Google Hacks by Tara Calishain, Rael Dornfest Publisher : O'reilly Pub

Total Page:16

File Type:pdf, Size:1020Kb

Google Hacks by Tara Calishain, Rael Dornfest Publisher : O'reilly Pub Google Hacks By Tara Calishain, Rael Dornfest Publisher : O'Reilly Pub Date : February 2003 ISBN : 0-596-00447-8 Preface Search engines for large collections of data preceded the World Wide Web by decades. There were those massive library catalogs, hand -typed with painstaking precision on index cards and eventually, to varying degrees, automated. There were the large data collections of professional information companies such as Dialog and LexisNexis. Then there are the still-extant private, expensive medical, real estate, and legal search services. Those data collections were not always easy to search, but with a little finesse and a lot of patience, it was always possible to search them thoroughly. Information was grouped according to established ontologies, data preformatted according to particular guidelines. Then came the Web. Information on the Web—as anyone knows who's ever looked at half-a-dozen web pages knows—is not all formatted the same way. Nor is it necessarily particularly accurate. Nor up to date. Nor spellchecked. Nonetheless, search engines cropped up, trying to make sense of the rapidly-increasing index of information online. Eventually, special syntaxes were added for searching common parts of the average web page (such as title or URL). Search engines evolved rapidly, trying to encompass all the nuances of the billions of documents online, and they still continue to evolve today. Google™ threw its hat into the ring in 1998. The second incarnation of a search engine service known as BackRub, the name "Google" was a play on the word "googol," a one followed by a hundred zeros. From the beginning, Google was different from the other major search engines online—AltaVista, Excite, HotBot, and others. Was it the technology? Partially. The relevance of Google's search results was outstanding and worthy of comment. But more than that, Google's focus and more human face made it stand out online. With its friendly presentation and its constantly expanding set of options, it's no surprise that Google continues to get lots of fans. There are weblogs devoted to it. Search engine newsletters, such as ResearchBuzz, spend a lot of time covering Google. Legions of devoted fans spend lots of time uncovering documented features, creating games (like Google whacking) and even coining new words (like "Googling," the practice of checking out a prospective date or hire via Google's search engine.) In April 2002, Google reached out to its fan base by offering the Google API. The Google API gives developers a legal way to access the Google search results with automated queries (any other way of accessing Google's search results with automated software is against Google's Terms of Service.) Why Google Hacks? "Hacks" are generally considered to be "quick -n-dirty" solutions to programming problems or interesting techniques for getting a task done. But what does this kind of hacking have to do with Google? Considering the size of the Google index, there are many times when you might want to do a particu lar kind of search and you get too many results for the search to be useful. Or you may want to do a search that the current Google interface does not support. The idea of Google Hacks is not to give you some exhaustive manual of how every command in the Google syntax works, but rather to show you some tricks for making the best use of a search and show applications of the Google API that perform searches that you can't perform using the regular Google interface. In other words, hacks. Dozens of programs and interfaces have sprung up from the Google API. Both games and serious applications using Google's database of web pages are available from everybody from the serious programmer to the devoted fan (like me). Google Hacks Seite 1 von 204 How This Book Is Organized The combination o f Google's API and over 3 billion pages of constantly shifting data can do strange things to your imagination and give you lots of new perspectives on how best to search. This book goes beyond the instruction page to the idea of "hacks"—tips, tricks, and techniques you can use to make your Google searching experience more fruitful, more fun, or (in a couple of cases) just more weird. This book is divided into several chapters: Chapter 1 This chapter describes the fundamentals of how Google's search properties work, with some tips for making the most of Google's syntaxes and specialty search offerings. Beyond the list of "this syntax means that," we'll take a