Skip to main content

Home/ IMT122 OUA Group/ Group items tagged information

Rss Feed Group items tagged

Joanne S

Eli Pariser: Beware online "filter bubbles" | Video on TED.com - 0 views

    • Joanne S
       
      Mark Zuckerberg, a journalist was asking him a question about the news feed. And the journalist was asking him, "Why is this so important?" And Zuckerberg said, "A squirrel dying in your front yard may be more relevant to your interests right now than people dying in Africa." And I want to talk about what a Web based on that idea of relevance might look like. So when I was growing up in a really rural area in Maine, the Internet meant something very different to me. It meant a connection to the world. It meant something that would connect us all together. And I was sure that it was going to be great for democracy and for our society. But there's this shift in how information is flowing online, and it's invisible. And if we don't pay attention to it, it could be a real problem. So I first noticed this in a place I spend a lot of time -- my Facebook page. I'm progressive, politically -- big surprise -- but I've always gone out of my way to meet conservatives. I like hearing what they're thinking about; I like seeing what they link to; I like learning a thing or two. And so I was surprised when I noticed one day that the conservatives had disappeared from my Facebook feed. And what it turned out was going on was that Facebook was looking at which links I clicked on, and it was noticing that, actually, I was clicking more on my liberal friends' links than on my conservative friends' links. And without consulting me about it, it had edited them out. They disappeared. So Facebook isn't the only place that's doing this kind of invisible, algorithmic editing of the Web. Google's doing it too. If I search for something, and you search for something, even right now at the very same time, we may get very different search results. Even if you're logged out, one engineer told me, there are 57 signals that Google looks at -- everything from what kind of computer you're on to what kind of browser you're using to where you're located -- that it uses to personally tailor you
Joanne S

Mobile Strategy | National Library of Australia - 0 views

  • must move towards a model with comprehensive mobile access to online services
  • mobile’ has come to encompass an ever-expanding field of devices, platforms and content
  • Smart (internet enabled) or dumb/cellular
  • ...98 more annotations...
  • Supplied (on-site device distribution) or privately owned
  • Native apps
  • Mobile websites
  • In terms of content this includes:
  • Applications (software designed for specific tasks
  • Podcasts (audio and video content
  • Other downloadable content (e.g. PDFs and ebook
  • the Library may look to harness the potential of these technologies to break away from the traditional broadcast-only website presence and move towards two-way conversations between the Library and its users, or conversations between the users themselves
  • the key objectives stated in the Information Technology Strategic Plan 2012-2015 include Online Presence and supporting “the needs of our users for easy discovery of, access to, and engagement with our services, collections and other information resources in the digital environment”
  • ensure equal access to our resources and services for all Australians.
  • facilitate equal access to Library resources for everyone.
  • Putting Library resources into the hands of users in their lounge rooms reflects a deeper understanding of the need to move beyond the desire to follow our users and instead reach out to them to “take them some place new
  • mobile will only continue to grow and overtake desktop internet usage within 2-3 years
  • building both infrastructure and a culture of engagement will pave the way to more efficiently and effectively meeting that need in the future
  • 4         Strategic goals
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Adopt an evidence-based approach to service development and delivery
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • 6         Recommended activities
  • activities provide a means to implement and ground the strategy with specific and measurable tasks
  • 6.1      Governance and infrastructure
  • The Library’s IT Strategy Group will determine priorities
  • formalising the Web Committee’s role as an advisory body
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Information Technology Division to examine ongoing resourcing of development work, administrative models, and potential for partial cost-recovery
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes. Identify
  • Investigate infrastructure and resourcing requirements for digital recording and distribution
  • Collections Management Division to keep a watching brief on any developments pertaining to the extension of Legal Deposit to include digital (and mobile) content
  • developing a statement of collecting intentions for the various categories of ebook titles within the context of revising the collecting policy for Australian electronic publications in general
  • Applications
  • Podcasts (audio and video content
  • Other downloadable content (e.g. PDFs and ebooks
  • 3         Our mobile vision
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • 4         Strategic goals
  • 3         Our mobile vision
  • 4         Strategic goals
  • 3         Our mobile vision
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • 4         Strategic goals
  • Adopt an evidence-based approach to service development and delivery
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Adopt an evidence-based approach to service development and delivery
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Tactics
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Adopt an evidence-based approach to service development and delivery
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Tactics
  • Tactics
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Tactics
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • Recommended
  • 6.1      Governance and infrastructure
  • Library’s IT Strategy Group will determine priorities
  • formalising the Web Committee
  • Information Technology Division to examine ongoing resourcing
  • formalising the Web Committee
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • formalising the Web Committee
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes
  • Investigate infrastructure and resourcing requirements for digital recording and distribution to ensure the long-term sustainability of online broadcast activity
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • formalising the Web Committee
  • Information Technology Division to examine ongoing resourcing
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Collections Management Division to keep a watching brief on any developments pertaining to the extension of Legal Deposit to include digital (and mobile) conten
  • developing a statement of collecting intentions for the various categories of ebook titles within the context of revising the collecting policy for Australian electronic publications
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes
Joanne S

