Web Enhancement #1

Total Page:16

File Type:pdf, Size:1020Kb

Web Enhancement #1 the redhurst academy of magic™ adventure seeds web enhancement #1 For use with the Requires the use of the Dungeons & Dragons Player’s Handbook, published by Wizards of the Coast, Inc. 1 This product utilizes updated material from the v.3.5 revision. ©2003 Human credits about this “book” Head Studios, Inc. Writing and Design: Matt Forbeck hose of you who have purchased The Redhurst All Rights Reserved. Editing: Timothy S. Gerritsen tAcademy of Magic and read it through know that it’s Redhurst, The Redhurst Art Direction: Matt Forbeck a gold mine for DMs hungry for adventure ideas. Due Academy of Magic and Graphic Design: Matt Forbeck and Tim Bowman to the nature of the book, however, we weren’t able to the Human Head Cartography: Jeff Lahren spell out adventure hooks directly in the book, as that Studios logo are Creative Direction: Matt Forbeck and would have broken the metaphor under which the trademarks of Human Timothy S. Gerritsen book was constructed. The spy who wrote the bits in Head Studios, Inc. the margins, for instance, couldn’t just throw in advice The Fast Forward for DMs as she went along. It just wouldn’t fit. Entertainment logo is a Through the wonder of the World Wide Web, how- trademark of Fast For- ever, we’re able to offer you the first official enhance- ward Entertainment. ment to The Redhurst Academy of Magic, free of charge. Reproduction of non- Since this is an adjunct to that book and not actually Open Game Content part of it, we are free to break the book’s fourth wall, so from this work by any to speak, and address d20 System DMs directly. means without express This short piece features a liberal amount of adven- written consent of ture hooks for you to use in your campaign. Some of Human Head Studios, them are most appropriate to a game centered around except for short ex- Redhurst, while others are just fine for epics that only cerpts for the purposes occasionally touch upon the finest school of wizardry of reviews, is expressly in the Known Realms. prohibited. ‘d20 System’ and the ‘d20 System’ logo other enhancements are trademarks of Wiz- This is the first of a number of web enhancements ards of the Coast, Inc. planned for The Redhurst Academy of Magic. The next in and are used according the series features the full rules for the spellflag game to the terms of the d20 so beloved by Redhurst students and staff. After that, System License version we present a full-fledged adventure for use on the 5.0. A copy of this Published by Human Head Studios, Inc. Redhurst campus. License can be found To keep up to date on the latest Redhurst develop- at www.wizards.com/ www.humanheadgames.com ments, as well as to learn all about other upcoming d20. Dungeons & For sales inquiries, releases from Human Head Studios, be sure to visit Dragons and Wizards please contact our team at www.humanheadgames.com. of the Coast are trademarks of Wizards of the Coast, Inc. in the United States and other countries and are used with permission. Voice: (262) 348-0440 Fax: (262) 348-0449 [email protected] www.fastforwardgames.com 2 redhurst: campus of adventure let the creative study aids Campaign Type: This seed works best when the adventures begin! players are teachers at Redhurst. his document contains a baker’s dozen of adven- Every year, it seems like some of the students at tture hooks that can help DMs take better advan- Redhurst decide that studying is just too much trouble. tage of The Redhurst Academy of Magic than ever. Once It’s far easier to cheat. It’s almost impossible for a you’ve read the book, your head may be whirling with student to use magic to cheat consistently and not get all sorts of different ideas about how to integrate the caught. The teachers often cast a detect magic spell dur- academy into your campaign. After all, it’s one thing to ing important exams, and any magic that seems out of discover the finest institute of arcane instruction in the place is ground for immediate removal from the test. Known Realm. It’s something else altogether to use it. The best way to fool a wizard, though, isn’t always We’ve retained the wide margins from the book so with magic. Some students have devised other, more that you can make your own notes there in place of mundane ways of giving themselves a competitive where the spy would normally put hers. Since these are advantage over their