Exploring Research

Total Page:16

File Type:pdf, Size:1020Kb

Exploring Research EXPLORING RESEARCH EIGHTH EDITION Neil J. Salkind University of Kansas Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Executive Editor: Stephan Frail Editorial Assistant: Madelyn Schricker Marketing Manager: Nicole Kunzmann Marketing Assistant: Jessica Warren Production Assistant: Caitlin Smith Production /Manufacturing Manager: Pat Brown Cover Administrator: Jayne Conte Editorial Production and Composition Service: Hemalatha/ Integra Software Services Pvt. Ltd. Cover Designer: Bruce Kenselaar Printer and Binder: Bind-Rite Graphics Cover Printer: Lehigh-Phoenix Color Cover image: Shotterstock Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page within the text. Appendix A screenshots are all from SPSS, Inc. Copyright © 2012 by Pearson Education, Inc. All rights reserved. Printed in the United States of America. This publication is protected by Copyright and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458 or you may fax your request to 201-236-3290. Many of the designations by manufacturers and seller to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps. Library of Congress Cataloging-in-Publication Data Salkind, Neil J. Exploring research / Neil J. Salkind.—8th ed. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-205-09381-6 (alk. paper) ISBN-10: 0-205-09381-7 (alk. paper) 1. Psychology—Research—Methodology. 2. Education—Research—Methodology. I. Title. BF76.5.S24 2012 150.72—dc22 2011008869 10987654321—14 13 12 11 10 ISBN-10: 0-205-09381-7 ISBN-13: 978-0-205-09381-6 ISBN 10: 0-205-09390-6 ISBN 13: 978-0-205-09390-8 ISBN 10: 0-205-10877-6 ISBN 13: 978-0-205-10877-0 For Sara, Micah and Ted and my fellow Sharks . Happy Laps This page intentionally left blank At a Glance Preface xvii Chapter 1: The Role and Importance of Research 1 Chapter 2: The Research Process: Coming to Terms 21 Chapter 3A: Selecting a Problem and Reviewing the Research 39 Chapter 3B: The Importance of Practicing Ethics in Research 83 Chapter 4: Sampling and Generalizability 95 Chapter 5: Measurement, Reliability, and Validity 109 Chapter 6: Methods of Measuring Behavior 133 Chapter 7: Data Collection and Descriptive Statistics 155 Chapter 8: Introducing Inferential Statistics 177 Chapter 9: Nonexperimental Research: Descriptive and Correlational Methods 197 Chapter 10: Nonexperimental Research: Qualitative Methods 213 Chapter 11: Pre- and True Experimental Research Methods 229 Chapter 12: Quasi-Experimental Research: A Close Cousin to Experimental Research 245 v vi At a Glance Chapter 13: Writing a Research Proposal 259 Chapter 14: Writing A Research Manuscript 273 Appendix A: An Introduction to SPSS 19.x 301 Appendix B: Sample Data Set 363 Appendix C: Answers to End-of-Chapter Exercises 369 Bibliography 387 Glossary 391 Index 401 Contents Preface xvii What’s New in This Edition? xvii How This Book Is Organized xviii What’s Special About This Book? xix A Note to the Instructor xix How to Use This Book xx A Big Thanks xx Chapter 1: The Role and Importance of Research 1 Say Hello to Research! 1 What Research Is and What It Isn’t 2 A Model of Scientific Inquiry 5 Asking the Question 6 Identifying the Important Factors 7 Formulating a Hypothesis 7 Collecting Relevant Information 8 Testing the Hypothesis 8 Working with the Hypothesis 9 Reconsidering the Theory 9 Asking New Questions 9 Different Types of Research 10 Nonexperimental Research 10 Experimental Research 13 True Experimental Research 14 Quasi-Experimental Research 14 What Research Method to Use When? 15 Basic Research Versus Applied Research 15 Summary 17 Exercises 17 Online . 19 Professional Organizations 19 vii viii Contents Chapter 2: The Research Process: Coming to Terms 21 From Problem to Solution 21 The Language of Research 23 All About Variables 23 Dependent Variables 24 Independent Variables 25 The Relationship Between Independent and Dependent Variables 26 Other Important Types of Variables 27 Hypotheses 27 The Null Hypothesis 28 The Research Hypothesis 29 Differences Between the Null Hypothesis and the Research Hypothesis 30 What Makes a “Good” Hypothesis? 