2021 Global Responsibility Report
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
TIBCO Jasperreports® Server Administrator Guide
TIBCO JasperReports® Server Administrator Guide Software Release 7.8 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. ANY SOFTWARE ITEM IDENTIFIED AS THIRD PARTY LIBRARY IS AVAILABLE UNDER SEPARATE SOFTWARE LICENSE TERMS AND IS NOT PART OF A TIBCO PRODUCT. AS SUCH, THESE SOFTWARE ITEMS ARE NOT COVERED BY THE TERMS OF YOUR AGREEMENT WITH TIBCO, INCLUDING ANY TERMS CONCERNING SUPPORT, MAINTENANCE, WARRANTIES, AND INDEMNITIES. DOWNLOAD AND USE OF THESE ITEMS IS SOLELY AT YOUR OWN DISCRETION AND SUBJECT TO THE LICENSE TERMS APPLICABLE TO THEM. BY PROCEEDING TO DOWNLOAD, INSTALL OR USE ANY OF THESE ITEMS, YOU ACKNOWLEDGE THE FOREGOING DISTINCTIONS BETWEEN THESE ITEMS AND TIBCO PRODUCTS. -
CIO Guide to Application Modernization
CIO Guide to Application Modernization May 2020 2 What You Need To Know The global pandemic has put unexpected pressures on businesses of all sorts — in ways no one was projecting at the beginning of the year. As a result, CIOs face a series of urgent challenges: • How can they raise system visibility and system control over operations that are more dispersed and changing than ever? • How can they cut costs, yet create a more agile and responsive IT system? • How can they do more with older data, even as they understand better the data from a market that is changing every week? • How can they help people work faster, with a minimum of change management, or set the stage for growth, while preserving capital? In many cases the answer is a step-by-step deployment of cloud computing technology, tailored to meet the most pressing needs first. Working with a comprehensive cloud provider, it is possible to create cloud systems that respect and preserve core assets, while enabling rapid modernization, in particular for the cost-aware agility and resilience of modern application architecture. Why You Should Keep Reading This guide offers a series of approaches to application modernization, from identifying needs and developing an action-oriented roadmap, to methods of identifying and effecting meaningful change in the most critical parts of your IT operations. We have also included at the end a list of key solutions that Google Cloud and our technology partners have to give your organization fast results. 3 Introduction Even before the current crisis, IT organizations saw pressure to be more agile and innovative. -
Proquest Dissertations
REPROGRAMMING THE LYRIC: A GENRE APPROACH FOR CONTEMPORARY DIGITAL POETRY HOLLY DUPEJ A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS GRADUATE PROGRAM IN COMMUNICATIONS AND CULTURE YORK UNIVERSITY, TORONTO, ONTARIO APRIL 2008 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-38769-6 Our file Notre reference ISBN: 978-0-494-38769-6 NOTICE: AVIS: The author has granted a non L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Plntemet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation. -
