• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 4
  • 4
  • 1
  • 1
  • Tagged with
  • 17
  • 17
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

"Mentors' perception of the effectiveness of the Big Brother Big Sister mentor training programme"

Jano, Rubina January 2008 (has links)
Magister Psychologiae - MPsych / Mentoring has gained a great deal of popularity across various professional fields and disciplines over the past few years. More recently, planned mentoring has become an important form of intervention with young people (Philip, 2003). Although mentoring can be an effective strategy for dealing with youth, the mentoring is only as good as the relationship that develops out of the process between mentors and mentees and the match that is made between the two parties. The number of mentor programmes that is running continues to grow yet the quality of these programmes remains unknown as this area lacks agreed upon sets of standards and / bench marks that could be used to determine the effectiveness of these programmes (Sipe, 1988 -1995). The primary aim of this study is to evaluate the mentors' perceptions of the effectiveness of a mentor training programme run by Big Brother Big Sister South Africa. / South Africa
12

Driftövervakning av Windows och Linux/Unix Servrar

Falk, Mikael, Fernandez Karlsson, Matias January 2008 (has links)
Ju fler servrar, med olika konfigurationer och olika system, som blir medlemmar i ett nätverk, desto svårare och osmidigare blir det att övervaka nätverksmiljön. Men om man använder sig av ett övervakningssystem, som tar emot information från flera servrar, blir det lättare att få en överblick om hur allt fungerar och samtidigt som det går snabbare att få information om felmeddelanden, som man sedan kan åtgärda. I detta dokument tar vi upp olika typer av övervakningssystem som finns ute på marknaden idag, våren 2008. Bland dessa hittar vi t.ex. SCOM 2007, BigBrother, Nagios och Mon. Vi har inte begränsat oss till ett specifikt operativsystem, utan vi tar upp övervakningssystem som passar till Windows och/eller Linux/Unix. Utifrån den information vi hittat om varje övervakningssystem och de kriterier som Valderas Consulting AB vill att systemen ska uppfylla, har vi valt ut tre stycken övervakningssystem som vi tycker passar bäst. Dessa system har vi sen, ett och ett, testat i ett litet nätverk där vi utsätter det för en del scenarior som kan hända ute på företag som t.ex. trasig anslutning, för full hårddisk och kraschat operativsystem. De tre övervakningssystem vi tyckte höjde sig över mängden var SCOM 2007, Big Brother 4 och Nagios. Efter att ha testat vart och ett av dessa tre tycker vi att Nagios är det klart bästa. Det är användarvänligt i installationen, konfigurationen samt i övervakningen. En annan stor fördel med Nagios är att det är gratis, dvs. open source. Om ens datormiljö enbart innehåller Windows-datorer och en domän, passar SCOM 2007 bäst, då Nagios måste installeras på en Linux/Unix-dator. Big Brother 4 var bra det med, men faller bort pga. att det inte är gratis, färre testmöjligheter på nätverket och fungerade inte helt bra med att övervaka Linux/Unixdatorer. / The more servers you install in your network, which utilize different types of configurations and operative systems, the harder it gets to monitor the entire network. But if you use a monitoring system to monitor the network it will get much simpler. The monitoring system gathers information from all of your hosts and servers on your network and warns you if something is wrong or not working properly. In this document we will describe many of the monitoring systems that are out on the market today, spring 2008. Among these monitoring systems are: SCOM, BigBrother, Nagios, and Mon. We have not focused on a single operating system, but rather we have gathered information about monitoring systems that can be installed on Windows and/or Linux/Unix environments. From the information, which we have gathered about each monitoring system, and the criteria that Valderas Consulting AB gave us, we have focused on three monitoring systems that seem to be the best. We have installed these systems, one at a time, on a server that’s part of a small network, and run several tests, such as failure to the network and an operating system crash, to see how each system handles these failures in a real life environment. We thought that SCOM 2007, Big Brother 4, and Nagios were the best amongst the systems we looked at. After testing each one of them, we think that Nagios is the best. It is userfriendly regarding installation, configuration, and monitoring. One big advantage with Nagios is that it is free of charge, open source. If you have a computer-environment that contain computers with Windows, and you only have one domain, then SCOM 2007 is the system for you to choose, because Nagios only works if it is installed on a computer with Linux/Unix. Big Brother 4 was also ok, but it had some issues. It is not free of charge, and it did not have as many tests, to run on the network-units, as Nagios. We also had some problem, with Big Brother 4, regarding monitoring computers with Linux/Unix.
13