31 Samples and Populations 33 The Concept of Significance 33 Summary 34 Exercises 34 Online . 37 Seven Golden Steps 37 The Research Process Helper 37 How to Conduct Research 37 Research 101 37 Chapter 3A: Selecting a Problem and Reviewing the Research 39 Selecting a Problem 40 Defining Your Interests 42 Ideas, Ideas, Ideas (and What to Do with Them) 43 From Idea to Research Question to Hypothesis 44 Reviewing the Literature 46 Using General Sources 48 Using Secondary Sources 50 Using Primary Sources 52 Reading and Evaluating Research 60 What Does a Research Article Look Like? 60 Criteria for Judging a Research Study 61 Using Electronic Tools in Your Research Activities 62 Searching Online 63 Contents ix The Great Search Engines 63 More About Google 65 Using Bibliographic Database Programs 68 Using the Internet: Beyond Searchers 70 Research Activities and the Internet 71 More About E-Mail 71 An Introduction to Usenet (News) Groups 72 Using Mailing Lists or ListServs 76 And, Just a Bit about Web Sites 76 Writing the Literature Review 77 Summary 79 Exercises 79 Online . 81 The Gale Directory of Online, Portable, and Internet Databases 81 The GPO Database List 81 The National Library of Medicine Databases 81 Choosing the Best Search Engine for your Information Need 81 Ready ‘Net Go! 81 Chapter 3B: The Importance of Practicing Ethics in Research 83 A Bit of History 83 Basic Principles of Ethical Research 85 Protection from Harm 85 Maintenance of Privacy 86 Coercion 86 Informed Consent 86 Confidentiality 88 Debriefing 89 Sharing Benefits 89 Ensuring High Ethical Standards 89 The Role of Professional Organizations 90 A Summary of Ethical Guidelines 90 Ethics and Children 91 Ethics Regarding Online Research 92 Summary 93 Exercises 93 Online . 94 Research Methods Knowledge Base 94 Ethics: Why So Important? 94 x Contents Chapter 4: Sampling and Generalizability 95 Populations and Samples 95 Probability Sampling Strategies 96 Simple Random Sampling 96 Systematic Sampling 100 Stratified Sampling 101 Cluster Sampling 102 Nonprobability Sampling Strategies 102 Convenience Sampling 103 Quota Sampling 103 Samples, Sample Size, and Sampling Error 103 How Big Is Big? 105 Estimating Sample Size 105 Summary 106 Exercises 106 Online . 108 The Research Randomizer 108 Doug’s Random Sampling Applet 108 How to Calculate Sample Size 108 Random Number Generator 108 Chapter 5: Measurement, Reliability, and Validity 109 The Measurement Process 109 Levels of Measurement 109 Nominal 111 Ordinal 112 Interval 112 Ratio 113 Continuous Versus Discrete Variables 114 What Is All the Fuss? 114 Reliability and Validity: Why They Are Very, Very Important 115 A Conceptual Definition of Reliability 115 What Makes Up Error Scores? 116 Increasing Reliability 118 How Reliability Is Measured 118 Types of Reliability 119 Establishing Reliability: An Example 122 Validity 123 A Conceptual Definition of Validity 123 Types of Validity 124 Establishing Validity: An Example 126 Contents xi The Relationship Between Reliability and Validity 127 Closing (and Very Important) Thoughts 128 Summary 129 Exercises 129 Online . 131 The Buros Institute 131 The ERIC Test Locator 131 The ETS Test Collection 131 Tests and Test Reviews 131 Screening Tools and Rating Scales 131 Chapter 6: Methods of Measuring Behavior 133 Tests and Their Development 134 Why Use Tests? 134 What Tests Look Like 135 Types of Tests 136 Achievement Tests 136 Multiple-Choice Achievement Items 137 Attitude Tests 142 Personality Tests 145 Observational Techniques 145 Questionnaires 147 Summary 151 Exercises 152 Online . 