3,027 research outputs found

    The Soul of a News Machine: Electronic Journalism in the Twenty-First Century

    Get PDF
    As new technologies reshape elemental aspects of our nation\u27s communications system, the basic assumptions about how the system will be used to gather and distribute the news will, by necessity, need to be reexamined. Some working in journalism and communications are excited by the opportunities arising from the changing circumstances, while others fear the repercussions of setting new precedent. Whatever the perspective, it will be impossible for anyone to escape the relentless process of change. The Author begins with an intuitive vision of the landscape of electronic journalism in the twenty-first century. While the pace of change will herald an exciting age, the Author suggests it will pose profound challenges to those designing and building the news machine of the future. The Author concludes that time honored values, particularly the free press and journalistic ethics, must be utilized to insure that the inevitable technological changes befalling journalism are advantageous to all. Symposium: The Transformation of Television New

    Synfuel Production As An Economic Farm Enterprise

    Get PDF

    Towards A Paperless Choral Classroom

    Get PDF
    Our group recommended the best ways to integrate new technologies into the annual Eastern American Choral Directors Association Conference. We worked with Robert Duff, President of the EACDA, to create these recommendations based on his vision and direction for the conference. We researched video conferencing tools, live streaming methods, music cataloging, and tech booth designs for our proposal. We presented our comparisons of these different tools to be used in future Choral Director Conferences

    The Five Indicia of Virtual Property

    Get PDF
    [Excerpt] “Many Americans use “it” every day. Although it is intangible, it may be worth thousands of dollars. Because we can both control it and prevent other people from controlling it, we assume, without much thought, that we own it. Sometimes we pay someone a monthly fee to hold it for us. Sometimes, simply by using it, we increase its value. When we finish using it, we often sell it. “It” is virtual property, and it may take the form of an email address, a website, a bidding agent, a video game character, or any number of other intangible, digital commodities. If it were to be damaged or stolen, the immediate questions would be: (1) how should a court identify it; and (2) what degree of legal protection should it receive? Because no court or legislature in the United States yet has recognized virtual property interests, a combination of contract and custom currently controls the relationship between Internet users and service providers. […] The question therefore becomes, how should courts identify protectable virtual property interests? Partially due to the dramatic success of Massively Multiplayer Online Games (MMOGs)9 and the rise of secondary markets for virtual characters and treasures from those games, a recent frenzy of legal scholarship has struggled to resolve this question. This note supports the legal recognition of virtual property interests, as already convincingly justified by the legal analogy to traditional property interests set forth by Professor Joshua Fairfield, buttressed by the practical reality that virtual property has significant economic value. Building on these rationales, this note proposes five indicia, common to most forms of virtual property, which a court should use to identify legally protectable virtual property interests on the Internet. These indicia are: (1) rivalry; (2) persistence; (3) interconnectivity; (4) secondary markets; and (5) value-added-by-users. This note cautions, however, against applying this newfound definition indiscriminately against the interests of the very entities without whom the property would not exist: the businesses hosting the remotely accessed computer resources (i.e., the service providers). […] Part III of this note applies the five indicia to the well-established framework of traditional property to illustrate this balancing process. Throughout the development of the law in this area, courts must retain the freedom and flexibility to craft appropriate equitable remedies on a case-by-case basis, and special attention should be directed to the practical issues commonly faced by Internet service providers. The ultimate purpose of virtual property jurisprudence should be to strike a balance that provides legal redress to users whose legitimate virtual property interests have been violated while simultaneously reducing liability and disincentives to service providers who promote and sustain the growth of the Internet.

    Clustering by compression

    Full text link
    We present a new method for clustering based on compression. The method doesn't use subject-specific features or background knowledge, and works as follows: First, we determine a universal similarity distance, the normalized compression distance or NCD, computed from the lengths of compressed data files (singly and in pairwise concatenation). Second, we apply a hierarchical clustering method. The NCD is universal in that it is not restricted to a specific application area, and works across application area boundaries. A theoretical precursor, the normalized information distance, co-developed by one of the authors, is provably optimal but uses the non-computable notion of Kolmogorov complexity. We propose precise notions of similarity metric, normal compressor, and show that the NCD based on a normal compressor is a similarity metric that approximates universality. To extract a hierarchy of clusters from the distance matrix, we determine a dendrogram (binary tree) by a new quartet method and a fast heuristic to implement it. The method is implemented and available as public software, and is robust under choice of different compressors. To substantiate our claims of universality and robustness, we report evidence of successful application in areas as diverse as genomics, virology, languages, literature, music, handwritten digits, astronomy, and combinations of objects from completely different domains, using statistical, dictionary, and block sorting compressors. In genomics we presented new evidence for major questions in Mammalian evolution, based on whole-mitochondrial genomic analysis: the Eutherian orders and the Marsupionta hypothesis against the Theria hypothesis.Comment: LaTeX, 27 pages, 20 figure

    The Apps for Justice Project: Employing Design Thinking to Narrow the Access to Justice Gap

    Get PDF

    Factors shaping the evolution of electronic documentation systems

    Get PDF
    The main goal is to prepare the space station technical and managerial structure for likely changes in the creation, capture, transfer, and utilization of knowledge. By anticipating advances, the design of Space Station Project (SSP) information systems can be tailored to facilitate a progression of increasingly sophisticated strategies as the space station evolves. Future generations of advanced information systems will use increases in power to deliver environmentally meaningful, contextually targeted, interconnected data (knowledge). The concept of a Knowledge Base Management System is emerging when the problem is focused on how information systems can perform such a conversion of raw data. Such a system would include traditional management functions for large space databases. Added artificial intelligence features might encompass co-existing knowledge representation schemes; effective control structures for deductive, plausible, and inductive reasoning; means for knowledge acquisition, refinement, and validation; explanation facilities; and dynamic human intervention. The major areas covered include: alternative knowledge representation approaches; advanced user interface capabilities; computer-supported cooperative work; the evolution of information system hardware; standardization, compatibility, and connectivity; and organizational impacts of information intensive environments

    Integrated Formal Analysis of Timed-Triggered Ethernet

    Get PDF
    We present new results related to the verification of the Timed-Triggered Ethernet (TTE) clock synchronization protocol. This work extends previous verification of TTE based on model checking. We identify a suboptimal design choice in a compression function used in clock synchronization, and propose an improvement. We compare the original design and the improved definition using the SAL model checker

    v. 80, issue 11, February 8th, 2013

    Get PDF
    • …
    corecore