69 resultados para Hacking


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Learning is most effective when intrinsically motivated through personal interest, and situated in a supportive socio-cultural context. This paper reports on findings from a study that explored implications for design of interactive learning environments through 18 months of ethnographic observations of people’s interactions at “Hack The Evening” (HTE). HTE is a meetup group initiated at the State Library of Queensland in Brisbane, Australia, and dedicated to provide visitors with opportunities for connected learning in relation to hacking, making and do-it-yourself technology. The results provide insights into factors that contributed to HTE as a social, interactive and participatory environment for learning – knowledge is created and co-created through uncoordinated interactions among participants that come from a diversity of backgrounds, skills and areas of expertise. The insights also reveal challenges and barriers that the HTE group faced in regards to connected learning. Four dimensions of design opportunities are presented to overcome those challenges and barriers towards improving connected learning in library buildings and other free-choice learning environments that seek to embody a more interactive and participatory culture among their users. The insights are relevant for librarians as well as designers, managers and decision makers of other interactive and free-choice learning environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It could be argued that architecture has an inherent social responsibility to enrich the urban and spatial environments for the city’s occupants. However how we define quality, and how ‘places’ can be designed to be fair and equitable, catering for individuals on a humanistic and psychological level, is often not clearly addressed. Lefebvre discusses the idea of the ‘right to the city’; the belief that public space design should facilitate freedom of expression and incite a sense of spatial ownership for its occupants in public/commercial precincts. Lefebvre also points out the importance of sensory experience in the urban environment. “Street-scape theatrics” are performative activities that summarise these two concepts, advocating the ‘right to the city’ by way of art as well as providing sensual engagement for city users. Literature discusses the importance of Street-scape Theatrics however few sources attempt to discuss this topic in terms of how to design these spaces/places to enhance the city on both a sensory and political level. This research, grounded in political theory, investigates the case of street music, in particular busking, in the city of Brisbane, Australia. Street culture is a notion that already exists in Brisbane, but it is heavily controlled especially in central locations. The study discusses how sensory experience of the urban environment in Brisbane can be enriched through the design for busking; multiple case studies, interviews, observations and thematic mappings provide data to gather an understanding of how street performers see and understand the built form. Results are sometime surprisingly incongruous with general assumptions in regards to street artist as well as the established political and ideological framework, supporting the idea that the best and most effective way of urban hacking is working within the system. Ultimately, it was found that the Central Business District in Brisbane, Australia, could adopt certain political and design tactics which attempt to reconcile systematic quality control with freedom of expression into the public/commercial sphere, realism upheld. This can bridge the gap between the micro scale of the body and the macro of the political economy through freedom of expression, thus celebrating the idiosyncratic nature of the city.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Com o crescente aumento de utilizadores e da importância no quotidiano de uma grande parte da população mundial, a Internet disponibiliza hoje às empresas, um conjunto de oportunidades que devidamente aproveitadas, se poderão traduzir na captação de novos clientes e no aumento da notoriedade da marca. Tem-se assistido nos últimos anos a um crescimento considerável do investimento das empresas em Marketing Digital, fazendo uso das mais variadas ferramentas que potenciam e aumentam a sua presença online. Decorrente do aumento de competividade no meio digital, têm surgido diversos casos de startups que desenvolveram e aplicaram técnicas e acções de marketing digital inovadoras, que se traduziram num crescimento exponencial do seu número de clientes/utilizadores. Desta forma, o presente trabalho tem como principais objetivos identificar o conceito de Growth Hacking, principais tácticas e ferramentas utilizadas, e avaliar qual impacto que o mesmo poderá ter para o sucesso de uma organização no meio online. Recorrendo ao estudo de dois casos de sucesso é feita uma análise das estratégias adotadas pelas empresas Uber e Dropbox e apresentadas as principais caraterísticas que as diferenciam e que permitiram o seu sucesso no meio digital.