look at how to eke every last bit of searching power out of each syntax—and how to mix syntaxes for some truly monster searches. Chapter 2 Google goes beyond web searching into several different arenas, including images, USENET, and news. Did you know that these collections have their own syntaxes? As you'll learn in this section, Google's equally adroit at helping you holiday shop or search for current events. Chapter 3 Not all the hacks are ones that you want to install on your desktop or web server. In this section, we'll take a look at third-party services that integrate the Google API with other applications or act as handy web tools—or even check Google by email! Chapter 4 Google's API doesn't search all Google properties, but sometimes it'd be real handy to take that search for phone numbers or news stories and save it to a file. This collection of scrapers shows you how. Chapter 5 We'll take a look under the hood at Google's API, considering several different languages and how Google works with each one. Hint: if you've always wanted to learn Perl but never knew what to "do with it," this is your section. Chapter 6 Once you've got an understanding of the Google API, you'll start thinking of all kinds of ways you can use it. Take inspiration from this collection of useful applications that use the Google API. Chapter 7 All work and no play makes for a dull web surfer. This collection of pranks and games t urns Google into a poet, a mirror, and a master chef. Well, a chef anyway. Or at least someone who throws ingredients together. Chapter 8 If you're a web wrangler, you see Google from two sides—from the searcher side and from the side of someone who wants to get the best search ranking for a web site. In this section, you'll learn about Google's (in)famous PageRank, cleaning up for a Google visit, and how to make sure your pages aren't indexed by Google if you don't want them there. How to Contact Us We have tested and verified the information in this book to the best of our ability, but you may find that features have changed (or even that we have made mistakes!). As reader of this book, you can help us to improve future editions by sending us your feedback. Please let us know about any errors, inaccuracies, bugs, misleading or confusing statements, and typos that you find anywhere in this book. Please also let us know what we can do to make this book more useful to you. We take your comments seriously and will try to incorporate reasonable suggestions into future editions. You can write to us at: O'Reilly & Associates, Inc. 1005 Gravenstein Hwy N. Sebastopol, CA 95472 (800) 998-9938 (in the U.S. or Canada) (707) 829-0515 (international/local) (707) 829-0104 (fax) To ask technical questions or to comment on the book, send email to: Google Hacks Seite 2 von 204 [email protected] The web site for Google Hacks lists examples, errata, and plans for future editions. You can find this page at: http://www.oreilly.com/catalog/googlehks/ For more information about this book and others, see the O'Reilly web site: http://www.oreilly.com Gotta Hack? To explore Hacks books online or to contribute a hack for future titles, visit: http://hacks.oreilly.com Chapter 1. Searching Google Section 1.1. Hacks #1-28 Section 1.2. What Google Isn't Section 1.3. What Google Is Section 1.4. Google Basics Section 1.5. The Special Syntaxes Section 1.6. Advanced Search Hack 1. Setting Preferences Hack 2. Language Tools Hack 3. Anatomy of a Search Result Hack 4. Specialized Vocabularies: Slang and Terminology Hack 5. Getting Around the 10 Word Limit Hack 6. Word Order Matters Hack 7. Repetition Matters Hack 8. Mixing Syntaxes Hack 9. Hacking Google URLs Hack 10. Hacking Google Search Forms Hack 11. Date-Range Searching Hack 12. Understanding and Using Julian Dates Hack 13. Using Full-Word Wildcards Hack 14. inurl: Versus site: Hack 15. Checking Spelling Hack 16. Consulting the Dictionary Google Hacks Seite 3 von 204 Hack 17. Consulting the Phonebook Hack 18. Tracking Stocks Hack 19. Google Interface for Translators Hack 20. Searching Article Archives Hack 21. Finding Directories of Information Hack 22. Finding Technical Definitions Hack 23. Finding Weblog Commentary Hack 24. The Google Toolbar Hack 25. The Mozilla Google Toolbar Hack 26. The Quick Search Toolbar Hack 27. GAPIS Hack 28. Googling with Bookmarklets .1 Hacks #1-28 Google's front page is deceptively simple: a search form and a couple of buttons. Yet that basic interface—so alluring in its simplicity—belies the power of the Google engine underneath and the wealth of information at its disposal. And if you use Google's search syntax to its fullest, the Web is your research oyster.
