394 resultados para Prove it works


Relevância:

80.00% 80.00%

Publicador:

Resumo:

For Adorno writing in 1953, Hollywood cinema was a medium of “regression” based on infantile wish fulfillment manufactured by the industrial repetition of the filmic image that he called a modern “hieroglyphics”—like the archaic language of pictures in Ancient Egypt, which guaranteed immortality after death in Egyptian burial rites. From that 1953 essay Prolog zum Fernsehen to Das Schema der Massenkultur in 1981, Adorno likened film frames to cultural ideograms: What he called the filmic “language of images” (Bildersprache) constituted a Hieroglyphenschrift that visualised forbidden sexual impulses and ideations of death and domination in the unconscious of the mass spectator. In his famous passage he writes, “As image, the image-writing (Bilderschrift) is a medium of regression, where the producer and consumer coincide; as writing, film resurrects the archaic images of modernity.” In other words, cinema takes the spectator on a journey into his unconscious in order to control him from within. It works, because the spectator begins to believe the film is speaking to him in his very own image-language (the unconscious), making him do and buy whatever capitalism demands. Modernity for Adorno is precisely the instrumentalisation of the collective unconscious through the mediatic images of the culture industry.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We explore the use of Gittins indices to search for near optimality in sequential clinical trials. Some adaptive allocation rules are proposed to achieve the following two objectives as far as possible: (i) to reduce the expected successes lost, (ii) to minimize the error probability at the end. Simulation results indicate the merits of the rules based on Gittins indices for small trial sizes. The rules are generalized to the case when neither of the response densities is known. Asymptotic optimality is derived for the constrained rules. A simple allocation rule is recommended for one-stage models. The simulation results indicate that it works better than both equal allocation and Bather's randomized allocation. We conclude with a discussion of possible further developments.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The aim of this paper is to propose design principles for ambient intelligence (AmI) environments. The question we are investigating is how these environments can be designed to support a group to be able to carry out common goal-oriented activities. The approach we are taking in answering this question is informed by the concept of collective intelligence (CI). We are applying the concept of CI to AmI as we have found it works well in biological and social systems. Examples from nature demonstrate the power of CI stimulated by implicit cues in the environment. We use these examples to derive design principles for AmI environments. By applying these design principles to a concrete scenario, we are able to propose ways to help decrease environmental pollution within urban areas.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Deep packet inspection is a technology which enables the examination of the content of information packets being sent over the Internet. The Internet was originally set up using “end-to-end connectivity” as part of its design, allowing nodes of the network to send packets to all other nodes of the network, without requiring intermediate network elements to maintain status information about the transmission. In this way, the Internet was created as a “dumb” network, with “intelligent” devices (such as personal computers) at the end or “last mile” of the network. The dumb network does not interfere with an application's operation, nor is it sensitive to the needs of an application, and as such it treats all information sent over it as (more or less) equal. Yet, deep packet inspection allows the examination of packets at places on the network which are not endpoints, In practice, this permits entities such as Internet service providers (ISPs) or governments to observe the content of the information being sent, and perhaps even manipulate it. Indeed, the existence and implementation of deep packet inspection may challenge profoundly the egalitarian and open character of the Internet. This paper will firstly elaborate on what deep packet inspection is and how it works from a technological perspective, before going on to examine how it is being used in practice by governments and corporations. Legal problems have already been created by the use of deep packet inspection, which involve fundamental rights (especially of Internet users), such as freedom of expression and privacy, as well as more economic concerns, such as competition and copyright. These issues will be considered, and an assessment of the conformity of the use of deep packet inspection with law will be made. There will be a concentration on the use of deep packet inspection in European and North American jurisdictions, where it has already provoked debate, particularly in the context of discussions on net neutrality. This paper will also incorporate a more fundamental assessment of the values that are desirable for the Internet to respect and exhibit (such as openness, equality and neutrality), before concluding with the formulation of a legal and regulatory response to the use of this technology, in accordance with these values.