Meeting my favorite memes : un face à face avec moi-mème

Djankou Ngamaleu, André 09 1900 (has links)
Mémoire en recherche-création / Il y a quelques années, j’ai presque gagné 100 000 $ dans une émission de télé-réalité appelée Big Brother Canada. Je rêvais fièrement à ma victoire quand j'ai été rapidement ramenée à la réalité en étant évincée de la maison par les quatre autres concurrent.es. restant.es. Quelques semaines après la fin de l'émission, déçue et quelque peu déstabilisée, j'ai découvert que plusieurs images de moi circulaient de façon virale en ligne. En fait, j'étais devenue un mème ! Fascinée par cette nouvelle forme de langage que les mèmes semblent avoir créé sur mes réseaux sociaux au fil des ans, l'expérience de devenir un mème a suscité une grande envie de savoir ce que d'autres personnes ayant une expérience similaire à la mienne ressentent. Ma curiosité a inspiré cette recherche exploratoire dans laquelle je cherche à mieux comprendre ma mise en mème (ou mémification) à travers l’expérience vécue d'autres mèmes. Présenté sous la forme d'une création audiovisuelle accompagnée d’un script réfléchi, et soutenu par le concept de « face » de Goffman, ainsi que par les théories sur la « visibilité » de Voirol et Jauréguiberry, ce travail explore la face cachée des mèmes, le rapport entre individu-face-mème et les effets de devenir-mème. / I once came close to winning a 100 000$ on a reality TV show called Big Brother Canada. I could almost taste the jackpot when I suddenly got evicted from the house by the four remaining houseguests. Few weeks after the show was over, disappointed, and overwhelmed, I discovered that multiple images of me went viral on social media. In fact, I had become a meme! Already fascinated by this new form of language that memes seem to have created on my social media over the years, the experience of becoming a meme ignited a thirst to know how other individuals with a similar experience to mine felt. My curiosity led to this exploratory research where I seek to better understand my transformation into a meme (or memefication) through the lenses of other memes. Presented in the form of an audio-visual creation accompanied by a commented script and supported by Goffman’s concept of “face” as well as Voirol and Jauréguiberry theories about “visibility”, this work digs into the hidden faces behind memes, the connection between individual-face-meme and the effects of becoming meme.
14

Mentoring and its Effect on the Life Chances and Experiences of Children in Group Homes

Young, Laquana M. 02 April 2009 (has links)
Mentoring relationships can be defined as an interaction between a less experienced individual, called a mentee or protégé, and a more experienced individual known as a mentor. The relationship that the mentee and the mentor establish is one that provides influential and emotional support. Research suggests that mentoring relationships have a positive effect on children in group homes. Although children in group homes may not have strong support from their biological families or kin, they often count on the undivided support from their counselors. For this study, group home stakeholders (director, counselors and children) were supportive of developing a formal mentoring program as part of the group home experience. / Master of Science
15

Ett originalverk och två lättlästa versioner, vad skiljer de tre åt? : Narratologiska närläsningar av George Orwells 1984 / An original work and two easy-to-read versions: What distinguishes the three? : Narratological close readings of George Orwell’s 1984