Companies and information: The leaky corporation | The Economist - 0 views

  • the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
  • Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
  • Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
  • ...10 more annotations...
  • more and more data are seeping out of companies, even of the sort that should be well protected.
  • To be able to work better with data, employees often transfer them into spreadsheets and other types of files that are easier to manipulate—but also easier to lose control of.
  • Although most leaks are not deliberate, many are.
  • “data loss prevention” (DLP).
  • software that sits at the edge of a firm's network and inspects the outgoing data traffic.
  • “bells in the dark”. False records—made-up pieces of e-mail, say—are spread around the network. Because they are false, no one should gain access to them. If somebody does, an alarm is triggered
  • In the corporate world, to limit the channels through which data can escape, some companies do not allow employees to bring their own gear to work or to use memory sticks or certain online services.
  • How then to strike the right balance between secrecy and transparency?
  • Intel, the world's largest chipmaker, issues “speeding tickets” to employees who break its rules.
  • Transparency is not just a natural inclination but a necessity, says Mitchell Baker, who chairs the foundation. If Mozilla kept its cards close to the chest, its global community of developers would not and could not help write the program. So it keeps secrets to a minimum: employees' personal information, data that business partners do not want made public and security issues in its software.
Joanne S

Emerald | Diffusion of innovation theories and their relevance to understanding the rol... - 0 views

  •  
    Holland, M. (1997). Diffusion of innovation theories and their relevance to understanding the role of librarians when introducing users to networked information. The Electronic Library, 15(5), 389-394. doi:10.1108/eb045587 Start at part 2. Background and History p.390 
Joanne S

Recordkeeping In Brief 62 - FAQs about cloud computing - State Records NSW - 0 views

  • Cloud computing is internet-based computing whereby shared resources, software and information are provided to computers and other devices on demand.
  • Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
  • There are a range of applications that can be delivered to users via cloud computing models, from email or content management to specialist applications for activities such as project management or human resources management to data storage.
    • Joanne S
       
      Models include: Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS)
  • ...8 more annotations...
  • A cloud can be private or public:
  • As with any business related activity there are both risks and opportunities associated with using cloud computing services.
  • potentially a number of business and information risks associated with using cloud computing services.
  • noted that even if the cloud computing environment is managed wholly within NSW an appropriate risk assessment of the service and the provider should occur.
  • level of risk that an organisation attributes to a proposed cloud computing arrangement will vary according to the content or subject matter of their records
  • The content of the contract in these types of service arrangements is very important.
  • What are others saying? Australia Australasian Digital Recordkeeping Initiative (ADRI), Advice on managing the recordkeeping risks associated with cloud computing, July 2010, available at http://www.adri.gov.au Defence Signals Directorate (Commonwealth), Cloud computing security considerations, April 2011, available at http://www.dsd.gov.au/infosec/cloudsecurity.htm Department of Finance and Deregulation (Commonwealth), Cloud computing strategic direction paper: opportunities and applicability for use by the Australian Government, April 2011, available at http://www.finance.gov.au/e-government/strategy-and-governance/docs/final_cloud_computing_strategy_version_1.pdf
  • International Archives and Records Association UK and Ireland, Cloud computing toolkit: guidance for outsourcing information storage to the cloud, August 2010, available at http://www.archives.org.uk/images/documents/Cloud_Computing_Toolkit-2.pdf – this guidance contains a comprehensive overview of the range of cloud computing services available and the recordkeeping considerations that apply to each CIO Council and Chief Acquisition Officers Council (USA), Creating effective cloud computing contracts for the Federal Government: best practices for acquiring IT as a service, February 2012, available at http://www.cio.gov/cloudbestpractices.pdf – this is a comprehensive and useful document for those seeking to procure cloud computing services
Joanne S

