Administrator Guide, Dragon Medical Practice Edition Version 2.0, L-3659

Total Page:16

File Type:pdf, Size:1020Kb

Administrator Guide, Dragon Medical Practice Edition Version 2.0, L-3659 Dragon Medical Practice Edition 2 Administrator Guide 1 Dragon Medical Practice Edition 2 Administrator Guide Copyright 2013. Dragon Medical Practice Edition 2. This material may not include some last-minute technical changes and/or revisions to the software. Changes are periodically made to the information provided here. Future versions of this material will incorporate these changes. No part of this manual or software may be reproduced in any form or by any means, including, without limitation, electronic or mechanical, such as photocopying or recording, or by any information storage and retrieval systems, without the express written consent of Nuance Communications, Inc. Specifications are subject to change without notice. Copyright © 2002-2013 Nuance Communications, Inc. All rights reserved. Nuance, ScanSoft, the Nuance logo, the Dragon logo, Dragon, DragonBar, NaturallySpeaking, NaturallyMobile, RealSpeak, Nothing But Speech (NBS), Natural Language Technology, Select-and-Say, MouseGrid, and Vocabulary Editor are registered trademarks or trademarks of Nuance Communications, Inc. in the United States or other countries. All other names and trade- marks referenced herein are trademarks of Nuance Communications or their respective owners. Designations used by third- party manufacturers and sellers to distinguish their products may be claimed as trademarks by those third-parties. Adobe and Acrobat are registered trademarks of Adobe Systems Incorporated. AMD is a trademark of Advanced Micro Devices, Inc. America Online is a registered trademark of America Online, Inc., a division of AOL Time Warner. Corel and WordPerfect are registered trademarks of Corel Corporation. iPAQ is a registered trademark of the Hewlett-Packard Company. Lotus and Lotus Notes are registered trademarks of Lotus Development Corporation. Macromedia Flash? is a trademark of Mac- romedia, Inc. Microsoft, Outlook, Windows, Windows NT, Visual Basic, and PowerPoint are trademarks or registered trade- marks of Microsoft Corporation. Mozilla, Mozilla Firefox, and Mozilla Thunderbird are trademarks or registered trademarks of the Mozilla Foundation. Palm OS is a registered trademark of PalmSource, Inc. or its affiliates. Panasonic is a registered trade- mark of the Matsushita Electric Industrial Co., Ltd. Pentium is a registered trademark of Intel Corporation. Sony and Memory Stick are registered trademarks of the Sony Corporation. Voice It, the Voice It logo, and Voice It Link are trademarks or reg- istered trademarks of VXI Corporation. Disclaimer Nuance makes no warranty, express or implied, with respect to the quality, reliability, currentness, accuracy, or freedom from error of this document or the product or products referred to herein and specifically disclaims any implied warranties, includ- ing, without limitation, any implied warranty of merchantability, fitness for any particular purpose, or non-infringement. Nuance disclaims all liability for any direct, indirect, incidental, consequential, special, or exemplary damages resulting from the use of the information in this document. Mention of any product not manufactured by Nuance does not constitute an endorse- ment by Nuance of that product. Notice Nuance Communications, Inc. is strongly committed to creating high quality voice and data management products that, when used in conjunction with your own company’s security policies and practices, deliver an efficient and secure means of man- aging confidential information. We strongly urge current owners of Nuance products that include optional system password features to verify that these fea- tures are enabled! You can call our support line if you need assistance in setting up passwords correctly or in verifying your existing security settings. L-3659 Published by Nuance Communications, Inc., Burlington, Massachusetts, USA Visit Nuance Communications, Inc. on the Web at www.nuance.com. Visit Nuance Healthcare on the Web at www.nuance.com/healthcare. 