Submit Search
Upload
The computer as text processor
•
0 likes
•
220 views
G
gracefulgrace
Follow
Technology
Report
Share
Report
Share
1 of 22
Recommended
File types pro forma
File types pro forma
Ross Hardman
Representing sound
Representing sound
wardjo
Higher Computing Science Bitmapped Graphics
SD & D Bitmapped Graphics
SD & D Bitmapped Graphics
Forrester High School
How Computers Represent Graphics
How Computers Represent Graphics
Forrester High School
Representation of Bitmapped Graphics
Representation of Bitmapped Graphics
Representation of Bitmapped Graphics
Forrester High School
Lecture 4 text
Lecture 4 text
Mr SMAK
IMPACT OF COMPOSING MEDIUM ON THE QUALITY AND QUANTITY OF WRITING
IMPACT OF COMPOSING MEDIUM ON THE QUALITY AND QUANTITY OF WRITING
IMPACT OF COMPOSING MEDIUM ON THE QUALITY AND QUANTITY OF WRITING
Kimberly Jones
Human Centred Design Institute (HCDI) semianr series 2012-13
When users think about design - Nathan Crilly - HCDI seminar 19 March 2013
When users think about design - Nathan Crilly - HCDI seminar 19 March 2013
Marco Ajovalasit
Recommended
File types pro forma
File types pro forma
Ross Hardman
Representing sound
Representing sound
wardjo
Higher Computing Science Bitmapped Graphics
SD & D Bitmapped Graphics
SD & D Bitmapped Graphics
Forrester High School
How Computers Represent Graphics
How Computers Represent Graphics
Forrester High School
Representation of Bitmapped Graphics
Representation of Bitmapped Graphics
Representation of Bitmapped Graphics
Forrester High School
Lecture 4 text
Lecture 4 text
Mr SMAK
IMPACT OF COMPOSING MEDIUM ON THE QUALITY AND QUANTITY OF WRITING
IMPACT OF COMPOSING MEDIUM ON THE QUALITY AND QUANTITY OF WRITING
IMPACT OF COMPOSING MEDIUM ON THE QUALITY AND QUANTITY OF WRITING
Kimberly Jones
Human Centred Design Institute (HCDI) semianr series 2012-13
When users think about design - Nathan Crilly - HCDI seminar 19 March 2013
When users think about design - Nathan Crilly - HCDI seminar 19 March 2013
Marco Ajovalasit
Presented Friday 06 March 2020.
Understanding natural language processing
Understanding natural language processing
jbene mourad
Position paper for a workshop at ECSCW 2007 on a pattern language for creative collaboration
Position paper for ecscw 2007 workshop
Position paper for ecscw 2007 workshop
John Thomas
A mock presentation to community leaders for an ideal learning space.
Learning Space Presentation
Learning Space Presentation
Kathleen L. Gordon
INTERACT 2007 talk on how to design for social creativity.
Meta design and social creativity
Meta design and social creativity
John Thomas
Beekman5 std ppt_05
Beekman5 std ppt_05
Department of Education - Philippines
Interactive Workshop by Mirjam Hauck and Regine Hample presented at the Eurocall CMC SIG Workshop in Leon Spain. Computer-mediated exchanges in language learning:what can be researched and how can we go about it?
Cmc Sig Leon Workshop Mh Rh 200409
Cmc Sig Leon Workshop Mh Rh 200409
lamericaana
One of the strengths of DITA architecture is the separation of presentation from content. When focusing on the content model, it is easy to forget about how it looks to the end user. Together with Chris Patterson, an information developer with Creative and Technical Communications at Xerox, we discuss factors affecting the usability of technical publications and how research, experience, and DITA structure influence format decisions.
Format Matters - How presentation affects understanding
Format Matters - How presentation affects understanding
Mike Rice
Plenary presented by Dr. Cheryl E. Ball at the Thomas R. Watson conference on Rhetoric and Composition, October 2008.