fellow students. These include just adventure hooks, you may have to do a bit of work things as simple as crib notes inserted up the sleeve to to tailor the ideas to your own campaign, and now you events as complex as having a friend cause a diversion have the space in which to do it. in the hallway so you can sneak a look at a textbook after the exam has already begun. One group of students has gotten particularly good no players allowed! at cheating, and Andarlin has made it his mission If you’re a player, do us all a favor and stop read- to find out how they’re getting away with it. To that ing now. This document is for the DM’s eyes only. If end, the teachers are giving every bit of help they can. you continue reading it, you’re sure to learn all sorts of Andarlin has even gone as far as to recruit snitches in things that your character couldn’t possibly know, and the student body, but all efforts have proven fruitless. it’s hard to fake the proper ignorance in the course of a It turns out that the students are cheating by writing game. the answers backwards on the ceiling of the classroom. So, please uphold the mythical Players’ Code of They then use a tiny mirror to read the information Honor. Before temptation gets the better of you, turn they need at their leisure. Since they never look up around and walk away. to read the text, the teachers haven’t thought to look Thanks! there—yet. 3 everyone talks the grand tour Campaign Type: This seed works best when the about the weather players hail from outside of Redhurst. Campaign Type: This seed works best when the players are part of the staff at Redhurst. If they are part The heroes have been invited on a tour of the of the academy’s guard, all the better. Redhurst campus. Perhaps they know someone in the school. Maybe they’ve applied to take on an intern. Or Someone has figured out how to use Redhurst’s it could be they are simply curious. Either way, they weather control system, and it’s making life difficult find themselves wandering about the school with one for the school. The system is controlled by touching a of the faculty members as a guide. figure of the sun in the Sun Tower (#52) and a figure of As the heroes go along, they may notice that one the moon in the Moon Tower (#46). The original sculp- of the members of their group is casing the place for tures that were used as controls here have long since a future break-in. She spends a great deal of her time vanished, but substitutes work just as well. asking about various security efforts and details like The culprit is a curious student who likes to mess the height and thickness of the walls. with things and maybe have classes cancelled once in The heroes have a chance to shop in the Redhurst a while. Either way, both the guards and the Redhurst Academy Store (#54). As they leave, the proprietor, spy are hunting for this kid. The guards just want to Renshaw, yells that someone has stolen a valuable stop him. The spy, on the other hand, is interested in pearl from its position of honor. The heroes stand as ac- learning the student’s secret and using it herself. cused of the crime as any of the other visitors and must The first sign that something is wrong with the now go out of the way to prove their innocence. Redhurst weather is the snowstorm that hits the school The heroes may leap straight away to announcing as it sits in the desert lands of the Emerald Sultanate. that the mysteriously curious woman is a thief. She At first, Andarlin and Christopha consider this just a probably stole the pearl, right? fluke. They might even realize that the weather system Wrong. It was one of the other members of the tour has been activated, but they figure that it’s just a one- group. Perhaps it’s the young boy who needs to get time accident. home to help take care of his younger siblings. Or may- Then it starts happening again and again. Soon be it’s the old wizard visiting the stomping grounds of enough, a pattern starts to emerge. Bad weather hits his youth—or so he says. Or it could happen that the during certain classes or exams, and good weather lasts pearl ends up in the possession of one of the heroes, all weekend long. having been slipping onto his person by the true cul- The student activates the system by walking into prit, who plans to use the chaos from this revelation to one of the towers and touching a miniature version of steal more costly items from the store.