Thalén, Patrik January 2021 (has links)
This thesis explores a novel’s potential transformations when adapted into the easy-reader format. In early 2021, two distinct easy-reader adaptations of George Orwell’s 1984 were published, accompanied by a new translation of the original full-length version. This analysis primarily seeks to study whether the theme of surveillance undergoes alteration in the easy- reader adaptations, potentially becoming stricter or facilitating a more nuanced interpretation. A notable difference in length among the three versions was observed; when compared as audiobooks at a consistent speed (words per minute), their durations are as follows: the original text: 10 hours and 7 minutes, adapted text 1 by Book Publisher Hedvig: 2 hours and 9 minutes, and adapted text 2 by Vilja Publisher: 33 minutes. Employing comparative close reading and drawing on narratological theory, this study is inspired by the distinctions between round and flat characters, as discussed by E.M. Forster, Maria Nikolajeva, and Mieke Bal. Regarding the theme of surveillance, the thesis concludes that the adaptations do not exhibit as drastic changes as one might anticipate. Analysis of the characters’ transformations in response to surveillance reveals that their portrayal becomes harsher and more rugged in the easy-reader versions compared to the original text. Nevertheless, the shortest adapted text maintains the closest resemblance to the original.
16

Janela indiscreta: a simulação do mundo vivido no audiovisual

Rocha, Debora Cristine 20 May 2009 (has links)
Made available in DSpace on 2016-04-26T18:17:55Z (GMT). No. of bitstreams: 1 Debora Cristine Rocha.pdf: 10899162 bytes, checksum: f83817ee08fe3147d639f3ee751803e7 (MD5) Previous issue date: 2009-05-20 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / The research aims to explore the modelization of verisimilitude among communication systems from the semiotic point of view. Becoming more and more frequent, this form of modelization leads to a text construction which puts emphasis on the the referent blending fiction and reality. Based on such perspective, this work seeks to map the strategies and language resources present on the translation process of such referent, more specifically audiovisual production, taking as study cases television and documentary film. On this work, the lived world is perceived as a natural world, which the signs represent and the midiatic world is also seen as the universe created by such representation. Hypothetically, it is admitted that such modelization simulates, on screen, the lived world through the semiosis of elements from the ethnographic method. In order to accomplish such task, the elements from the ethnographic method, when translated into the communication systems, abandon their ethnographic condition, becoming marks of veracity on the audiovisual text. That is to say, ethnography is modelized by audiovisual communication systems. Another accepted hypothesis is that the modelization of verisimilitude will constitute into the simulation, intending to erase representation marks from public eyes, generating therefore a platform of credibility for these communication systems. The simulation will utilize the phenomena called rear window, that is to say, the public desire to know about the private life of others, as a midiatic voyerism, simultaneously, their willingness to reveal their own lives to others. In this context, one of the strategies and resources put in use by the simulation will be the utilization of life histories of anonymous people. The research corpus will analyse the television aspect, taking as starting point the telenovela Páginas da Vida (TV Globo, 2006-2007), the reality show BBB8 Big Broter Brasil 8 (TV Globo, 2008), as well as the condition of the documentary film, taking examples such as Edifício Master (Eduardo Coutinho, 2002) and Ônibus 174 (José Padilha & Felipe Lacerda, 2002). The analysis is fundamented on the Tartu-Moscow school of the semiotics of culture and Jean Baudrillard thoughts, responsible for the major dialogued concepts reflected on this work: modelization and simulation. It also includes contributions from Bauman, Bateson, Jackobson, Luhman, Certeau, Geertz, Clifford and McLuhan / A pesquisa visa explorar a modelização da verossimilhança em sistemas de comunicação do ponto de vista semiótico. Cada vez mais frequente, essa forma de modelização se volta para a construção de textos que enfatizam o referente e fundem ficção e realidade. Nessa perspectiva, o trabalho procura mapear as estratégias e os recursos de linguagem presentes no processo de tradução daquele referente, em específico no audiovisual, com estudos de caso sobre a televisão e o filme documentário. No trabalho, compreende-se o mundo vivido como o mundo natural que os signos representam e considera-se, também, o mundo midiático como o universo criado pela representação. Como hipótese, admite-se que tal modelização simula, na tela, o mundo vivido pela semiose de elementos do método etnográfico. Para tanto, os elementos do método etnográfico, quando traduzidos para os sistemas de comunicação, deixam a sua condição etnográfica e transformam-se em marcas de veracidade do texto audiovisual. Ou seja, a etnografia é modelizada pelos sistemas de comunicação audiovisuais. Admite-se como hipótese, ainda, que a modelização da verossimilhança construirá a simulação, que pretende apagar as marcas da representação aos olhos do público, de modo a gerar uma plataforma de credibilidade para os sistemas de comunicação. A simulação utiliza o fenômeno janela indiscreta, isto é, o desejo do público de conhecer a vida privada do outro como voyeurismo midiático e, simultaneamente, a sua vontade de revelar a própria vida a terceiros. Nesse contexto, uma das estratégias e um dos recursos utilizados pela simulação será o uso de histórias de vida de pessoas anônimas. O corpus de pesquisa analisa o caso da televisão, com a telenovela Páginas da Vida (TV Globo, 2006-2007) e o reality show BBB8 Big Brother Brasil 8 (TV Globo, 2008), assim como a condição do filme documentário, com Edifício Master (Eduardo Coutinho, 2002) e Ônibus 174 (José Padilha e Felipe Lacerda, 2002). A análise está fundamentada no pensamento da Escola de Tártu- Moscou de semiótica da cultura e Jean Baudrillard, responsáveis pelos conceitos principais que dialogam no trabalho: modelização e simulação. Mas também inclui as contribuições de Bauman, Bateson, Jakobson, Luhman, Certeau, Geertz, Clifford e McLuhan
17