Lexical Innovation on the Internet - Neologisms in Blogs
Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können. -
Bigquery SQL Example: Simple Aggregates
Crunching Big Data with Big Query Ryan Boyd, Developer Advocate Jordan Tigani, Software Engineer How BIG is big? 1 million rows? 1 million 1 million 1 million 1 million 1 million 1 million10 million rows? 1 million 1 million 1 million 1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million100 1million million 1 million rows?1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 500million million11 millionmillion 1million1 million million11 million 1million1 million millionrows?11 million 1million1 million million 11 million 1million1 million -
Vendor Contract
d/W^sEKZ'ZDEd ĞƚǁĞĞŶ t'ŽǀĞƌŶŵĞŶƚ͕>>ĂŶĚ d,/EdZ>K>WhZ,^/E'^z^dD;d/W^Ϳ &Žƌ Z&Wϭϴ1102 Internet & Network Security 'ĞŶĞƌĂů/ŶĨŽƌŵĂƚŝŽŶ dŚĞsĞŶĚŽƌŐƌĞĞŵĞŶƚ;͞ŐƌĞĞŵĞŶƚ͟ͿŵĂĚĞĂŶĚĞŶƚĞƌĞĚŝŶƚŽďLJĂŶĚďĞƚǁĞĞŶdŚĞ/ŶƚĞƌůŽĐĂů WƵƌĐŚĂƐŝŶŐ^LJƐƚĞŵ;ŚĞƌĞŝŶĂĨƚĞƌƌĞĨĞƌƌĞĚƚŽĂƐ͞d/W^͟ƌĞƐƉĞĐƚĨƵůůLJͿĂŐŽǀĞƌŶŵĞŶƚĐŽŽƉĞƌĂƚŝǀĞ ƉƵƌĐŚĂƐŝŶŐƉƌŽŐƌĂŵĂƵƚŚŽƌŝnjĞĚďLJƚŚĞZĞŐŝŽŶϴĚƵĐĂƚŝŽŶ^ĞƌǀŝĐĞĞŶƚĞƌ͕ŚĂǀŝŶŐŝƚƐƉƌŝŶĐŝƉĂůƉůĂĐĞ ŽĨďƵƐŝŶĞƐƐĂƚϰϴϰϱh^,ǁLJϮϳϭEŽƌƚŚ͕WŝƚƚƐďƵƌŐ͕dĞdžĂƐϳϱϲϴϲ͘dŚŝƐŐƌĞĞŵĞŶƚĐŽŶƐŝƐƚƐŽĨƚŚĞ ƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚďĞůŽǁ͕ŝŶĐůƵĚŝŶŐƉƌŽǀŝƐŝŽŶƐŽĨĂůůƚƚĂĐŚŵĞŶƚƐƌĞĨĞƌĞŶĐĞĚŚĞƌĞŝŶ͘/ŶƚŚĞĞǀĞŶƚŽĨ ĂĐŽŶĨůŝĐƚďĞƚǁĞĞŶƚŚĞƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚďĞůŽǁĂŶĚƚŚŽƐĞĐŽŶƚĂŝŶĞĚŝŶĂŶLJƚƚĂĐŚŵĞŶƚ͕ƚŚĞ ƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚƐŚĂůůĐŽŶƚƌŽů͘ dŚĞǀĞŶĚŽƌŐƌĞĞŵĞŶƚƐŚĂůůŝŶĐůƵĚĞĂŶĚŝŶĐŽƌƉŽƌĂƚĞďLJƌĞĨĞƌĞŶĐĞƚŚŝƐŐƌĞĞŵĞŶƚ͕ƚŚĞƚĞƌŵƐĂŶĚ ĐŽŶĚŝƚŝŽŶƐ͕ƐƉĞĐŝĂůƚĞƌŵƐĂŶĚĐŽŶĚŝƚŝŽŶƐ͕ĂŶLJĂŐƌĞĞĚƵƉŽŶĂŵĞŶĚŵĞŶƚƐ͕ĂƐǁĞůůĂƐĂůůŽĨƚŚĞƐĞĐƚŝŽŶƐ ŽĨƚŚĞƐŽůŝĐŝƚĂƚŝŽŶĂƐƉŽƐƚĞĚ͕ŝŶĐůƵĚŝŶŐĂŶLJĂĚĚĞŶĚĂĂŶĚƚŚĞĂǁĂƌĚĞĚǀĞŶĚŽƌ͛ƐƉƌŽƉŽƐĂů͘͘KƚŚĞƌ ĚŽĐƵŵĞŶƚƐƚŽďĞŝŶĐůƵĚĞĚĂƌĞƚŚĞĂǁĂƌĚĞĚǀĞŶĚŽƌ͛ƐƉƌŽƉŽƐĂůƐ͕ƚĂƐŬŽƌĚĞƌƐ͕ƉƵƌĐŚĂƐĞŽƌĚĞƌƐĂŶĚĂŶLJ ĂĚũƵƐƚŵĞŶƚƐǁŚŝĐŚŚĂǀĞďĞĞŶŝƐƐƵĞĚ͘/ĨĚĞǀŝĂƚŝŽŶƐĂƌĞƐƵďŵŝƚƚĞĚƚŽd/W^ďLJƚŚĞƉƌŽƉŽƐŝŶŐǀĞŶĚŽƌĂƐ ƉƌŽǀŝĚĞĚďLJĂŶĚǁŝƚŚŝŶƚŚĞƐŽůŝĐŝƚĂƚŝŽŶƉƌŽĐĞƐƐ͕ƚŚŝƐŐƌĞĞŵĞŶƚŵĂLJďĞĂŵĞŶĚĞĚƚŽŝŶĐŽƌƉŽƌĂƚĞĂŶLJ ĂŐƌĞĞĚĚĞǀŝĂƚŝŽŶƐ͘ dŚĞĨŽůůŽǁŝŶŐƉĂŐĞƐǁŝůůĐŽŶƐƚŝƚƵƚĞƚŚĞŐƌĞĞŵĞŶƚďĞƚǁĞĞŶƚŚĞƐƵĐĐĞƐƐĨƵůǀĞŶĚŽƌƐ;ƐͿĂŶĚd/W^͘ ŝĚĚĞƌƐƐŚĂůůƐƚĂƚĞ͕ŝŶĂƐĞƉĂƌĂƚĞǁƌŝƚŝŶŐ͕ĂŶĚŝŶĐůƵĚĞǁŝƚŚƚŚĞŝƌƉƌŽƉŽƐĂůƌĞƐƉŽŶƐĞ͕ĂŶLJƌĞƋƵŝƌĞĚ ĞdžĐĞƉƚŝŽŶƐŽƌĚĞǀŝĂƚŝŽŶƐĨƌŽŵƚŚĞƐĞƚĞƌŵƐ͕ĐŽŶĚŝƚŝŽŶƐ͕ĂŶĚƐƉĞĐŝĨŝĐĂƚŝŽŶƐ͘/ĨĂŐƌĞĞĚƚŽďLJd/W^͕ƚŚĞLJ ǁŝůůďĞŝŶĐŽƌƉŽƌĂƚĞĚŝŶƚŽƚŚĞĨŝŶĂůŐƌĞĞŵĞŶƚ͘ WƵƌĐŚĂƐĞKƌĚĞƌ͕ŐƌĞĞŵĞŶƚŽƌŽŶƚƌĂĐƚŝƐƚŚĞd/W^DĞŵďĞƌ͛ƐĂƉƉƌŽǀĂůƉƌŽǀŝĚŝŶŐƚŚĞ ĂƵƚŚŽƌŝƚLJƚŽƉƌŽĐĞĞĚǁŝƚŚƚŚĞŶĞŐŽƚŝĂƚĞĚĚĞůŝǀĞƌLJŽƌĚĞƌƵŶĚĞƌƚŚĞŐƌĞĞŵĞŶƚ͘^ƉĞĐŝĂůƚĞƌŵƐ -
The Evolution of Cloud Computing
Read the complete book: www.bcs.org/books/cloud Read the complete book: www.bcs.org/books/cloud THE EVOLUTION OF CLOUD COMPUTING Read the complete book: www.bcs.org/books/cloud BCS, THE CHARTERED INSTITUTE FOR IT BCS, The Chartered Institute for IT, is committed to making IT good for society. We use the power of our network to bring about positive, tangible change. We champion the global IT profession and the interests of individuals engaged in that profession, for the benefit of all. Exchanging IT expertise and knowledge The Institute fosters links between experts