) on the following Electronic and Computing Devices you have personally at home. n Desktop Q Laptop Q Printer I I Scanner 1^ Digital Camera |^ Handy Camera | | Web Ca mera I I Microphone D Smart Mobile Phone D Tablet/Ipad D Pen Dr ive I I Nothing Q2. Which type of Internet Connection you have at your home? I I Dial-up I I Broad-band |_] Wifi O 26 Dongle/SIM Q 3G Dongle/SIM I I No internet Connection at home Q3.Please (V^ ) on the following cyber registrations you have on various websites O E'"^3'' tZI Linkedin Q Skype Q Face book Q Google+ Q Twitter Q Own Web page O Own Website D BLOG D No cyber presence Q Other, Specify Q4. How do you access ICT infrastructure at your Institution/Colleges/University Department? O Desktop Q Laptop []] Tablet PC I I Smart Phone I I I don't have any facility | | Other Specify Q5. How do you access ICT infrastructure in Classroom? n Laptop Q LCD Projector Q Smart Board Q Television I I No any facility in the classroom | | | never use any of the above Appendix - 2 Q6. How do you rate yourself on the scale of 5 in using following application? 1 represents No Skill and 5 represent Advance skills. 12 3 4 5 Ms-Word 0 0 0 0 0 MS-Excel 0 0 0 0 0 MS-PowerPoint 0 0 0 0 0 MS-Access 0 0 0 0 0 Q7. Which of the following types of e-content do you use in developing your own presentations? Type of Learning Resources I don't Know I Know it, but Sometime Always what is this? I never used Only Text Text with appropriate Picture/Imaoe/Diasram/Photo Audio Clips Video Clips 2D Flash Animations 3D Animations Simulation Applications Other than specify 1 do not use any of the above Q8. Which of the following learning resources do you use in developing your own presentations? Type of Learning Resources I don't Know 1 Know it, but Sometime Always what is this? 1 never used Wikipedia Online Research Journals E-books Presentations available on internet Digital Library Interactive Multimedia CD ROMs/ Packages Online Open Courses Youtube Appendix - 2 Q9. Which of the following Applications you use in creating e-content for the presentations? Type of Learning Resources I don't Know I Know it, but Sometime Always what is this? I never used Microsoft PowerPoint Adobe Photoshop Flash Acrobat reader/writer Other than specify I do not use any of the above QIO. Which of the following devices you use in creating e-content for the presentations? Type of Learning Resources I don't Know I Know it, but Sometime Always what is this? I never used Digital camera Mobile Phones Camcorder Scanners Audio voice recorder Other than specify 1 do not use any of the above Q12. Please (V^ ) on the following Google Applications which you use to manage your teaching-learning and research activities. 1 1 Gmail 1^ Google Maps [^ Google News \_\ Youtube n Google Scholar • Google Books • Google Calendar | Google Translation 1 Google Transliteration Not any | | Other, Specify Q13. For searching on Internet, which search engine you prefer to use 0 Google Q Yahoo Q MSN 0 Altavista (^ 1 don't use search engines fj) Other, Specify Q14. Please (V^ ) on the following Search Types you apply to search the required information from Internet. • Basic Search • Advance Search • Image Search | | Google Scholar 1 1 Google Books | Google Trends | Google Translation | | Google Transliteration ^ Blog Search I | Directory Search| ^ Other, Specify Appendix - 2 Q16. How do you store links of websites, which you liked and want to iise in future? O 1 do not save/store links of websites U 1 store it in my brain U 1 write it into m/ diary/computer word/text files \J 1 Bool<mark those links in my browser vj 1 Bookmark those links in my browser 17. Do you use computer base application like Quiz, Online Test to assess your students? Once Sometime Always Never 1 don't know how to use it. QlS.PIease (\^ ) on the following tools of communication, which you use to communicate you're your students and peers. [J Mobile Messaging | | Direct Call Q E-mail 1 1 Chatting Q BLOG 1 1 Forum 1 1 Video conferencing | Post on SNS 1 ! 1 do not communicat e after duty 1 1 Other, Specify Q19.Please (\ ) on the following sources of information, on which you depend upon in your research process. 