867 resultados para Productive chain of digital medias
Resumo:
This report presents the project outcomes for digital presentation of historical artefacts from the region of Plovdiv, related to the Balkan War (1912-1913). The selected collections include digitized periodicals, postcards, photographs, museum objects and paintings by Bulgarian artists. Problems related to the digitization, creation, storage and visualization of digital objects from the funds of these cultural institutions are also discussed. The content of this digital library is expected to be completed with other collections at cultural institutions in Plovdiv. The idea is as a next step to integrate the project with the other digital libraries. The project website „Digital library of collections from cultural institutions in Plovdiv” is also presented here - http://plovdivartefacts.com/ (Figure 1).
Resumo:
Pahayokolides A-D are cytotoxic cyclic polypeptides produced by the freshwater cyanobacterium Lyngbya sp. strain 15-2 that possess an unusual β-amino acid, 3-amino-2,5,7,8-tetrahydroxy-10-methylundecanoic acid (Athmu). The absolute configuration of pahayokolides A-D was determined using advanced Marfey’s method. It was also confirmed that a pendant N-acetyl- N-methyl leucine moiety in pahayokolide A was absent in pahayokolides B and pahayokolides C-D were conformers of pahayokolide A. Feeding experiments indicated that the biosynthesis of the Athmu sidechain arises from leucine or α-ketoisovalerate, however could not be further extended by three rounds of condensation with malonate units. Putative four peptide and one unique polyketide synthetases in Lyngbya sp. strain 15-2 were identified by using a PCR method and degenerate primers derived from conserved core sequences of known NRPSs and PKSs. Identification of one unique KS domain conflicted with the logic rule that the long side chain of Athmu was assembled by three rounds of ketide extensions if PKSs were involved. A gene cluster (pah) encoding a peptide synthetase putatively producing pahayokolide was cloned, partially sequenced and characterized. Seven modules of the non-ribosomal peptide synthetase (NRPS) were identified. Ten additional opening reading frames (ORFs) were found, responsible for peptide resistance, transport and degradation. Although the predicted substrate specificities of NRPS agreed with the structure of pahayokolide A partially, the disagreement could be explained. However, no PKS gene was found in the pah gene cluster.
Resumo:
This research examines how assasa-passisa and its surrounding concepts are discussed in Buddhaghossa's 5th century Theravada work, the Visuddhimagga (The Path of Purification) to determine if there is metaphysical use of the term in the text and to determine if the concept of assasa-passasa is similar to the better-known Indian concept of prana (metaphysical vital animating force), indicating whether Theravada Buddhism more closely resembles other Indian religions in terms of metaphysical content. Text analysis reveals how assasa-passasa is described in the Visuddhimagga as an animating vital force, suggesting that Theravada Buddhism has an implicit ontology similar to other Indian schools of philosophy. Secondarily, this paper argues that because assisa-passasa plays a similar role to prana in the Visuddhimagga, it is also operationally similar and could be functioning as the implicit intermediary between links in the chain of dependent co-arising-as the vehicle of paticcasamuppada.
Resumo:
Pahayokolides A-D are cytotoxic cyclic polypeptides produced by the freshwater cyanobacterium Lyngbya sp. strain 15-2 that possess an unusual β-amino acid, 3-amino-2,5,7,8-tetrahydroxy-10-methylundecanoic acid (Athmu). The absolute configuration of pahayokolides A-D was determined using advanced Marfey’s method. It was also confirmed that a pendant N-acetyl-N-methyl leucine moiety in pahayokolide A was absent in pahayokolides B and pahayokolides C-D were conformers of pahayokolide A. Feeding experiments indicated that the biosynthesis of the Athmu sidechain arises from leucine or α-ketoisovalerate, however could not be further extended by three rounds of condensation with malonate units. Putative four peptide and one unique polyketide synthetases in Lyngbya sp. strain 15-2 were identified by using a PCR method and degenerate primers derived from conserved core sequences of known NRPSs and PKSs. Identification of one unique KS domain conflicted with the logic rule that the long side chain of Athmu was assembled by three rounds of ketide extensions if PKSs were involved. A gene cluster (pah) encoding a peptide synthetase putatively producing pahayokolide was cloned, partially sequenced and characterized. Seven modules of the non-ribosomal peptide synthetase (NRPS) were identified. Ten additional opening reading frames (ORFs) were found, responsible for peptide resistance, transport and degradation. Although the predicted substrate specificities of NRPS agreed with the structure of pahayokolide A partially, the disagreement could be explained. However, no PKS gene was found in the pah gene cluster.