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Context The School of Information Technology at QUT has recently undertaken a major restructuring of their Bachelor of Information Technology (BIT) course. Some of the aims of this restructuring include a reduction in first year attrition and to provide an attractive degree course that meets both student and industry expectations. Emphasis has been placed on the first semester in the context of retaining students by introducing a set of four units that complement one another and provide introductory material on technology, programming and related skills, and generic skills that will aid the students throughout their undergraduate course and in their careers. This discussion relates to one of these four fist semester units, namely Building IT Systems. The aim of this unit is to create small Information Technology (IT) systems that use programming or scripting, databases as either standalone applications or web applications. In the prior history of teaching introductory computer programming at QUT, programming has been taught as a stand alone subject and integration of computer applications with other systems such as databases and networks was not undertaken until students had been given a thorough grounding in those topics as well. Feedback has indicated that students do not believe that working with a database requires programming skills. In fact, the teaching of the building blocks of computer applications have been compartmentalized and taught in isolation from each other. The teaching of introductory computer programming has been an industry requirement of IT degree courses as many jobs require at least some knowledge of the topic. Yet, computer programming is not a skill that all students have equal capabilities of learning (Bruce et al., 2004) and this is clearly shown by the volume of publications dedicated to this topic in the literature over a broad period of time (Eckerdal & Berglund, 2005; Mayer, 1981; Winslow, 1996). The teaching of this introductory material has been done pretty much the same way over the past thirty years. During this period of time that introductory computer programming courses have been taught at QUT, a number of different programming languages and programming paradigms have been used and different approaches to teaching and learning have been attempted in an effort to find the golden thread that would allow students to learn this complex topic. Unfortunately, computer programming is not a skill that can be learnt in one semester. Some basics can be learnt but it can take many years to master (Norvig, 2001). Faculty data typically has shown a bimodal distribution of results for students undertaking introductory programming courses with a high proportion of students receiving a high mark and a high proportion of students receiving a low or failing mark. This indicates that there are students who understand and excel with the introductory material while there is another group who struggle to understand the concepts and practices required to be able to translate a specification or problem statement into a computer program that achieves what is being requested. The consequence of a large group of students failing the introductory programming course has been a high level of attrition amongst first year students. This attrition level does not provide good continuity in student numbers in later years of the degree program and the current approach is not seen as sustainable.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Lifecycle funds offered by retirement plan providers allocate aggressively to risky asset classes when the employee participants are young, gradually switching to more conservative asset classes as they grow older and approach retirement. This approach focuses on maximizing growth of the accumulation fund in the initial years and preserving its value in the later years. The authors simulate terminal wealth outcomes based on conventional lifecycle asset allocation rules as well as on contrarian strategies that reverse the direction of asset switching. The evidence suggests that the growth in portfolio size over time significantly impacts the asset allocation decision. Due to the portfolio size effect that is observed by the authors, the terminal value of accumulation in retirement accounts is influenced more by the asset allocation strategy adopted in later years relative to that adopted in early years. By mechanistically switching to conservative assets in the later years of a plan, lifecycle strategies sacrifice significant growth opportunity and prove counterproductive to the participant's wealth accumulation objective. The authors' conclude that this sacrifice does not seem to be compensated adequately in terms of reducing the risk of potentially adverse outcomes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hong Kong has been one of the early jurisdictions to adopt Public Private Partnership (PPP) model for delivering large public infrastructure projects. The development of this procurement approach in Hong Kong has followed an intricate path. As such, it is believed that there are a number of areas which are interesting to unveil. As part of a comprehensive research study looking at implementing PPPs, interviews with experienced local industrial practitioners from the public sector were conducted to realize their perspective on the topic of procuring public works projects. Amongst these interviews, fourteen were launched government officials and advisers. The interview findings show that the majority of the Hong Kong and Australian interviewees had previously conducted some kind of research in the field of PPP. Both groups of interviewees agreed that “PPPs gain private sector’s added efficiency/expertise/management skills” when compared to projects procured traditionally. Also, both groups of interviewees felt that projects best suited to use PPP are those that have an “Economic business case”. The interviewees believed that “Contractor’s performance” could be used as key performance indicators for PPP projects. A large number of critical success factors were identified by the interviewees for PPP projects; two of these were similar for both groups of interviewees. These included “Project objectives well defined” and “Partnership spirit/commitment/trust”. Finally it was found that in-house guidance materials were more common in the organizations of the Australian interviewees compared to the Hong Kong ones. This paper studies the views of the public sector towards the topic of PPPs in Hong Kong and Australia, which helps to answer some of the queries that both academics and the private sector in these jurisdictions are keen to know. As a result the private sector can be more prepared when negotiating with the public sector and realise their needs better, academics on the other hand are provided a wider perspective of this topic benefiting the research industry at large.