What Has Push Technology Done for You Lately? Well, Today the URL
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Role of Librarian in Internet and World Wide Web Environment K
Informing Science Information Sciences Volume 4 No 1, 2001 Role of Librarian in Internet and World Wide Web Environment K. Nageswara Rao and KH Babu Defence Research & Development Laboratory Kanchanbagh Post, India [email protected] and [email protected] Abstract The transition of traditional library collections to digital or virtual collections presented the librarian with new opportunities. The Internet, Web en- vironment and associated sophisticated tools have given the librarian a new dynamic role to play and serve the new information based society in bet- ter ways than hitherto. Because of the powerful features of Web i.e. distributed, heterogeneous, collaborative, multimedia, multi-protocol, hyperme- dia-oriented architecture, World Wide Web has revolutionized the way people access information, and has opened up new possibilities in areas such as digital libraries, virtual libraries, scientific information retrieval and dissemination. Not only the world is becoming interconnected, but also the use of Internet and Web has changed the fundamental roles, paradigms, and organizational culture of libraries and librarians as well. The article describes the limitless scope of Internet and Web, the existence of the librarian in the changing environment, parallelism between information sci- ence and information technology, librarians and intelligent agents, working of intelligent agents, strengths, weaknesses, threats and opportunities in- volved in the relationship between librarians and the Web. The role of librarian in Internet and Web environment especially as intermediary, facilita- tor, end-user trainer, Web site builder, researcher, interface designer, knowledge manager and sifter of information resources is also described. Keywords: Role of Librarian, Internet, World Wide Web, Data Mining, Meta Data, Latent Semantic Indexing, Intelligent Agents, Search Intermediary, Facilitator, End-User Trainer, Web Site Builder, Researcher, Interface Designer, Knowledge Man- ager, Sifter. -
Participating in a Story: a Cognitive Perspective
Participating in a Story Participating in a Story EXPLORING AUDIENCE COGNITION PIERRE GANDER Lund University Cognitive Studies 119 Copyright © Pierre Gander 2005. All rights reserved. For further information, corrections, and updates, see the author’s web page at http://www.pierregander.com Cover: Detail from Henna by Afsaneh Monemi. Photograph by Afsaneh Monemi. Printed in Sweden by Arkitektkopia, Göteborg 2005. ISBN 91-628-6417-3 ISSN 1101-8453 ISRN LUHFDA/HFKO-1015-SE Lund University Cognitive Studies 119 To everyone who participates in my story CONTENTS Acknowledgements ix CHAPTER 1 Introduction 1 • PART I: THEORETICAL FRAMEWORK CHAPTER 2 Stories 21 CHAPTER 3 Fiction 33 CHAPTER 4 Participatory stories 47 • PART II: EMPIRICAL STUDIES CHAPTER 5 A method for generating data for exploring off-line cognition 93 CHAPTER 6 Long-term memory representations of spatiality 135 CHAPTER 7 Exploring memory qualities using the reality monitoring framework 173 CHAPTER 8 Perspective on actions and events 199 • CHAPTER 9 Conclusions and future research 241 References 255 Appendix 265 ACKNOWLEDGEMENTS :HVWRI+RXVH <RXDUHLQDQRSHQILHOGZHVWRIDELJZKLWH KRXVHZLWKDERDUGHGIURQWGRRU 7KHUHLVDVPDOOPDLOER[KHUH !2SHQPDLOER[ 2SHQLQJWKHPDLOER[UHYHDOVDGLVVHUWDWLRQ !5HDGGLVVHUWDWLRQ ACKNOWLEDGEMENTS During the years of working with this book, which is also my doc- toral dissertation, my ideas and skills have formed in the meeting with numerous people, some of whom I may not even remember, at university departments, conferences, and elsewhere. Academi- cally I have spent time at the Department of Computer Science, University of Skövde, at the Department of Cognitive Science (LUCS), Lund University, at the Department of Linguistics and the SSKKII Center for Cognitive Science, both at Göteborg University. It is the people at these places who have shaped me the most. -
The History of Spam Timeline of Events and Notable Occurrences in the Advance of Spam