Recommended publications
  • PDF a Parent and Carer's Guide to Google Safesearch and Youtube Safety Mode
    A parent and carer’s guide to Google SafeSearch and YouTube Safety Mode Google is the most used search engine in the world and users can type in a word, expression, phrase or sentence in more than 100 languages and receive instant results in text, images or videos. YouTube is ranked as the world second largest search engine, with over 1 billion users that each day watch a billion hours of videos. With limited ways to control content, the Google and YouTube platforms can be challenge for parents and carers because there are hundreds of thousands of videos, images and other content that may not be considered appropriate for children or young people. This article explains why it may be useful to filter search results on Google and YouTube and how parents and carers can engage safety settings on these two platforms. Please note – the weblinks in this document are only available in English language. Is Google content appropriate for children and young people? A Google query lasts less than half a second, however there are many more steps involved before a final result is provided. This video from Google illustrates exactly how a Google search works. When Google realized that the results of an unfiltered Google search contained content that is not always appropriate for children, Google then developed SafeSearch so that children could safely find documents, images, and videos within the Google database. Is YouTube content appropriate for children and young people? Google purchased YouTube in 2006 with the idea that YouTube would provide a marketing hub as more viewers and advertisers chose the Internet over television.
    [Show full text]
  • Google™ Safesearch™ and Youtube™ Safety Mode
    Google™ SafeSearch™ and YouTube™ Safety Mode Searching the internet is a daily activity and Google™ is often the first port of call for homework, shopping and finding answers to any questions. But it is important to remember that you, or your children, might come across inappropriate content during a search, even if searching the most seemingly harmless of topics. Google SafeSearch is designed to screen out sites that contain sexually explicit content so they don’t show up in your family’s search results. No filter is 100% accurate, but SafeSearch helps you avoid the stuff you’d prefer not to see or have your kids stumble across. ‘Google’, the Google logo and ‘SafeSearch’ are trademarks or registered trademarks of Google Inc. Google SafeSearch and YouTube Safety Mode | 2 Follow these simple steps to set up Google SafeSearch. 1 Open your web browser and go to google.co.uk 2 Click Settings at the bottom of the page, then click Search settings in the pop-up menu that appears. Google SafeSearch and YouTube Safety Mode | 3 3 On the Search Settings page, tick the Filter explicit results box. Then click Save at the bottom of the page to save your SafeSearch settings. 4 If you have a Google account, you can lock SafeSearch on your family’s computer so that filter explicit results is always in place and no-one except you can change the settings. Click on Lock SafeSearch. If you’re not already signed in to your Google account, you’ll be asked to sign in. 5 Once you’re signed in, click on Lock SafeSearch.
    [Show full text]
  • Safesearch: Turn on Or Off
    Google SafeSearch. This information is taken directly from The Google Website SafeSearch: Turn on or off With SafeSearch, you can help prevent adult content from appearing in your search results. No filter is 100 percent accurate, but SafeSearch should help you avoid most of this type of material. Turn SafeSearch on or off 1. Visit the Search Settings page at http://www.google.com/preferences. 2. In the "SafeSearch filters" section: o Turn on SafeSearch by checking the box beside "Filter explicit results." Turning SafeSearch will filter sexually explicit video and images from Google Search result pages, as well as results that might link to explicit content. o Turn off SafeSearch by leaving the box unchecked. With SafeSearch off, we'll provide the most relevant results for your search and may include explicit content when you search for it. 3. Click the Save button at the bottom of the page. Change my settings If you're signed in to your Google Account, you can click Lock SafeSearch to help prevent others from changing your setting. Learn more about locking SafeSearch SafeSearch should remain set as long as cookies are enabled on your computer, although your SafeSearch settings may be reset if you delete your cookies. Learn more Report explicit content If you're trying to have sites or images removed, request to remove information from Google. We do our best to keep SafeSearch as up-to-date and comprehensive as possible, but objectionable content sometimes slips through the cracks. If you have SafeSearch set to filter explicit results, but still see these types of sites or images, please let us know.
