Conservation in Collections of Digital Works of Art Ben

Total Page:16

File Type:pdf, Size:1020Kb

Conservation in Collections of Digital Works of Art Ben Presented at the Electronic Media Group Session, AIC 40th Annual Meeting, May 8–11, 2012, Albuquerque, NM. CONSERVATION IN COLLECTIONS OF DIGITAL WORKS OF ART BEN FINORADIN ABSTRACT Rather than addressing entropy and deterioration of objects, paintings, prints, or textiles, many collections must now contend with ensuring the conservation of works that are entirely born-digital. The constantly shifting compatibility of tech- nologies, and looming wave of obsolescence dictates that this emerging practice is often preemptive, in some cases even leaning towards the archival perspective. Since 1999, Rhizome at the New Museum of Contemporary Art, New York, has maintained an online archive called the ArtBase, a collection containing works of art that employ materials such as software, code, websites, moving images, games, and browsers, towards aesthetic and critical ends. This paper offers three case studies on the conservation of works from Rhizome’s collection. These three works will be used specifcally to illustrate conservation methods for: • Works that exist as performative actions within commercial web services or social networking platforms • Performative web-based works that employ real-time data • The obsolescence of crucial client-side JavaScript in web based works Offered in conclusion is a discussion of metadata, from a collection management standpoint, to ensure the long-term sustainability of digital conservation measures. The Electronic Media Review ■ Volume Two 2013 101 BEN FINORADIN INTRODUCTION we will consider Pulse (1999) by American artist Mark Rhizome is a non-proft institution (established in 1996) Napier (b. 1961). This work fell victim to obsolescence devoted to the creation, presentation, preservation, and of crucial client-side JavaScript. This section will pro- critique of emerging artistic practices that engage tech- vide a qualitative analysis of various emulation strategies nology. In 1999 the Rhizome ArtBase was founded as that restored function to the work, as well as consider- an online archive that sought to collect, preserve, and ation of the scalability of maintaining code-based works contextualize the creative practices that had emerged in collections and archives. in the preceding decade, along with the advent of the world wide web. The ArtBase collects works that employ LEGENDARY ACCOUNT materials diverse as software, code, websites, moving As is often the case in the broad scope of new media and images, games, and web browsers towards aesthetic and technology based works of art, Holmberg’s Legendary critical ends. As the years have passed, shifting threats Account initially posed a non-technical challenge to con- to the longevity of these works have emerged, along with ventions of curation, collection, and ontology of artworks. a discourse and philosophy of the conservation of born- In a sense, the work could be said to have no primary digital works of art. In 2011 Rhizome published a paper form or medium, existing originally as a disparate set titled “Digital Preservation Practices and the Rhizome of actions. Over the course of two years, the artist en- ArtBase” (Fino-Radin), which explored in detail the fun- gaged users on Yahoo! Answers, asking questions (fg. 1) damental threats to its collection, and extrapolated a that range from unanswerable provocations (e.g., “How theoretical framework for approaching the management possible is it to convince people that you are an artist?” of these risks. This paper, in contrast, focuses explicitly June 6, 2008, 4:24 PM), to the absurdly mundane (e.g., on methods and techniques of digital conservation and “where did you get that chair you are sitting in?” June preservation, through the documentation of three case 19, 2008, 2:28 AM). The work was an attempt to mildly studies. All methods described and documented herein subvert the platform’s intended mode of interaction, ex- make use of open source tools and common technologies posing its inherent limitations, and to engage its users in and standards, yielding workfows that are reproducible a manner oddly personal. in similar scenarios. Discussed frst is Legendary Ac- count (2008–2010) by American artist Joel Holmberg The artist exhibited a manifestation of the work in the (b. 1982). This artwork will present an approach for pre- 2010 exhibition Free at the New Museum of Contempo- serving works whose primary materials exist within a 3rd rary Art. For the exhibition, the artist painted a gallery party commercial web platform not controlled by the art- wall to match the background color of the Yahoo! An- ist or collecting institution. The provided methodology is swers website, and mounted digital prints of the work to grounded in web archiving practices, and makes use of a the wall. This manifestation was a temporary installation, Python tool for the batch production of archival screen- its photographic documentation being the only surviving shots of web