The History of Spam Timeline of events and notable occurrences in the advance of spam July 2014 The History of Spam The growth of unsolicited e-mail imposes increasing costs on networks and causes considerable aggravation on the part of e-mail recipients. The history of spam is one that is closely tied to the history and evolution of the Internet itself. 1971 RFC 733: Mail Specifications 1978 First email spam was sent out to users of ARPANET – it was an ad for a presentation by Digital Equipment Corporation (DEC) 1984 Domain Name System (DNS) introduced 1986 Eric Thomas develops first commercial mailing list program called LISTSERV 1988 First know email Chain letter sent 1988 “Spamming” starts as prank by participants in multi-user dungeon games by MUDers (Multi User Dungeon) to fill rivals accounts with unwanted electronic junk mail. 1990 ARPANET terminates 1993 First use of the term spam was for a post from USENET by Richard Depew to news.admin.policy, which was the result of a bug in a software program that caused 200 messages to go out to the news group. The term “spam” itself was thought to have come from the spam skit by Monty Python's Flying Circus. In the sketch, a restaurant serves all its food with lots of spam, and the waitress repeats the word several times in describing how much spam is in the items. When she does this, a group of Vikings in the corner start a song: "Spam, spam, spam, spam, spam, spam, spam, spam, lovely spam! Wonderful spam!" Until told to shut up. -
Reading and Playing Cadre's Varicella
MelbourneDAC 2003 Face It, Tiger, You Just Hit the Jackpot: Reading and Playing Cadre’s Varicella Nick Montfort Stuart Moulthrop Department of Computer and Information Science School of Information Arts and Technologies University of Pennsylvania University of Baltimore E-mail: [email protected] E-mail: [email protected] A B ST R A C T: W e co n sid er a s pecif ic ch ar acter , th e to w er . That was m or e than f ou r y ear s ag o . P r in ces s Ch arlo tte, in th e 1 9 9 9 in teractiv e f ictio n S h e’ s s till her e. w o rk Va ricella b y A d am Cad re. To ap pr eciate and s o lv e this w or k , th e in ter acto r m u s t b o th in ter p r et S h e lo o ks u p . “h ello , v ar icella,” s h e s ay s . “f ace it, th e tex ts th at r es u lt ( as a liter ar y r eader d oes ) an d tiger , yo u jus t hit the jack p o t!” [ Bold f ace in also o p er ate th e cy b ertex tual m ach in e o f th e o r ig in al.] p r og r am , actin g as a gam e play er an d tr y in g to u n der s tan d the s ys tem o f Va ricella ’ s s im u lated What exactly could this utterance mean? It could be read w o rld . -
The Internet and the Web T6 a Technical View of System Analysis and Design
Technology Guides T1 Hardware T2 Software T3 Data and Databases T4 Telecommunications ᮣ T5 The Internet and the Web T6 A Technical View of System Analysis and Design Technology Guide The Internet 5 and the Web T5.1 What Is the Internet? T5.2 Basic Characteristics and Capabilities of the Internet T5.3 Browsing and the World Wide Web T5.4 Communication Tools for the Internet T5.5 Other Internet Tools T5.1 T5.2 Technology Guide The Internet and the Web T5.1 What Is the Internet?1 The Internet (“the Net”) is a network that connects hundreds of thousands of inter- nal organizational computer networks worldwide. Examples of internal organiza- tional computer networks are a university computer system, the computer system of a corporation such as IBM or McDonald’s, a hospital computer system, or a system used by a small business across the street from you. Participating computer systems, called nodes, include PCs, local area networks, database(s), and mainframes.A node may include several networks of an organization, possibly connected by a wide area network. The Internet connects to hundreds of thousands of computer networks in more than 200 countries so that people can access data in other organizations, and can communicate and collaborate around the globe, quickly and inexpensively. Thus, the Internet has become a necessity in the conduct of modern business. The Internet grew out of an experimental project of the Advanced Research Proj- BRIEF HISTORY ect Agency (ARPA) of the U.S. Department of Defense.The project was initiated in 1969 as ARPAnet to test the feasibility of a wide area computer network over which researchers, educators, military personnel, and government agencies could share data, exchange messages, and transfer files. -