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The following project introduces a model of Growth Hacking strategies for business-tobusiness Software-as-a-Service startups that was developed in collaboration with and applied to a Portuguese startup called Liquid. The work addresses digital marketing channels such as content marketing, email marketing, social marketing and selling. Further, the company’s product, pricing strategy, partnerships and website communication are examined. Applying best case practices, competitor benchmarks and interview insights from numerous industry influencers and experts, areas for improvement are deduced and procedures for each of those channels recommended.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This share has a web resource on hacking. The web resource provides a tutorial on hacking and then an interactive quiz to test the user's knowledge.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: The objective of routine outpatient assessment of well functioning patients after primary total hip arthroplasty (THA) is to detect asymptomatic failure of prostheses to guide recommendations for early intervention. We have observed that the revision of THAs in asymptomatic patients is highly uncommon. We therefore question the need for routine follow-up of patients after THA. Methods: A prospective analysis of an orthopaedic database identified 158 patients who received 177 revision THAs over a 4 year period. A retrospective chart review was conducted. Patient demographics, primary and revision surgery parameters and follow-up information was recorded and cross referenced with AOA NJRR data. Results: 110 THAs in 104 patients (average age 70.4 (SD 9.8 years). There were 70 (63.6%) total, 13 (11.8%) femoral and 27 (24.5%) acetabular revisions. The indications for revision were aseptic loosening (70%), dislocation (8.2%), peri-prosthetic fracture (7.3%), osteolysis (6.4%) and infection (4.5%). Only 4 (3.6%) were asymptomatic revisions. A mean of 5.3 (SD 5.2 and 1.9 (SD 5.3 follow-up appointments were required before revision in patients with and without symptoms, respectively. The average time from the primary to revision surgery was 11.8 (SD 7.23) years. Conclusions: We conclude that patients with prostheses with excellent long term clinical results as validated by Joint Registries, routine follow-up of asymptomatic THA should be questioned and requires further investigation. Based on the work of this study, the current practice of routine follow-up of asymptomatic THA may be excessively costly and unnecessary and a less resource-intensive review method may be more appropriate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Consumer personal information is now a valuable commodity for most corporations. Concomitant with increased value is the expansion of new legal obligations to protect personal information. Mandatory data breach notification laws are an important new development in this regard. Such laws require a corporation that has suffered a data breach, which involves personal information, such as a computer hacking incident, to notify those persons who may have been affected by the breach. Regulators may also need to be notified. Australia currently does not have a mandatory data breach notification law but this may be about to change. The Australian Law Reform Commission has suggested that a data breach notification scheme be implemented through the Privacy Act 1988 (Cth). However, the notification of data breaches may already be required under the continuous disclosure regime stipulated by the Corporations Act 2001 (Cth) and the Australian Stock Exchange (ASX) Listing Rules. Accordingly, this article examines whether the notification of data breaches is a statutory requirement of the existing continuous disclosure regime and whether the ASX should therefore be notified of such incidents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is a review of Brisbane artist Christopher Howlett's 2009 exhibitions at Metro Arts and the Brisbane Town Hall. The review discusses the artist's use of 'modding' and other digital hacking strategies to explore the ethical dimensions of topics including Michael Jackson and the war in Iraq.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper will compare and evaluate the effectiveness of commercial media lobbying and advocacy against public service media in two countries, the United Kingdom and Australia. The paper will focus empirically on the commercial media coverage of public service media issues in these countries (relating to the BBC and ABC respectively) over the period since the election of the Conservative-led Coalition in Britain in June 2010, and the election of the Gillard government in Australia in August 2010. Reference will be made to preceding periods as relevant to an understanding of the current environment. In both countries the main commercial media rival to public service media is News Corp and its associated organisations – News Ltd and Sky News in Australia, and News International and BSkyB in the UK. The paper will examine with analysis of print and online news and commentary content how News Corp outlets have reported and commented on the activities and plans of public service media as the latter have developed and extended their presence on digital TV and online platforms. It will also consider the responses of the ABC and BBC to these interventions. It will consider, thirdly, the responses of Australian and British governments to these debates, and the policy outcomes. This