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: As part of a comprehensive research study looking at implementing PPPs, interviews with experienced researchers were conducted to realize their views on private sector involvement in public works projects. Design / methodology / approach: Amongst these interviews, five were launched with academics from Hong Kong and Australia, and two were conducted with Legislative Councillors of the Hong Kong Special Administration Region (HKSAR) government. Findings: The interview findings show that both Hong Kong and Australian interviewees had previously conducted some kind of research in the field of PPP. The interviewees highlighted that “Different risk profiles” and “Private sector more innovative / efficient” were the main differences between projects that were procured by PPP and traditionally. Other differences include risk transfer. In a PPP arrangement the public sector passes on a substantial amount of the project risks to the private sector, whereas in a traditional case the public sector would take the largest responsibility in bearing these risks. Another common feature of the private sector is that they tend to be more efficient and innovative when compared to the public sector hence their expertise is often reflected in PPP projects. The interviewees agreed that the key performance indicators for PPP projects were unique depending on the individual project. The critical success factors mentioned by both groups of interviewees included “Transparent process”, “Project dependent” and “Market need”. Due to the fact that PPP projects tend to be large scaled costly projects, adequate transparency in the process is necessary in order to demonstrate that a fair selection and tendering process is conducted. A market need for the project is also important to ensure that the project will be financially secure and that the private sector can make a reasonable profit to cover their project expenditure. Originality / value: The findings from this study have enabled a comparative analysis between the views of researchers in two completely different jurisdictions. With the growing popularity to implement PPP projects, it is believed that the results presented in this paper would be of interest to the industry at large.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose : The Hong Kong Special Administrative Region (referred to as Hong Kong from here onwards) is an international leading commercial hub particularly in Asia. In order to keep up its reputation a number of large public works projects have been considered. Public Private Partnership (PPP) has increasingly been suggested for these projects, but the suitability of using this procurement method in Hong Kong is yet to be studied empirically. The findings presented in this paper will specifically consider whether PPPs should be used to procure public works projects in Hong Kong by studying the attractive and negative factors for adopting PPP. Design/methodology/approach : As part of this study a questionnaire survey was conducted with industrial practitioners. The respondents were requested to rank the importance of fifteen attractive factors and thirteen negative factors for adopting PPP. Findings : The results found that in general the top attractive factors ranked by respondents from Hong Kong were efficiency related, these included (1) ‘Provide an integrated solution (for public infrastructure / services)’; (2) ‘Facilitate creative and innovative approaches’; and (3) ‘Solve the problem of public sector budget restraint’. It was found that Australian respondents also shared similar findings to those in Hong Kong, but the United Kingdom respondents showed a higher priority to those economic driven attractive factors. Also, the ranking of the attractive and negative factors for adopting PPP showed that on average the attractive factors were scored higher than the negative factors. Originality/value : The results of this research have enabled a comparison of the attractive and negative factors for adopting PPP between three administrative systems. These findings have confirmed that PPP is a suitable means to procure large public projects which are believed to be useful and interesting to PPP researchers and practitioners.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Research on workforce diversity at the organisational level gained momentum in the 1990s, because of the growing trend in HR research to link HR practices with organisational performance. The new parallel wave of research focused on the business case for diversity, in which diversity was linked to organisational performance. However, the results of these studies, mainly focusing on linear diversity-performance relationships, have been inconsistent. Based on contrasting theories, this paper proposes three competing predictions of the gender diversity-performance relationship at the organisational level: a positive linear relationship derived from the resource-based view of the firm, a negative linear relationship derived from self-categorisation and social identity theories, and a U-shaped curvilinear relationship derived from the integration of the resource-based view of the firm