from industry, academia and business to promote new thinking, education and knowledge sharing. Supporting practitioners Through continuing professional development and a series of respected IT qualifica- tions, the Institute seeks to promote professional practice tuned to the demands of business. It provides practical support and information services to its members and volunteer communities around the world. Setting standards and frameworks The Institute collaborates with government, industry and relevant bodies to establish good working practices, codes of conduct, skills frameworks and common standards. It also offers a range of consultancy services to employers to help them adopt best practice. Become a member Over 70,000 people including students, teachers, professionals and practitioners enjoy the benefits of BCS membership. These include access to an international community, invitations to a roster of local and national events, career development tools and a quar- terly thought-leadership magazine. Visit www.bcs.org/membership to find out more. Further Information BCS, The Chartered Institute for IT, First Floor, Block D, North Star House, North Star Avenue, Swindon, SN2 1FA, United Kingdom. -
The Ghosts of War by Ryan Smithson
THE GHOSTS OF WAR BY RYAN SMITHSON RED PHASE I. STUCK IN THE FENCE II. RECEPTION III. BASIC TRAINING PART I IV. MAYBE A RING? V. EQ PLATOON VI. GI JOE SCHMO VII. COLD LIGHTNING VIII. THE EIGHT HOUR DELAY IX. THE TOWN THAT ACHMED BUILT X. A TASTE OF DEATH WHITE PHASE XI. BASIC TRAINING PART II XII. RELIEF XIII. WAR MIRACLES XIV. A TASTE OF HOME XV. SATAN’S CLOTHES DRYER XVI. HARD CANVAS XVII. PETS XVIII. BAZOONA CAT XIX. TEARS BLUE PHASE XX. BASIC TRAINING PART III XXI. BEST DAY SO FAR XXII. IRONY XXIII. THE END XXIV. SILENCE AND SILHOUETTES XXV. WORDS ON PAPER XXVI. THE INNOCENT XXVII. THE GHOSTS OF WAR Ghosts of War/R. Smithson/2 PART I RED PHASE I. STUCK IN THE FENCE East Greenbush, NY is a suburb of Albany. Middle class and about as average as it gets. The work was steady, the incomes were suitable, and the kids at Columbia High School were wannabes. They wanted to be rich. They wanted to be hot. They wanted to be tough. They wanted to be too cool for the kids who wanted to be rich, hot, and tough. Picture me, the average teenage boy. Blond hair and blue eyes, smaller than average build, and, I’ll admit, a little dorky. I sat in third period lunch with friends wearing my brand new Aeropostale t-shirt abd backwards hat, wanting to be self-confident. The smell of greasy school lunches filled e air. We were at one of the identical, fold out tables. -
Building Secure and Reliable Systems