section of the paper will seek to evaluate the trajectory of the policy-public-private dynamic in recent years, and to draw conclusions as to the future direction of policy. Particular attention will be devoted to recent key moments in this unfolding dialogue. In Britain, debates around the efforts of News Corp to take over 100% of BSkyB, both before and after the breaking of the phone-hacking scandal in July 2011; in Australia, the debate around the National Broadband Network and the competitive tender process for ABC World, that country’s public service transnational broadcaster; and other key moments where rivalry between News Corp companies and public service media became mainstream news stories provoking wider public debate. The paper will conclude with recommendations as to how public service media organisations might engage constructively with commercial organisations in the future, including News Corp, and taking into account emerging technological and financial challenges to traditional rationales for public service provision.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent events, notions of political protest, civil disobedience, extremism, and criminal action have become increasingly blurred. The London Riots, the Occupy movement, and the actions of hacking group Anonymous have all sparked heated debate about the limits of legitimate protest, and the distinction between an acceptable action and a criminal offence. Long before these events, environmental activists were challenging convention in protest actions, with several groups engaging in politically motivated law-breaking. The emergence of the term ‘eco-tage’ (the sabotage of equipment in order to protect the environment) signifies the important place environmental activists hold in challenging the traditional boundaries between illegal action and legitimate protest. Many of these groups establish their own boundaries of legitimacy, with some justifying their actions on the basis of civil disobedience or extensional self-defence. This paper examines the statements of environmental activist organisations that have engaged in politically motivated law breaking. It identifies the parameters that these groups set on their illegal actions, as well as the justifications that they provide, with a view to determining where these actions fit in the vast grey area between legal protest and violent extremism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Cybercrime consists of any criminal action or behaviour that is committed through the use of Information Technology. Common examples of such activities include cyber hacking, identity theft, cracking, spamming, social engineering, data tampering, online fraud, programming attacks, etc. The pervasive use of the internet clearly indicates that the impacts of cybercrime is far reaching and any one, may it be a person or an entity can be a victim of cybercriminal activities. Recently in the US, eight members of a global cybercrime ring were charged in one of the biggest ever bank heists. The cybercrime gang allegedly stole US$45 million by hacking into credit card processing firms and withdrawing money from ATMs in 27 countries (Jessica et al. 2013). An extreme example, the above case highlights how IT is changing the way crimes are being committed. No longer do criminals use masks, guns and get-a-way cars, criminals are able to commit crimes in the comfort of their homes, millions of miles from the scene of the crime and can access significant sums of money that can financially cripple organisations. The world is taking notice of this growing threat and organisations in the Pacific must also be proactive in tackling this emerging issue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the 1980s the concept of risk has produced a large and diverse volume of sociological research. Ulrich Beck’s groundbreaking risk society thesis provides a particularly engaging contribution, since it seems that nearly every sociological account of risk engages with this work. For Beck, we are living in second modernity – a new epoch that breaks with pre-modernity and industrial society due to the centrality, incalculability and reflexivity of globalised risk. While Beck’s theory is compelling, a reading of other theorists such as Foucault (2007[1978]) and Hacking (1975,1990) suggests that a difficulty with Beck’s work is that in attempting to explain what is novel about risk in contemporary times, he too quickly passes over the complexities and ruptures of historical change that impact on the history and contingency of risk. This paper begins by presenting a brief analysis of the present state of risk by introducing Beck’s historical narrative of risk from pre-modernity to the risk society; it then outlines the challenges with the “risk as epoch” argument by considering a range of literature, which suggests risk has a more complex history than proposed by Beck; and finally it highlights the value in examining strategies of statecraft in early modern Europe, specifically Machiavelli’s The Prince (2008[1513]) and Giovanni Botero’s political treatise, Della Ragion di Stato (1956[1589]) – as a means of more thoroughly understanding how our current concept of risk emerges. In doing so, this paper seeks to open up new trajectories in the historicisation of risk for other interested scholars.