Digital Memories: Exploring Critical Issues

Total Page:16

File Type:pdf, Size:1020Kb

Digital Memories: Exploring Critical Issues Edited by Anna Maj & Daniel Riha Digital Memories Exploring Critical Issues Critical Issues Series Editors Dr Robert Fisher Dr Nancy Billias Advisory Board Dr Alejandro Cervantes-Carson Dr Peter Mario Kreuter Professor Margaret Chatterjee Martin McGoldrick Dr Wayne Cristaudo Revd Stephen Morris Mira Crouch Professor John Parry Dr Phil Fitzsimmons Paul Reynolds Professor Asa Kasher Professor Peter Twohig O w e n K e l l y Professor S Ram Vemuri Revd Dr Kenneth Wilson, O.B.E A Critical Issues research and publications project. http://www.inter-disciplinary.net/critical-issues/ The C y b e r Hub ‘Digital Memories’ Digital Memories: Exploring Critical Issues Edited by Anna Maj and Daniel Riha Inter-Disciplinary Press Oxford, United Kingdom © Inter-Disciplinary Press 2009 http://www.inter-disciplinary.net/publishing/id-press/ The Inter-Disciplinary Press is part of Inter-Disciplinary.Net – a global network for research and publishing. The Inter-Disciplinary Press aims to promote and encourage the kind of work which is collaborative, innovative, imaginative, and which provides an exemplar for inter-disciplinary and multi- disciplinary publishing. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the prior permission of Inter-Disciplinary Press. Inter-Disciplinary Press, Priory House, 149B Wroslyn Road, Freeland, Oxfordshire. OX29 8HR, United Kingdom. +44 (0)1993 882087 British Library Cataloguing in Publication Data. A catalogue record for this book is available from the British Library. ISBN: 978-1-84888-004-7 First published in the United Kingdom in eBook format in 2009. First Edition. Contents Introduction Anna Maj and Daniel Riha 1 Part I: Theories and Concepts in Digitizing Individual and Community Memory 11 The Trouble with Memory: Reco(r)ding the Mind in Code 46 Laura Schuster 13 (New) Media and Representations of the Past Martin Pogačar 23 The Globytal: Towards an Understanding of Globalised Memories in the Digital Age Anna Reading 31 Part II: Externalization and Mediation of Memories, Representational Principles for Memory Record, Digital Recording Strategies 41 Original Cinephany and Reappropriation: The Original Affect and its Reactualisation through Emerging Digital Technologies Marc Jolly-Corcoran 43 Can Web 2.0 Shape Metamemory? Alberto Sá 51 Clickable Memories: Hyperlinking and Memory Contextualisation Olivier Nyirubugara 63 Part III: Emergent Technologies and Systems for Capturing Private Memories 73 HyperAuthor: A New Tool for Hypertextual Narrative Creation Diana Espinal Cruces and Jose Jesus García Rueda 75 Disclosing Cultural Heritage over iDTV Tom Evens 85 Part IV: Virtual Spaces of the Past 95 Biography as an Interactive 3-D Documentary Daniel Riha 97 Bill Viola’s Passions Series and the Sensualisation of Experience Maria Lakka 107 3-D as a Medium for Virtual Memorialisation Lois Hamill 117 Part V: Archiving and Disseminating Community Memory Data 127 Is There a Way Back or Can the Internet Remember its Own History? Marcus Burkhardt 129 Browsing through Memories: the Online Disclosure of Oral History in Flanders Laurence Hauttekeete, Tom Evens and Erik Mannens 139 The Digitization of Audiovisual Archives: Technological Change within the Structures of Reproduction Thomas Nachreiner 149 Part VI: New Media and Representations of the Past 159 Data as Memory and Memory as Data describes The Vienna Project Karen Frostig 161 Re-Writing Literary Past in the Digital Age Marin Laak and Pille Pruulmann-Vengerfeldt 167 Part VII: National Identity and Memory in the Digital Age, Political Uses of Cybermedia for Historical Revisionism 177 Dokdo Island Dispute: Korean Reconstruction of History and National Identity in User-Created Content Media Jukka Jouhki 179 National Heroes in the Digital Age: The Institution of Great Men in Change Tuuli Lähdesmäki 189 Part VIII: Social Issues Research, Online Ethnographic Research 197 Computerlore, Netlore and Digital Memories: HCI as Ethnographic Field Research Michal Derda-Nowakowski 199 Digital Memories of High-Tech Tourists and Travelling Media: Twittering and Globalhood Anna Maj 209 Introduction Anna Maj & Daniel Riha The papers included in this volume reflect the debates that progressed during the First Global Conference on Digital Memories, held as a part of Cyber Hub activity in the frames of the ID.net Critical Issues research in Salzburg, Austria in March 2009. The edited draft papers are a snapshot of the actual publishing. The topic of digital memories emerged soon