Building Secure & Reliable Systems Best Practices for Designing, Implementing and Maintaining Systems Compliments of Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea & Adam Stubblefi eld Praise for Building Secure and Reliable Systems It is very hard to get practical advice on how to build and operate trustworthy infrastructure at the scale of billions of users. This book is the first to really capture the knowledge of some of the best security and reliability teams in the world, and while very few companies will need to operate at Google’s scale many engineers and operators can benefit from some of the hard-earned lessons on securing wide-flung distributed systems. This book is full of useful insights from cover to cover, and each example and anecdote is heavy with authenticity and the wisdom that comes from experimenting, failing and measuring real outcomes at scale. It is a must for anybody looking to build their systems the correct way from day one. —Alex Stamos, Director of the Stanford Internet Observatory and former CISO of Facebook and Yahoo This book is a rare treat for industry veterans and novices alike: instead of teaching information security as a discipline of its own, the authors offer hard-wrought and richly illustrated advice for building software and operations that actually stood the test of time. In doing so, they make a compelling case for reliability, usability, and security going hand-in-hand as the entirely inseparable underpinnings of good system design. —Michał Zalewski, VP of Security Engineering at Snap, Inc. and author of The Tangled Web and Silence on the Wire This is the “real world” that researchers talk about in their papers. -
Extrahop 8.1 Admin UI Guide © 2020 Extrahop Networks, Inc
ExtraHop 8.1 Admin UI Guide © 2020 ExtraHop Networks, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior written approval from ExtraHop Networks, Inc. For more documentation, see https://docs.extrahop.com/. Published: 2020-08-01 ExtraHop Networks Seattle, WA 98101 877-333-9872 (US) +44 (0)203 7016850 (EMEA) +65-31585513 (APAC) www.extrahop.com Contents Introduction to the ExtraHop Admin UI 8 Supported browsers 8 Status and Diagnostics 9 Health 9 Audit Log 10 Send audit log data to a remote syslog server 11 Audit log events 11 Fingerprint 15 Exception Files 15 Support Scripts 15 Run the default support script 15 Run a custom support script 16 Network Settings 17 Connect to ExtraHop Cloud Services 17 Troubleshoot your connection to ExtraHop Cloud Services 17 Configure your firewall rules 18 Connect to ExtraHop Cloud Services through a proxy 18 Bypass certificate validation 18 Connectivity 19 Configure an interface 19 Interface throughput 20 Set a static route 21 Enable IPv6 for an interface 21 Global proxy server 22 ExtraHop Cloud proxy 22 Bond interfaces 22 Create a bond interface 23 Modify bond interface settings 23 Destroy a bond interface 24 Flow Networks 24 Configure the Discover appliance to collect traffic from NetFlow and sFlow devices 24 Configure the interface on your Discover appliance 24 Configure the flow type and the UDP port over which flow data is collected 24 Add the pending flow networks on the Discover appliance 25 View configured -
Emergindo Das Trevas: Análise Do Discurso Metal Sinfônico Em Within Temptation