153 Educational Testing Service 153 FairTest: The National Center for Fair & Open Testing 153 Rethinking Schools 153 Personality Tests 153 Chapter 7: Data Collection and Descriptive Statistics 155 Getting Ready for Data Collection 155 The Data Collection Process 156 Constructing Data Collection Forms 156 Coding Data 159 The Ten Commandments of Data Collection 160 Getting Ready for Data Analysis 161 Descriptive Statistics 162 Distributions of Scores 162 xii Contents Comparing Distributions of Scores 163 Measures of Central Tendency 163 Measures of Variability 165 The Range 166 The Standard Deviation 166 Understanding Distributions 168 The Normal (Bell-Shaped) Curve 168 The Mean and the Standard Deviation 169 Standard Scores: Computing and Using z Scores 170 What z Scores Really, Really Mean 172 Summary 172 Exercises 173 Online . 175 Introduction to Descriptive Statistics 175 Z score Convertor 175 Chapter 8: Introducing Inferential Statistics 177 Say Hello to Inferential Statistics! 177 How Inference Works 177 The Role of Chance 178 The Central Limit Theorem 178 The Idea of Statistical Significance 181 Tests of Significance
Recommended publications
  • Maximum Internet Security: a Hackers Guide - Networking - Intrusion Detection
    - Maximum Internet Security: A Hackers Guide - Networking - Intrusion Detection Exact Phrase All Words Search Tips Maximum Internet Security: A Hackers Guide Author: Publishing Sams Web Price: $49.99 US Publisher: Sams Featured Author ISBN: 1575212684 Benoît Marchal Publication Date: 6/25/97 Pages: 928 Benoît Marchal Table of Contents runs Pineapplesoft, a Save to MyInformIT consulting company that specializes in Internet applications — Now more than ever, it is imperative that users be able to protect their system particularly e-commerce, from hackers trashing their Web sites or stealing information. Written by a XML, and Java. In 1997, reformed hacker, this comprehensive resource identifies security holes in Ben co-founded the common computer and network systems, allowing system administrators to XML/EDI Group, a think discover faults inherent within their network- and work toward a solution to tank that promotes the use those problems. of XML in e-commerce applications. Table of Contents I Setting the Stage 1 -Why Did I Write This Book? 2 -How This Book Will Help You Featured Book 3 -Hackers and Crackers Sams Teach 4 -Just Who Can Be Hacked, Anyway? Yourself Shell II Understanding the Terrain Programming in 5 -Is Security a Futile Endeavor? 24 Hours 6 -A Brief Primer on TCP/IP 7 -Birth of a Network: The Internet Take control of your 8 -Internet Warfare systems by harnessing the power of the shell. III Tools 9 -Scanners 10 -Password Crackers 11 -Trojans 12 -Sniffers 13 -Techniques to Hide One's Identity 14 -Destructive Devices IV Platforms
    [Show full text]
  • ED381174.Pdf
    DOCUMENT RESUME ED 381 174 IR 055 469 AUTHOR Klatt, Edward C.; And Others TITLE Windows to the World: Utah Library Network Internet Training Manual. INSTITUTION Utah State Library, Salt Lake City. PUB DATE Mar 95 NOTE 136p. AVAILABLE FROMWorld Wide Web at http://www.state.lib.ut.us/internet.htm (available electronically) or Utah State Library Division, 2150 S. 3rd W., Suite 16, Salt Lake City, UT 84115-2579 ($10; quantity price, $5). PUB TYPE Guides Non-Classroom Use (055) EDRS PRICE MF01/PC06 Plus Postage. DESCRIPTORS Access to Information; *Computer Networks; Computer Software; Electronic Mail; *information Networks; *Information Systems; *Librarians; Online Catalogs; Professional Training; Telecommunications IDENTIFIERS *Internet; Utah ABSTRACT This guide reviews the basic principles of Internet exploration for the novice user, describing various functions and utilizing "onscreen" displays. The introduction explains what the Internet is, and provides historical information. The introduction is followed by a listing of Internet hardware and software (freeware and shareware), both lists including information fo: PC-compatibles and Macintosh computers. Users are introduced to and instructed in the use of the following Internet systems and services: EWAN telnet; OPACS (Online Public Access Catalogs); CARL (Colorado Alliance of Research Libraries; FirstSearch; UMI (University Microfilm Inc.); Deseret News; Pegasus E-Mail; Listservs; WinVN Newsreader; Viewers; Netscape; Mosaic; Gopher; Archie; and FTP (File Transfer Protocol). Over 100 computer screen reproductions help to illustrate the instruction. Contains 16 references and a form for ordering additional copies of this guide are provided. (MAS) *********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document.