2 Contents Chapter 1: Introduction to Dragon Medical Practice Edition 2 15 What's new for administrators 17 Auto-saving end-user recognition history data 27 Creation and management of the recognition history log files 28 Contents of the recognition history log files 29 Enabling or disabling the logging of recognition history for an end-user 30 Removing the recognition history log files 31 Disable the SavePerUserProfileUtteranceData option 31 Manually delete the recognition history log files 31 Enable auto-saving of recognition history during a Dragon push installation 32 Supporting Web applications 33 Supported web browsers 33 Supported web applications 33 Enabling and using Web application support 33 Verifying web application support is on 33 Troubleshooting web application support 34 Enabling Web application support in a supported browser 35 Enabling Web application support in Internet Explorer 9 (32-bit mode) or later 35 Enabling Web application support in Mozilla Firefox 12 or higher 35 Enabling Web application support in Google Chrome 16 or higher 36 Troubleshooting web applications 37 Hiding Dictation Box confirmation 38 Hide the Dictation Box close confirmation for one end-user 38 Hide the Dictation Box close confirmation for all created end-users 38 Sending a notification when the AutoTranscribe Folder Agent completes a tran- scription job 40 Microsoft Exchange command line example 40 SMTP command line example 41 The Dragon Support Packager 43 Starting the Dragon Support Packager 43 What to do if the Dragon Support Packager produces an error 44 Creating Windows shortcuts to User Profiles and Vocabularies 46 To create a shortcut to a User Profile and Vocabulary 46 Types of Paths 47 Using multiple acoustic models with a User Profile 48 Acoustic Optimization for User Profiles with BestMatch V acoustic models 48 Contents Multiple acoustic models and User Profiles on single and multi-core computers 48 The Dragon Support Packager 50 Starting the Dragon Support Packager 50 What to do if the Dragon Support Packager produces an error 51 Installing, modifying and upgrading Dragon 53 Troubleshooting silent install errors 54 Search for silent install error information in log files 54 Support for edit controls 55 Windows Presentation Framework controls 55 Supported Edit controls 55 Configuring support for Windows Presentation Framework controls 57 Disable support for WPF controls in local applications 57 Enable support for WPF controls in local applications 57 Chapter 2: Preparing to Install Dragon 58 Preparing for an installation or upgrade 59 Installation restrictions 59 File Structure 59 Installation checklist 60 Installation checklist 60 Upgrade checklist 61 Support Checklist 61 Dragon system requirements 62 Processor 62 Processor cache 62 Operating systems and RAM 62 Free hard disk space 63 Microphone 63 Sound card 64 Screen resolution 64 Other requirements 64 Storage space required for User Profiles 65 Installing on or upgrading to Windows 7 or Windows 8 67 Upgrade considerations 67 Roaming User Profiles in an MSI Installation on Windows Vista, Windows 7, or Windows 8 67 Coexistence with other Dragon products 68 Coexistence with previous versions of Dragon 68 Coexistence with Dragon SDK Client Edition 68 Run Dragon SDK Client Edition 11 on a computer with Dragon Medical Practice Edition 2 68 Run Dragon Medical Practice Edition 2 on a computer with Dragon SDK Client Edition 11 68 4 Contents Chapter 3: Installing Dragon 70 Installing Dragon on a single computer 71 Enable or disable tutorials during a custom Dragon installation 75 Sample custom installation of Dragon 77 Preparing for the Roaming feature 77 Install Dragon 77 Setting the Dragon Options 80 Setting the Administrative Options: Roaming User Profiles 88 Setting the Administrative Options: Miscellaneous options 90 Setting the Administrative Options: Scheduled Tasks 91 Setting Auto-Formatting Options 91 Post Installation Tasks 93 Cleaning up after uninstalling Dragon Medical Practice Edition 2 93 Dragon file structure 94 Dragon Medical Practice Edition 2 on Windows 8 directory structure 95 Turning off Dragon's use of Microsoft Active Accessibility Service 96 Enhancing the privacy of patient data 98 Security Considerations 98 Chapter 4: Upgrading Dragon 100 Upgrading Dragon 101 Installing on or upgrading to Windows 7 or Windows 8 104 Upgrade considerations 104 Roaming User Profiles in an MSI Installation on Windows Vista, Windows 7, or Windows 8 104 Upgrading multiple User Profiles 105 Using the User Profile Upgrade Wizard 105 User Profile Upgrade Wizard: Select the profile(s) to upgrade 105 User Profile Upgrade Wizard: Begin profile upgrading 108 Step 3: Upgrade the end-user systems 110 Preparing to upgrade Roaming User Profiles 111 Step 1: Install Dragon Medical