945 resultados para The Thing


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Amongst the opportunities for cross-cultural contact created by the burgeoning use of the Internet are those provided by electronic discussion lists. This study looks at what happens when language students venture out of the classroom (virtual or otherwise) to participate in on-line discussion groups with native speakers. Responses to messages and commentary by moderators and other participants on the (in) appropriateness of contributions allow us to determine what constitutes successful participation and to make suggestions regarding effective teaching strategies for this medium. A case study examines the threads started by four anglophone students of French when they post messages to a forum on the Web site of the French newspaper Le Monde. Investigation of these examples points to the ways in which electronic discussion inflects and is inflected by cultural and generic expectations. We suggest that successful participation on Internet fora depends on awareness of such cultural and generic mores and an ability to work within and/or with them. Teachers therefore need to find ways in which students can be sensitized to such issues so that their participation in such electronic discussion is no longer seen as linguistic training, but as engagement with a cultural practice.

Relevância:

40.00% 40.00%

Publicador:

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article explores the history of the archaeological category Sámi circular offering sites, which refers to certain dry wall structures in Finnmark and Troms in northern Norway. In recent years the term has been used more frequently outside this geographical area too, at times to refer to structures vastly different from those originally labelled as circular offering sites. Such interpretations may be questioned, but perhaps it is the category itself that needs to be re-evaluated; a study ofthe research history suggests that the term is a result of a mid-19th century hypothesis that was established due to a lack of other plausible explanations rather than based on indicative finds or on local traditions. This interpretation has later been adopted by key researchers and has never really been challenged by any alternative hypothesis. This article proposes that the stone structures in question could represent other cultural phenomena, and that this needs further investigation.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Since their introduction in 2005, thousands of same-sex couples in the UK have had a civil partnership. However, many other couples have chosen not to have one. This qualitative study explores why some same-sex couples are choosing not to have a civil partnership. Seven semi-structured interviews were conducted with 12 people (five couples and two individuals) who identified as lesbian, gay or bisexual, and analysed using discourse analysis. Participants' accounts were characterised by ambivalence about civil partnership, and three main paradoxes were identified: the 'good but not good enough' paradox, the 'unwanted prize' paradox and the 'legal rights v. social oppression paradox. A major source of ambivalence was support for rights but resistance to assimilation into dominant heteronormative cultural frameworks. Participants negotiated this ambivalence in a variety of ways, including considering how to have a civil partnership that is different from 'marriage', and adopting a pragmatic position. The analysis highlights the importance of social recognition and support for a range of relationship forms and identities, as well as for an ongoing critical debate about civil partnerships and same-sex marriage. © The Author(s) 2011.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Anaphylaxis is a serious, rare condition increasing in prevalence. This study explored the psychological experience of adult-onset anaphylaxis from patient, family and staff perspectives. Semi-structured interviews were conducted with twelve participants. Two global themes emerged from thematic analysis: ‘controllability’ (‘an unknown and distressing experience’, ‘the importance of control over triggers’ and ‘responsibility but no control: the impact on others’) and ‘conflict’ (‘rejecting illness identity’, ‘minimisation of risk’, ‘accessing specialist care: running in slow motion’ and ‘patient-centred versus service-centred care’). Findings highlight the importance of perceived control and emphasise the presence of conflict in the experience of this complex, episodic condition.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Recent technological advancements have played a key role in seamlessly integrating cloud, edge, and Internet of Things (IoT) technologies, giving rise to the Cloud-to-Thing Continuum paradigm. This cloud model connects many heterogeneous resources that generate a large amount of data and collaborate to deliver next-generation services. While it has the potential to reshape several application domains, the number of connected entities remarkably broadens the security attack surface. One of the main problems is the lack of security measures to adapt to the dynamic and evolving conditions of the Cloud-To-Thing Continuum. To address this challenge, this dissertation proposes novel adaptable security mechanisms. Adaptable security is the capability of security controls, systems, and protocols to dynamically adjust to changing conditions and scenarios. However, since the design and development of novel security mechanisms can be explored from different perspectives and levels, we place our attention on threat modeling and access control. The contributions of the thesis can be summarized as follows. First, we introduce a model-based methodology that secures the design of edge and cyber-physical systems. This solution identifies threats, security controls, and moving target defense techniques based on system features. Then, we focus on access control management. Since access control policies are subject to modifications, we evaluate how they can be efficiently shared among distributed areas, highlighting the effectiveness of distributed ledger technologies. Furthermore, we propose a risk-based authorization middleware, adjusting permissions based on real-time data, and a federated learning framework that enhances trustworthiness by weighting each client's contributions according to the quality of their partial models. Finally, since authorization revocation is another critical concern, we present an efficient revocation scheme for verifiable credentials in IoT networks, featuring decentralization, demanding minimum storage and computing capabilities. All the mechanisms have been evaluated in different conditions, proving their adaptability to the Cloud-to-Thing Continuum landscape.