What is a Database, really? Data Storage for Librarians « The Other Librarian - 0 views

  • A Text File Good old text is still not a bad way to store data. 
  • If you want to retrieve that information, you can use a script to tell the computer to organize the information in a particular way.   This is called parsing
  • Structured Text As you climb the data food chain, complex systems get developed to organize information. 
  • ...17 more annotations...
  • Mark-up:   Marked information is data that has marks or signals to let a computer distinguish one type of data from the other.  
  • A variable:   A variable happens when you give some data a name. 
  • A string:   A string is a kind of variable that has text.
  • An array:   An array is a type of variable that includes a list used by computer programs for later manipulation.    
  • An object:   Explaining objects in full requires that someone read up on object-oriented programming.  
  • Tree-based  Structures Tree-based structures, or cluster models are a subset of “structured text” data storage models.  
  • XML is probably the best example.
  • data is organized in “parents”, “siblings” and “children”.
  • The Relational Model The relational model is better than a tree-model when your dataset is large and complicated.    The way it works is, instead of thinking in terms of “parents, siblings and children,” you think in term of relationships.
  • the “Primary Key.”   This means that every data object (such as a library) has a way of identifying itself in a unique way
  • a “Foreign Key.”    The Foreign key is a way to associate one dataset (eg. libraries) with another dataset (eg. library branches, hospitals or businesses).
  • This association is called a relationship.
  • In more complicated relationships (called the Many-to-Many relationship), you might have to create a third table to associate two entities.      
  • TEXT/XML Based Text files can be organized in such a way as to accommodate some of the benefits of the relational model.
  • Two examples of XML-based databases include Xindice and Sedna.
  • SQL/Binary-based Databases The more common relational database type is a piece of software running on a server, rather than a set of text files.   They are generally accessed using a standard language called SQL (Structure Query Language), or more specifically SQL as supported by a popular scripting language like PHP, Python or Java.
  • Almost any major web application will have a combination of all these types of data storage methods!  
  •  
    How databases are used in libraries
Joanne S

The Code4Lib Journal - How Hard Can It Be? : Developing in Open Source - 0 views

  • We experienced freedom to explore alternate avenues, to innovate, to take risks in ways that would have been difficult under the direct control of a district council.
  • patrons made it clear that while they appreciated that computers were a necessary part of a modern library, they did not consider them the most important part.
  • Our overall objective was to source a library system which: could be installed before Y2K complications immobilised us, was economical, in terms of both initial purchase and future license and maintenance support fees, ran effectively and fast by dial-up modem on an ordinary telephone line, used up-to-the minute technologies, looked good, and was easy for both staff and public to use, took advantage of new technology to permit members to access our catalogue and their own records from home, and let us link easily to other sources of information – other databases and the Internet. If we could achieve all of these objectives, we’d be well on the way to an excellent service.
  • ...14 more annotations...
  • "How hard can it be" Katipo staff wondered, "to write a library system that uses Internet technology?" Well, not very, as it turned out.
  • Koha would thus be available to anyone who wanted to try it and had the technical expertise to implement it.
  • fairly confident that we already had a high level of IT competence right through the staff, a high level of understanding of what our current system did and did not do.
  • ensure the software writers did not miss any key points in their fundamental understanding of the way libraries work.
  • The programming we commissioned cost us about 40% of the purchase price of an average turn-key solution.
  • no requirement to purchase a maintenance contract, and no annual licence fees.
  • An open source project is never finished.
  • Open source projects only survive if a community builds up around the product to ensure its continual improvement. Koha is stronger than ever now, supported by active developers (programmers) and users (librarians)
  • There are a range of support options available for Koha, both free and paid, and this has contributed to the overall strength of the Koha project.
  • Vendors like Anant, Biblibre, ByWater, Calyx, Catalyst, inLibro, IndServe, Katipo, KohaAloha, LibLime, LibSoul, NCHC, OSSLabs, PakLAG, PTFS, Sabinet, Strategic Data, Tamil and Turo Technology take the code and sell support around the product, develop add-ons and enhancements for their clients and then contribute these back to the project under the terms of the GPL license.
  • FRBR [5] arrangement, although of course it wasn’t called that 10 years ago, it was just a logical way for us to arrange the catalogue. A single bibliographic record essentially described the intellectual content, then a bunch of group records were attached, each one representing a specific imprint or publication.
  • The release of Koha 3.0 in late 2008 brought Koha completely into the web 2.0 age and all that entails. We are reconciled to taking a small step back for now, but the FRBR logic is around and RDA should see us back where want to be in a year or so – but with all the very exciting features and opportunities that Koha 3 has now.
  • In the early days, the Koha list appeared to have been dominated by programmers but I have noticed a lot more librarians participating now
  • "Adopt technology that keeps data open and free, abandon[ing] technology that does not." The time is right for OSS.
  •  
    For more information about Koha and how it was developed, see: Ransom, J., Cormack, C., & Blake, R. (2009). How Hard Can It Be? : Developing in Open Source. Code4Lib Journal, (7). Retrieved from http://journal.code4lib.org/articles/1638
Joanne S