Resumo:
Social contingency is the ability to connect social stimuli, such as those behaviors performed by oneself and those performed by others. Detecting social contingencies occurs by means of reciprocity through shared experiences with others. Reciprocity denotes a circumstance in which two individuals participate in a collaborative exchange, and is distinguished from an event in which two individuals engage in separate, unrelated activities. Specifically, reciprocity incorporates joint attention (JA), which occurs when two individuals simultaneously and visually attend to the same item. JA is facilitated by gazing and pointing, whereby one individual initiates the action and the second individual follows suit by, for example, gaze-following. However, little is known about the role the mother may play in the development of JA. The purpose of our study was to investigate social contingency between mothers and infants engaging in dyadic interactions. Thirty-three 12-month-old typically developing infants (M = 12.2, SD = .19; N = 19 males) were filmed for 10 minutes during free play with their mothers and toys provided by an experimenter. Reciprocity was measured by coding mother-infant interactions when a precise chain of events occurred: (1) mother initiated a bid by introducing a toy/activity or request to the infant, (2) infant accepted the bid/request by engaging in play with the given toy/activity, and (3) mother persisted by continuing to engage in play with said toy/activity. We computed a Pearson Correlation to assess the relation between the mothers’ initiations of JA and their infants’ responses to JA. We found a moderately positive correlation between the two variables (r= 0.37, p<.05). Our findings suggest that reciprocity, an important component of social relationships, during parent-infant dyads may serve as a scaffold for joint attention abilities, which have been linked to social and language development.
Resumo:
In this study I examine the development of three inclusive music bands in Cork city. Derived from Jellison’s research on inclusive music education, inclusive music bands involve students with disabilities coming together with typically developing peers to make and learn music that is meaningful (Jellison, 2012). As part of this study, I established three inclusive music bands to address the lack of inclusive music making and learning experiences in Cork city. Each of these bands evolved and adapted in order to be socio-culturally relevant within formal and informal settings: Circles (community education band), Till 4 (secondary school band) and Mish Mash (third level and community band). I integrated Digital Musical Instruments into the three bands, in order to ensure access to music making and learning for band members with profound physical disabilities. Digital Musical Instruments are electronic music devices that facilitate active music making with minimal movement. This is the first study in Ireland to examine the experiences of inclusive music making and learning using Digital Musical Instruments. I propose that the integration of Digital Musical Instruments into inclusive music bands has the potential to further the equality and social justice agenda in music education in Ireland. In this study, I employed qualitative research methodology, incorporating participatory action research methodology and case study design. In this thesis I reveal the experiences of being involved in an inclusive music band in Cork city. I particularly focus on examining whether the use of this technology enhances meaningful music making and learning experiences for members with disabilities within inclusive environments. To both inform and understand the person centered and adaptable nature of these inclusive bands, I draw theoretical insights from Sen’s Capabilities Approach and Deleuze and Guatarri’s Rhizome Theory. Supported by descriptive narrative from research participants and an indepth examination of literature, I discover the optimum conditions and associated challenges of inclusive music practice in Cork city.
Resumo:
Two concepts in rural economic development policy have been the focus of much research and policy action: the identification and support of clusters or networks of firms and the availability and adoption by rural businesses of Information and Communication Technologies (ICT). From a theoretical viewpoint these policies are based on two contrasting models, with clustering seen as a process of economic agglomeration, and ICT-mediated communication as a means of facilitating economic dispersion. The study’s conceptual framework is based on four interrelated elements: location, interaction, knowledge, and advantage, together with the concept of networks which is employed as an operationally and theoretically unifying concept. The research questions are developed in four successive categories: Policy, Theory, Networks, and Method. The questions are approached using a study of two contrasting groups of rural small businesses in West Cork, Ireland: (a) Speciality Foods, and (b) firms in Digital Products and Services. The study combines Social Network Analysis (SNA) with Qualitative Thematic Analysis, using data collected from semi-structured interviews with 58 owners or managers of these businesses. Data comprise relational network data on the firms’ connections to suppliers, customers, allies and competitors, together with linked qualitative data on how the firms established connections, and how tacit and codified knowledge was sourced and utilised. The research finds that the key characteristics identified in the cluster literature are evident in the sample of Speciality Food businesses, in relation to flows of tacit knowledge, social embedding, and the development of forms of social capital. In particular the research identified the presence of two distinct forms of collective social capital in this network, termed “community” and “reputation”. By contrast the sample of Digital Products and Services businesses does not have the form of a cluster, but matches more closely to dispersive models, or “chain” structures. Much of the economic and social structure of this set of firms is best explained in terms of “project organisation”, and by the operation of an individual rather than collective form of “reputation”. The rural setting in which these firms are located has resulted in their being service-centric, and consequently they rely on ICT-mediated communication in order to exchange tacit knowledge “at a distance”. It is this factor, rather than inputs of codified knowledge, that most strongly influences their operation and their need for availability and adoption of high quality communication technologies. Thus the findings have applicability in relation to theory in Economic Geography and to policy and practice in Rural Development. In addition the research contributes to methodological questions in SNA, and to methodological questions about the combination or mixing of quantitative and qualitative methods.