1 Wikipedia 1 1 Open Journals 1 1 Google Scholar 1 Whitepapers Q INFLIBNET 1 Not any 1 Other, Specify Q20. How do you maintain your bibliography/citation, when you use online research references? Q RefWorks 1 1 Zotero 1 1 Mendeley 1 1 Not any Other, Specify Q21. How do you analyse your quantitative/Qualitative data using software Application? Q MS Excel Q SPSS 1 Survey Application UMASS 1 Other, Specify Appendix - 2 IQ22. Can you edit and format your research paper or dissertation as per the guidelines specified? O Yes. I can do it completely. O Yes. But partially, some settings I don't understand. O I can only type and organize my research paper/dissertation O No. I do not know how to edit/format. Q23. Which of the following checks do you ensure to check quality of your dissertation/research paper? I I Spell Check | | Grammar Check |_J plagiarism | | Formatting as per guideline I I Other, Specify Q24. Have you participated in any Online conference? O Yes O No Q25. Have you presented your paper through Video Conferencing? O Yes O Nc Q26. Have you delivered your plenary (or any speech) in any conference through Video Conferencing? O Yes O ^° Q27. Do you follow any researcher's work through Twittcr/BLOG/Acadeniia/SNS O Yes O No The above information is true to my knowledge. Mobile Number: E-mail: Date: Place: Appendix - 2 Appendix 3 - Questionnaire for PG Students Declaration: I, Rajeev Ghode, persuing my Ph.D. in Department of Communication Studies, Pune University. Title of Ph.D. Research is "To study potential and challenges in the use and adoption of ICT in Higher Education'Tor this research purpose, I want to collect quantitative data from all the professors of colleges which are affiliated to Pune University.
Recommended publications
  • The Effectiveness of Application Permissions
    The Effectiveness of Application Permissions Adrienne Porter Felt,∗ Kate Greenwood, David Wagner University of California, Berkeley apf, kate eli, [email protected] Abstract cations’ permission requirements up-front so that users can grant them during installation. Traditional user-based permission systems assign the Traditional user-based permission systems assign the user’s full privileges to all applications. Modern plat- user’s full privileges to all of the user’s applications. In forms are transitioning to a new model, in which each the application permission model, however, each appli- application has a different set of permissions based on cation can have a customized set of permissions based its requirements. Application permissions offer several on its individual privilege requirements. If most applica- advantages over traditional user-based permissions, but tions can be satisfied with less than the user’s full priv- these benefits rely on the assumption that applications ileges, then three advantages of application permissions generally require less than full privileges. We explore over the traditional user-based model are possible: whether that assumption is realistic, which provides in- sight into the value of application permissions. • User Consent: Security-conscious users may be We perform case studies on two platforms with appli- hesitant to grant access to dangerous permissions cation permissions, the Google Chrome extension sys- without justification. For install-time systems, this tem and the Android OS. We collect the permission re- might alert some users to malware at installation; quirements of a large set of Google Chrome extensions for time-of-use systems, this can prevent an in- and Android applications.
    [Show full text]
  • Apigee X Migration Offering
    Apigee X Migration Offering Overview Today, enterprises on their digital transformation journeys are striving for “Digital Excellence” to meet new digital demands. To achieve this, they are looking to accelerate their journeys to the cloud and revamp their API strategies. Businesses are looking to build APIs that can operate anywhere to provide new and seamless cus- tomer experiences quickly and securely. In February 2021, Google announced the launch of the new version of the cloud API management platform Apigee called Apigee X. It will provide enterprises with a high performing, reliable, and global digital transformation platform that drives success with digital excellence. Apigee X inte- grates deeply with Google Cloud Platform offerings to provide improved performance, scalability, controls and AI powered automation & security that clients need to provide un-parallel customer experiences. Partnerships Fresh Gravity is an official partner of Google Cloud and has deep experience in implementing GCP products like Apigee/Hybrid, Anthos, GKE, Cloud Run, Cloud CDN, Appsheet, BigQuery, Cloud Armor and others. Apigee X Value Proposition Apigee X provides several benefits to clients for them to consider migrating from their existing Apigee Edge platform, whether on-premise or on the cloud, to better manage their APIs. Enhanced customer experience through global reach, better performance, scalability and predictability • Global reach for multi-region setup, distributed caching, scaling, and peak traffic support • Managed autoscaling for runtime instance ingress as well as environments independently based on API traffic • AI-powered automation and ML capabilities help to autonomously identify anomalies, predict traffic for peak seasons, and ensure APIs adhere to compliance requirements.