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • 3. Internet – Participating in the Knowledge Society
    3. Internet – Participating in the knowledge society “Knowledge is power. Information is liberating. Education is the premise of progress, in every society, in every family.” Kofi Annan, former Secretary General of the United Nations, January 1997-December 2006 CHECKLIST FACT SHEET 10 – SEARCHING FOR INFORMATION Do you read the disclaimer when you are consulting a website? How can you be sure the information you find is factual and objective? Do you consult several websites to check your facts? CHECKLIST FACT SHEET 11 – FINDING QUALITY INFORMATION ON THE WEB Before downloading files, do you check that your anti-virus software is active? If you get your news from the Internet, do you seek multiple perspectives on the same story? Clean out your cookies from time to time to avoid being “profiled” by search engines. CHECKLIST FACT SHEET 12 – DISTANCE LEARNING AND MOOCs Choose a method of distance learning that is appropriate for you: determine what type of learning (synchronous, asynchronous, open schedule, hybrid distance learning) will best help you reach your goals. Before selecting a distance learning course, research the reviews – both from students and teachers. Take adequate precautions to ensure that your computer equipment and software is secure from hackers, viruses and other threats. CHECKLIST FACT SHEET 13 – SHOPPING ONLINE Do not make online purchases on unsecure Internet connections. Understand and agree to the key information provided about the product or service. Disable in-app purchases on your smartphone or tablet. Do not believe all user recommendations you see, creating “user” recommendations can also be a money-making business. Fact sheet 11 Finding quality information on the Web he original idea behind the creation of the Internet1 was to develop an electronic library for the Teasy access and distribution of information2.
    [Show full text]
  • Newsreaders.Com: Getting Started: Netiquette
    Usenet Netiquette NewsReaders.com: Getting Started: Netiquette I hope you will try Giganews or UsenetServer for your news subscription -- especially as a holiday present for your friends, family, or yourself! Getting Started (Netiquette) Consult various Netiquette links The Seven Don'ts of Usenet Google Groups Posting Style Guide Introduction to Usenet and Netiquette from NewsWatcher manual Quoting Style by Richard Kettlewell Other languages: o Voila! Francois. o Usenet News German o Netiquette auf Deutsch! Some notes from me: Read a newsgroup for a while before posting o By reading the group without posting (known as "lurking") for a while, or by reading the group archives on Google, you get a sense of the scope and tone of the group. Consult the FAQ before posting. o See Newsgroups page to find the FAQ for a particular group o FAQ stands for Frequently Asked Questions o a FAQ has not only the questions, but the answers! o Thus by reading the FAQ you don't post questions that have been asked (and answered) ad infinitum See the configuring software section regarding test posts (only post tests to groups with name ending in ".test") and not posting a duplicate post in the mistaken belief that your initial post did not go through. Don't do "drive through" posts. o Frequently someone who has an urgent question will post to a group he/she does not usually read, and then add something like "Please reply to me directly since I don't normally read this group." o Newsgroups are meant to be a shared experience.