resources. Second, we will consider i’m artifact. The artist had at some point in the work’s history here and there .com (2011), by Dutch artist Jonas Lund documented each question he had asked through his Ya- (b. 1984), which poses the problem of how to collect hoo! Answers account, as screenshots. These were saved and preserve a dynamic web based artwork that included in the JPG format with severe lossy compression, caus- a dimension of time and performance. The approach ing the images to display compression artifacts. Survey- discussed offers a model of conservation that produces ing these manifestations, instantiations, and documents an archival solution without compromising the sensitive, of the work, it emerges that they as a whole constitute real-time, and performative nature of the work. Finally the work, rather than one discrete artifact. The goal then 102 The Electronic Media Review ■ Volume Two 2013 CONSERVATION IN COLLECTIONS OF DIGITAL WORKS OF ART Fig. 1. Holmberg asks: “What is the goal of online?” was not so much the conservation and preservation of perform a precise, targeted crawl of a list of specifc the material as the artwork itself, but rather, accurate URLs, and (2) that the tool provided the ability to output and future-proof documentation of evidence of the work. the Web ARChive fle format (WARC) (National Digital The material that was the target of this documentation Stewardship Alliance 2011), as well as the retrieved ma- was the original collection of web pages that contained terials in an uncompressed directory structure. In typical the individual questions belonging to Holmberg’s Yahoo! large-scale web archiving settings, where the intent is Answers account and his profle page, which contained to perform broad crawls of entire websites, recursion is links to each of these individual questions. It was de- heavily employed. The frst page hit by the crawler is sired to archive these pages such that the links between parsed to identify hyperlinks so that these linked pages all of them were preserved, so that an offine version, or may be also crawled, archived, and parsed for additional one hosted in a repository would be browsable as it was pages, at which point the process continues indefnitely originally within the Yahoo! Answers platform. depending on the level of recursion specifed. Recursion was not an option in this case, as this would cause the The requirements for selecting the appropriate tool in- crawler to extend far beyond scope, eventually down- cluded primarily that: (1) the tool offered the ability to loading Yahoo! Answers in its entirety. Thus, it was cru- The Electronic Media Review ■ Volume Two 2013 103 BEN FINORADIN cial that the tool used allow for a list of targets to be ence for their content. In this case our crawl was quite specifed. While WARC is widely considered to be the limited, and crucial components would have been omit- standard archival format for web resources, it requires ted were robots.txt to be respected. HTTP based crawlers additional software (such as the Internet Archive’s Way- are only able to access that which is publicly accessible, back software) (Internet Archive 2011) in order to render so ignoring robots.txt would seem to pose no privacy the archived materials. For this reason it was desired threat. The second option, “--random-wait” is another that in addition to WARC, to also output the crawled option that must be used with caution and care. Some content in a standard directory structure, preserving the servers are confgured to detect patterns in multiple relative directory structure. This format of output yields requests from the same user, for the purpose of block- a collection of fles that may be hosted and served from ing a crawler making requests on a predictable interval. any web server, without special software. The GNU Wget “--random-wait” causes Wget to randomize the intervals (GNU 2012) software was selected as the tool of choice, at which it makes requests of the server, thus eluding as it offers all of the aforementioned aspects of utility detection (GNU 2013c). The third fag, “-p” tells Wget and has a very diverse community of users, which yields to retrieve all page “requisites.” Without this fag, none a support system. Wget is quite adaptable to small scale, of the images, video, sound, linked CSS (cascading style highly specifc and customized crawls, and as of recently, sheets), and JavaScript fles—essentially any embedded offers the option to output crawls in WARC format as well content—would be retrieved. The fourth option, “-H” as a directory structure. specifes that the crawl may span hosts. If the pages listed in “url_list” were at the http://answers.yahoo.com The methodology and procedure used with Wget was to host, but all embedded images were hosted at http://l. frst compile the list of URLs to be included in the crawl. yimg.com/, without the “-H” fag these images would This list was saved as a plaintext fle named “url_list,” not be retrieved, even with the “-p” fag having been with each URL on a new line, without a delimiting char- invoked.