Practice Edition 2 on the computer where you upgrade Dragon Medical Enterprise Edition 10.x or Dragon Medical Practice Edition 1 User Profiles 111 Step 2: On the Dragon Medical Enterprise Edition 10.x or Dragon Medical Practice Edition 1 end-user systems that use the Roaming feature 111 Step 3: On the central network storage location for the Dragon Medical Enterprise Edition 10.x or Dragon Medical Practice Edition 1 Master Roaming User Profiles 112 Step 4: Copy the Dragon Medical Enterprise Edition 10.x or Dragon Medical Practice Edition 1 Master Roaming User Profiles to the Dragon Medical Practice Edition 2 client computer 112 Step 5: On the administrator system where you plan to upgrade the Dragon Medical Enter- prise Edition 10.x or Dragon Medical Practice Edition 1 Master Roaming User
Recommended publications
  • Lo Hemos Olvidado Todo
    PERSPECTIVAS nº39 marzo/abril 2007 DEL MUNDO DE LA COMUNICACIÓN sumario Lo hemos olvidado todo HUBO UN TIEMPO EN EL QUE POR ENCIMA DE LAS DIFERENCIAS IDEO- LÓGICAS, LOS PERIODISTAS ESPAÑOLES COMPARTÍAN UN PACTO NO EX- Lo hemos olvidado todo PLÍCITO ACERCA DEL TRATAMIENTO INFORMATIVO DE LOS ACTOS TE- pág.1 RRORISTAS. LAS BASES ERAN UN ESCRUPULOSO RESPETO A LAS VÍCTI- MAS, INFORMAR SIN ENTORPECER LA INVESTIGACIÓN Y NO HACER EL JUEGO A LOS TERRORISTAS. Concentración y pluralismo informativo La prioridad era respetar la digni- sar de las peticiones de las asocia- en Europa dad de las víctimas y sus familiares. ciones de víctimas de no emitirlas. Lo secundario, pero no por ello me- Un episodio lamentable de intromi- pág.2 nos importante, conciliar el derecho sión gratuita en una circunstancia a la información con el deber de no tan íntima como es la muerte o el do- entorpecer la investigación policial. lor. La metamorfosis de un buscador Por último, evitar a toda costa cual- en un metamedio quier tentación de instrumentalizar la La democracia se sostiene en la plu- información con fines partidistas. Du- ralidad de opiniones que, llevada al pág.4 rante décadas los medios respetaron campo de la comunicación, se ha en mayor o menor medida estas re- de concretar en la independencia y glas de juego y las aplicaron a los autonomía de los profesionales de la Perspectivas del numerosos atentados que ETA ha co- información, la ausencia de presio- cine polaco reciente metido en nuestro país. Sin embar- nes exteriores y el rigor informativo, basado en el contraste de las noti- pág.6 go, toda la madurez alcanzada por los informadores en la cobertura de cias.
    [Show full text]
  • Operationalizing Design Fiction with Anticipatory Ethnography
    1 – We will add this chapter heading, 2 line spaces after Operationalizing Design Fiction with Anticipatory Ethnography HighWire Centre for Doctoral Training, Lancaster University (UK) JOSEPH LINDLEY DHRUV SHARMA ROBERT POTTS Transmuting the entanglement of situations, contexts, artifacts and people, designers mediate the relationship between ‘what could be’ and ‘what is’. All design, then, has an implicit relationship with the future. Latency will always exist as part of this relationship, between the inception of a design concept, development and delivery of that concept, and the manifestation of that concept’s potential impact on the world. As we move further into the heart of the Digital Revolution these periods of latency decrease, whilst the breadth and depth of potential impacts increase. Always an arm’s length away, but with a velocity and mass greater than at any point in history, the momentum of the future today is greater than ever before. This paper describes the practicalities of operationalizing design fiction, using anticipatory ethnography, in order to illuminate and explore the implications of plausible near futures and in doing so allowing designers and their designs to match the velocity of the future before critical impacts occur. By harnessing designers' speculation can we make the future’s ‘what is’ better than simply ‘what could be’? The universe of possible worlds is constantly expanding and diversifying thanks to the incessant world-constructing activity of human minds and hands. Literary fiction is probably the most active experimental laboratory of the world-constructing enterprise (Lubomír 1998). BACKGROUND Anticipatory ethnography looks at design fiction artifacts (cf. Bleecker 2009; Lindley 2015), and applies ethnographic techniques to them in order to produce actionable insights (Lindley, Sharma, and Potts 2014).