    [Show full text]
  • How Ro Download a File on Giganews How to Download Using Usenet
    how ro download a file on giganews How to Download Using Usenet. wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 16 people, some anonymous, worked to edit and improve it over time. The wikiHow Tech Team also followed the article's instructions and verified that they work. This article has been viewed 149,534 times. Just as we once debated between Blockbuster and Hollywood Video, we have many choices when it comes to downloading. One of the oldest and best downloading sites is Usenet. Usenet downloads from a single server, making it among the safest and fastest ways to download. It’s slightly more complicated than other options, and it does have a small price tag, but it’s worth it: Usenet has a wealth of media, it’s secure, and thanks to Usenet’s strict policies, the risk of piracy is low. The following article will guide you through the process downloading with Usenet and get you on your way to enjoying the vast Usenet community. So Your Download Is Incomplete? Alas, this is something every Usenet user goes through sometime in his career. You’ve found the file you were searching for, started downloading, and were already imagining watching the movie, listening to the piece of music or otherwise using it, and there it is, the whole, ugly truth: Your download is damaged beyond repair, no chance to do anything about it. Or is there? First, let us briefly explain what exactly happened here.
    [Show full text]
  • Between the Lines: Newsgroups As an Information Source for Social Historians
    In: Zimmermann, Harald H.; Schramm, Volker (Hg.): Knowledge Management und Kommunikationssysteme, Workflow Management, Multimedia, Knowledge Transfer. Proceedings des 6. Internationalen Symposiums für Informationswissenschaft (ISI 1998), Prag, 3. – 7. November 1998. Konstanz: UVK Verlagsgesellschaft mbH, 1998. S. 123 – 136 Between the lines: Newsgroups as an information source for social historians Sylva Simsova Mrs Sylva Simsova DATA HELP, 18 Muswell Avenue, London N10 2EG tel/fax 0181 883 6351, [email protected] Contents 1 Introduction 2 Use of written material as a source of data 3 Mass-Observation methods 4 Oral history methods 5 Analysis of texts by the content analysis method 6 Analysis of texts by the qualitative research method 7 Methods chosen for this research 8 The sample 9 The classification of articles 10 UK material 11 Contributors 12 Contributions 13 Content analysis 14 Conclusion Summary The aim of this pilot study was to show the potential usefulness of Usenet discussions to future social historians and to explore possible methods for analysing the data. A survey of 42 Usenet newsgroups was made in November 1996 to explore the patterns of information formed by the contributors. The 5541 articles written by 2130 persons were analysed to identify UK participants and topics related to the UK; to measure the frequency of contributions and relate it to their authors' interests; to draw a comparison between moderated and non- moderated groups; and to indicate the most commonly discussed topics, using keywords taken from headers. A content analysis was used to check adherence to a point of netiquette and to find out to what extent two selected themes (the forthcoming election and violence in society) occupied the minds of contributors.