    [Show full text]
  • EN-Google Hacks.Pdf
    Table of Contents Credits Foreword Preface Chapter 1. Searching Google 1. Setting Preferences 2. Language Tools 3. Anatomy of a Search Result 4. Specialized Vocabularies: Slang and Terminology 5. Getting Around the 10 Word Limit 6. Word Order Matters 7. Repetition Matters 8. Mixing Syntaxes 9. Hacking Google URLs 10. Hacking Google Search Forms 11. Date-Range Searching 12. Understanding and Using Julian Dates 13. Using Full-Word Wildcards 14. inurl: Versus site: 15. Checking Spelling 16. Consulting the Dictionary 17. Consulting the Phonebook 18. Tracking Stocks 19. Google Interface for Translators 20. Searching Article Archives 21. Finding Directories of Information 22. Finding Technical Definitions 23. Finding Weblog Commentary 24. The Google Toolbar 25. The Mozilla Google Toolbar 26. The Quick Search Toolbar 27. GAPIS 28. Googling with Bookmarklets Chapter 2. Google Special Services and Collections 29. Google Directory 30. Google Groups 31. Google Images 32. Google News 33. Google Catalogs 34. Froogle 35. Google Labs Chapter 3. Third-Party Google Services 36. XooMLe: The Google API in Plain Old XML 37. Google by Email 38. Simplifying Google Groups URLs 39. What Does Google Think Of... 40. GooglePeople Chapter 4. Non-API Google Applications 41. Don't Try This at Home 42. Building a Custom Date-Range Search Form 43. Building Google Directory URLs 44. Scraping Google Results 45. Scraping Google AdWords 46. Scraping Google Groups 47. Scraping Google News 48. Scraping Google Catalogs 49. Scraping the Google Phonebook Chapter 5. Introducing the Google Web API 50. Programming the Google Web API with Perl 51. Looping Around the 10-Result Limit 52.
    [Show full text]
  • 2Nd USENIX Conference on Web Application Development (Webapps ’11)
    conference proceedings Proceedings of the 2nd USENIX Conference Application on Web Development 2nd USENIX Conference on Web Application Development (WebApps ’11) Portland, OR, USA Portland, OR, USA June 15–16, 2011 Sponsored by June 15–16, 2011 © 2011 by The USENIX Association All Rights Reserved This volume is published as a collective work. Rights to individual papers remain with the author or the author’s employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. Permission is granted to print, primarily for one person’s exclusive use, a single copy of these Proceedings. USENIX acknowledges all trademarks herein. ISBN 978-931971-86-7 USENIX Association Proceedings of the 2nd USENIX Conference on Web Application Development June 15–16, 2011 Portland, OR, USA Conference Organizers Program Chair Armando Fox, University of California, Berkeley Program Committee Adam Barth, Google Inc. Abdur Chowdhury, Twitter Jon Howell, Microsoft Research Collin Jackson, Carnegie Mellon University Bobby Johnson, Facebook Emre Kıcıman, Microsoft Research Michael E. Maximilien, IBM Research Owen O’Malley, Yahoo! Research John Ousterhout, Stanford University Swami Sivasubramanian, Amazon Web Services Geoffrey M. Voelker, University of California, San Diego Nickolai Zeldovich, Massachusetts Institute of Technology The USENIX Association Staff WebApps ’11: 2nd USENIX Conference on Web Application Development June 15–16, 2011 Portland, OR, USA Message from the Program Chair . v Wednesday, June 15 10:30–Noon GuardRails: A Data-Centric Web Application Security Framework . 1 Jonathan Burket, Patrick Mutchler, Michael Weaver, Muzzammil Zaveri, and David Evans, University of Virginia PHP Aspis: Using Partial Taint Tracking to Protect Against Injection Attacks .