after the first computers as the result of data storage and processing which enabled the creation of artificial intelligence. The Digital Memories conference, however, cannot be summarized as a prosaic meeting for archaeologists of new media. Data accumulation, protection and selection are increasingly important issues connected with the everydayness of humanity on a global scale. Digital identities produce individual digital memory that can be read out en masse as social digital identities. This means that digital remembering, in addition to being chaotic or insignificant collecting of data, can have economic or political impact on contemporary societies and hence will be crucial for knowledge and power distribution in the future. Digital memory seems to be vulnerable in many ways. It produces a new context for human existence-not only due to the available and accessible data, whose amount can be both an advantage and a disadvantage for its users, but also by inflicting a direct change on human lives at the level of privacy or its gradual deprivation. On the other hand, the vulnerability of digital memory can be seen as a threat not only for individuals but also for societies or even cultures. Data protection, performed with the help of new digital archiving means and methods, becomes a never-ending struggle to select the important elements in cultural heritage and preserve this purified vision of humanity for future users. The parallel processes of constant digitisation of data and erosion of its analogue artifacts may well lead us to a moment in which only these purified versions of human life will be accessible. Although interpretation of the past has always been the major role of all traditional archives, the possible future scenario shows that even conservative institutions of that type are evolving under the pressure of the digital age. The virtual archive providing only a digital version of the past is more flexible and open to modifications, hence it allows cultural heritage to fluctuate and dissolve: digital remembering can be both similar to and different from digital forgetting. Although the “fragility” of digital data may lead to a global digital memory disaster that can paralyse the most developed countries and turn them back to the Gutenberg Galaxy, thus far technology has rather been an 2 Anna Maj & Daniel Riha ______________________________________________________________ element accelerating and stimulating culture, communication and economy. Digital memory provides a new context for both personal remembrances and for information, which is strategic for whole societies. Although this memory is still personal or local, it also reaches a global aspect creating new possibilities and threats for information seekers, users or distributors. In this context, data storage becomes more that just archiving - it acquires the power of knowledge. Database becomes the most important form of the digital knowledge. The discourse of digital power is thus dependent on technology and competencies to use it. The ability to create meta-data is no longer the work of a librarian; each user must learn to manage and manipulate the extraordinary amount of data. It is important to note, however, that new media competencies emerge together with new models of perception and behaviour. New strategies of dealing with data are the answers to questions of new everyday practices associated with the use of technology. The convergence of new media provokes new users’ strategies: mobile phones with cameras and ubiquitous Internet access enable instant exchange of data, such as text messaging, photo sharing or web browsing and social bookmarking, which as a result, form possibilities or even create the need to access to various personal yet publicly shared data in the form of a moblog. The rising mobility of contemporary societies has impacts on all areas of life. The demand for instant information on every subject affects data regarded as both private and public. Thus, the meaning of privacy is changing. Memory is no longer solely a private thing; it becomes personal and public at the same time. Sharing photos, videos or sounds turns into a new cultural paradigm exerting influence on identity. Common behaviour of life logging or other kinds of self-recording can be easily criticised but, in psychological and anthropological terms, they are elements of the process of global testing of new devices and communication possibilities. Digital memory is the result of this experiment conducted on a global scale by independent yet coordinated and interconnected users. Technology creates digital imagination and digital imaginary. This means that at various levels of interaction, memory is reworked and functionalised. Constant self-recording and web-based share-ism connected with Web 2.0 ideology are significant elements of this process - a re- invention of the human-computer relationship and a re-invention of the human itself in the context