What is social software? In Social software in libraries: building collaboration, commu... - 0 views

  •  
    Farkas, M. G. (2007). What is social software? In Social software in libraries: building collaboration, communication, and community online. Information Today, Inc. Retrieved from http://www.sociallibraries.com/farkaschap1.pdf
Joanne S

Kroski, E. (2008). Web 2.0. In Web 2.0 for librarians and information professionals - 0 views

  •  
    Kroski, E. (2008). Web 2.0. In Web 2.0 for librarians and information professionals. New York: Neal-Schuman.  (Available from: https://auth.lis.curtin.edu.au/cgi-bin/auth-ng/authredirect.cgi?redirurl=http://edocs.lis.curtin.edu.au/eres.cgi&url=dc60266981 )
Joanne S

Publications | National and State Libraries Australasia - 0 views

  •  
    National and State Libraries Australasia. (2008). Re-imagining library services: strategic plan. Retrieved from http://nsla.org.au/publications/papers/2008/pdf/NSLA.Discussion-Paper-20080708-Re.imagining.Library.Services.Strategic.Plan.pdf MULTIMEDIA PLATFORMS IN INFORMATION SERVICES
Joanne S

Full Report - Information Systems Audit Report: Full Report (No. 4). Perth, Western Au... - 0 views

  •  
    ( Full report at Office of the Auditor General for Western Australia. (2011). Information Systems Audit Report: Full Report (No. 4). Perth, Western Australia. Retrieved from http://www.audit.wa.gov.au/reports/pdfreports/report2011_04.pdf )
Joanne S

Office of the Auditor General for Western Australia. (2011). Information Systems Audit ... - 0 views

  •  
    Office of the Auditor General for Western Australia. (2011). Information Systems Audit Report: Summary. Perth, Western Australia. Retrieved from http://www.audit.wa.gov.au/reports/pdfreports/insert2011_04.pdf
Joanne S

The Universal Declaration of Human Rights - 0 views

  • Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
  •  
    "We also discussed the United Nations Universal Declaration of Human Rights, Article 19: Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers."
Michelle Pitman

Reinventing Society In The Wake Of Big Data | Conversation | Edge - 0 views

  •  
    Engaging discussion the concept of Big Data.  As Berners-Lee asked us for data as in Linked Data, Pentland argues that people at the micro levels will provide the information in Big Data that will change the societies we live in. His spin is positive in that he believes BD will offer opportunities for improved medicine, better financial systems and better government.  Amazing discussion. Really speaks to info management technologies. 
Joanne S

Michael Mace talks about the future of ebooks - YouTube - 0 views

  •  
    Michael Mace was a keynote speaker at the ALIA Information Online conference in February 2011. The interview was recorded just after his talk, so there is very loud music in the background. Michael Mace talks about the future of ebooks. (2011). Retrieved from http://www.youtube.com/watch?v=T5mm6ahe8B4&feature=youtube_gdata_player
Joanne S

2001 Public Libraries Conference paper - 0 views

  •  
    Hutley, S., Joseph, M., & Saunders, P. (2001). Follow the eBook road: eBooks in Oz public libraries. In Endless Possibilities. Presented at the ALIA Public Libraries Conference, Melbourne Australia: Australian Library and Information Association. Retrieved from http://conferences.alia.org.au/public2001/hutley.joseph.saunders.html
Joanne S