with self-categorisation and social identity theories. The U-shaped relationship accounts for the inconsistent findings in past research, because different proportions of men and women produce different social dynamics that have different effects on organisational performance. Further, the proposed U-shaped relationship can have different slopes in the manufacturing and services industries. The paper contributes to the field of diversity by strengthening its weak theoretical foundations and by highlighting the industry differences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In Strong v Woolworth Ltd (t/as Big W) (2012) 285 ALR 420 the appellant was injured when she fell at a shopping centre outside the respondent’s premises. The appellant was disabled, having had her right leg amputated above the knee and therefore walked with crutches. One of the crutches came into contact with a hot potato chip which was on the floor, causing the crutch to slip and the appellant to fall. The appellant sued in negligence, alleging that the respondent was in breach of its duty of care by failing to institute and maintain a cleaning system to detect spillages and foreign objects within its sidewalk sales area. The issue before the High Court was whether it could be established on the balance of probabilities as to when the hot chip had fallen onto the ground so as to prove causation in fact...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by ma¬licious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual pro¬perties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infra¬structure based on sporadic security audits. Instead net¬works should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT in¬frastructure. Namely, we define an extensible frame¬work which uses public vulnerability databases to identify pro¬bable multi-step attacks in an IT infrastructure, and pro¬vide recommendations in the form of patching strategies, topology changes, and configuration updates.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The strategies of price discrimination engaged in by a number of international publishers, coupled with a lack of competition and restrictions on the ability of consumers to engage in arbitrage, is likely to undermine the legitimacy of copyright law in Australia. By increasing prices beyond a reasonable and fair level, these strategies also undermine the goal of copyright law to enhance access to cultural goods. Enhancing access – and therefore lowering prices – is crucial to enhancing Australia's innovative capacity and the ability of Australians to experience, learn, act, and grow through cultural works. We recommend that the committee investigates the following options: 1. Repeal parallel importation restrictions; 2. Fundamentally reconsider the operation of anti-circumvention law in the context of digital distribution models; 3. Prohibit and render unenforceable contractual restrictions on parallel importation; 4. Introduce a right of digital resale in Australia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This dissertation seeks to define and classify potential forms of Nonlinear structure and explore the possibilities they afford for the creation of new musical works. It provides the first comprehensive framework for the discussion of Nonlinear structure in musical works and provides a detailed overview of the rise of nonlinearity in music during the 20th century. Nonlinear events are shown to emerge through significant parametrical discontinuity at the boundaries between regions of relatively strong internal cohesion. The dissertation situates Nonlinear structures in relation to linear structures and unstructured sonic phenomena and provides a means of evaluating Nonlinearity in a musical structure through the consideration of the degree to which the structure is integrated, contingent, compressible and determinate as a whole. It is proposed that Nonlinearity can be classified as a three dimensional space described by three continuums: the temporal continuum, encompassing sequential and multilinear forms of organization, the narrative continuum encompassing processual, game structure and developmental narrative forms and the referential continuum encompassing stylistic allusion, adaptation and quotation. The use of spectrograms of recorded musical works is proposed as a means of evaluating Nonlinearity in a musical work through the visual representation of parametrical divergence in pitch, duration, timbre and dynamic over time. Spectral and structural analysis of repertoire works is undertaken as part of an exploration of musical nonlinearity and the compositional and performative features that characterize it. The contribution of cultural, ideological, scientific and technological shifts to the emergence of Nonlinearity in music is discussed and a range of compositional factors that contributed to the emergence of musical Nonlinearity is examined. The evolution of notational innovations from the mobile score to the screen score is plotted and a novel framework for the discussion of these forms of musical transmission is proposed. A computer coordinated performative model is discussed, in which a computer synchronises screening of notational information, provides temporal coordination of the performers through click-tracks or similar methods and synchronises the audio processing and synthesized elements of the work. It is proposed that such a model constitutes a highly effective means of realizing complex Nonlinear structures. A creative folio comprising 29 original works that explore nonlinearity is presented, discussed and categorised utilising the proposed classifications. Spectrograms of these works are employed where appropriate to illustrate the instantiation of parametrically divergent substructures and examples of structural openness through multiple versioning.