    [Show full text]
  • Netizens: an Anthology
    Netizens: An Anthology Table of Contents Foreword: By Tom Truscott Preface: What is a Netizen? Introduction: Participatory Networks Part I - The Present: What Has Been Created and How? Chapter 1 - The Net and the Netizens: The Impact the Net has on People’s Lives Chapter 2 - The Evolution of Usenet: The Poor Man’s ARPANET Chapter 3 - The Social Forces Behind the Development of Usenet Chapter 4 - The World of Usenet Part II - The Past: Where Has It All Come From? Chapter 5 - The Vision of Interactive Computing and the Future Chapter 6 - Cybernetics, Time-sharing, Human-Computer Symbiosis and On-line Communities: Creating a Super-community of On-line Communities Chapter 7 - Behind the Net: Computer Science and the Untold Story of the ARPANET Chapter 8 - The Birth and Development of the ARPANET Chapter 9 - On the Early History and Impact of UNIX: Tools to Build the Tools for a New Millennium Chapter 10 - On the Early Days of Usenet: The Roots of the Cooperative Online Culture Part III - And the Future? Chapter 11 - The NTIA Conference on the Future of the Net Creating a Prototype for a Democratic Decision Making Process Chapter 12 - “Imminent Death of the Net Predicted!” Chapter 13 - The Effect of the Net on the Professional News Media: The Usenet News Collective and Man-Computer News Symbiosis Chapter 14 - The Net and the Future of Politics: The Ascendancy of the Commons Chapter 15 - Exploring New York City’s On-Line Community: A Snapshot of NYC.General Part IV - Contributions Toward Developing a Theoretical Framework Chapter 16 - The Expanding Commonwealth of Learning: Printing and the Net Chapter 17 - ‘Arte’: An Economic Perspective Chapter 18 - The Computer as Democratizer Bibliography Glossary of Acronyms Appendix Proposed draft Declaration of the Rights of Netizens Foreword Netizens: On the Impact and History of Usenet and the Internet is an ambitious look at the social aspects of computer networking.
    [Show full text]
  • Los Newsgroups Políticos
    Hablar de política en La Red: los newsgroups políticos * Sara Bentivegna Facultad de Sociología Universitá di Roma La Sapienza Traducción de Eva Aladro (*) Corresponde al capitulo cuarto del libro de esta misma autora: LA POLíTICA IN RETE, Roma. Meltemi. 1999. Traducido con la autorización de la editorial y la propia autora. LA RED COMO OCASIÓN PARA CONVERSAR ntre las oportunidades que La Red ofrece se considera sin duda una de las más E importantes el establecimiento de una interacción entre sus usuarios, lo que per- mite el intercambio de opiniones, solicitud de informaciones, ofertas de sugerencias, toma de posturas y otros muchos servicios. En síntesis, la red permite la discusión de los más diversos argumentos en un contexto que reproduce algunas de las caracte- rísticas de la comunicación directa entre individuos aún cuando tenga lugar en un ámbito mediático. En particular, los newsgroups <grupos de discusión o de noticias) —que ponen en marcha una comunicación que sucede en modalidad asincrona1— pue- den situarse, dentro de un hipotético continuum que abarca desde la comunicación interpersonal cara a cara a la comunicación establecida a través de los media tradi- cionales, en una posición intermedia que conjuga la interactividad de la primera con la amplitud y simultaneidad de la segunda. Entre las personas que participan en un newsgroup se da de hecho la interactividad, pero al mismo tiempo tal interactividad desaparece para los sujetos que se limitan a asumir un papel de espectadores. Se trata, además, de una interactividad sui generis, de naturaleza diversa ala que pode- mos encontrar en la comunicación cara a cara: en este caso, el sujeto que interactúa exhibe directa y/o indirectamente señas de identidad, mientras que en el newsgroup el anonimato o incluso la operación de spoofing (alias humorístico), oculta al sujeto a los ojos de su interlocutor.