Recommended publications
  • Twitter Crowd Mining and Data Fishing
    International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8, Issue-1S4, June 2019 Twitter Crowd Mining and Data Fishing Sherin Eliyas, R. Naveen, M. Siva Krishna Abstract--- People use twitter as a medium to share their One variety or technique of data mining that can be used opinions, which in turn makes it a platform for analyzing public to extract information from organized data is Text Mining. opinion. This kind of information in various fields can be used Text mining focuses on textual data, this textual data is for further analysis. Text mining is used for classifying tweets unstructured, and it is difficult to deal with algorithmically, into negative and positive statements depending on their purpose. Text messages are used to define mind set of large groups of though, text is commonly used for information transfer by people. From perspective of decision makers, precious the present society. Vast amount of textual data comes from information is provided by collection of text messages. In this email and social media. Public post real time messages and paper, we use data collected from twitter and extract useful data their opinion on variety of topics, creating it as a valuable from it using data mining tools. The results is represented as platform for analyzing and tracking public opinion on decision trees and this can be used to make further analysis or current situation, including their opinion on the bus ticket used to take decision for analyst. Here we evaluate or analyze the impact of tweets by using emotic icons for process.
    [Show full text]
  • Towards a Situation-Aware Architecture for the Wisdom Web of Things
    Chapter 4 Towards a Situation-Aware Architecture for the Wisdom Web of Things Akihiro Eguchi, Hung Nguyen, Craig Thompson, and Wesley Deneke Abstract Computers are getting smaller, cheaper, faster, with lower power require- ments, more memory capacity, better connectivity, and are increasingly distributed. Accordingly, smartphones became more of a commodity worldwide, and the use of smartphones as a platform for ubiquitous computing is promising. Nevertheless, we still lack much of the architecture and service infrastructure we will need to transition computers to become situation aware to a similar extent that humans are. Our Everything is Alive (EiA) project illustrates an integrated approach to fill in the void with a broad scope of works encompassing Ubiquitous Intelligence (RFID, spa- tial searchbot, etc.), Cyber-Individual (virtual world, 3D modeling, etc.), Brain In- formatics (psychological experiments, computational neuroscience, etc.), and Web Intelligence (ontology, workflow, etc.). In this paper, we describe the vision and architecture for a future where smart real-world objects dynamically discover and interact with other real or virtual objects, humans or virtual human. We also dis- cuss how the vision in EiA fits into a seamless data cycle like the one proposed in the Wisdom Web of Things (W2T), where data circulate through things, data, in- formation, knowledge, wisdom, services, and humans. Various open research issues related to internal computer representations needed to model real or virtual worlds are identified, and challenges of using those representations to generate visualiza- tions in a virtual world and of “parsing” the real world to recognize and record these data structures are also discussed.
    [Show full text]
  • TIBCO Jasperreports® Server Administrator Guide
    TIBCO JasperReports® Server Administrator Guide Software Release 7.8 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. ANY SOFTWARE ITEM IDENTIFIED AS THIRD PARTY LIBRARY IS AVAILABLE UNDER SEPARATE SOFTWARE LICENSE TERMS AND IS NOT PART OF A TIBCO PRODUCT. AS SUCH, THESE SOFTWARE ITEMS ARE NOT COVERED BY THE TERMS OF YOUR AGREEMENT WITH TIBCO, INCLUDING ANY TERMS CONCERNING SUPPORT, MAINTENANCE, WARRANTIES, AND INDEMNITIES. DOWNLOAD AND USE OF THESE ITEMS IS SOLELY AT YOUR OWN DISCRETION AND SUBJECT TO THE LICENSE TERMS APPLICABLE TO THEM. BY PROCEEDING TO DOWNLOAD, INSTALL OR USE ANY OF THESE ITEMS, YOU ACKNOWLEDGE THE FOREGOING DISTINCTIONS BETWEEN THESE ITEMS AND TIBCO PRODUCTS.