Imessage Privacy HITB, Kuala Lumpur, Oct
Quarkslab on iMessage Privacy HITB, Kuala Lumpur, oct. 2013 @pod2g ([email protected]) gg ([email protected]) Presentations • Quarkslab is a research company specialized in cutting edge solutions to complex security problems. We provide innovative, efficient and practical solutions based on profound knowledge and years of experience in the field. • gg: security researcher, cryptography R.E. specialist. Joined Quarkslab in 2012 • @pod2g: security researcher, long background in Apple product security. Joined Quarkslab in 2013 Plan I. The current political and media context II. The iMessage protocol III. MITM attacks IV. Countermeasures V. Final thoughts I. THE CONTEXT NSA, PRISM, Apple NSA’s PRISM (US-984XN) • American supervision program • Mass surveillance data mining • Based on alliances with american firms • Can collect texts, emails, photos, etc. • Foreigners are also potential targets • Program was leaked by Edward Snowden Is Apple included? • Washington Post have leaked PRISM presentation slides that are said to be coming from the NSA • Looking at them, Apple joined in oct 2012 • Slides talk of « data collection », which sounds like a transparent process Apple publicly says: « Two weeks ago, when technology companies were accused of indiscriminately sharing customer data with government agencies, Apple issued a clear response: We first heard of the government’s “Prism” program when news organizations asked us about it on June 6. We do not provide any government agency with direct access to our servers, and any government agency requesting customer content must get a court order. » Source: https://www.apple.com/apples-commitment-to-customer-privacy/ What about iMessages? « Apple has always placed a priority on protecting our customers’ personal data, and we don’t collect or maintain a mountain of personal details about our customers in the first place. -
ABF Podcast Series and Communication and Media
Document 1 ABF Podcast Series A monthly podcast series featuring different elements of Australian Border Force will be developed. The series will invite engagement with ABF by the Australian public and related government agencies, promote ABF’s border security arrangements and position ABF as a policy champion. The podcast series will be developed in-house and distributed via a number of suitable podcast directories and the Border.gov.au website. The series could be promoted through LinkedIn, Twitter and Facebook engagement, Border Bulletin, and the revised DIBP intranet. Five reasons to podcast #1: Professional Development From Walkmans to iPods to smartphones, portable music has revolutionised the world, but in today’s society people are looking to take more than music with them–they’re looking for ways to learn more. Podcasts provide opportunities to learn without taking extra time in their day. #2: Trust Websites and blogs are a great way to give valuable information to your audience, but by delivering the same content through a podcast, you’re able to use your voice to bring your content to life. You have the ability to connect with your audience on a more personal level. #3: Mobility According to Eddison Research, nearly two-thirds of podcast consumers do most of their podcast listening on mobile devices. With a website or blog, you are asking an audience to sit down and give you 10 – 15 minutes of their time to read your posts. By turning that same material into a podcast, you’ve opened up your audience from people sitting down at their desk to people in the car, jogging, and working. -
IF Theory Reader