Resumo:
This paper focuses on the ties between social and digital inequalities among Argentinean youth. It uses a qualitative approach to explore different aspects of the everyday lives of adolescents, such as sociability, leisure time and family use of Information and Communication Technologies (ICTs), in order to assess the impact of the Connecting Equality Program (Programa Conectar Igualdad, PCI) on reducing digital inequalities and fostering social inclusion. What were the existing conditions of access for students and their families when the PCI was first implemented? What influence does the implementation of the PCI have on the individual, family and scholastic appropriation of ICTs? How does the use of computers and the Internet vary among youth? Has this large-scale incorporation of netbooks in schools, and especially homes and free time changed it in any way? Does the appropriation of ICTs through student participation in the PCI contribute to material and symbolic social inclusion? In order to answer these questions, we compare the processes of ICT appropriation among lower and middle class adolescents, focusing on the distinctive uses and meanings assigned to computers and the Internet by boys and girls in their daily lives. For this purpose we analyze data collected through semi-structured interviews in two schools in Greater La Plata, Argentina during 2012. The main findings show that in terms of access, skills and types of use, the implementation of the PCI has had a positive impact among lower class youth, guaranteeing access to their first computers and promoting the sharing of knowledge and digital skills with family members. Moreover, evidence of more diverse and intense use of ICTs among lower class students reveals the development of digital skills related to educational activities. Finally, in terms of sociability, having a personal netbook enables access to information and cultural goods which are very significant in generating ties and strengthening identities and social integration
Resumo:
This paper focuses on the ties between social and digital inequalities among Argentinean youth. It uses a qualitative approach to explore different aspects of the everyday lives of adolescents, such as sociability, leisure time and family use of Information and Communication Technologies (ICTs), in order to assess the impact of the Connecting Equality Program (Programa Conectar Igualdad, PCI) on reducing digital inequalities and fostering social inclusion. What were the existing conditions of access for students and their families when the PCI was first implemented? What influence does the implementation of the PCI have on the individual, family and scholastic appropriation of ICTs? How does the use of computers and the Internet vary among youth? Has this large-scale incorporation of netbooks in schools, and especially homes and free time changed it in any way? Does the appropriation of ICTs through student participation in the PCI contribute to material and symbolic social inclusion? In order to answer these questions, we compare the processes of ICT appropriation among lower and middle class adolescents, focusing on the distinctive uses and meanings assigned to computers and the Internet by boys and girls in their daily lives. For this purpose we analyze data collected through semi-structured interviews in two schools in Greater La Plata, Argentina during 2012. The main findings show that in terms of access, skills and types of use, the implementation of the PCI has had a positive impact among lower class youth, guaranteeing access to their first computers and promoting the sharing of knowledge and digital skills with family members. Moreover, evidence of more diverse and intense use of ICTs among lower class students reveals the development of digital skills related to educational activities. Finally, in terms of sociability, having a personal netbook enables access to information and cultural goods which are very significant in generating ties and strengthening identities and social integration
Resumo:
This paper focuses on the ties between social and digital inequalities among Argentinean youth. It uses a qualitative approach to explore different aspects of the everyday lives of adolescents, such as sociability, leisure time and family use of Information and Communication Technologies (ICTs), in order to assess the impact of the Connecting Equality Program (Programa Conectar Igualdad, PCI) on reducing digital inequalities and fostering social inclusion. What were the existing conditions of access for students and their families when the PCI was first implemented? What influence does the implementation of the PCI have on the individual, family and scholastic appropriation of ICTs? How does the use of computers and the Internet vary among youth? Has this large-scale incorporation of netbooks in schools, and especially homes and free time changed it in any way? Does the appropriation of ICTs through student participation in the PCI contribute to material and symbolic social inclusion? In order to answer these questions, we compare the processes of ICT appropriation among lower and middle class adolescents, focusing on the distinctive uses and meanings assigned to computers and the Internet by boys and girls in their daily lives. For this purpose we analyze data collected through semi-structured interviews in two schools in Greater La Plata, Argentina during 2012. The main findings show that in terms of access, skills and types of use, the implementation of the PCI has had a positive impact among lower class youth, guaranteeing access to their first computers and promoting the sharing of knowledge and digital skills with family members. Moreover, evidence of more diverse and intense use of ICTs among lower class students reveals the development of digital skills related to educational activities. Finally, in terms of sociability, having a personal netbook enables access to information and cultural goods which are very significant in generating ties and strengthening identities and social integration