    [Show full text]
  • A Privacy-Aware and Secure System for Human Memory Augmentation
    A Privacy-aware and Secure System for Human Memory Augmentation Doctoral Dissertation submitted to the Faculty of Informatics of the Università della Svizzera italiana in partial fulfillment of the requirements for the degree of Doctor of Philosophy presented by Agon Bexheti under the supervision of Prof. Marc Langheinrich September 2019 Dissertation Committee Prof. Antonio Carzaniga Università della Svizzera italiana, Switzerland Prof. Fernando Pedone Università della Svizzera italiana, Switzerland Prof. Cecilia Mascolo University of Cambridge, United Kingdom Prof. Claudio Bettini Università degli Studi di Milano, Italy Dissertation accepted on 06 September 2019 Research Advisor PhD Program Director Prof. Marc Langheinrich Prof. Walter Binder and Prof. Silvia Santini i I certify that except where due acknowledgement has been given, the work presented in this thesis is that of the author alone; the work has not been submit- ted previously, in whole or in part, to qualify for any other academic award; and the content of the thesis is the result of work which has been carried out since the official commencement date of the approved research program. Agon Bexheti Lugano, 06 September 2019 ii Abstract The ubiquity of digital sensors embedded in today’s mobile and wearable devices (e.g., smartphones, wearable cameras, wristbands) has made technology more intertwined with our life. Among many other things, this allows us to seamlessly log our daily experiences in increasing numbers and quality, a process known as “lifelogging”. This practice produces a great amount of pictures and videos that can potentially improve human memory. Consider how a single photograph can bring back distant childhood memories, or how a song can help us reminisce about our last vacation.
    [Show full text]
  • Introduction to Web 2.0 Technologies
    Introduction to Web 2.0 Joshua Stern, Ph.D. Introduction to Web 2.0 Technologies What is Web 2.0? Æ A simple explanation of Web 2.0 (3 minute video): http://www.youtube.com/watch?v=0LzQIUANnHc&feature=related Æ A complex explanation of Web 2.0 (5 minute video): http://www.youtube.com/watch?v=nsa5ZTRJQ5w&feature=related Æ An interesting, fast-paced video about Web.2.0 (4:30 minute video): http://www.youtube.com/watch?v=NLlGopyXT_g Web 2.0 is a term that describes the changing trends in the use of World Wide Web technology and Web design that aim to enhance creativity, secure information sharing, increase collaboration, and improve the functionality of the Web as we know it (Web 1.0). These have led to the development and evolution of Web-based communities and hosted services, such as social-networking sites (i.e. Facebook, MySpace), video sharing sites (i.e. YouTube), wikis, blogs, etc. Although the term suggests a new version of the World Wide Web, it does not refer to any actual change in technical specifications, but rather to changes in the ways software developers and end- users utilize the Web. Web 2.0 is a catch-all term used to describe a variety of developments on the Web and a perceived shift in the way it is used. This shift can be characterized as the evolution of Web use from passive consumption of content to more active participation, creation and sharing. Web 2.0 Websites allow users to do more than just retrieve information.