IF Theory Reader edited by Kevin Jackson-Mead J. Robinson Wheeler > Transcript On Press Boston, MA All authors of articles in this book retain their own copyrights. Neither the editors nor the publisher make any copyright claims. Version 1, March 2011. Version 2, April 2011. Please send corrections to [email protected]. Contents Preface Crimes Against Mimesis 1 Roger S. G. Sorolla Theory Toward a Theory of Interactive Fiction 25 Nick Montfort Characterizing, If Not Defining, Interactive Fiction 59 Andrew Plotkin not that you may remember time: Interactive Fiction, Stream-of-Consciousness Writing, and Free Will 67 Mark Silcox 2 Brief Dada Angels 89 Ryan Stevens, writing as Rybread Celsius Object Relations 91 Graham Nelson IF as Argument 101 Duncan Stevens The Success of Genre in Interactive Fiction 111 Neil Yorke-Smith Parser at the Threshold: Lovecraftian Horror in Interactive Fiction 129 Michael Gentry Distinguishing Between Game Design and Analysis: One View 135 Gareth Rees Natural Language, Semantic Analysis, and Interactive Fiction 141 Graham Nelson Afterword: Five Years Later 189 Graham Nelson Craft Challenges of a Broad Geography 203 Emily Short Thinking Into the Box: On the Use and Deployment of Puzzles 229 Jon Ingold PC Personality and Motivations 249 Duncan Stevens Landscape and Character in IF 261 Paul O’Brian Hint Development for IF 279 Lucian Smith Descriptions Constructed 291 Stephen Granade Mapping the Tale: Scene Description in IF 299 J. Robinson Wheeler Repetition of Text in Interactive Fiction 317 Jason Dyer NPC Dialogue Writing 325 Robb Sherwin NPC Conversation Systems 331 Emily Short History 10 Years of IF: 1994–2004 359 Duncan Stevens The Evolution of Short Works: From Sprawling Cave Crawls to Tiny Experiments 369 Stephen Granade History of Italian IF 379 Francesco Cordella Racontons une histoire ensemble: History and Characteristics of French IF 389 Hugo Labrande Preface This is a book for which people in the interactive fiction community have been waiting for quite some time. -
Processing Online News Streams for Large-Scale Semantic Analysis
Processing Online News Streams for Large-Scale Semantic Analysis Milosˇ Krstajic´ #1, Florian Mansmann #2, Andreas Stoffel #3, Martin Atkinson ∗4, Daniel A. Keim #5 #University of Konstanz Germany [email protected] [email protected] [email protected] [email protected] ∗EC Joint Research Centre Ispra, Italy [email protected] Abstract— While Internet has enabled us to access a vast challenges in legal, security and/or political spheres. amount of online news articles originating from thousands of In our concrete case, we obtained a live stream of online different sources, the human capability to read all these articles news articles, which are continuously collected by the Euro- has stayed rather constant. Usually, the publishing industry takes over the role of filtering this enormous amount of information pean Media Monitor (EMM) [1]. An interesting aspect of this and presenting it in an appropriate way to the group of their data is the fact, that the articles are written in a multitude subscribers. In this paper, the semantic analysis of such news of languages. EMM thereby focuses on entity extraction and streams is discussed by introducing a system that streams online news clustering approaches in order to cope with this multi- news collected by the Europe Media Monitor to our proposed lingual corpus of news articles. In contrast to EMM, our semantic news analysis system. Thereby, we describe in detail the emerging challenges and the corresponding engineering solutions system is designed to support the user in the following two to process incoming articles close to real-time. -
Interactive Fiction Communities from Preservation Through Promotion and Beyond
