What is Authorial Philology?

What is Authorial Philology?

Author: Paola Italia

Publisher: Open Book Publishers

Published: 2021-03-01

Total Pages: 137

ISBN-13: 1800640269

DOWNLOAD EBOOK

A stark departure from traditional philology, What is Authorial Philology? is the first comprehensive treatment of authorial philology as a discipline in its own right. It provides readers with an excellent introduction to the theory and practice of editing ‘authorial texts’ alongside an exploration of authorial philology in its cultural and conceptual architecture. The originality and distinction of this work lies in its clear systematization of a discipline whose autonomous status has only recently been recognised (at least in Italy), though its roots may extend back as far as Giorgio Pasquali. This pioneering volume offers both a methodical set of instructions on how to read critical editions, and a wide range of practical examples, expanding upon the conceptual and methodological apparatus laid out in the first two chapters. By presenting a thorough account of the historical and theoretical framework through which authorial philology developed, Paola Italia and Giulia Raboni successfully reconceptualize the authorial text as an ever-changing organism, subject to alteration and modification. What is Authorial Philology? will be of great didactic value to students and researchers alike, providing readers with a fuller understanding of the rationale behind different editing practices, and addressing both traditional and newer methods such as the use of the digital medium and its implications. Spanning the whole Italian tradition from Petrarch to Carlo Emilio Gadda, this ground-breaking volume provokes us to consider important questions concerning a text’s dynamism, the extent to which an author is ‘agentive’, and, most crucially, about the very nature of what we read.


Introduction to the New Mainframe

Introduction to the New Mainframe

Author: Mike Ebbers

Publisher: IBM.Com/Redbooks

Published: 2006

Total Pages: 0

ISBN-13: 9780738495972

DOWNLOAD EBOOK

This IBM Redbook provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to have successfully completed an introductory course in computer system concepts, such as computer organization and architecture, operating systems, data management, or data communications. They should also have successfully completed courses in one or more programming languages, and be PC literate. This textbook can also be used as a prerequisite for courses in advanced topics or for internships and special studies. It is not intended to be a complete text covering all aspects of mainframe operation, nor is it a reference book that discusses every feature and option of the mainframe facilities. Others who will benefit from this course include experienced data processing professionals who have worked with non-mainframe platforms, or who are familiar with some aspects of the mainframe but want to become knowledgeable with other facilities and benefits of the mainframe environment. As we go through this course, we suggest that the instructor alternate between text, lecture, discussions, and hands-on exercises. Many of the exercises are cumulative, and are designed to show the student how to design and implement the topic presented. The instructor-led discussions and hands-on exercises are an integral part of the course material, and can include topics not covered in this textbook. This book is also offered with a textbook cover instead of a redbook cover in PDF and hardcopy formats. Download PDF of book with textbook cover (6.0MB) Order hardcopy of book with textbook cover Note: The contents of the book are identical in both the textbook and redbook versions except for the covers.


Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Author: Axel Buecker

Publisher: IBM Redbooks

Published: 2015-11-02

Total Pages: 200

ISBN-13: 0738441023

DOWNLOAD EBOOK

This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.


Scaling BPM Adoption: From Project to Program with IBM Business Process Manager

Scaling BPM Adoption: From Project to Program with IBM Business Process Manager

Author: Lisa Dyer

Publisher: IBM Redbooks

Published: 2012-10-04

Total Pages: 268

ISBN-13: 073843681X

DOWNLOAD EBOOK

Your first Business Process Management (BPM) project is a crucial first step on your BPM journey. It is important to begin this journey with a philosophy of change that allows you to avoid common pitfalls that lead to failed BPM projects, and ultimately, poor BPM adoption. This IBM® Redbooks® publication describes the methodology and best practices that lead to a successful project and how to use that success to scale to enterprise-wide BPM adoption. This updated edition contains a new chapter on planning a BPM project. The intended audience for this book includes all people who participate in the discovery, planning, delivery, deployment, and continuous improvement activities for a business process. These roles include process owners, process participants, subject matter experts (SMEs) from the operational business, and technologists responsible for delivery, including BPM analysts, BPM solution architects, BPM administrators, and BPM developers.


Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security

Author: Axel Buecker

Publisher: IBM Redbooks

Published: 2014-02-06

Total Pages: 240

ISBN-13: 0738437891

DOWNLOAD EBOOK

Security is a major consideration in the way that business and information technology systems are designed, built, operated, and managed. The need to be able to integrate security into those systems and the discussions with business functions and operations exists more than ever. This IBM® Redbooks® publication explores concerns that characterize security requirements of, and threats to, business and information technology (IT) systems. This book identifies many business drivers that illustrate these concerns, including managing risk and cost, and compliance to business policies and external regulations. This book shows how these drivers can be translated into capabilities and security needs that can be represented in frameworks, such as the IBM Security Blueprint, to better enable enterprise security. To help organizations with their security challenges, IBM created a bridge to address the communication gap between the business and technical perspectives of security to enable simplification of thought and process. The IBM Security Framework can help you translate the business view, and the IBM Security Blueprint describes the technology landscape view. Together, they can help bring together the experiences that we gained from working with many clients to build a comprehensive view of security capabilities and needs. This book is intended to be a valuable resource for business leaders, security officers, and consultants who want to understand and implement enterprise security by considering a set of core security capabilities and services.