    [Show full text]
  • The Mother of All Demos
    UC Irvine Embodiment and Performativity Title The Mother of All Demos Permalink https://escholarship.org/uc/item/91v563kh Author Salamanca, Claudia Publication Date 2009-12-12 Peer reviewed eScholarship.org Powered by the California Digital Library University of California The Mother of All Demos Claudia Salamanca PhD Student, Rhetoric Department University of California Berkeley 1929 Fairview St. Apt B. Berkeley, CA, 94703 1 510 735 1061 [email protected] ABSTRACT guide situated at the mission control and from there he takes us This paper analyses the documentation of the special session into another location: a location that Levy calls the final frontier. delivered by Douglas Engelbart and William English on This description offered by Levy as well as the performance in December 9, 1968 at the Fall Computer Joint Conference in San itself, shows a movement in time and space. The name, “The Francisco. Mother of All Demos,” refers to a temporality under which all previous demos are subcategories of this performance. Furthermore, the name also points to a futurality that is constantly Categories and Subject Descriptors in production: all future demos are also included. What was A.0 [Conference Proceedings] delivered on December 9, 1968 captured the past but also our future. In order to explain this extended temporality, Engelbart’s General Terms demo needs to be addressed not only from the perspective of the Documentation, Performance, Theory. technological breakthroughs but also the modes in which they were delivered. This mode of futurality goes beyond the future simple tense continuously invoked by rhetorics of progress and Keywords technology. The purpose of this paper is to interrogate “The Demo, medium performance, fragmentation, technology, Mother of All Demos” as a performance, inquiring into what this augmentation system, condensation, space, body, mirror, session made and is still making possible.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • The Fourth Paradigm
    ABOUT THE FOURTH PARADIGM This book presents the first broad look at the rapidly emerging field of data- THE FOUR intensive science, with the goal of influencing the worldwide scientific and com- puting research communities and inspiring the next generation of scientists. Increasingly, scientific breakthroughs will be powered by advanced computing capabilities that help researchers manipulate and explore massive datasets. The speed at which any given scientific discipline advances will depend on how well its researchers collaborate with one another, and with technologists, in areas of eScience such as databases, workflow management, visualization, and cloud- computing technologies. This collection of essays expands on the vision of pio- T neering computer scientist Jim Gray for a new, fourth paradigm of discovery based H PARADIGM on data-intensive science and offers insights into how it can be fully realized. “The impact of Jim Gray’s thinking is continuing to get people to think in a new way about how data and software are redefining what it means to do science.” —Bill GaTES “I often tell people working in eScience that they aren’t in this field because they are visionaries or super-intelligent—it’s because they care about science The and they are alive now. It is about technology changing the world, and science taking advantage of it, to do more and do better.” —RhyS FRANCIS, AUSTRALIAN eRESEARCH INFRASTRUCTURE COUNCIL F OURTH “One of the greatest challenges for 21st-century science is how we respond to this new era of data-intensive
    [Show full text]
  • CIO Guide to Application Modernization
    CIO Guide to Application Modernization May 2020 2 What You Need To Know The global pandemic has put unexpected pressures on businesses of all sorts — in ways no one was projecting at the beginning of the year. As a result, CIOs face a series of urgent challenges: • How can they raise system visibility and system control over operations that are more dispersed and changing than ever? • How can they cut costs, yet create a more agile and responsive IT system? • How can they do more with older data, even as they understand better the data from a market that is changing every week? • How can they help people work faster, with a minimum of change management, or set the stage for growth, while preserving capital? In many cases the answer is a step-by-step deployment of cloud computing technology, tailored to meet the most pressing needs first. Working with a comprehensive cloud provider, it is possible to create cloud systems that respect and preserve core assets, while enabling rapid modernization, in particular for the cost-aware agility and resilience of modern application architecture. Why You Should Keep Reading This guide offers a series of approaches to application modernization, from identifying needs and developing an action-oriented roadmap, to methods of identifying and effecting meaningful change in the most critical parts of your IT operations. We have also included at the end a list of key solutions that Google Cloud and our technology partners have to give your organization fast results. 3 Introduction Even before the current crisis, IT organizations saw pressure to be more agile and innovative.