Resumo:
This article analyses security discourses that are beginning to self-consciously take on board the shift towards the Anthropocene. Firstly, it sets out the developing episteme of the Anthropocene, highlighting the limits of instrumentalist cause-and-effect approaches to security, increasingly becoming displaced by discursive framings of securing as a process, generated through new forms of mediation and agency, capable of grasping inter-relations in a fluid context. This approach is the methodology of hacking: creatively composing and repurposing already existing forms of agency. It elaborates on hacking as a set of experimental practices and imaginaries of securing the Anthropocene, using as a case study the field of digital policy activism with the focus on community empowerment through social-technical assemblages being developed and applied in ‘the City of the Anthropocene’: Jakarta, Indonesia. The article concludes that policy interventions today cannot readily be grasped in modernist frameworks of ‘problem solving’ but should be seen more in terms of evolving and adaptive ‘life hacks’.
Resumo:
It is just over 20 years since Adobe's PostScript opened a new era in digital documents. PostScript allows most details of rendering to be hidden within the imaging device itself, while providing a rich set of primitives enabling document engineers to think of final-form rendering as being just a sophisticated exercise in computer graphics. The refinement of the PostScript model into PDF has been amazingly successful in creating a near-universal interchange format for complex and graphically rich digital documents but the PDF format itself is neither easy to create nor to amend. In the meantime a whole new world of digital documents has sprung up centred around XML-based technologies. The most widespread example is XHTML (with optional CSS styling) but more recently we have seen Scalable Vector Graphics (SVG) emerge as an XML-based, low-level, rendering language with PostScript-compatible rendering semantics. This paper surveys graphically-rich final-form rendering technologies and asks how flexible they can be in allowing adjustments to be made to final appearance without the need for regenerating a whole page or an entire document. Particular attention is focused on the relative merits of SVG and PDF in this regard and on the desirability, in any document layout language, of being able to manipulate the graphic properties of document components parametrically, and at a level of granularity smaller than an entire page.
Resumo:
Digitalization has been widely adopted by private organizations of all sizes. As customers we are starting to expect a certain level of digital services from businesses and these expectations are evolving to consider the public sector services as well. Moreover, the Finnish municipalities are under pressure to cut costs and make their operation more efficient. This research aims in exploring the field of municipal digitalization in Finland with three main questions to answer: what are the motivations for municipalities for digital service transformation, what the main benefits of this transformation are and what are the challenges for the transformation. The research starts with examining the characteristics of municipal operation and reviewing some of the relevant digital service opportunities. In the empirical part of the research, 11 professionals related to the municipal field were interviewed using a semi-structured interview design. These interviewees were chosen from three important groups for the change: the service provider, municipal administration and municipal employees. The data gained from the interviews was first summarized according to the main topics chosen from the literature and then reflected on the digital services opportunities presented in the research. The motivations discovered in both the service provider and the city of Porvoo interviews were: tightening resources combined with increasing expectations, transparent structuring of information, supporting the shift into mobile and providing new channels for customers to participate. The benefits discovered in all groups were: efficiency, customer experience, transparent structuring of information, reducing manual input and responding to customer needs in service development. The challenges perceived by multiple groups were: change resistance, innovating new with no best practices and defining the scope and new operation model. The results of this research suggest that even with some challenges along the way, digitalization is a likely future for the Finnish public sector. The business case for the transformation is becoming increasingly evident on both municipal- and governmental levels.