Recommended publications
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Benítez Bravo, Rubén; Liu, Xiao; Martín Mor, Adrià, Dir
    This is the published version of the article: Benítez Bravo, Rubén; Liu, Xiao; Martín Mor, Adrià, dir. Proyecto de local- ización de Waterfox al catalán y al chino. 2019. 38 p. This version is available at https://ddd.uab.cat/record/203606 under the terms of the license Trabajo de TPD LOCALIZACIÓN DE WATERFOX EN>CA/ZH Ilustración 1. Logo de Waterfox Rubén Benítez Bravo y Xiao Liu 1332396 | 1532305 [email protected] [email protected] Màster de tradumàtica: Tecnologies de la traducció 2018-2019 Índice de contenidos 1. Introducción ........................................................................................ 4 2. Tabla resumen .................................................................................... 5 3. Descripción del proceso de localización ............................................. 6 3.1 ¿Qué es Waterfox? ........................................................................ 6 3.2 ¿Qué uso tiene?............................................................................. 6 3.3 Preparando la traducción ............................................................... 7 4. Análisis de la traducción ................................................................... 11 5. Análisis técnico ................................................................................. 21 6. Fase de testing ................................................................................. 29 7. Conclusiones .................................................................................... 35 8. Bibliografía
    [Show full text]
  • Why Websites Can Change Without Warning
    Why Websites Can Change Without Warning WHY WOULD MY WEBSITE LOOK DIFFERENT WITHOUT NOTICE? HISTORY: Your website is a series of files & databases. Websites used to be “static” because ​ there were only a few ways to view them. Now we have a complex system, and telling your webmaster what device, operating system and browser is crucial, here’s why: TERMINOLOGY: You have a desktop or mobile “device”. Desktop computers and mobile ​ ​ ​ devices have “operating systems” which are software. To see your website, you’ll pull up a ​ ​ ​ ​ “browser” which is also software, to surf the Internet. Your website is a series of files that ​ ​ needs to be 100% compatible with all devices, operating systems and browsers. Your website is built on WordPress and gets a weekly check up (sometimes more often) to ​ ​ ​ see if any changes have occured. Your site could also be attacked with bad files, links, spam, comments and other annoying internet pests! Or other components will suddenly need updating which is nothing out of the ordinary. WHAT DOES IT LOOK LIKE IF SOMETHING HAS CHANGED? Any update to the following can make your website look differently: There are 85 operating ​ systems (OS) that can update (without warning). And any of the most popular roughly 7 ​ ​ ​ browsers also update regularly which can affect your site visually and other ways. (Lists below) ​ Now, with an OS or browser update, your site’s 18 website components likely will need ​ ​ updating too. Once website updates are implemented, there are currently about 21 mobile ​ devices, and 141 desktop devices that need to be viewed for compatibility.
    [Show full text]
  • Hacking the PSP™
    http://videogames.gigcities.com 01_778877 ffirs.qxp 12/5/05 9:29 PM Page i Hacking the PSP™ Cool Hacks, Mods, and Customizations for the Sony® PlayStation® Portable Auri Rahimzadeh 01_778877 ffirs.qxp 12/5/05 9:29 PM Page i Hacking the PSP™ Cool Hacks, Mods, and Customizations for the Sony® PlayStation® Portable Auri Rahimzadeh 01_778877 ffirs.qxp 12/5/05 9:29 PM Page ii Hacking the PSP™: Cool Hacks, Mods, and Customizations for the Sony® PlayStation® Portable Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2006 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN-13: 978-0-471-77887-5 ISBN-10: 0-471-77887-7 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/SR/RS/QV/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]
  • Creating with Anger: Contemplating Vendetta
    City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 2-2016 Creating with Anger: Contemplating Vendetta. An Analysis of Anger in Italian and Spanish Women Writers of the Early Modern Era Luisanna Sardu Castangia Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/770 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] CREATING WITH ANGER: CONTEMPLATING VENDETTA. AN ANALYSIS OF ANGER IN ITALIAN AND SPANISH WOMEN WRITERS OF THE EARLY MODERN ERA By LUISANNA SARDU CASTANGIA A dissertation submitted to the Graduate Faculty in Comparative Literature in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2016 © 2016 LUISANNA SARDU CASTANGIA All Rights Reserved CREATING WITH ANGER: CONTEMPLATING VENDETTA. AN ANALYSIS OF ANGER IN ITALIAN AND SPANISH WOMEN WRITERS OF THE EARLY MODERN ERA. by LUISANNA SARDU CASTANGIA This manuscript has been read and accepted for the Graduate Faculty in Comparative Literature to satisfy the dissertation requirement for the degree of Doctor of Philosophy. Monica Calabritto ____________________________ ______________________________ Date Chair of Examining Committee Giancarlo Lombardi, Ph.D. _____________________________ ______________________________ Date Executive Officer Dr. Clare Carroll, Ph.D Dr. Lía Schwartz, Ph.D Supervisory Committee THE CITY UNIVERSITY OF NEW YORK ABSTRACT CREATING WITH ANGER: CONTEMPLATING VENDETTA. AN ANALYSIS OF ANGER IN ITALIAN AND SPANISH WOMEN WRITERS OF THE EARLY MODERN ERA.