Functionality, Materiality, Commodification
Functionality, Materiality, Commodification
Cheryl Ball
Simple Program for Enhancing Quality in Discussion Boards
Simple Program for Enhancing Quality in Discussion Boards
Rafael Hernandez
Presentation to the Lone Star chapter of STC in March 2002.
Designing for People: Communicating Effectively with Interaction
Designing for People: Communicating Effectively with Interaction
Andrea L. Ames
We start by setting up a common ground introducing why relational databases fall short, addressing common EDA characteristics such as the need for real-time response times and schemaless approaches to address recurring changes to adapt and on-board new use cases. Next, interact with a sample Rust-based application: a social network app demonstrating an integration of both ScyllaDB and Redpanda.
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
ScyllaDB
Here comes another enlightening document that dives into the thrilling world of breaking BitLocker, Windows' attempt at full disk encryption. This analysis will walk you through the myriad of creative hacks, from the classic cold boot attacks—because who doesn't love freezing their computer to steal some data—to exploiting those oh-so-reliable TPM chips that might as well have a "hack me" sign on them. We'll also cover some software vulnerabilities, because Microsoft just wouldn't be the same without a few of those sprinkled in for good measure. And let's not forget about intercepting those elusive decryption keys; it's like a digital treasure hunt! So, whether you're a security expert, a forensic analyst, or just a curious cat in the world of cybersecurity, enjoy the read, and maybe keep that data backed up somewhere safe, yeah? ------- This document provides a comprehensive analysis of the method demonstrated in the video "Breaking Bitlocker - Bypassing the Windows Disk Encryption" where the author showcases a low-cost hardware attack capable of bypassing BitLocker encryption. The analysis will cover various aspects of the attack, including the technical approach, the use of a Trusted Platform Module (TPM) chip, and the implications for security practices. The analysis provides a high-quality summary of the demonstrated attack, ensuring that security professionals and specialists from different fields can understand the potential risks and necessary countermeasures. The document is particularly useful for cybersecurity experts, IT professionals, and organizations that rely on BitLocker for data protection and to highlight the need for ongoing security assessments and the potential for similar vulnerabilities in other encryption systems.
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
In the digital age, accessing information has become increasingly convenient, and this holds true for checking CNIC (Computerized National Identity Card) information online.
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
danishmna97
Discover how to avoid common pitfalls when shifting to an event-driven architecture (EDA) in order to boost system recovery and scalability. We cover Kafka Schema Registry, in-broker transformations, event sourcing, and more.
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
ScyllaDB
Artificial Intelligence is referred to as machine intelligence, and it is rooted in binary codes and mathematical algorithms. It is a testament to human creativity and is capable of massive data processing, pattern recognition, and even self-learning. However, the realm of AI realm is confined.
AI mind or machine power point presentation
AI mind or machine power point presentation
yogeshlabana357357
Slides for my "WebRTC-to-SIP and back: it's not all about audio and video" presentation at the OpenSIPS Summit 2024. They describe my prototype efforts to add gatewaying support for a few SIP application protocols (T.140 for real-time text and MSRP) to Janus via data channels, with the related implementation challenges and the interesting opportunities they open.
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
Lorenzo Miniero
"The Ultimate Prompt Engineering Guide for Generative AI" provides a comprehensive guide to leveraging the power of AI assistants through effective prompt design. It explores fundamental prompt concepts and details strategies for crafting prompts that maximize output quality. Readers learn about iterative refinement, examples, constraints, and advanced techniques like chaining and decomposition. Case studies demonstrate real-world applications in content creation, coding, analysis, and more. Trends in multimodal, automated, and responsible prompting are also examined. This book is a must-read for anyone seeking to optimize generative AI capabilities.
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
SOFTTECHHUB
Discover the top CodeIgniter development companies that can elevate your project to new heights. Our blog explores the best firms known for their expertise in CodeIgniter framework development. From robust web applications to scalable solutions, these companies deliver excellence. Whether you're a startup or an enterprise, find the perfect match for your development needs on Top CSS Gallery's blog.