Recommended publications
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Benítez Bravo, Rubén; Liu, Xiao; Martín Mor, Adrià, Dir
    This is the published version of the article: Benítez Bravo, Rubén; Liu, Xiao; Martín Mor, Adrià, dir. Proyecto de local- ización de Waterfox al catalán y al chino. 2019. 38 p. This version is available at https://ddd.uab.cat/record/203606 under the terms of the license Trabajo de TPD LOCALIZACIÓN DE WATERFOX EN>CA/ZH Ilustración 1. Logo de Waterfox Rubén Benítez Bravo y Xiao Liu 1332396 | 1532305 [email protected] [email protected] Màster de tradumàtica: Tecnologies de la traducció 2018-2019 Índice de contenidos 1. Introducción ........................................................................................ 4 2. Tabla resumen .................................................................................... 5 3. Descripción del proceso de localización ............................................. 6 3.1 ¿Qué es Waterfox? ........................................................................ 6 3.2 ¿Qué uso tiene?............................................................................. 6 3.3 Preparando la traducción ............................................................... 7 4. Análisis de la traducción ................................................................... 11 5. Análisis técnico ................................................................................. 21 6. Fase de testing ................................................................................. 29 7. Conclusiones .................................................................................... 35 8. Bibliografía
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • Hacking the PSP™
    http://videogames.gigcities.com 01_778877 ffirs.qxp 12/5/05 9:29 PM Page i Hacking the PSP™ Cool Hacks, Mods, and Customizations for the Sony® PlayStation® Portable Auri Rahimzadeh 01_778877 ffirs.qxp 12/5/05 9:29 PM Page i Hacking the PSP™ Cool Hacks, Mods, and Customizations for the Sony® PlayStation® Portable Auri Rahimzadeh 01_778877 ffirs.qxp 12/5/05 9:29 PM Page ii Hacking the PSP™: Cool Hacks, Mods, and Customizations for the Sony® PlayStation® Portable Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2006 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN-13: 978-0-471-77887-5 ISBN-10: 0-471-77887-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/SR/RS/QV/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]
  • Creating with Anger: Contemplating Vendetta
    City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 2-2016 Creating with Anger: Contemplating Vendetta. An Analysis of Anger in Italian and Spanish Women Writers of the Early Modern Era Luisanna Sardu Castangia Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/770 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] CREATING WITH ANGER: CONTEMPLATING VENDETTA. AN ANALYSIS OF ANGER IN ITALIAN AND SPANISH WOMEN WRITERS OF THE EARLY MODERN ERA By LUISANNA SARDU CASTANGIA A dissertation submitted to the Graduate Faculty in Comparative Literature in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2016 © 2016 LUISANNA SARDU CASTANGIA All Rights Reserved CREATING WITH ANGER: CONTEMPLATING VENDETTA. AN ANALYSIS OF ANGER IN ITALIAN AND SPANISH WOMEN WRITERS OF THE EARLY MODERN ERA. by LUISANNA SARDU CASTANGIA This manuscript has been read and accepted for the Graduate Faculty in Comparative Literature to satisfy the dissertation requirement for the degree of Doctor of Philosophy. Monica Calabritto ____________________________ ______________________________ Date Chair of Examining Committee Giancarlo Lombardi, Ph.D. _____________________________ ______________________________ Date Executive Officer Dr. Clare Carroll, Ph.D Dr. Lía Schwartz, Ph.D Supervisory Committee THE CITY UNIVERSITY OF NEW YORK ABSTRACT CREATING WITH ANGER: CONTEMPLATING VENDETTA. AN ANALYSIS OF ANGER IN ITALIAN AND SPANISH WOMEN WRITERS OF THE EARLY MODERN ERA.
    [Show full text]
  • Free Download Basilisk (Web Browser)
    free download Basilisk (web browser) Welcome to the Basilisk home page! Basilisk is a free and Open Source XUL-based web browser, featuring the well-known Firefox-style interface and operation. It is based on the Goanna layout and rendering engine (a fork of Gecko) and builds on the Unified XUL Platform (UXP), which in turn is a fork of the Mozilla code base without Servo or Rust. Basilisk is primarily a reference application for development of the XUL platform it builds upon, and additionally a potential replacement for Firefox. Basilisk is development software . This means that it should be considered more or less "beta" at all times; it may have some bugs and is provided as-is, with potential defects. Like any other Free Software community project, it comes without any warranty or promise of fitness for any particular purpose. That being said: of course we will do our best to provide an as stable and secure browser as possible with every official release of Basilisk. It should be noted that because of this focus on platform development, the browser itself (the application code) will be released and maintained mostly as-it-is, with very little change or development on the user interface or browser front-end features. As the platform develops, some Firefox- specific features may be dropped; please do not expect this application to remain the same, forever. What does this browser support? It supports a wide array of features required for the Modern Web, including advanced scripting, WebRTC, CSS v3, HTML5 and downloadable font support. It also fully supports all NPAPI plugins (e.g.
    [Show full text]
  • Java Blocked?
    Getting started with NRV 1. Browser compatibility The NRV website is fully compatible with the following (current as of 21 January 2020) versions of browsers: NRV Browser 2.0.7 (Windows) / 2.04 (Linux) (http://nrv.jinr.ru/nrv/) Pale Moon 28.8.1 Basilisk 2020.01.12 K-Meleon 76.2G Build 20200118 Waterfox Classic 2020.01 SeaMonkey 2.49.5 Otter Browser 1.0.81 weekly 300 Lunascape 6.15.2 Internet Explorer 11 Most other browsers (current versions) do not support Java any more. 2. Installation of Java and enabling applets At the moment, most of the sections of the NRV web knowledge base use Java to provide interactive user interface and display information. Java may be downloaded at https://java.com/en/download/. Depending on the version of the browser, 32- or 64-bit version of Java must be installed. After installation go to the Java Control Panel, open the Security tab, check Enable java content in the browser, and click OK to apply settings (Fig. 1). Fig. 1. Java Control Panel with the correct settings (Java 8 under Microsoft Windows 7). On the first run in a particular browser a security warning will appear. Check Do not show this again for apps from the publisher and location above and click the Run button (Fig. 2). A Java applet will start. The same warning may also appear periodically later, often after the update of the browser or Java. Fig. 2. Security warning. Please note that the actual look of the Java Control Panel and security warnings may vary.