Arcabouço teórico para discussões sobre o panorama multifacetado da privacidade na era digital

Friedman, Sandra de Castro 30 August 2013 (has links)
Submitted by Luiz Felipe Barbosa (luiz.fbabreu2@ufpe.br) on 2015-03-12T15:12:38Z No. of bitstreams: 2 Dissertaçao Sandra Friedman.pdf: 3093791 bytes, checksum: a8717835d5925a6a173e5d53ca7694bb (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Approved for entry into archive by Daniella Sodre (daniella.sodre@ufpe.br) on 2015-03-13T12:59:12Z (GMT) No. of bitstreams: 2 Dissertaçao Sandra Friedman.pdf: 3093791 bytes, checksum: a8717835d5925a6a173e5d53ca7694bb (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Made available in DSpace on 2015-03-13T12:59:12Z (GMT). No. of bitstreams: 2 Dissertaçao Sandra Friedman.pdf: 3093791 bytes, checksum: a8717835d5925a6a173e5d53ca7694bb (MD5) license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) Previous issue date: 2013-08-30 / Ameaças como vazamento de dados, roubo de identidade, vigilância, criação de perfis e dossiês, bem como as políticas de privacidade mutantes das redes sociais estão frequentemente relacionadas com danos à reputação e perda da privacidade. Este estudo faz uma explanação geral da legislação no contexto internacional e um exame crítico em artigos, documentos e pesquisas de opinião, analisando as questões de privacidade da informação – e as definições de privacidade como um todo – investigando as diferentes facetas da privacidade e como a tecnologia nos desafia a realinhar nossas expectativas de privacidade. Trabalhamos com a hipótese de que o cuidado com a proteção à privacidade de dados pessoais tende a figurar entre as qualidades buscadas por usuários de aplicativos de software, e, portanto, deverá se constituir em elemento fundamental de vantagem competitiva no mercado de aplicativos. Nossa hipótese foi suportada pela descoberta de estratégias e uma miríade de soluções de software para a proteção da privacidade nas fases de coleta, armazenamento, processamento e disseminação de informações. A privacidade está em necessidade urgente de preservação e as estratégias regulatórias vigentes parecem não estar à altura da tarefa. As empresas, que levam em conta a privacidade como um valor inerente aos projetos e desenvolvimento de seus produtos e tecnologias, estimulam o espírito de inovação e destacam-se no mercado, construindo um relacionamento de confiança com seus clientes e usuários. Espera-se trazer conhecimento científico a estudantes e profissionais comprometidos com a ética, com os valores de liberdade e autonomia e interessados no tema privacidade da informação.

Page generated in 0.0641 seconds