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
TopCSSGallery
In the ever-evolving landscape of data management, Zero-ETL is an approach that is reshaping how businesses handle and integrate their data. This webinar explores Zero-ETL, a paradigm shift from the traditional Extract, Transform, Load (ETL) process, offering a more streamlined, efficient, and real-time data integration method. We will begin with an introduction to the concept of Zero-ETL, including how it allows direct access to data in its native environment and real-time data transformation, providing up-to-date information with significantly reduced data redundancy. Next, we'll take you through several demonstrations showing how Zero-ETL can deliver real-time data and enable the free movement of data between systems. We will also discuss the various tools that support all aspects of Zero-ETL, providing attendees with an understanding of how they can adopt this innovative approach in their organizations. Lastly, the session will conclude with an interactive Q&A segment, allowing participants to gain deeper insights into how Zero-ETL can be tailored to their specific business needs and how they can get started today. Join us to discover how Zero-ETL can elevate your organization's data strategy.
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
Safe Software
RailsConf 2024 - Insights Gained From Developing A Hybrid Application Using Turbo-Native and Strada.
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard37
This Slide deck talk about how FHIR is being used in Ayushman Bharat Digital Mission (ABDM). It introduces the readers to ABDM and also to FHIR Documents paradigm. This is part of FHIR India community Basics learning initiative.
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Kumar Satyam
Generative AI refers to a class of machine learning algorithms that are designed to generate new data samples that are similar to those in the training data. Unlike traditional AI models that are trained to recognize patterns and make predictions, generative AI models have the ability to create entirely new data based on the patterns they have learned. This is achieved through techniques such as generative adversarial networks (GANs), variational autoencoders (VAEs), and transformer architectures, among others.
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
alexjohnson7307
More Related Content
Similar to The computer as text processor
Presented Friday 06 March 2020.
Understanding natural language processing
Understanding natural language processing
jbene mourad
Position paper for a workshop at ECSCW 2007 on a pattern language for creative collaboration
Position paper for ecscw 2007 workshop
Position paper for ecscw 2007 workshop
John Thomas
A mock presentation to community leaders for an ideal learning space.
Learning Space Presentation
Learning Space Presentation
Kathleen L. Gordon
INTERACT 2007 talk on how to design for social creativity.
Meta design and social creativity
Meta design and social creativity
John Thomas
Beekman5 std ppt_05
Beekman5 std ppt_05
Department of Education - Philippines
Interactive Workshop by Mirjam Hauck and Regine Hample presented at the Eurocall CMC SIG Workshop in Leon Spain. Computer-mediated exchanges in language learning:what can be researched and how can we go about it?
Cmc Sig Leon Workshop Mh Rh 200409
Cmc Sig Leon Workshop Mh Rh 200409
lamericaana
One of the strengths of DITA architecture is the separation of presentation from content. When focusing on the content model, it is easy to forget about how it looks to the end user. Together with Chris Patterson, an information developer with Creative and Technical Communications at Xerox, we discuss factors affecting the usability of technical publications and how research, experience, and DITA structure influence format decisions.
Format Matters - How presentation affects understanding
Format Matters - How presentation affects understanding
Mike Rice
Plenary presented by Dr. Cheryl E. Ball at the Thomas R. Watson conference on Rhetoric and Composition, October 2008.
Functionality, Materiality, Commodification
Functionality, Materiality, Commodification
Cheryl Ball
Simple Program for Enhancing Quality in Discussion Boards
Simple Program for Enhancing Quality in Discussion Boards
Rafael Hernandez
Presentation to the Lone Star chapter of STC in March 2002.