UNIVERSIDADE PRESBITERIANA MACKENZIE PROGRAMA DE PÓS-GRADUAÇÃO EM LETRAS MESTRADO EM LETRAS TALES DOS SANTOS EMERGINDO DAS TREVAS: ANÁLISE DO DISCURSO METAL SINFÔNICO EM WITHIN TEMPTATION São Paulo 2017 TALES DOS SANTOS EMERGINDO DAS TREVAS: ANÁLISE DO DISCURSO METAL SINFÔNICO EM WITHIN TEMPTATION Dissertação de mestrado apresentada à banca examinadora da Universidade Presbiteriana Mackenzie como requisito parcial para a obtenção do título de Mestre em Letras. Orientadora: Profa. Dra. Neusa Maria Oliveira Barbosa Bastos. São Paulo 2017 S237e Santos, Tales dos. Emergindo das trevas: análise do discurso metal sinfônico em Within Temptation / Tales dos Santos – São Paulo, 2017. 112 f. : il. ; 30 cm. Dissertação (Mestrado em Letras) - Universidade Presbiteriana Mackenzie, 2017. Orientador: Neusa Maria Oliveira Barbosa Bastos Referência bibliográfica: p. 95-98. 1. Heavy metal. 2. Metal sinfônico. 3. Análise do discurso. 4. Letras de música. Título. CDD 401.41 TALES DOS SANTOS EMERGINDO DAS TREVAS: ANÁLISE DO DISCURSO METAL SINFÔNICO EM WITHIN TEMPTATION Dissertação aprovada em: ____/____/________ BANCA EXAMINADORA: Profa. Dra. Neusa Maria Oliveira Barbosa Bastos – Orientadora Universidade Presbiteriana Mackenzie - UPM Profa. Dra. Diana Luz Pessoa de Barros – Avaliadora interna Universidade Presbiteriana Mackenzie - UPM Profa. Dra. Maria Mercedes Saraiva Hackerott – Avaliadora externa Universidade Paulista - UNIP Dedicatória Aos meus amigos Lucas Seiji Watanabe, Pedro Henrique Camargo e Pietro Beires Marzani Silva que compartilham do mesmo -
Digital Memories: Exploring Critical Issues
Edited by Anna Maj & Daniel Riha Digital Memories Exploring Critical Issues Critical Issues Series Editors Dr Robert Fisher Dr Nancy Billias Advisory Board Dr Alejandro Cervantes-Carson Dr Peter Mario Kreuter Professor Margaret Chatterjee Martin McGoldrick Dr Wayne Cristaudo Revd Stephen Morris Mira Crouch Professor John Parry Dr Phil Fitzsimmons Paul Reynolds Professor Asa Kasher Professor Peter Twohig O w e n K e l l y Professor S Ram Vemuri Revd Dr Kenneth Wilson, O.B.E A Critical Issues research and publications project. http://www.inter-disciplinary.net/critical-issues/ The C y b e r Hub ‘Digital Memories’ Digital Memories: Exploring Critical Issues Edited by Anna Maj and Daniel Riha Inter-Disciplinary Press Oxford, United Kingdom © Inter-Disciplinary Press 2009 http://www.inter-disciplinary.net/publishing/id-press/ The Inter-Disciplinary Press is part of Inter-Disciplinary.Net – a global network for research and publishing. The Inter-Disciplinary Press aims to promote and encourage the kind of work which is collaborative, innovative, imaginative, and which provides an exemplar for inter-disciplinary and multi- disciplinary publishing. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the prior permission of Inter-Disciplinary Press. Inter-Disciplinary Press, Priory House, 149B Wroslyn Road, Freeland, Oxfordshire. OX29 8HR, United Kingdom. +44 (0)1993 882087 British Library Cataloguing in Publication Data. A catalogue record for this book is available from the British Library. ISBN: 978-1-84888-004-7 First published in the United Kingdom in eBook format in 2009.