    [Show full text]
  • Beyond Assessment: Recognizing Achievement in a Networked World Downes, Stephen
    NRC Publications Archive Archives des publications du CNRC Beyond assessment: recognizing achievement in a networked world Downes, Stephen NRC Publications Archive Record / Notice des Archives des publications du CNRC : https://nrc-publications.canada.ca/eng/view/object/?id=ac803139-7450-4ab7-acd8-be85a13ffb16 https://publications-cnrc.canada.ca/fra/voir/objet/?id=ac803139-7450-4ab7-acd8-be85a13ffb16 Access and use of this website and the material on it are subject to the Terms and Conditions set forth at https://nrc-publications.canada.ca/eng/copyright READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THIS WEBSITE. L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site https://publications-cnrc.canada.ca/fra/droits LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE WEB. Questions? Contact the NRC Publications Archive team at [email protected]. If you wish to email the authors directly, please see the first page of the publication for their contact information. Vous avez des questions? Nous pouvons vous aider. Pour communiquer directement avec un auteur, consultez la première page de la revue dans laquelle son article a été publié afin de trouver ses coordonnées. Si vous n’arrivez pas à les repérer, communiquez avec nous à [email protected]. Beyond Assessment: Recognizing Achievement in a Networked World For ePIC 2014 (11th July, Greenwich) Stephen Downes What does it take to be a Dean at MIT? "Ms. Jones had received the institute’s highest honor for administrators, the M.I.T. Excellence Award for Leading Change.“ But no degree.
    [Show full text]
  • Regulating Adwords: Consumer Protection in a Market Where the Commodity Is Speech
    CANNON (final) 2/7/2009 12:22:41 PM REGULATING ADWORDS: CONSUMER PROTECTION IN A MARKET WHERE THE COMMODITY IS SPEECH Alex W. Cannon∗ All current forms of activity tend towards advertising and most exhaust themselves therein. Not necessarily advertising itself, the kind that is produced as such—but the form of advertising, that of a simplified operational mode, vaguely seductive [and] vaguely consensual.1 I. INTRODUCTION We should be elated, we should be concerned, yet we should not be surprised. Google2 can read our minds, tell us what we want to purchase, assist us in fulfilling our most personal and closely guarded desires, further our businesses, update us on current events, make decisions for us, educate us, and keep us healthy. Some consumers “can’t think of anything [they] don’t search for.”3 The aforemen- tioned sentiments resonate throughout an eight-minute Internet flash video made for the Museum of Media History entitled EPIC: 2014, which predicts that Google will merge with Amazon.com, TiVo, Blogger, and various social networking tools to create the “Google ∗ J.D. Candidate, 2009, Seton Hall University School of Law. B.F.A., 2003, Web- ster University. The author wishes to thank Professor Frank Pasquale for his invalu- able assistance; his parents for their continued love and support; and his friends in New York, New Jersey, and Atlanta. Finally, the author wishes to thank Larry Page and Sergey Brin for their nonpareil research assistance. 1 JEAN BAUDRILLARD, Absolute Advertising, Ground-Zero Advertising, in SIMULACRA AND SIMULATION 87, 87 (Shelia Faria Glaser trans., Univ.
    [Show full text]
  • Asterisk Revisited: Debating a Right of Reply on Search Results
    Brooklyn Law School BrooklynWorks Faculty Scholarship 2008 Asterisk Revisited: Debating a Right of Reply on Search Results Frank Pasquale Follow this and additional works at: https://brooklynworks.brooklaw.edu/faculty Part of the Internet Law Commons, and the Science and Technology Law Commons FRANK PASQUALE* Asterisk Revisited: Debating a Right of Reply on Search Results I. INTRODUCTION WHAT DO WE WORRY ABOUT WHEN WE WORRY ABOUT GOOGLE? Will the company combine the worst aspects of Microsoft, ChoicePoint, WalMart, Experian, and News Corporation?' Or will its "Don't Be Evil" slogan and unique ownership struc- ture assure some accountability to the public?2 Some of the most creative minds in cyberlaw, science fiction, and cultural studies have addressed those questions.3 Some have envisioned Google-driven dystopiasi In Cory Doctorow's story Scroogled, the Department of Homeland Security out- sources so much surveillance to Google that the company becomes a new J. Edgar . Associate Professor of Law, Seton Hall Law School. I wish to thank James Grimmelmann for his comments on a draft of this Essay. I certainly have not been able to respond to all of his comments, but thank him for the kind of open-minded conversation that right-of-reply at its best facilitates. 1. Google has a uniquely dominant place in the universe of search engines and for that reason will be the primary focus of this Essay. It is aiming to combine social networking, software, database, media, and retail capabilities in an unprecedented way. At the time of this writing (November 2007), its market capitalization made it the fifth largest company in the United States, and few companies are unafraid of its potential to restructure their markets.