    [Show full text]
  • September 1994
    Contents Features DENNIS CHAMBERS Baltimore's most monstrous drummin' son just keeps on going. John McLaughlin, Steve Khan, the Brecker Brothers— jazz giants left and right are squeezing Dennis into their plans these days. Get the latest from the drummer many consider the greatest. • Robin Tolleson 20 JIM CHAPIN Asking your average drummer about Jim Chapin's Advanced Techniques For The Modern Drummer is like asking your aver- age Jesuit priest about The Bible. This month MD taps the mind of one of drum-dom's acknowledged sages. • Rick Mattingly 26 SIM CAIN Henry Rollins is a seriously fierce performer. His band obvious- ly has to kick equally serious butt. Drummer Sim Cain describes the controlled chaos he negotiates every day—and the surprisingly varied back- ground that feeds his style. • Matt Peiken 30 DRUM THRONES UP CLOSE Everyone knows the drummer is king, so it's no accident our stool is called "the drum throne." But the drummer's job also depends on comfort—and our seat needs to serve that "end" as well as possible. In this spe- cial report, MD covers today's stool scene from AtoZ. • Rick Van Horn 34 Volume 18, Number 9 Cover photo of Dennis Chambers by Michael Bloom Jim Chapin by Rick Malkin Columns EDUCATION NEWS EQUIPMENT 48 LATIN 8 UPDATE SYMPOSIUM Phillip Rhodes of Applying The Clave Gin Blossoms, BY CHUCK SILVERMAN Brother Cane's Scott Collier, Akira Jimbo, and Jeff Donavan of 56 Rock'N' the Paladins, plus News JAZZ CLINIC Doubling Up: Part 2 120 INDUSTRY BY ROD MORGENSTEIN HAPPENINGS 74 JAZZ DRUMMERS' DEPARTMENTS WORKSHOP
    [Show full text]
  • Handling Information Overload on Usenet
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NORA - Norwegian Open Research Archives UNIVERSITY OF OSLO Department of Informatics Handling Information Overload on Usenet Advanced Caching Methods for News Jan Ingvoldstad Cand Scient Thesis 4th August 2001 Abstract Usenet is the name of a world wide network of servers for group communica- tion between people. From 1979 and onwards, it has seen a near exponential growth in the amount of data transported, which has been a strain on band- width and storage. There has been a wide range of academic research with focus on the WWW, but Usenet has been neglected. Instead, Usenet’s evolu- tion has been dominated by practical solutions. This thesis describes the history of Usenet in a growth perspective, and introduces methods for collection and analysis of statistical data for testing the usefulness of various caching strategies. A set of different caching strategies are proposed and examined in light of bandwidth and storage demands as well as user perceived performance. I have shown that advanced caching methods for news offers relief for reading servers’ storage and bandwidth capacity by exploiting usage patterns for fetching or prefetching articles the users may want to read, but it will not solve the problem of near exponential growth nor the problems of Usenet’s backbone peers. Preface When I first started my studies at the University in Oslo in the autumn of 1991, I thought I was going to be a mathematician, and followed my first class in university level mathematics with vigor.
    [Show full text]
  • Publication Encase Legal Journal
    LAW Guidance Software is the leader in digital investigation solutions. EnCase® Enterprise is used by numerous government agencies and 65 of the Fortune 100. Market-leading solutions EnCase® eDiscovery, EnCase® Cybersecurity, and EnCase® Analytics help organizations respond to e-discovery requests, security incidents, and emerging internal and external threats. EnCase® Legal Journal 5th Edition Official Legal Citation: EnCase L.J. (2014) .Copyright © 2014 Guidance Software Inc ,All rights reserved. No part of this book may be reproduced, stored, or transmitted by any means—whether auditory, graphic mechanical, or electronic—without written permission of both publisher and author, except in the case of brief excerpts used .in critical articles and reviews. Unauthorized reproduction of any part of this work is illegal and is punishable by law ISBN: 978-1-4834-0915-3 (sc) ISBN: 978-1-4834-0914-6 (e) Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do .not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them The information provided herein is general information only and does not constitute legal or other professional advice or any opinion of Guidance Software, Inc. or its contributing authors. For this reason, it is recommended that you seek the .advice of a lawyer who can advise you on the specific legal issues that may be applicable to your business concerns Any people depicted in stock imagery provided by Thinkstock are models, and .such images are being used for illustrative purposes only .Certain stock imagery © Thinkstock Lulu Publishing Services rev. date: 3/24/2014 Acknowledgements Guidance Software Editorial Board • Victor T.
    [Show full text]