    [Show full text]
  • Reference Guide
    Apache Syncope - Reference Guide Version 2.1.9 Table of Contents 1. Introduction. 2 1.1. Identity Technologies. 2 1.1.1. Identity Stores . 2 1.1.2. Provisioning Engines . 4 1.1.3. Access Managers . 5 1.1.4. The Complete Picture . 5 2. Architecture. 7 2.1. Core . 7 2.1.1. REST . 7 2.1.2. Logic . 8 2.1.3. Provisioning . 8 2.1.4. Workflow. 9 2.1.5. Persistence . 9 2.1.6. Security . 9 2.2. Admin UI. 10 2.2.1. Accessibility . 10 2.3. End-user UI. 12 2.3.1. Password Reset . 12 2.3.2. Accessibility . 13 2.4. CLI . 15 2.5. Third Party Applications. 15 2.5.1. Eclipse IDE Plugin . 15 2.5.2. Netbeans IDE Plugin. 15 3. Concepts . 16 3.1. Users, Groups and Any Objects . 16 3.2. Type Management . 17 3.2.1. Schema . 17 Plain . 17 Derived . 18 Virtual . 18 3.2.2. AnyTypeClass . 19 3.2.3. AnyType . 19 3.2.4. RelationshipType . 21 3.2.5. Type Extensions . 22 3.3. External Resources. 23 3.3.1. Connector Bundles . 24 3.3.2. Connector Instance details . 24 3.3.3. External Resource details . 25 3.3.4. Mapping . 26 3.3.5. Linked Accounts . 29 3.4. Realms . 29 3.4.1. Realm Provisioning . 30 3.4.2. LogicActions . 31 3.5. Entitlements. 31 3.6. Privileges . 31 3.7. Roles. 31 3.7.1. Delegated Administration . 32 3.8. Provisioning. 33 3.8.1. Overview. 33 3.8.2.
    [Show full text]
  • The Book of Apigee Edge Antipatterns V2.0
    The Book of Apigee Edge Antipatterns Avoid common pitfalls, maximize the power of your APIs Version 2.0 Google Cloud ​Privileged and confidential. ​apigee 1 Contents Introduction to Antipatterns 3 What is this book about? 4 Why did we write it? 5 Antipattern Context 5 Target Audience 5 Authors 6 Acknowledgements 6 Edge Antipatterns 1. Policy Antipatterns 8 1.1. Use waitForComplete() in JavaScript code 8 1.2. Set Long Expiration time for OAuth Access and Refresh Token 13 1.3. Use Greedy Quantifiers in RegularExpressionProtection policy​ 16 1.4. Cache Error Responses 19 1.5. Store data greater than 512kb size in Cache ​24 1.6. Log data to third party servers using JavaScript policy 27 1.7. Invoke the MessageLogging policy multiple times in an API proxy​ 29 1.8. Configure a Non Distributed Quota 36 1.9. Re-use a Quota policy 38 1.10. Use the RaiseFault policy under inappropriate conditions​ 44 1.11. Access multi-value HTTP Headers incorrectly in an API proxy​ 49 1.12. Use Service Callout policy to invoke a backend service in a No Target API proxy 54 Google Cloud ​Privileged and confidential. ​apigee 2 2. Performance Antipatterns 58 2.1. Leave unused NodeJS API Proxies deployed 58 3. Generic Antipatterns 60 3.1. Invoke Management API calls from an API proxy 60 3.2. Invoke a Proxy within Proxy using custom code or as a Target 65 3.3. Manage Edge Resources without using Source Control Management 69 3.4. Define multiple virtual hosts with same host alias and port number​ 73 3.5.