    [Show full text]
  • Access, Fairness, and Accountability in the Law of Search Oren Bracha
    Cornell Law Review Volume 93 Article 11 Issue 6 September 2008 Federal Search Commission - Access, Fairness, and Accountability in the Law of Search Oren Bracha Frank Pasquale Follow this and additional works at: http://scholarship.law.cornell.edu/clr Part of the Law Commons Recommended Citation Oren Bracha and Frank Pasquale, Federal Search Commission - Access, Fairness, and Accountability in the Law of Search, 93 Cornell L. Rev. 1149 (2008) Available at: http://scholarship.law.cornell.edu/clr/vol93/iss6/11 This Article is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Law Review by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. FEDERAL SEARCH COMMISSION? ACCESS, FAIRNESS, AND ACCOUNTABILITY IN THE LAW OF SEARCH Oren Bracha & Frank Pasqualet Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this Article, we make the case for some regulation of the ability of search engines to ma- nipulate and structure their results. We demonstrate that the First Amend- ment, properly understood, does not prohibit such regulation. Nor will such intervention inevitably lead to the disclosure of important trade secrets. After setting forth normativefoundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalizedsearch may constrain abusive companies to some extent, they have little chance of check- ing untoward behavior by the oligopolists who now dominate the search mar- ket.
    [Show full text]
  • Alice E. Marwick [email protected] |
    Marwick 1 Alice E. Marwick [email protected] | http://www.tiara.org ACADEMIC APPOINTMENTS University of North Carolina, Chapel Hill 2017 – Assistant Professor, Department of Communication Faculty Affiliate, UNC Center for Media Law and Policy Data and Society Research Institute, New York, NY 2016 – 2016-2017 Fellow; Faculty Advisor, Media Manipulation Initiative Fordham University, Bronx, NY 2014 – 2016 Director, McGannon Center for Communication Research Fordham University, Bronx, NY 2012 – 2016 Assistant Professor, Department of Communication and Media Studies Academic Affiliate, Center on Law & Information Policy, Fordham University School of Law Microsoft Research New England, Cambridge, MA 2010 – 2012 Postdoctoral Researcher, Social Media Collective Supervisor: Dr. danah boyd EDUCATION PhD New York University, New York, NY 2005 – 2010 Media, Culture, and Communication Dissertation: “Status Update: Celebrity, Publicity and Self-Branding in Web 2.0” Committee: Dr. Marita Sturken (chair), Dr. Helen Nissenbaum, Dr. Gabriella Coleman Readers: Dr. Fred Turner, Dr. danah boyd MA University of Washington, Seattle, WA 2003 - 2005 Communication Thesis: “Selling Your Self: Identity Online in the Age of a Commodified Internet” Committee: Dr. David Silver (chair), Dr. Beth Kolko, Dr. Crispin Thurlow BA Wellesley College, Wellesley, MA 1994 - 1998 Political Science and Women’s Studies (cum laude) RESEARCH INTERESTS Social media, privacy and surveillance, celebrity and consumer culture, information policy, gender and technology, technology industries, far-right internet subcultures, youth and technology Marwick 2 BOOKS Marwick, A. (under contract). Hidden: Networked Privacy and Those Left Out (working title). New Haven: Yale University Press. Marwick, A. (2013). Status Update: Celebrity, Publicity and Branding in the Social Media Age. New Haven: Yale University Press.