Designing for People: Communicating Effectively with Interaction
Designing for People: Communicating Effectively with Interaction
Andrea L. Ames
Similar to The computer as text processor
(10)
Understanding natural language processing
Understanding natural language processing
Position paper for ecscw 2007 workshop
Position paper for ecscw 2007 workshop
Learning Space Presentation
Learning Space Presentation
Meta design and social creativity
Meta design and social creativity
Beekman5 std ppt_05
Beekman5 std ppt_05
Cmc Sig Leon Workshop Mh Rh 200409
Cmc Sig Leon Workshop Mh Rh 200409
Format Matters - How presentation affects understanding
Format Matters - How presentation affects understanding
Functionality, Materiality, Commodification
Functionality, Materiality, Commodification
Simple Program for Enhancing Quality in Discussion Boards
Simple Program for Enhancing Quality in Discussion Boards
Designing for People: Communicating Effectively with Interaction
Designing for People: Communicating Effectively with Interaction
Recently uploaded
We start by setting up a common ground introducing why relational databases fall short, addressing common EDA characteristics such as the need for real-time response times and schemaless approaches to address recurring changes to adapt and on-board new use cases. Next, interact with a sample Rust-based application: a social network app demonstrating an integration of both ScyllaDB and Redpanda.
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
ScyllaDB
Here comes another enlightening document that dives into the thrilling world of breaking BitLocker, Windows' attempt at full disk encryption. This analysis will walk you through the myriad of creative hacks, from the classic cold boot attacks—because who doesn't love freezing their computer to steal some data—to exploiting those oh-so-reliable TPM chips that might as well have a "hack me" sign on them. We'll also cover some software vulnerabilities, because Microsoft just wouldn't be the same without a few of those sprinkled in for good measure. And let's not forget about intercepting those elusive decryption keys; it's like a digital treasure hunt! So, whether you're a security expert, a forensic analyst, or just a curious cat in the world of cybersecurity, enjoy the read, and maybe keep that data backed up somewhere safe, yeah? ------- This document provides a comprehensive analysis of the method demonstrated in the video "Breaking Bitlocker - Bypassing the Windows Disk Encryption" where the author showcases a low-cost hardware attack capable of bypassing BitLocker encryption. The analysis will cover various aspects of the attack, including the technical approach, the use of a Trusted Platform Module (TPM) chip, and the implications for security practices. The analysis provides a high-quality summary of the demonstrated attack, ensuring that security professionals and specialists from different fields can understand the potential risks and necessary countermeasures. The document is particularly useful for cybersecurity experts, IT professionals, and organizations that rely on BitLocker for data protection and to highlight the need for ongoing security assessments and the potential for similar vulnerabilities in other encryption systems.
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
In the digital age, accessing information has become increasingly convenient, and this holds true for checking CNIC (Computerized National Identity Card) information online.
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
danishmna97
Discover how to avoid common pitfalls when shifting to an event-driven architecture (EDA) in order to boost system recovery and scalability. We cover Kafka Schema Registry, in-broker transformations, event sourcing, and more.
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
ScyllaDB
Artificial Intelligence is referred to as machine intelligence, and it is rooted in binary codes and mathematical algorithms. It is a testament to human creativity and is capable of massive data processing, pattern recognition, and even self-learning. However, the realm of AI realm is confined.
AI mind or machine power point presentation
AI mind or machine power point presentation
yogeshlabana357357
Slides for my "WebRTC-to-SIP and back: it's not all about audio and video" presentation at the OpenSIPS Summit 2024. They describe my prototype efforts to add gatewaying support for a few SIP application protocols (T.140 for real-time text and MSRP) to Janus via data channels, with the related implementation challenges and the interesting opportunities they open.
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
Lorenzo Miniero
"The Ultimate Prompt Engineering Guide for Generative AI" provides a comprehensive guide to leveraging the power of AI assistants through effective prompt design. It explores fundamental prompt concepts and details strategies for crafting prompts that maximize output quality. Readers learn about iterative refinement, examples, constraints, and advanced techniques like chaining and decomposition. Case studies demonstrate real-world applications in content creation, coding, analysis, and more. Trends in multimodal, automated, and responsible prompting are also examined. This book is a must-read for anyone seeking to optimize generative AI capabilities.
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
SOFTTECHHUB
Discover the top CodeIgniter development companies that can elevate your project to new heights. Our blog explores the best firms known for their expertise in CodeIgniter framework development. From robust web applications to scalable solutions, these companies deliver excellence. Whether you're a startup or an enterprise, find the perfect match for your development needs on Top CSS Gallery's blog.