    [Show full text]
  • Learning Perl Through Examples Part 2 L1110@BUMC 2/22/2017
    www.perl.org Learning Perl Through Examples Part 2 L1110@BUMC 2/22/2017 Yun Shen, Programmer Analyst [email protected] IS&T Research Computing Services Spring 2017 Tutorial Resource Before we start, please take a note - all the codes and www.perl.org supporting documents are accessible through: • http://rcs.bu.edu/examples/perl/tutorials/ Yun Shen, Programmer Analyst [email protected] IS&T Research Computing Services Spring 2017 Sign In Sheet We prepared sign-in sheet for each one to sign www.perl.org We do this for internal management and quality control So please SIGN IN if you haven’t done so Yun Shen, Programmer Analyst [email protected] IS&T Research Computing Services Spring 2017 Evaluation One last piece of information before we start: www.perl.org • DON’T FORGET TO GO TO: • http://rcs.bu.edu/survey/tutorial_evaluation.html Leave your feedback for this tutorial (both good and bad as long as it is honest are welcome. Thank you) Yun Shen, Programmer Analyst [email protected] IS&T Research Computing Services Spring 2017 Today’s Topic • Basics on creating your code www.perl.org • About Today’s Example • Learn Through Example 1 – fanconi_example_io.pl • Learn Through Example 2 – fanconi_example_str_process.pl • Learn Through Example 3 – fanconi_example_gene_anno.pl • Extra Examples (if time permit) Yun Shen, Programmer Analyst [email protected] IS&T Research Computing Services Spring 2017 www.perl.org Basics on creating your code How to combine specs, tools, modules and knowledge. Yun Shen, Programmer Analyst [email protected] IS&T Research Computing
    [Show full text]
  • Sankei Digital Enabled Data-Driven Decision Making to Assess Website
    Case Study Sankei Digital enabled data-driven decision Partnership making to assess website engagement, user The Japanese newspaper industry is facing a decline in readership due to digitization, an consumption, and pave the path to subscriptions aging print readership, the rise of emerging media, and global economic changes. Print Google, in cooperation with e-Agency, a Google Analytics 360 authorized reseller, newspaper sales in Japan witnessed a more worked with Sankei Digital to match audience segments to different revenue streams than 20-percent decline between 2008 and such as ads and paid content. This enabled them to adopt a set of strategies to engage 2018, indicating that digital transformation with different audiences. is crucial for the continued survival of newspapers. (Source: Nihon Shinbun Kyokai.) The Project Sankei Digital Inc. has been using Google’s ad monetization products since 2004. They Google News Initiative, in cooperation with e-Agency, a Google Analytics 360 authorized reseller, currently use both Google Ad Manager 360 and worked with Sankei Digital to match audience segments to different revenue streams such as Google Analytics 360 to maximize ad revenue. ads and paid content. This enabled them to adopt a set of strategies to engage with different audiences. This collaboration resulted in two key outcomes: Overview 1. Dashboard-based data visualization Sankei Digital provides an array of digital Google and e-Agency built a dashboard to help Sankei Digital analyze their performance for services for Sankei Shimbun Co., Ltd., subscriptions, ad revenue, and user engagement. It was built by using the data framework including an online newspaper.
    [Show full text]
  • Free Download
    2021 TREND STUDY DIGITAL ANALYTICS & MARKETING ACTIVATION Trakken GmbH Zirkusweg 1 20359 Hamburg Germany [email protected] www.trkkn.com www.analytics-trends.com Contents 1 Preface 3 2 Analysis approach 4 3 Overview of results & respondents‘ self-assessment 36 4 Results in detail 4.1 First party data collection 11 4.2 Reporting & steering 17 4.3 Data storage 20 4.4 Data enrichment 22 4.5 Activation 25 4.6 Outlook 2021 28 2 3 1 - PREFACE MOIN For the sixth time now, we are publishing the trend study, in which we analyze the current and now established to- pics of digital analytics. For the past four years, we have been analyzing the trends in conversion optimization as well. And because we don‘t stagnate, we have expanded the concept again this year and are now looking at the entire field of digital analytics and marketing activation. This study is intended to identify industry trends, which is why we consider it important to ask the same ques- tions about digital analytics and conversion optimization on an annual basis. In addition, we also aim to reflect the changes in our fast-moving industry and to integrate as comprehensively as possible all related areas that are clo- sely connected with digital analytics and conversion op- timization. The result, a completely new structure of the study with a handful of new questions, while retaining the previous core questions. The chapters now cover all rele- vant areas from data collection, monitoring, data storage and enrichment to activation. In addition to the answers to previous and new questions, which we always present in year-on-year comparisons where possible, we surveyed self-assessments in the respective areas.