    [Show full text]
  • Surveillance and Privacy in the Implementation of Google Apps For
    EER0010.1177/1474904116654917European Educational Research JournalLindh and Nolin 654917research-article2016 General submission European Educational Research Journal 1 –20 Information We Collect: © The Author(s) 2016 Reprints and permissions: Surveillance and Privacy sagepub.co.uk/journalsPermissions.nav DOI: 10.1177/1474904116654917 in the Implementation of eerj.sagepub.com Google Apps for Education Maria Lindh The Swedish School of Library and Information Science, University of Borås, Sweden Jan Nolin The Swedish School of Library and Information Science, University of Borås, Sweden Abstract The aim of this study is to show how Google’s business model is concealed within Google Apps for Education (GAFE) as well as how such a bundle is perceived within one educational organisation, consisting of approximately 30 schools. The study consists of two parts: 1) a rhetorical analysis of Google policy documents and 2) an interview study in a Swedish educational organisation. By making an implicit demarcation between the two concepts (your) ‘data’ and (collected) ‘information’ Google can disguise the presence of a business model for online marketing and, at the same time, simulate the practices and ethics of a free public service institution. This makes it problematic for Swedish schools to implement Google Apps for Education, bearing in mind Google’s surveillance practices for making profits on pupil’s algorithmic identities. From a front end viewpoint of Google Apps for Education, the advantages of the services are evident to the users, and emerge in the study, whereas back end strategies are relatively hidden. Keywords Cloud computing, algorithmic identities, Google Apps for Education (GAFE), privacy, surveillance economy Introduction This study focuses on digital surveillance in relation to public cloud services in Swedish schools.
    [Show full text]
  • Messing with the Magic PART TWO - the Google Story
    Table of Contents Title Page Copyright Page Dedication PREFACE PART ONE - Different Planets CHAPTER ONE - Messing with the Magic PART TWO - The Google Story CHAPTER TWO - Starting in a Garage CHAPTER THREE - Buzz but Few Dollars CHAPTER FOUR - Prepping the Google Rocket CHAPTER FIVE - Innocence or Arrogance? CHAPTER SIX - Google Goes Public CHAPTER SEVEN - The New Evil Empire? PART THREE - Google Versus the Bears CHAPTER EIGHT - Chasing the Fox CHAPTER NINE - War on Multiple Fronts CHAPTER TEN - Waking the Government Bear CHAPTER ELEVEN - Google Enters Adolescence CHAPTER TWELVE - Is "Old" Media Drowning? CHAPTER THIRTEEN - Compete or Collaborate? CHAPTER FOURTEEN - Happy Birthday PART FOUR - Googled CHAPTER FIFTEEN - Googled CHAPTER SIXTEEN - Where Is the Wave Taking Old Media? CHAPTER SEVENTEEN - Where Is the Wave Taking Google? Acknowledgements NOTES INDEX ALSO BY KEN AULETTA Media Man: Ted Turner's Improbable Empire Backstory: Inside the Business of News World War 3.0: Microsoft and Its Enemies The Higbwaymen: Warriors of the Information Superhighway Three Blind Mice: How the TV Networks Lost Their Way Greed and Glory on Wall Street: The Fall of the House of Lehman The Art of Corporate Success: The Story of Schlumberger The Underclass Hard Feelings The Streets Were Paved with Gold THE PENGUIN PRESS Published by the Penguin Group Penguin Group (USA) Inc., 375 Hudson Street, New York, New York 10014, U.S.A. Penguin Group (Canada), 90 Eglinton Avenue East, Suite 700, Toronto, Ontario, Canada M4P 2Y3 (a division of Pearson Penguin Canada Inc.). Penguin Books Ltd, 80 Strand, London WC2R ORL, England. Penguin Ireland, 25 St. Stephen's Green, Dublin 2, Ireland (a division of Penguin Books Ltd).