    [Show full text]
  • Mobile Applications and Browser Plugins for Wordnets
    Sophisticated Lexical Databases - Simplified Usage: Mobile Applications and Browser Plugins For Wordnets Diptesh Kanojia Raj Dabre Pushpak Bhattacharyya CFILT, CSE Department, School of Informatics, CFILT, CSE Department, IIT Bombay, Kyoto University, IIT Bombay, Mumbai, India Kyoto, Japan Mumbai, India [email protected] [email protected] [email protected] Abstract identifiable mother-tongues and 122 major languages1 . Of these, 29 languages have India is a country with 22 officially rec- more than a million native speakers, 60 have ognized languages and 17 of these have more than 100,000 and 122 have more than WordNets, a crucial resource. Web 10,000 native speakers. With this in mind, browser based interfaces are available the construction of the Indian WordNets, the for these WordNets, but are not suited IndoWordNet (Bhattacharyya, 2010) project for mobile devices which deters peo- was initiated which was an effort undertaken ple from effectively using this resource. by over 12 educational and research insti- We present our initial work on devel- tutes headed by IIT Bombay. Indian Word- oping mobile applications and browser Nets were inspired by the pioneering work of extensions to access WordNets for In- Princeton WordNet(Fellbaum, 1998) and cur- dian Languages. rently, there exist WordNets for 17 Indian lan- Our contribution is two fold: (1) We guages with the smallest one having around develop mobile applications for the An- 14,900 synsets and the largest one being Hindi droid, iOS and Windows Phone OS with 39,034 synsets and 100,705 unique words. platforms for Hindi, Marathi and San- Each WordNet is accessible by web interfaces skrit WordNets which allow users to amongst which Hindi WordNet(Dipak et al., search for words and obtain more in- 2002), Marathi WordNet and Sanskrit Word- formation along with their translations Net(Kulkarni et al., 2010) were developed at in English and other Indian languages.
    [Show full text]
  • Mergers in the Digital Economy
    2020/01 DP Axel Gautier and Joe Lamesch Mergers in the digital economy CORE Voie du Roman Pays 34, L1.03.01 B-1348 Louvain-la-Neuve Tel (32 10) 47 43 04 Email: [email protected] https://uclouvain.be/en/research-institutes/ lidam/core/discussion-papers.html Mergers in the Digital Economy∗ Axel Gautier y& Joe Lamesch z January 13, 2020 Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five's strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company's most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves. For these tech giants, therefore, acquisition appears to be a substitute for in-house R&D. Finally, from our check for possible "killer acquisitions", it appears that just a single one in our sample could potentially be qualified as such. Keywords: Mergers, GAFAM, platform, digital markets, competition policy, killer acquisition JEL Codes: D43, K21, L40, L86, G34 ∗The authors would like to thank M.
    [Show full text]
  • Design Challenges in Low-Resource Cross-Lingual Entity Linking
    Design Challenges in Low-resource Cross-lingual Entity Linking Xingyu Fu1,∗ Weijia Shi2∗, Xiaodong Yu1, Zian Zhao3, Dan Roth1 1University of Pennsylvania 2University of California Los Angeles 3Columbia University fxingyuf2, xdyu, [email protected] [email protected], [email protected] Abstract Odia: [ଚିଲିକାେର] ଅରଖକୁଦ ନିକଟେର ଏକ ମୁହାଣ େଖାଲିଥିଲା । Cross-lingual Entity Linking (XEL), the prob- English: Gloss: Flood appeared in Arakhkud near [Chilika Lake]. lem of grounding mentions of entities in a for- XEL: eign language text into an English knowledge [ଚିଲିକାେର] Chilika Lake base such as Wikipedia, has seen a lot of re- https://en.wikipedia.org/wiki/Chilika_Lake search in recent years, with a range of promis- ing techniques. However, current techniques Figure 1: The EXL task: in the given sentence we link do not rise to the challenges introduced by text “Chilika Lake” to its corresponding English Wikipedia in low-resource languages (LRL) and, surpris- ingly, fail to generalize to text not taken from task typically involves two main steps: (1) candi- Wikipedia, on which they are usually trained. This paper provides a thorough analysis of date generation, retrieving a list of candidate KB low-resource XEL techniques, focusing on entries for the mention, and (2) candidate ranking, the key step of identifying candidate English selecting the most likely entry from the candidates. Wikipedia titles that correspond to a given for- While XEL techniques have been studied heavily eign language mention. Our analysis indi- in recent years, many challenges remain in the LRL cates that current methods are limited by their setting.