www.dichtung-digital.org/2012/41/montfort-short.htm Interactive Fiction Communities From Preservation through Promotion and Beyond by Nick Montfort and Emily Short The interactive fiction (IF) community has for decades been involved with the authorship, sharing, reading, and discussion of one type of electronic literature and computer game. Creating interactive fiction is a game-making and world-building activity, one that involves programming as well as writing. Playing interactive fiction typically involves typing input and receiving a textual response explaining the current situation. From the first canonical interactive fiction, the minicomputer game Adventure, the form has lived through a very successful commercial phase and is now being actively developed by individuals, worldwide, who usually share their work for free online. Although it is typical to speak of "the IF community", there have actually been several communities representing different interests, different types of authoring systems, and various natural languages. Until around 2005, online archives, discussions, newsletters, and competitions focused the energies of IF community members. But since the middle of the 21st century's first decade, interest in IF has broadened beyond its earlier boundaries and academics, students, and players of indie games who are not IF community members have become active as IF players. Groups have met in person in different cities to play games and discuss work in progress. We consider the IF community's early formation and the way it, -
Pirate Or Hackers Bible More Like Guidelines...= a = Abbrev: /*-Breev
Pirate or Hackers Bible More like guidelines.... = A = abbrev: /*-breev'/, /*-brev'/ n. Common abbreviation for `abbreviation'. ABEND: [ABnormal END] /ah'bend/, /*-bend'/ n. Abnormal termination (of software); {crash}; {lossage}. Derives from an error message on the IBM 360; used jokingly by hackers but seriously mainly by {code grinder}s. Usually capitalized, but may appear as `abend'. Hackers will try to persuade you that ABEND is called `abend' because it is what system operators do to the machine late on Friday when they want to call it a day, and hence is from the German `Abend' = `Evening'. accumulator: n. 1. Archaic term for a register. On-line use of it as a synonym for `register' is a fairly reliable indication that the user has been around for quite a while and/or that the architecture under discussion is quite old. The term in full is almost never used of microprocessor registers, for example, though symbolic names for arithmetic registers beginning in `A' derive from historical use of the term `accumulator' (and not, actually, from `arithmetic'). Confusingly, though, an `A' register name prefix may also stand for `address', as for example on the Motorola 680x0 family. 2. A register being used for arithmetic or logic (as opposed to addressing or a loop index), especially one being used to accumulate a sum or count of many items. This use is in context of a particular routine or stretch of code. "The FOOBAZ routine uses A3 as an accumulator." 3. One's in-basket (esp. among old-timers who might use sense 1). "You want this reviewed? Sure, just put it in the accumulator." (See {stack}.) ACK: /ak/ interj. -
Alfāẓ-I Adviyah Taṣnĭf Nūr Al-Dĭn Muḥammad 'Abd Allāh Shĭrāzĭ
Glasgow IRS /930 LIBRARY University of Glasgow ALL ITEMS ARE ISSUED SUBJECT TO RECALL GUL 18-08 The University of Glasgow, charity number SC004401 v U L F A Z U D W I Y E H, OR THE MATERIA MEDICA, IN THE COMPILED BY ^ NOUREDDEEN MOHAMMED ABDULLAH SHIRAZY, PHYSICIAN TO THE EMPEROR SHAHJEHa'n, WITH AN ENGLISH TRANSLATION, B Y F RA N C I S GLADWIN. CALCUTTA: E R I'm: E D AT THE CHRONICLE PRESS, M D C C X C I I I. ...... ^ji^i^t'i' JOHN L AIR A Efq, PRESIDENT, AND MEMBERS OF THE HOSPITAL BOARD; FORT WILLIAM, GENTLEMEN, THE following Work being publillied at your Recommendation, for the ufe of the Honour- able Company, I beg leave to place it under your immediate Proteftion. I HAVE THE HONOUR TO BE, GENTLEMEN, YOUR MOST OBEDIENT, HUMBLE SERVANT, FRANCIS G LAD V/IN, CALCUTTA, SEPTEMBER 10, I793» Digitized by the Internet Archive in 2015 https://archive.org/details/b21469568 ; INTRO. DUCTION OF MEDICINES IN GENERAL. '^J^HE Arabian phyficians, in defcribing the quality or power of medicines, make ufe of four degrees. y The FIRST DEGREE, 13 that whofe quahty makes imperceptible impreffion fuch as thofe that are hot, or thofe that are cold, 5ic. but which are not feh, unlefs they are leiterated. 1 he second degree, is that which is more powerful than the former, but not fo much as to occafion any vifible injury. The third degree is that whofe impreffion is effentially hurtful, but not fo as to deflroy.