    [Show full text]
  • A Study of Emerging Opportunities for Digital Print Production of User-Generated Content Javier Rodriguez-Borlado Martinez
    Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 10-1-2008 A study of emerging opportunities for digital print production of user-generated content Javier Rodriguez-Borlado Martinez Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended Citation Martinez, Javier Rodriguez-Borlado, "A study of emerging opportunities for digital print production of user-generated content" (2008). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by the Thesis/Dissertation Collections at RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. A Study of Emerging Opportunities for Digital Print Production of User-Generated Content by Javier Rodríguez-Borlado Martínez A Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in the School of Print Media in the College of Imaging Arts and Sciences of the Rochester Institute of Technology October 2008 Primary Thesis Advisor: Professor Frank Cost Secondary Thesis Advisor: Professor J. Fernando Naveda Table of Content Abstract ……………………………………………………………………….…..……. v Chapter 1 – Introduction and Statement of the Problem …………….…………….1 Statement of the Problem ……………………………………….…………….1 Background …………………………………………………………………… 3 Present Significance ………………………………………………………….. 4 Reasons for Interest in the Study ……………………………………..…….. 5 Chapter 2 - Literature Review .. ………………………………………………..……. 7 “The Perfect Storm” . …………………………………………………………..7 One by One, Customer by Customer, Item by Item . ……………………….8 The Web Evolution …………………………………………………..………..10 Web 1.0: Information Provider ………………………………………10 Web 2.0: User-Created Content ………………………..……..…… 12 Web 2.5: Social Networking ………………………………………… 12 The Printing Evolution ………………………………………………………. 15 Access to Information ……………………………………………………….
    [Show full text]
  • When Chaos Rules, Only the Fittest Survive: the Impact of Disruptive Technologies on Organizational Survival
    FEATURE When Chaos Rules, Only the Fittest Survive: The Impact of Disruptive Technologies on Organizational Survival By Deepak Sarup, CISA, FCA But if variations useful to any organic being ever do Some 70 years later, another major shift is taking place in occur, assuredly individuals thus characterized will have the movie business. DVD sales and rental revenues have the best chance of being preserved in the struggle for overtaken the box office revenue from cinema tickets by more life. This principle of preservation, or the survival of the than two times in the US. Yet most studios today still conceive fittest, I have called Natural Selection. new productions with a strong bias on the return from box —Charles Darwin, The Origin of Species (1859) office proceeds, as they have little or no knowledge of the preferences of the end consumer with respect to DVD tastes ailing around the Galapagos Islands on board the and the even newer video-on-demand channel. The latter, H.M.S. Beagle in the early 1830s, Charles Darwin was though small, is growing rapidly and may soon overtake both S “much struck with certain facts in the distribution of the the box office and DVD revenues. Not surprisingly, a major organic beings inhabiting South America.”1 Mulling over these shakeout is likely in the near future, and the studios that are facts led him to formulate and publish, some 25 years later, the unable to adapt to the new delivery technologies will probably new and hugely controversial, at least for that time, theory of face the same end as the weaker species so laboriously evolution.
    [Show full text]
  • KIM ERWIN Email: [email protected]
    Cell: (847) 922-0655 KIM ERWIN Email: [email protected] EDUCATION MDes, Design Methods IIT Institute of Design, Chicago 1991-1994 BA, Philosophy and Logic Loyola University, Chicago 1984-1989 ACADEMIC APPOINTMENT HISTORY Associate Research Professor for Healthcare Design, IIT Institute of Design 2021- present Founder and Co-Director, Institute for Healthcare Delivery Design, UIC 2017 - 2020 Associate Director, Population Health Sciences, UIC 2017 - 2020 Research Professor, UIC School of Design 2017 - 2020 Director + Founder, Center for Collaborative Healthcare Design 2016 - 2017 Associate Professor, IIT Institute of Design 2017 - 2017 Assistant Professor, IIT Institute of Design 2011 - 2017 Visiting Professor, IIT Institute of Design 2009 - 2011 Adjunct faculty, IIT Institute of Design 2006 - 2009 SUMMARY STATEMENT I have 30 years experience in applying design methods to complex systems and the development of novel solutions to help those systems better fit the needs of people. Specifically, I employ strategic planning, methods from the field of Human-Centered Design, and communication methods to build teams, identify opportunities, and tailor interventions to the real-world context of stakeholders. My published book on the topic has been available on Amazon since 2013: Communicating the New: Methods to Accelerate and Shape Innovation. PERSONAL STATEMENT My research bridges the fields of design and healthcare delivery, specifically the application of human-centered design methods to healthcare systems and their futures. As health and healthcare are both fundamentally place-based, I target interventions, services and strategies that respond to specific the people and environments where these activities take place. This is also a strategy for equity and cultural inclusion.
    [Show full text]