    [Show full text]
  • Free Download Basilisk (Web Browser)
    free download Basilisk (web browser) Welcome to the Basilisk home page! Basilisk is a free and Open Source XUL-based web browser, featuring the well-known Firefox-style interface and operation. It is based on the Goanna layout and rendering engine (a fork of Gecko) and builds on the Unified XUL Platform (UXP), which in turn is a fork of the Mozilla code base without Servo or Rust. Basilisk is primarily a reference application for development of the XUL platform it builds upon, and additionally a potential replacement for Firefox. Basilisk is development software . This means that it should be considered more or less "beta" at all times; it may have some bugs and is provided as-is, with potential defects. Like any other Free Software community project, it comes without any warranty or promise of fitness for any particular purpose. That being said: of course we will do our best to provide an as stable and secure browser as possible with every official release of Basilisk. It should be noted that because of this focus on platform development, the browser itself (the application code) will be released and maintained mostly as-it-is, with very little change or development on the user interface or browser front-end features. As the platform develops, some Firefox- specific features may be dropped; please do not expect this application to remain the same, forever. What does this browser support? It supports a wide array of features required for the Modern Web, including advanced scripting, WebRTC, CSS v3, HTML5 and downloadable font support. It also fully supports all NPAPI plugins (e.g.
    [Show full text]
  • Java Blocked?
    Getting started with NRV 1. Browser compatibility The NRV website is fully compatible with the following (current as of 21 January 2020) versions of browsers: NRV Browser 2.0.7 (Windows) / 2.04 (Linux) (http://nrv.jinr.ru/nrv/) Pale Moon 28.8.1 Basilisk 2020.01.12 K-Meleon 76.2G Build 20200118 Waterfox Classic 2020.01 SeaMonkey 2.49.5 Otter Browser 1.0.81 weekly 300 Lunascape 6.15.2 Internet Explorer 11 Most other browsers (current versions) do not support Java any more. 2. Installation of Java and enabling applets At the moment, most of the sections of the NRV web knowledge base use Java to provide interactive user interface and display information. Java may be downloaded at https://java.com/en/download/. Depending on the version of the browser, 32- or 64-bit version of Java must be installed. After installation go to the Java Control Panel, open the Security tab, check Enable java content in the browser, and click OK to apply settings (Fig. 1). Fig. 1. Java Control Panel with the correct settings (Java 8 under Microsoft Windows 7). On the first run in a particular browser a security warning will appear. Check Do not show this again for apps from the publisher and location above and click the Run button (Fig. 2). A Java applet will start. The same warning may also appear periodically later, often after the update of the browser or Java. Fig. 2. Security warning. Please note that the actual look of the Java Control Panel and security warnings may vary.
    [Show full text]
  • Basilisk Goggles & Wishing Wells
    Basilisk Goggles & Wishing Wells: An Old School Esoterica 1 Oliver Moody (Order #10629337) Basilisk Goggles & Wishing Wells: An Old School Esoterica Written by Derek Holland Edited and Co-written by Greg Chapin Layout and Design by Rick Hershey and Troy Daniels Fat Goblin Games Team Chris Bayes, Eric Hindley, Jeff Swank, John Bennett, Justice Mora, Kalyna Conrad, Kiel Howell, Lucus Palosaari, Nick Esposito, Rick Hershey, Richard Bennett, Troy Daniels, Tyler Beck Published by Fat Goblin Games Basilisk Goggles & Wishing Wells: An Old School Esoterica © 2015 Fat Goblin Games Labyrinth LordTM is copyright 2007-2011, Daniel Proctor. Labyrinth LordTM and Advanced Labyrinth LordTM are trademarks of Daniel Proctor. These trademarks are used under the Labyrinth LordTM Trademark License 1.2, available at www.goblinoidgames.com. Open Game Content: All material — including but not limited to art, place and character names, character and setting descriptions, background, and new class descriptions—is Product Identity. All other content is considered Open Game Content. ABOUT FAT GOBLIN GAMES Based in South Carolina, USA, Fat Goblin Games was founded in 2011 to create Pathfinder Roleplaying Game compatible products. With a focus on high quality production values and providing a creative environment for our writers, Fat Goblin Games has quickly become a recognized force in the world of third party publishers. With hundreds of support books, visual aids, campaign settings, and quality stock art, Fat Goblin Games continues to provide exciting content and fantastic worlds in which gamers can immerse themselves. Visit us on Facebook, follow us on Twitter and check out our website at fatgoblingames.com.