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
TopCSSGallery
In the ever-evolving landscape of data management, Zero-ETL is an approach that is reshaping how businesses handle and integrate their data. This webinar explores Zero-ETL, a paradigm shift from the traditional Extract, Transform, Load (ETL) process, offering a more streamlined, efficient, and real-time data integration method. We will begin with an introduction to the concept of Zero-ETL, including how it allows direct access to data in its native environment and real-time data transformation, providing up-to-date information with significantly reduced data redundancy. Next, we'll take you through several demonstrations showing how Zero-ETL can deliver real-time data and enable the free movement of data between systems. We will also discuss the various tools that support all aspects of Zero-ETL, providing attendees with an understanding of how they can adopt this innovative approach in their organizations. Lastly, the session will conclude with an interactive Q&A segment, allowing participants to gain deeper insights into how Zero-ETL can be tailored to their specific business needs and how they can get started today. Join us to discover how Zero-ETL can elevate your organization's data strategy.
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
Safe Software
RailsConf 2024 - Insights Gained From Developing A Hybrid Application Using Turbo-Native and Strada.
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard37
This Slide deck talk about how FHIR is being used in Ayushman Bharat Digital Mission (ABDM). It introduces the readers to ABDM and also to FHIR Documents paradigm. This is part of FHIR India community Basics learning initiative.
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Kumar Satyam
Generative AI refers to a class of machine learning algorithms that are designed to generate new data samples that are similar to those in the training data. Unlike traditional AI models that are trained to recognize patterns and make predictions, generative AI models have the ability to create entirely new data based on the patterns they have learned. This is achieved through techniques such as generative adversarial networks (GANs), variational autoencoders (VAEs), and transformer architectures, among others.
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
alexjohnson7307
FIDO Seminar RSAC 2024
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
FIDO Alliance
FIDO Seminar RSAC 2024
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
FIDO Alliance
Mobile accessibility can be a very difficult space to navigate. Let's make it easier to dive right in! From common terms, breakdown of application accessibility, and building up accessibility on mobile development teams, this session will help build the foundation to ensure your mobile applications are accessible.
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
MarkSteadman7
Because observability is such a broad topic – and often something we learn on the job – it can feel like there’s too much to learn at once. But you don’t have to tackle everything and can start with the basics and build from there! Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack. No matter what tooling is in place, there are still observability fundamentals that developers should know. That’s why I’ve put together a primer on the different telemetry types, when to use them, how to understand the data journey, and what to look for in time series graphs.
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Paige Cruz
A talk given to the AIM Research Support Facility @ the Turing Institute
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
Paolo Missier
The presentation was made in “Web3 Fusion: Embracing AI and Beyond” is more than a conference; it's a journey into the heart of digital transformation. The conference a provided a platform where the future of technology meets practical application. This three-day hybrid event, set in the heart of innovation, served as a gateway to the latest trends and transformative discussions in AI, Blockchain, IoT, AR/VR, and their collective impact on the information space.
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
AnitaRaj43
GPS (Global Positioning System) is a satellite-based navigation system that allows users to determine their precise location anywhere on Earth.
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
danishmna97
Speaker : Daniela Barbosa, Executive Director of the Hyperledger Foundation 2024年5月16日開催 Hyperledger Tokyo Meetupで講演
Overview of Hyperledger Foundation
Overview of Hyperledger Foundation
Hyperleger Tokyo Meetup
Recently uploaded
(20)
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
AI mind or machine power point presentation
AI mind or machine power point presentation
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
Overview of Hyperledger Foundation
Overview of Hyperledger Foundation
The computer as text processor
1.
THE COMPUTER AS
TEXT PROCESSOR Denise E Murray
2.
3.
4.
Word processing systems
produce dramatic changes in working practices, individual responsibilities and interpersonnel relationships (Longley and Shain 1984, p.99).
5.
6.
7.
8.
9.
10.
11.
12.
Bubbleus– mindmap
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.