    [Show full text]
  • Communicative Capital for Prosthetic Agents Patrick M
    This is an unpublished technical report undergoing peer review, not a final typeset article. First draft: July 23, 2016. Current Draft: November 9, 2017. Communicative Capital for Prosthetic Agents Patrick M. Pilarski 1;2∗, Richard S. Sutton 2, Kory W. Mathewson 1;2, Craig Sherstan 1;2, Adam S. R. Parker 1;2, and Ann L. Edwards 1;2 1Division of Physical Medicine and Rehabilitation, Department of Medicine, University of Alberta, Edmonton, AB, Canada 2Reinforcement Learning and Artificial intelligence Laboratory, Department of Computing Science, University of Alberta, Edmonton, AB, Canada Correspondence*: Patrick M. Pilarski, Division of Physical Medicine and Rehabilitation, Department of Medicine, 5-005 Katz Group Centre for Pharmacy and Health Research, University of Alberta, Edmonton, AB, Canada, T6G 2E1. [email protected] ABSTRACT This work presents an overarching perspective on the role that machine intelligence can play in enhancing human abilities, especially those that have been diminished due to injury or illness. As a primary contribution, we develop the hypothesis that assistive devices, and specifically artificial arms and hands, can and should be viewed as agents in order for us to most effectively improve their collaboration with their human users. We believe that increased agency will enable more powerful interactions between human users and next generation prosthetic devices, especially when the sensorimotor space of the prosthetic technology greatly exceeds the conventional control and communication channels available to a prosthetic user. To more concretely examine an agency-based view on prosthetic devices, we propose a new schema for interpreting the capacity of a human-machine collaboration as a function of both the human’s and machine’s degrees of agency.
    [Show full text]
  • Proquest Dissertations
    REPROGRAMMING THE LYRIC: A GENRE APPROACH FOR CONTEMPORARY DIGITAL POETRY HOLLY DUPEJ A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS GRADUATE PROGRAM IN COMMUNICATIONS AND CULTURE YORK UNIVERSITY, TORONTO, ONTARIO APRIL 2008 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-38769-6 Our file Notre reference ISBN: 978-0-494-38769-6 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Plntemet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation.
    [Show full text]
  • EN-Google Hacks.Pdf
    Table of Contents Credits Foreword Preface Chapter 1. Searching Google 1. Setting Preferences 2. Language Tools 3. Anatomy of a Search Result 4. Specialized Vocabularies: Slang and Terminology 5. Getting Around the 10 Word Limit 6. Word Order Matters 7. Repetition Matters 8. Mixing Syntaxes 9. Hacking Google URLs 10. Hacking Google Search Forms 11. Date-Range Searching 12. Understanding and Using Julian Dates 13. Using Full-Word Wildcards 14. inurl: Versus site: 15. Checking Spelling 16. Consulting the Dictionary 17. Consulting the Phonebook 18. Tracking Stocks 19. Google Interface for Translators 20. Searching Article Archives 21. Finding Directories of Information 22. Finding Technical Definitions 23. Finding Weblog Commentary 24. The Google Toolbar 25. The Mozilla Google Toolbar 26. The Quick Search Toolbar 27. GAPIS 28. Googling with Bookmarklets Chapter 2. Google Special Services and Collections 29. Google Directory 30. Google Groups 31. Google Images 32. Google News 33. Google Catalogs 34. Froogle 35. Google Labs Chapter 3. Third-Party Google Services 36. XooMLe: The Google API in Plain Old XML 37. Google by Email 38. Simplifying Google Groups URLs 39. What Does Google Think Of... 40. GooglePeople Chapter 4. Non-API Google Applications 41. Don't Try This at Home 42. Building a Custom Date-Range Search Form 43. Building Google Directory URLs 44. Scraping Google Results 45. Scraping Google AdWords 46. Scraping Google Groups 47. Scraping Google News 48. Scraping Google Catalogs 49. Scraping the Google Phonebook Chapter 5. Introducing the Google Web API 50. Programming the Google Web API with Perl 51. Looping Around the 10-Result Limit 52.
    [Show full text]