    [Show full text]
  • Basilisk Goggles & Wishing Wells
    Basilisk Goggles & Wishing Wells: An Old School Esoterica 1 Oliver Moody (Order #10629337) Basilisk Goggles & Wishing Wells: An Old School Esoterica Written by Derek Holland Edited and Co-written by Greg Chapin Layout and Design by Rick Hershey and Troy Daniels Fat Goblin Games Team Chris Bayes, Eric Hindley, Jeff Swank, John Bennett, Justice Mora, Kalyna Conrad, Kiel Howell, Lucus Palosaari, Nick Esposito, Rick Hershey, Richard Bennett, Troy Daniels, Tyler Beck Published by Fat Goblin Games Basilisk Goggles & Wishing Wells: An Old School Esoterica © 2015 Fat Goblin Games Labyrinth LordTM is copyright 2007-2011, Daniel Proctor. Labyrinth LordTM and Advanced Labyrinth LordTM are trademarks of Daniel Proctor. These trademarks are used under the Labyrinth LordTM Trademark License 1.2, available at www.goblinoidgames.com. Open Game Content: All material — including but not limited to art, place and character names, character and setting descriptions, background, and new class descriptions—is Product Identity. All other content is considered Open Game Content. ABOUT FAT GOBLIN GAMES Based in South Carolina, USA, Fat Goblin Games was founded in 2011 to create Pathfinder Roleplaying Game compatible products. With a focus on high quality production values and providing a creative environment for our writers, Fat Goblin Games has quickly become a recognized force in the world of third party publishers. With hundreds of support books, visual aids, campaign settings, and quality stock art, Fat Goblin Games continues to provide exciting content and fantastic worlds in which gamers can immerse themselves. Visit us on Facebook, follow us on Twitter and check out our website at fatgoblingames.com.
    [Show full text]
  • OSINT Handbook September 2020
    OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 Aleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetis 2 Foreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Such arguments are not without merit. My fear, however, is that they are also shortsighted. I offer four reasons why. To begin, a shortlist betrays the widening spectrum of OSINT practice. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. A limited toolkit can never satisfy all of these constituencies. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Indeed, the right tool can determine whether you harvest the right information.
    [Show full text]
  • Australasian Language Technology Association Workshop 2008
    Australasian Language Technology Association Workshop 2008 Proceedings of the Workshop Workshop Chairs: Nicola Stokes David Powers 8-10 December 2008 CSIRO ICT Centre Hobart, Australia Proceedings of the Australasian Language Technology Association Workshop 2008 (ALTA 2008) URL: http://www.alta.asn.au/events/alta2008/ Sponsors: ISSN 1834-7037 (online proceedings) ii Preface This volume contains the papers accepted for presentation at this year’s Australasian Language Technology Workshop (ALTA2008), held at the CSIRO Tasmanian ICT Centre, Hobart, Australia, on December 8-10, 2008. This is the sixth annual installment of the workshop since the formation of ALTA, and the continuation of an annual workshop series that existed under various guises throughout the 1990s. The goals of the workshop are: • to bring together the Language Technology (LT) community in Australasia; • to encourage interactions with the international LT community; • to foster interaction between academic and industrial researchers; • to encourage dissemination and peer evaluation of research results; • to provide a forum for the discussion of new and ongoing research and projects; • to allow the broader AI community to become aware of local LT research; • to increase visibility of LT research in Australia, New Zealand and overseas; • to promote, support and encourage the participation of students in LT research. Once again, this year ALTA is co-located with the Australasian Document Computing Symposium (ADCS), including a joint session of papers and talks of interest to both communities. This year’s Australasian Language Technology Workshop includes regular talks as well as poster presentations which rank equally as papers. The number of papers submitted increased by 52% compared to last year, and 20 papers were selected by formal review to appear in these proceedings.
    [Show full text]
  • Web Development with Node and Express
    Web Development with Node and Express Ethan Brown Web Development with Node and Express by Ethan Brown Copyright © 2014 Ethan Brown. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/ institutional sales department: 800-998-9938 or [email protected]. Editors: Simon St. Laurent and Brian Anderson Indexer: Ellen Troutman Zaig Production Editor: Matthew Hacker Cover Designer: Karen Montgomery Copyeditor: Linley Dolby Interior Designer: David Futato Proofreader: Rachel Monaghan Illustrator: Rebecca Demarest July 2014: First Edition Revision History for the First Edition: 2014-06-27: First release See http://oreilly.com/catalog/errata.csp?isbn=9781491949306 for release details. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Web Development with Node and Express, the picture of a black lark and a white-winged lark, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]