An Alternative to Existing Library Websites : Evaluation of Nine Start Pages using Crit... - 0 views

  •  
    WEB START PAGES AS LIBRARY HOME PAGES This is long, so just browse it to get the gist of the tools examined and the criteria used. Pigott, C. (2009). An Alternative to Existing Library Websites: Evaluation of Nine Start Pages Using Criteria Extracted from Library Literature. School of Information Management, Victoria University of Wellington. Retrieved from http://researcharchive.vuw.ac.nz//handle/10063/1276
Joanne S

Reprogramming The Museum | museumsandtheweb.com - 0 views

  • Powerhouse experie
  • her APIs
  • Flickr AP
  • ...23 more annotations...
  • Thomson Reuters OpenCalais
  • OCLC's WorldCat
  • Before we began our work on the Commons on Flickr, some museum colleagues were concerned that engaging with the Flickr community would increase workloads greatly. While the monitoring of the site does take some work, the value gained via the users has far outweighed any extra effort. In some cases, users have dated images for us.
  • In subsequent use of the Flickr API, we appropriated tags users had added to our images, and now include them in our own collection database website (OPAC). We also retrieved geo-location data added to our images for use in third party apps like Sepiatown and Layar.
  • In our case the purpose of creating an API was to allow others to use our content.
  • So consider the questions above not in the context of should we or shouldn't we put our data online (via an API or otherwise) but rather in the context of managing expectations of the data's uptake.
  • Steps to an API
  • several important things which had to happen before we could provide a public web API. The first was the need to determine the licence status of our content.
  • The drive to open up the licensing of our content came when, on a tour we conducted of the Museum's collection storage facilities for some Wikipedian
  • This prompted Seb Chan to make the changes required to make our online collection documentation available under a mix of Creative Commons licences. (Chan, April 2009)
  • Opening up the licensing had another benefit: it meant that we had already cleared one hurdle in the path to creating an API.
  • The Government 2.0 Taskforce (http://gov2.net.au/about/) was the driver leading us to take the next step.
  • "increasing the openness of government through making public sector information more widely available to promote transparency, innovation and value adding to government information"
  • the first cultural institution in Australia to provided a bulk data dump of any sort.
  • The great thing about this use is that it exposes the Museum and its collection to the academic sector, enlightening them regarding potential career options in the cultural sector.
  • I will briefly mention some of the technical aspects of the API now for those interested. In line with industry best practice the Powerhouse Museum is moving more and more to open-source based hosting and so we chose a Linux platform for serving the API
  • Images are served from the cloud as we had already moved them there for our OPAC, to reduce outgoing bandwidth from the Museum's network.
  • Once we had the API up and running, we realised it would not be too much work to make a WordPress plug-in which allowed bloggers to add objects from our collection to their blogs or blog posts. Once built, this was tested internally on our own blogs. Then in early 2011 we added it to the WordPress plugin directory: http://wordpress.org/extend/plugins/powerhouse-museum-collection-image-grid/
  • One of the main advantages the API has over the data dump is the ability to track use.
  • It is also worth noting that since the API requests usually do not generate pages that are rendered in a browser it is not possible to embed Google Analytics tracking scripts in the API's output.
  • y requiring people to sign up using a valid email address before requesting an API key we are able to track API use back to individuals or organisations.
  • Concerns that people would use the API inappropriately were dealt with by adding a limit to the number of requests per hour each key can generate
  • An Application Programming Interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided by another particular software program
  •  
    Dearnley, L. (2011). Repreogramming the museum. In Museums and the Web 2011 : Proceedings. Presented at the Museums and the Web 2011, Toronto: Archives & Museum Informatics. Retrieved from http://conference.archimuse.com/mw2011/papers/reprogramming_the_museum
Joanne S

Library 2.0 and User-Generated Content What can the users do for us? - 0 views

  •  
    Danowski, P. (2007). Library 2.0 and User-Generated Content What can the users do for us? In World Library and Information Congress: 73rd IFLA General Conference and Council. Durban, South Africa: IFLA. Retrieved from http://archive.ifla.org/IV/ifla73/papers/113-Danowski-en.pdf
1 - 20 of 56 Next › Last »
Showing 20 items per page