Resumo:
This thesis examines digital technologies policies designed for Australian schools and the ways they are understood and interpreted by students, school staff, teachers, principals and policy writers. This study explores the ways these research participant groups interpret and understand the ‘ethical dimension’ of schools’ digital technologies policies for teaching and learning. In this thesis the ethical dimension is considered to be a dynamic concept which encompasses various elements including; decisions, actions, values, issues, debates, education, discourses, and notions of right and wrong, in relation to ethics and uses of digital technologies in schools. In this study policy is taken to mean not only written texts but discursive processes, policy documents including national declarations, strategic plans and ‘acceptable use’ policies to guide the use of digital technologies in schools. The research is situated in the context of changes that have occurred in Australia and internationally over the last decade that have seen a greater focus on the access to and use of digital technologies in schools. In Australian school education, the attention placed on digital technologies in schools has seen the release of policies at the national, state, territory, education office and school levels, to guide their use. Prominent among these policies has been the Digital Education Revolution policy, launched in 2007 and concluded in 2013. This research aims to answers the question: What does an investigation reveal about understandings of the ethical dimension of digital technologies policies and their implementation in school education? The objective of this research is to examine the ethical dimension of digital technologies policies and to interpret and understand the responses of the research participants to the issues, silences, discourses and language, which characterise this dimension. In doing so, it is intended that the research can allow the participants to have a voice that, may be different to the official discourses located in digital technologies policies. The thesis takes a critical and interpretative approach to policies and examines the role of digital technologies policies as discourse. Interpretative theory is utilised as it provides a conceptual lens from which to interpret different perspectives and the implications of these in the construction of meaning in relation to schools’ digital technologies policies. Critical theory is used in tandem with interpretative theory as it represents a conceptual basis from which to critique and question underlying assumptions and discourses that are associated with the ethical dimension of schools’ digital technologies policies. The research methods used are semi-structured interviews and policy document analysis. Policies from the national, state, territory, education office and school level were analysed and contribute to understanding the way the ethical dimension of digital technologies policies is represented as a discourse. Students, school staff, teachers, principals and policy writers participated in research interviews and their views and perspectives were canvassed in relation to the ethical use of digital technologies and the policies that are designed to regulate their use. The thesis presents an argument that the ethical dimension of schools’ digital technologies policies and use is an under-researched area, and there are gaps in understanding and knowledge in the literature which remain to be addressed. It is envisaged that the thesis can make a meaningful contribution to understand the ways in which schools’ digital technologies policies are understood in school contexts. It is also envisaged that the findings from the research can inform policy development by analysing the voices and views of those in schools. The findings of the policy analysis revealed that there is little attention given to the ethical dimension in digital technologies at the national level. A discourse of compliance and control pervades digital technologies policies from the state, education office and school levels, which reduces ethical considerations to technical, legal and regulatory requirements. The discourse is largely instrumentalist and neglects the educative dimension of digital technologies which has the capacity to engender their ethical use. The findings from the interview conversations revealed that students, school staff and teachers perceive digital technologies policies to be difficult to understand, and not relevant to their situation and needs. They also expressed a desire to have greater consultation and participation in the formation and enactment of digital technologies policies, and they believe they are marginalised from these processes in their schools. Arising from the analysis of the policies and interview conversations, an argument is presented that in the light of the prominent role played by digital technologies and their potential for enhancing all aspects of school education, more research is required to provide a more holistic and richer understanding of the policies that are constructed to control and mediate their use.
Resumo:
The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the factors that make organizations vulnerable. Since humans are considered the weakest link in the cybersecurity chain of an organization, this study evaluates users’ individual differences (demographic factors, risk-taking preferences, decision-making styles and personality traits) to understand online security behavior. This thesis studies four different yet tightly related online security behaviors that influence organizational cybersecurity: device securement, password generation, proactive awareness and updating. A survey (N=369) of students, faculty and staff in a large mid-Atlantic U.S. public university identifies individual characteristics that relate to online security behavior and characterizes the higher-risk individuals that pose threats to the university’s cybersecurity. Based on these findings and insights from interviews with phishing victims, the study concludes with recommendations to help similat organizations increase end-user cybersecurity compliance and mitigate the risks caused by humans in the organizational cybersecurity chain.