    [Show full text]
  • Unravel Data Systems Version 4.5
    UNRAVEL DATA SYSTEMS VERSION 4.5 Component name Component version name License names jQuery 1.8.2 MIT License Apache Tomcat 5.5.23 Apache License 2.0 Tachyon Project POM 0.8.2 Apache License 2.0 Apache Directory LDAP API Model 1.0.0-M20 Apache License 2.0 apache/incubator-heron 0.16.5.1 Apache License 2.0 Maven Plugin API 3.0.4 Apache License 2.0 ApacheDS Authentication Interceptor 2.0.0-M15 Apache License 2.0 Apache Directory LDAP API Extras ACI 1.0.0-M20 Apache License 2.0 Apache HttpComponents Core 4.3.3 Apache License 2.0 Spark Project Tags 2.0.0-preview Apache License 2.0 Curator Testing 3.3.0 Apache License 2.0 Apache HttpComponents Core 4.4.5 Apache License 2.0 Apache Commons Daemon 1.0.15 Apache License 2.0 classworlds 2.4 Apache License 2.0 abego TreeLayout Core 1.0.1 BSD 3-clause "New" or "Revised" License jackson-core 2.8.6 Apache License 2.0 Lucene Join 6.6.1 Apache License 2.0 Apache Commons CLI 1.3-cloudera-pre-r1439998 Apache License 2.0 hive-apache 0.5 Apache License 2.0 scala-parser-combinators 1.0.4 BSD 3-clause "New" or "Revised" License com.springsource.javax.xml.bind 2.1.7 Common Development and Distribution License 1.0 SnakeYAML 1.15 Apache License 2.0 JUnit 4.12 Common Public License 1.0 ApacheDS Protocol Kerberos 2.0.0-M12 Apache License 2.0 Apache Groovy 2.4.6 Apache License 2.0 JGraphT - Core 1.2.0 (GNU Lesser General Public License v2.1 or later AND Eclipse Public License 1.0) chill-java 0.5.0 Apache License 2.0 Apache Commons Logging 1.2 Apache License 2.0 OpenCensus 0.12.3 Apache License 2.0 ApacheDS Protocol
    [Show full text]
  • Duo Access Gateway (SAML): Cisco ASA Only
    #CLMEL Duo Security: Journey toward Zero Trust Karl Lewis, Solutions Engineer - APJC BRKSEC-2718 #CLMEL BRK-2718 Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space cs.co/ciscolivebot#BRKSEC-2718 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Agenda • Introduction • Where did Zero-Trust come from? • Why are traditional approaches Failing? • How does Zero-Trust address these new challenges? • What does the journey look like? Where do I get value? • Use Cases and Architecture– How does it really work? • Live Demo and Integrations discussion. • Q&A BRK-2718 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Different Words, Similar Ideas John Kindervag at Forrester describes a “Zero Trust model” 2009 2003-ish 2013 The Jericho Forum Google talks about their first discusses “de- implementation, called perimeterization” “BeyondCorp” #CLMEL © 2019BRK Cisco-2718 and/or its affiliates. All rights reserved. Cisco Public Don’t trust something just because it’s on the “inside” of your firewall. It doesn’t mean you don’t need a firewall. #CLMEL BRK-2718 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public BRK-2718 Traditional approaches to security are falling short. A Castle Wall only works when everything you need to protect is: INSIDE And the attackers are: OUTSIDE © 2019 Cisco and/or its affiliates.
    [Show full text]
  • A.13 Apache Groovy
    Oracle® Big Data Spatial and Graph User©s Guide and Reference Release 1.2 E67958-03 May 2016 Oracle Big Data Spatial and Graph User's Guide and Reference, Release 1.2 E67958-03 Copyright © 2015, 2016, Oracle and/or its affiliates. All rights reserved. Primary Authors: Chuck Murray, Harihara Subramanian, Donna Carver Contributors: Bill Beauregard, Hector Briseno, Hassan Chafi, Zazhil Herena, Sungpack Hong, Roberto Infante, Hugo Labra, Gabriela Montiel-Moreno, Siva Ravada, Carlos Reyes, Korbinian Schmid, Jane Tao, Zhe (Alan) Wu This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations.
    [Show full text]
  • Proquest Dissertations
    REPROGRAMMING THE LYRIC: A GENRE APPROACH FOR CONTEMPORARY DIGITAL POETRY HOLLY DUPEJ A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS GRADUATE PROGRAM IN COMMUNICATIONS AND CULTURE YORK UNIVERSITY, TORONTO, ONTARIO APRIL 2008 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-38769-6 Our file Notre reference ISBN: 978-0-494-38769-6 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Plntemet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation.
    [Show full text]