    [Show full text]
  • Conservation in Collections of Digital Works of Art Ben
    Presented at the Electronic Media Group Session, AIC 40th Annual Meeting, May 8–11, 2012, Albuquerque, NM. CONSERVATION IN COLLECTIONS OF DIGITAL WORKS OF ART BEN FINORADIN ABSTRACT Rather than addressing entropy and deterioration of objects, paintings, prints, or textiles, many collections must now contend with ensuring the conservation of works that are entirely born-digital. The constantly shifting compatibility of tech- nologies, and looming wave of obsolescence dictates that this emerging practice is often preemptive, in some cases even leaning towards the archival perspective. Since 1999, Rhizome at the New Museum of Contemporary Art, New York, has maintained an online archive called the ArtBase, a collection containing works of art that employ materials such as software, code, websites, moving images, games, and browsers, towards aesthetic and critical ends. This paper offers three case studies on the conservation of works from Rhizome’s collection. These three works will be used specifcally to illustrate conservation methods for: • Works that exist as performative actions within commercial web services or social networking platforms • Performative web-based works that employ real-time data • The obsolescence of crucial client-side JavaScript in web based works Offered in conclusion is a discussion of metadata, from a collection management standpoint, to ensure the long-term sustainability of digital conservation measures. The Electronic Media Review ■ Volume Two 2013 101 BEN FINORADIN INTRODUCTION we will consider Pulse (1999) by American artist Mark Rhizome is a non-proft institution (established in 1996) Napier (b. 1961). This work fell victim to obsolescence devoted to the creation, presentation, preservation, and of crucial client-side JavaScript.
    [Show full text]
  • OSINT Handbook September 2020
    OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020 Aleksandra Bielska Noa Rebecca Kurz, Yves Baumgartner, Vytenis Benetis 2 Foreword I am delighted to share with you the 2020 edition of the OSINT Tools and Resources Handbook. Once again, the Handbook has been revised and updated to reflect the evolution of this discipline, and the many strategic, operational and technical challenges OSINT practitioners have to grapple with. Given the speed of change on the web, some might question the wisdom of pulling together such a resource. What’s wrong with the Top 10 tools, or the Top 100? There are only so many resources one can bookmark after all. Such arguments are not without merit. My fear, however, is that they are also shortsighted. I offer four reasons why. To begin, a shortlist betrays the widening spectrum of OSINT practice. Whereas OSINT was once the preserve of analysts working in national security, it now embraces a growing class of professionals in fields as diverse as journalism, cybersecurity, investment research, crisis management and human rights. A limited toolkit can never satisfy all of these constituencies. Second, a good OSINT practitioner is someone who is comfortable working with different tools, sources and collection strategies. The temptation toward narrow specialisation in OSINT is one that has to be resisted. Why? Because no research task is ever as tidy as the customer’s requirements are likely to suggest. Third, is the inevitable realisation that good tool awareness is equivalent to good source awareness. Indeed, the right tool can determine whether you harvest the right information.
    [Show full text]
  • Australasian Language Technology Association Workshop 2008
    Australasian Language Technology Association Workshop 2008 Proceedings of the Workshop Workshop Chairs: Nicola Stokes David Powers 8-10 December 2008 CSIRO ICT Centre Hobart, Australia Proceedings of the Australasian Language Technology Association Workshop 2008 (ALTA 2008) URL: http://www.alta.asn.au/events/alta2008/ Sponsors: ISSN 1834-7037 (online proceedings) ii Preface This volume contains the papers accepted for presentation at this year’s Australasian Language Technology Workshop (ALTA2008), held at the CSIRO Tasmanian ICT Centre, Hobart, Australia, on December 8-10, 2008. This is the sixth annual installment of the workshop since the formation of ALTA, and the continuation of an annual workshop series that existed under various guises throughout the 1990s. The goals of the workshop are: • to bring together the Language Technology (LT) community in Australasia; • to encourage interactions with the international LT community; • to foster interaction between academic and industrial researchers; • to encourage dissemination and peer evaluation of research results; • to provide a forum for the discussion of new and ongoing research and projects; • to allow the broader AI community to become aware of local LT research; • to increase visibility of LT research in Australia, New Zealand and overseas; • to promote, support and encourage the participation of students in LT research. Once again, this year ALTA is co-located with the Australasian Document Computing Symposium (ADCS), including a joint session of papers and talks of interest to both communities. This year’s Australasian Language Technology Workshop includes regular talks as well as poster presentations which rank equally as papers. The number of papers submitted increased by 52% compared to last year, and 20 papers were selected by formal review to appear in these proceedings.
    [Show full text]