    [Show full text]
  • Devonagentpro
    DEVONagent Pro VERSION 3.11.1 DOCUMENTATION © 2001-2019 DEVONtechnologies TABLE OF CONTENTS Read Me 4 Menus 29 The DEVONagent Pro Advantage 5 The DEVONagent Pro menu 29 System Requirements 6 The File menu 30 Installing, Updating, Removing 6 The Edit menu 31 Trial Restrictions 6 The Data menu 32 Version history 7 The Sort menu 33 License Agreement 11 The View menu 33 Credits 11 The Web menu 34 The History menu 35 Getting Started 12 The Go menu 36 Why use DEVONagent Pro? 12 The Window menu 36 When to use DEVONagent Pro? 12 The Services menu 37 DEVONagent Pro at a Glance 13 The Scripts menu 37 First steps with DEVONagent Pro 13 The Help menu 37 The Dock menu 38 Common Tasks 14 Windows and panels 39 How to find on the Internet 14 How to search beyond Google 14 Search window 40 How to customize DEVONagent Pro 15 Web browser 46 How to set up a search set to crawl feeds 15 Archive window 52 How to run a search automatically 16 Search sets 54 How to archive search results 16 Plugins and scanners 54 Downloads 56 Queries 18 Preferences 57 Assistant 57 Operators 18 Designing a search query 19 Preferences 59 Search sets 21 General 59 Search 60 What are search sets? 21 Menu extra 61 Choosing a search set 21 Web 62 Creating and managing sets 22 Tabs 63 Sharing sets 23 Bookmarks 64 General tab 23 Email 64 Advanced tab 25 Update 65 Sites tab 25 Plugins tab 26 Menu extra 66 Actions tab 27 Scripts 67 Schedule tab 28 Introduction 67 DEVONagent Pro's Scripts menu 68 Automator 69 DEVONagent Pro 3.11.1 Documentation, page 2 Plugin Development 70 Creating Your
    [Show full text]
  • Cross Lingual Information Access and Retrieval CHAPTER 1
    Cross Lingual Information Access and Retrieval CHAPTER 1 INTRODUCTION 1.1 Overview With an increasingly globalized economy, the ability to find information in other languages is becoming a necessity. Though initially the World Wide Web was dominated by English, now less than half of existing web pages are in English. Thus the problem is that much Internet content is effectively inaccessible as it is stored in languages that are not searchable without specific technical know­how. To overcome the above problem and to make communication global, the access to cross lingual information is more and more widespread within this society. The demand for fully multilingual multimedia retrieval systems first formulated in 1997, is increasingly relevant today as the global networks become vital sources of information for both professional and leisure activities. Information retrieval (IR) is a process that determines the relationship between document and query. It also defines the strength between them. Cross language information retrieval (CLIR) is the subfield of information retrieval. The basic idea behind the cross language information retrieval (CLIR) system is to retrieve documents in a language different from a query language made in the user’s own language. This may be desirable even when the user is not a speaker of the language used in the retrieved documents. Once it is known that the information exists and is relevant, the retrieved documents can be translated by a translator. Research in the area of cross­language information retrieval (CLIR) has focused mainly on methods for translating queries. Full document translation for large collections is impractical, thus query translation is a viable alternative.
    [Show full text]
  • Cesifo Working Paper No. 8056
    8056 2020 January 2020 Mergers in the Digital Economy Axel Gautier, Joe Lamesch Impressum: CESifo Working Papers ISSN 2364-1428 (electronic version) Publisher and distributor: Munich Society for the Promotion of Economic Research - CESifo GmbH The international platform of Ludwigs-Maximilians University’s Center for Economic Studies and the ifo Institute Poschingerstr. 5, 81679 Munich, Germany Telephone +49 (0)89 2180-2740, Telefax +49 (0)89 2180-17845, email [email protected] Editor: Clemens Fuest www.cesifo-group.org/wp An electronic version of the paper may be downloaded · from the SSRN website: www.SSRN.com · from the RePEc website: www.RePEc.org · from the CESifo website: www.CESifo-group.org/wp CESifo Working Paper No. 8056 Mergers in the Digital Economy Abstract Over the period 2015-2017, the five giant technologically leading firms, Google, Amazon, Facebook, Amazon and Microsoft (GAFAM) acquired 175 companies, from small start-ups to billion dollar deals. By investigating this intense M&A, this paper ambitions a better understanding of the Big Five’s strategies. To do so, we identify 6 different user groups gravitating around these multi-sided companies along with each company’s most important market segments. We then track their mergers and acquisitions and match them with the segments. This exercise shows that these five firms use M&A activity mostly to strengthen their core market segments but rarely to expand their activities into new ones. Furthermore, most of the acquired products are shut down post acquisition, which suggests that GAFAM mainly acquire firm’s assets (functionality, technology, talent or IP) to integrate them in their ecosystem rather than the products and users themselves.
    [Show full text]
  • Multi-Language Online Word Processor for Learners and the Visually Impaired
    Multi-language Online Word Processor for Learners and the Visually Impaired Shiblee Imtiaz Hasan Department of Computer Science and Engineering, BRAC University, 66, Mohakhali C/A, Dhaka 1212, Bangladesh [email protected] Abstract. Most of the modern operating systems come with accessibility and screen reading features. They also have with basic word processing applications. However, many of the languages are still not supported in the screen reading application and neither do they come with features such as translation and transliteration (phonetic). Many plugins are available to overcome these barriers, but the visually impaired users and/or users without administrative privilege will not be able to install those in the local computer. This paper discusses about implementation of a rich internet application that enables users to have access to a free online word processor which can translate, transliterate and speak out words (in different languages) that have been typed, which can be very helpful for learners of foreign languages and visually impaired users. Keywords: languages, word processor, speech synthesis, transliteration, accessibility. 1 Introduction Desktop-based applications, especially word processors are usually known to be more powerful than the online ones. They also come with more features compared to the Internet applications. However, the online applications can be very portable and can run without being installed in a computer. This paper would discuss about an online word processor which can be portable solution for many. The application can be a very important document processing utility for the visually impaired too. Some of the features would also assist learners of a new language.
    [Show full text]
  • Merger Policy in Digital Markets: an Ex Post Assessment 3 Study Is to Undertake a Less Common Form of Ex Post Assessment
    Journal of Competition Law & Economics, 00(00), 1–46 doi: 10.1093/joclec/nhaa020 MERGER POLICY IN DIGITAL MARKETS: AN EX Downloaded from https://academic.oup.com/jcle/advance-article/doi/10.1093/joclec/nhaa020/5874037 by guest on 18 December 2020 POST ASSESSMENT† Elena Argentesi,∗Paolo Buccirossi,†Emilio Calvano,‡ Tomaso Duso,§,∗ & Alessia Marrazzo,¶ & Salvatore Nava† ABSTRACT This paper presents a broad retrospective evaluation of mergers and merger decisions in markets dominated by multisided digital platforms. First, we doc- ument almost 300 acquisitions carried out by three major tech companies— Amazon, Facebook, and Google—between 2008 and 2018. We cluster target companies on their area of economic activity providing suggestive evidence on the strategies behind these mergers. Second, we discuss the features of digital markets that create new challenges for competition policy. By using relevant case studies as illustrative examples, we discuss theories of harm that have been used or, alternatively, could have been formulated by authorities in these cases. Finally, we retrospectively examine two important merger cases, Facebook/Instagram and Google/Waze, providing a systematic assessment of the theories of harm considered by the UK competition authorities as well as evidence on the evolution of the market after the transactions were approved. We discuss whether the competition authority performed complete and careful analyses to foresee the competitive consequences of the investigated mergers and whether a more effective merger control regime can be achieved within the current legal framework. JEL codes: L4; K21 ∗ Department of Economics, University of Bologna † Lear, Rome ‡ Department of Economics, University of Bologna, Toulouse School of Economics and CEPR, London § Deutsches Institut fuer Wirtschaftsforschung (DIW Berlin), Department of Economics, Tech- nical University (TU) Berlin, CEPR, London and CESifo, Munich ¶ Lear, Rome and Department of Economics, University of Bologna ∗ Corresponding author.
    [Show full text]